The Promise of Cybersecurity
"The Promise of Cybersecurity: From Prevention to Response: Building a Fortified Cyber Environment" is a crucial manual for comprehending and addressing cyber dangers in a time when digital threats are pervasive. This extensive book covers everything from the fundamentals to cutting-edge defense techniques, taking readers on an enlightening tour through the complex world of cybersecurity.The book's first section covers the foundational ideas of cybersecurity and describes the different kinds of cyber threats, including malware, phishing, and advanced persistent threats. The readers will comprehensively comprehend these hazards and acquire efficient tactics to avert them. After that, the story dives into developing a robust cyber defense, covering data security methods, endpoint protection, and network security measures.The book's extensive section on incident response emphasizes the necessity of having a well-structured strategy in place. It also covers cybersecurity's ethical and legal aspects, ensuring readers know responsible behavior and compliance.This book offers insightful information about the opportunities and challenges that the emergence of AI, quantum computing, and cloud services presents for the cybersecurity industry. Readers can improve their security posture with actionable actions from real-world case studies and helpful guidance.The book "The Promise of Cybersecurity" gives you the skills and information you need to create a secure online environment and keep ahead of changing threats, regardless of whether you work in IT, are a company leader, or are just interested in safeguarding your digital life.
Big Data and Social Computing
This book constitutes the refereed proceedings of the 9th China National Conference on Big Data and Social Computing, BDSC 2024, held in Harbin, China, during August 8-10, 2024. The 28 full papers presented in this volume were carefully reviewed and selected from a total of 141 submissions. The papers in the volume are organized according to the following topics: digital society and public security; modelling and simulation of social systems; internet intelligent algorithm governance; social network and group behavior; innovation, risks, and network security of large language models; and artificial intelligence and cognitive science.
Counterterrorism and Cybersecurity
Counterterrorism and cybersecurity are the top two priorities at the Federal Bureau of Investigation (FBI). Graduated from the FBI Citizens Academy in 2021, Prof. Newton Lee offers a broad survey of counterterrorism and cybersecurity history, strategies, and technologies in the 3rd edition of his riveting book that examines the role of the intelligence community, cures for terrorism, war and peace, cyber warfare, and quantum computing security. From September 11 attacks and Sony-pocalypse to Israel's 9/11 and MOAB (Mother of All Breaches), the author shares insights from Hollywood such as 24, Homeland, The Americans, and The X-Files. In real life, the unsung heroes at the FBI have thwarted a myriad of terrorist attacks and cybercrimes. The FBI has worked diligently to improve its public image and build trust through community outreach and pop culture. Imagine Sherlock Holmes meets James Bond in crime fighting, FBI Director Christopher Wray says, "We've got technically trained personnel-with cutting-edge tools and skills you might never have imagined seeing outside of a James Bond movie-covering roughly 400 offices around the country." This book is indispensable for anyone who is contemplating a career at the FBI, think tanks, or law enforcement agencies worldwide. It is also a must-read for every executive to safeguard their organization against cyberattacks that have caused more than $10 billion in damages. In the spirit of President John F. Kennedy, one may proclaim: "Ask not what counterterrorism and cybersecurity can do for you, ask what you can do for counterterrorism and cybersecurity." Praise for the First Edition: "The book presents a crisp narrative on cyberattacks and how to protect against these attacks. ... The author views terrorism as a disease that may be cured through education and communication. ... The book is a relevant, useful, and genial mix of history, current times, practical advice, and policy goals." - Brad Reid, ACM Computing Reviews "Very professional and well researched." - Eleanor Clift, Newsweek and The Daily Beast
Advanced Intelligent Computing Technology and Applications
This 6-volume set LNAI 14875-14880 constitutes - in conjunction with the 13-volume set LNCS 14862-14874 and the 2-volume set LNBI 14881-14882 - the refereed proceedings of the 20th International Conference on Intelligent Computing, ICIC 2024, held in Tianjin, China, during August 5-8, 2024. The total of 863 regular papers were carefully reviewed and selected from 2189 submissions. The intelligent computing annual conference primarily aims to promote research, development and application of advanced intelligent computing techniques by providing a vibrant and effective forum across a variety of disciplines. This conference has a further aim of increasing the awareness of industry of advanced intelligent computing techniques and the economic benefits that can be gained by implementing them. The intelligent computing technology includes a range of techniques such as Artificial Intelligence, Pattern Recognition, Evolutionary Computing, Informatics Theories and Applications, Computational Neuroscience & Bioscience, Soft Computing, Human Computer Interface Issues, etc.
Sustainable Development Using Private AI
This book covers the fundamental concepts of private AI and its applications. It also covers fusion of Private AI with cutting-edge technologies like cloud computing, federated learning and computer vision.
Cybersecurity of Discrete Event Systems
Su's book describes analysis and control against smart cyberattacks in discrete event systems (DES). This book is the first in the DES community to provide a thorough introduction of smart cyberattacks on supervisory control systems.
Advanced Intelligent Computing Technology and Applications
This 6-volume set LNAI 14875-14880 constitutes - in conjunction with the 13-volume set LNCS 14862-14874 and the 2-volume set LNBI 14881-14882 - the refereed proceedings of the 20th International Conference on Intelligent Computing, ICIC 2024, held in Tianjin, China, during August 5-8, 2024. The total of 863 regular papers were carefully reviewed and selected from 2189 submissions. The intelligent computing annual conference primarily aims to promote research, development and application of advanced intelligent computing techniques by providing a vibrant and effective forum across a variety of disciplines. This conference has a further aim of increasing the awareness of industry of advanced intelligent computing techniques and the economic benefits that can be gained by implementing them. The intelligent computing technology includes a range of techniques such as Artificial Intelligence, Pattern Recognition, Evolutionary Computing, Informatics Theories and Applications, Computational Neuroscience & Bioscience, Soft Computing, Human Computer Interface Issues, etc.
Byte by Byte
In the digital landscape of today, personal computers (PCs) serve as indispensable tools for communication, productivity, and entertainment. "Byte by Byte: Mastering the Essentials of Personal Computing" serves as a comprehensive guide for both novices and seasoned users, navigating through the intricate world of PCs.This book begins by tracing the evolution of personal computing, from its humble beginnings to the sophisticated machines of the present day. It delves into the fundamental components of a PC, elucidating the roles of processors, memory, storage, and input/output devices. Operating systems are demystified, empowering readers to understand the backbone of their computing experience.
Learn Clip Studio Paint - Fourth Edition
This beginner-friendly colored-guide to Clip Studio Paint, by award-winning artist Inko Ai Takita, equips you with all the essential tools to tell your own manga story and develop your digital drawing skills.Key Features: - A comprehensive guide by an award-winning artist for creating manga and comics digitally- Explore essential drawing, inking, and coloring techniques to create captivating characters and stories that pop off the page- Take your first steps into animation with Clip Studio Paint, and learn how to bring your artwork to lifeBook Description: Ever dreamed of creating your own manga art or comic books? Learn Clip Studio Paint, Fourth Edition is your roadmap to becoming a digital artist! This beginner-friendly guide takes you on a step-by-step journey of digital illustration. You'll get to grips with one of the essential features of digital illustration, layering, as you go through the process of penciling and inking your art. If you're interested in creating a webtoon graphic novel or web comic, you'll be happy to learn about comic-making essentials such as panels, sound effects, and speech bubblesIn this edition, you'll learn artistic techniques alongside Clip Studio Paint features, including a new focus on how to bring your artwork to life with proportions and perspective. You'll learn how to draw characters with various brushes and brush customizations, as well as exploring coloring methods and rulers to make your stories pop. The edition also dives into exciting new features like using 3D models to draw poses and the basics of creating animationsPacked with clear instructions and illustrated examples, this book is your one-stop shop for learning Clip Studio Paint. If you dream of creating your own manga art or comics, this guide equips you with skills to achieve your goalsWhat You Will Learn: - Organize layers to make your artwork easy to edit- Customize tools and brushes to draw compelling characters- Implement inking and coloring techniques to your art- Craft engaging comic panel layouts- Employ layer masks and screentones for professional results- Use 3D models to learn poses for your characters- Explore animation basics to bring your artwork to life- Leverage Clip Studio Paint's vast library of assets- Export your creations for various platforms, including print and webWho this book is for: If you're just starting out as a digital artist or want to switch to Clip Studio Paint from a different graphics software package, then this book is for you. While this book is designed for those with no prior knowledge of digital art, intermediate-level users looking to explore the unique features of Clip Studio Paint will also find this book useful.Table of Contents- Image Gallery of Manga and Illustrations Created by Clip Studio Paint- Installing Clip Studio Paint Pro and Interface Basics- Penciling: Layer and Layer Property Palettes- Introducing Clip Studio Paint Brushes- Pages and Panels to Shape Manga- Erasers, Selections, and the Sub View Palette- Using Text and Balloon Tools- Getting Started with Inking Tools- Material Palette and Inking Special Effects- Exploring Vector Layers- Creating Your Own Sound Effects- Making Layer Masks and Screentones- All About Rulers- Using 3D Figures and Objects- Color Palette- Using Clip Studio Paint to Color Your Manga- Auto Actions and Your Workflow- Exploring Clip Studio Assets and Animations- Exporting, Printing, and Uploading Your Manga
Cloud Core
Cloud computing has revolutionized the way businesses and individuals interact with technology, offering unparalleled scalability, flexibility, and cost efficiency. This book provides a comprehensive exploration of the core concepts, architectures, and services that define cloud computing, making it an essential resource for IT professionals, students, and technology enthusiasts.The journey begins with an Overview of Cloud Computing, tracing its History and Evolution and highlighting the Key Benefits of Cloud Adoption. Readers will gain a foundational understanding of the primary cloud service models, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).
Networking Nexus
"Networking Nexus: Foundations & Innovations in Computer Connectivity" provides a comprehensive exploration of computer networking, blending foundational principles with the latest advancements in the field. This book is designed to serve both as an introductory guide for newcomers and a detailed reference for seasoned professionals.The journey begins with an overview of networking basics, including the evolution of networks, essential terminologies, and the significance of various networking models and protocols. Readers will gain an understanding of different network architectures, such as LANs, WANs, and wireless networks, along with the topologies and technologies that define them.
Modern Networking
"Networking Essentials: Concepts, Technologies, and Future Directions" is a comprehensive guide that explores the fundamental principles, advanced technologies, and emerging trends in computer networking.Beginning with foundational concepts such as data transmission, network architectures, and the OSI and TCP/IP models, the book provides a solid understanding of how networks operate. It progresses into more advanced topics including software-defined networking (SDN), network function virtualization (NFV), and the transformative potential of 5G technology. These sections are designed to equip both students and professionals with practical knowledge and insights into modern networking paradigms.The book also addresses crucial practical applications such as network security strategies, performance optimization techniques, and the integration of wireless and IoT technologies. Each chapter emphasizes real-world scenarios and best practices to prepare readers for challenges in network design, management, and security. Looking ahead, the final chapters delve into the future of networking, discussing trends such as AI-driven network management and quantum networking.
Fundamentals, Innovations, and Future of Distributed Ledger Technology
Fundamentals, Innovations, and Future of Distributed Ledger Technology explores the revolutionary world of blockchain technology, providing a comprehensive overview of its foundational principles, architectural design, and diverse applications. This book delves into the intricacies of blockchain, explaining how this transformative technology works, its historical evolution, and the core concepts that underpin its operation, such as distributed ledger technology, consensus mechanisms, and cryptographic hash functions.The book is structured to guide readers from basic understanding to advanced knowledge, covering the architecture of blockchain, including block structures, hashing, and Merkle trees, as well as various consensus mechanisms like Proof-of-Work, Proof-of-Stake, and Byzantine Fault Tolerance.
Practical Cyber Intelligence
Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative process Practical Cyber Intelligence provides a thorough and practical introduction to the different tactics, techniques, and procedures that exist in the field of cyber investigation and cyber forensics to collect, preserve, and analyze digital evidence, enabling readers to understand the digital landscape and analyze legacy devices, current models, and models that may be created in the future. Readers will learn how to determine what evidence exists and how to find it on a device, as well as what story it tells about the activities on the device. Over 100 images and tables are included to aid in reader comprehension, and case studies are included at the end of the book to elucidate core concepts throughout the text. To get the most value from this book, readers should be familiar with how a computer operates (e.g., CPU, RAM, and disk), be comfortable interacting with both Windows and Linux operating systems as well as Bash and PowerShell commands and have a basic understanding of Python and how to execute Python scripts. Practical Cyber Intelligence includes detailed information on: OSINT, the method of using a device's information to find clues and link a digital avatar to a person, with information on search engines, profiling, and infrastructure mapping Window forensics, covering the Windows registry, shell items, the event log and much more Mobile forensics, understanding the difference between Android and iOS and where key evidence can be found on the device Focusing on methodology that is accessible to everyone without any special tools, Practical Cyber Intelligence is an essential introduction to the topic for all professionals looking to enter or advance in the field of cyber investigation, including cyber security practitioners and analysts and law enforcement agents who handle digital evidence.
Implementing Active Directory consolidated in infrastructures
The Active Directory directory service can be compared to a phone book or a personal organizer. In it we can organize days, weeks, months and even years, recording people's names, birthdays, important data and much more. The directory service has exactly the same meaning, that of organizing and, above all, having a centralized place to search for the information we need in our day-to-day work. The main task to be carried out in this project is to migrate from one domain to another in order to bring them together to form part of the same forest of a single domain. With the implementation of this solution, it is hoped that the respective AD Forests and Domains will be consolidated in order to take better advantage of the benefits that a consolidated AD environment brings to organizations, such as centralized management of network resources in an agile and more secure manner.
Mobile Ad-hoc Networks
Mobile Ad-hoc Networks (MANETs) represent a remarkable evolution in wireless communication technology, characterized by their dynamic and self-configuring nature. Unlike traditional networks, MANETs do not rely on any fixed infrastructure, making them highly adaptable and resilient in various environments. This book aims to provide a comprehensive exploration of the principles, protocols, and applications that define the landscape of mobile ad-hoc networks.In recent years, the proliferation of mobile devices and the growing need for seamless connectivity have propelled MANETs to the forefront of wireless communication research and development. From disaster recovery scenarios to military operations, from vehicular communication systems to the Internet of Things (IoT), the applications of MANETs are as diverse as they are impactful. This book delves into the theoretical foundations as well as the practical implementations of these networks, offering readers a balanced perspective on both the challenges and opportunities they present.
Psychology of UX Design
DESCRIPTION Understanding how users think, feel, and interact with digital products is crucial for creating designs that not only look good but also deliver exceptional user satisfaction. This book will help designers learn the fundamentals of design through the lenses of psychology, gamification, and biases. It includes numerous examples from actual mobile apps and websites, both Indian and global, allowing readers to connect the dots and deeply understand the psychological reasons behind various designs.Readers will understand how Fitt's law, Hick's law, and Miller's law shape layouts and decisions. They will also learn to use Gestalt principles for intuitive interfaces. You will discover how user behavior is influenced by the Zeigarnik effect, Halo effect, and Goal Gradient effect. The book will help you discover tips and tricks for gamifying your product, leading to better user acquisition and retention. Readers will learn about key biases that can impact design decisions. Featuring examples from well-known brands like Myntra, LinkedIn, Airbnb, MakeMyTrip, Swiggy, Zepto, Amazon, Flipkart, Walmart, and many more, this book connects with the products you use daily, helping you apply similar insights to your designs.Non-designers will also benefit from this book, as it provides valuable insights into the thought processes behind the design of physical and digital products, enabling them to observe and appreciate the design elements in their surroundings.KEY FEATURES ● Learn design with examples from booming startups and digital products.● Learn how the fundamentals of psychology help enhance design and process.● Learn gamification with the product's examples you use everyday.WHAT YOU WILL LEARN● Understand the psychological reasons behind every design.● Predict user behavior and make informed design decisions.● Motivate users to perform specific tasks.● Apply gamification theories to enhance user adoption.● Avoid biases during design development and review.WHO THIS BOOK IS FORThis book is intended for UX designers, UI designers, graphic designers, product managers, and any other designers interested in understanding their audience better.
Nlp and Text Mining Applications in R
Natural language processing (NLP) is a specialized field within artificial intelligence (AI) that is concerned with the interaction between computers and human languages. Renowned for its prowess in statistical computing and data analysis, the R programming language provides a robust library and toolset for NLP and text-mining applications. This book examines the theoretical foundations of NLP and text mining, providing illustrative examples to elucidate their real-world applications.
Click Me Baby One More Time
Geo has been a key figure in the influencer industry for 15 years, shaping the digital landscape from within some of the biggest brands in the world. Here, she peels back the curtain on the digital world that shapes our self-esteem, gender roles, even the structure of our brains. With a blend of insider anecdotes and media-nerd research, Geo shows us how the sausage is made (and what happens if you eat it!), from child safety to hustle culture and cancelling Elon Musk.This book is a must-read for anyone who spends hours per day on their phone (that's you!). Geo's insider perspective uncovers the realities behind our screen time, the influence of social platforms, and the commodification of our lives."Click Me Baby One More Time" dives into critical issues such as overconsumption, misinformation, and the future of parenting in the digital age. Through chapters like "Under the Influence" and "Confessions of a Shopaholic," Geo provides a comprehensive guide to understanding and navigating our digital landscape.Join Geo in this essential exploration of the digital age - it's a gripping, insightful read that will change the way you view your screens and yourself.
Social Processes of Online Hate
This book explores the social forces among and between online aggressors that affect the expression and perpetration of online hate. Its chapters illustrate how patterns of interactive social behavior reinforce, magnify, or modify this expression.
Secret History
This unique, award winning book offers a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical perparation, the book presents the mathematics in sufficient detail and weaves the history throughout the chapters. In addition to the fascinating historical and political sides of cryptology, the author-a former Scholar-in-Residence at the U.S. National Security Agency (NSA) Center for Cryptologic History-includes interesting instances of codes and ciphers in crime, literature, music, and art. The book helps further enlivens the already extremely popular field of cryptology.
Generative AI with Amazon Bedrock
Become proficient in Amazon Bedrock by taking a hands-on approach to building and scaling generative AI solutions that are robust, secure, and compliant with ethical standardsKey Features: - Learn the foundations of Amazon Bedrock from experienced AWS Machine Learning Specialist Architects- Master the core techniques to develop and deploy several AI applications at scale- Go beyond writing good prompting techniques and secure scalable frameworks by using advanced tips and tricks- Purchase of the print or Kindle book includes a free PDF eBookBook Description: The concept of generative artificial intelligence has garnered widespread interest, with industries looking to leverage it to innovate and solve business problems. Amazon Bedrock, along with LangChain, simplifies the building and scaling of generative AI applications without needing to manage the infrastructure.Generative AI with Amazon Bedrock takes a practical approach to enabling you to accelerate the development and integration of several generative AI use cases in a seamless manner. You'll explore techniques such as prompt engineering, retrieval augmentation, fine-tuning generative models, and orchestrating tasks using agents. The chapters take you through real-world scenarios and use cases such as text generation and summarization, image and code generation, and the creation of virtual assistants. The latter part of the book shows you how to effectively monitor and ensure security and privacy in Amazon Bedrock.By the end of this book, you'll have gained a solid understanding of building and scaling generative AI apps using Amazon Bedrock, along with various architecture patterns and security best practices that will help you solve business problems and drive innovation in your organization.What You Will Learn: - Explore the generative AI landscape and foundation models in Amazon Bedrock- Fine-tune generative models to improve their performance- Explore several architecture patterns for different business use cases- Gain insights into ethical AI practices, model governance, and risk mitigation strategies- Enhance your skills in employing agents to develop intelligence and orchestrate tasks- Monitor and understand metrics and Amazon Bedrock model response- Explore various industrial use cases and architectures to solve real-world business problems using RAG- Stay on top of architectural best practices and industry standardsWho this book is for: This book is for generalist application engineers, solution engineers and architects, technical managers, ML advocates, data engineers, and data scientists looking to either innovate within their organization or solve business use cases using generative AI. A basic understanding of AWS APIs and core AWS services for machine learning is expected.Table of Contents- Exploring Amazon Bedrock- Accessing and Utilizing Models in Amazon Bedrock- Engineering Prompts for Effective Model Usage- Customizing Models for Enhanced Performance- Harnessing the Power of RAG- Generating and Summarizing Text with Amazon Bedrock- Building Question Answering Systems and Conversational Interfaces- Extracting Entities and Generating Code with Amazon Bedrock- Generating and Transforming Images Using Amazon Bedrock- Developing Intelligent Agents with Amazon Bedrock- Evaluating and Monitoring Models with Amazon Bedrock- Ensuring Security and Privacy in Amazon Bedrock
Analysis of radio and fiber optic technologies
This research discusses radio and fiber optic technologies in the quilombola community of Umarizal. It looks at the two technologies present in the community's Conect_A&D internet provider. The general objective was to analyze the radio and fiber optic technologies in operation at the Internet provider in the quilombola community of Umarizal, Bai瓊o. The aim was to obtain comparative data between the two technologies, using a field study methodology with a qualitative approach. To this end, specific applications and software were used, among other practical analyses, in order to achieve the general objective of the research. The results obtained reveal the differences between the technologies in terms of speed, stability, costs, advantages and disadvantages. The results show that although fiber optic technology costs twice as much to deploy, it offers a better quality service and wider bandwidths. However, in the community of Umarizal, radio stands out for its ability to serve users where there are no conditions for laying optical cables.
Computer Security - Esorics 2024
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024. The 86 full papers presented in these proceedings were carefully reviewed and selected from 535 submissions. They were organized in topical sections as follows: Part I: Security and Machine Learning. Part II: Network, Web, Hardware and Cloud; Privacy and Personal Datat Protection. Part III: Software and Systems Security; Applied Cryptopgraphy. Part IV: Attacks and Defenses; Miscellaneous.
Security and Cryptography for Networks
The two-volume set LNCS 14973 and 14974 constitutes the proceedings of the 14th International Conference on Security and Cryptography for Networks, SCN 2024, which took place in Amalfai, Italy, during September 11-13, 2024. The 33 full papers included in the proceedings were carefully reviewed and selected from 90 submissions. They were organized in topical sections as follows: Part I: Zero Knowledge; foundations; protocols; voting systems; Part II: Homomorphic encryption; symmetric key encryption; cryptanalysis; key management; blockchains.
Security and Cryptography for Networks
The two-volume set LNCS 14973 and 14974 constitutes the proceedings of the 14th International Conference on Security and Cryptography for Networks, SCN 2024, which took place in Amalfai, Italy, during September 11-13, 2024. The 33 full papers included in the proceedings were carefully reviewed and selected from 90 submissions. They were organized in topical sections as follows: Part I: Zero Knowledge; foundations; protocols; voting systems; Part II: Homomorphic encryption; symmetric key encryption; cryptanalysis; key management; blockchains.
Driving the Future
A CAN bus, the common intra-vehicle network standard, has been used for over three decades. However, its weight, maintenance costs, and installation complexity increase with more ECUs, especially in AVs. This book aims to replace wired CAN with wireless CAN. Proposed solutions include designing an AV model with external and internal ECUs using CANoe/MATLAB simulation. Modifying ECU architecture for wireless communication, implementing a hidden communication environment with CCK modulation, and addressing jamming signals using dual channels. Testing using MATLAB and OPNET shows stable BER and packet loss, with robust CCK modification and challenges in signal interception. Results indicate successful integration of internal and external ECUs with IEEE 802.11b, and using 100BaseT Fast Ethernet for high bandwidth LiDAR data and delay requirements.
An Ideal Smart Campus and Environ
This book is a research work that aims at designing a smart environment, interconnecting network and end-users devices, censored objects and authentication equipment. In the end, this work, tend to promote an enhanced way of communication among students on campus, members of staff in their respective offices and neighboring communities. A multi-factor attendance taking in lectures, movement and treatment of files and security alert system constitutes the activities on the proposed network. The departments of the faculty of Natural and applied sciences was used for the design experience.
Securing endpoints to improve IT security
"Securing endpoints to improve IT security" introduces you to topics like effective unified endpoint management, overcoming endpoint management challenges, mitigating ransomware and malware, and securing personal data to achieve and sustain GDPR compliance. You'll learn how to manage a heterogeneous network from one central location. You'll also learn about some endpoint security best practices for keeping attackers at bay. In short, this book will assist you in effectively securing all your endpoints to keep your data and network safe.
Mobile and Ubiquitous Systems: Computing, Networking and Services
These two-volume proceedings constitute the refereed post-conference proceedings of the 20th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2023, held in Melbourne, Australia, during November 14-17, 2023. The 65 papers presented in these proceedings were carefully reviewed and selected from 161 submissions. The conference papers are organized in topical sections on: Part I - Tracking and Detection; IoT; Federated learning; Networks; Activity recognition; Security Management; Urban/Mobile Crowdsensing. Part II - Urban/Mobile Crowdsensing; Edge computing; Crowdsourcing, Platforms and localization; Activity recognition and prediction; AI and machine learning; Mobile edge and fog computing; Mobile augmented reality and applications for mobile computing; interaction technologies; AutoQuitous workshop.
Mobile and Ubiquitous Systems: Computing, Networking and Services
These two-volume proceedings constitute the refereed post-conference proceedings of the 20th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2023, held in Melbourne, Australia, during November 14-17, 2023. The 65 papers presented in these proceedings were carefully reviewed and selected from 161 submissions. The conference papers are organized in topical sections on: Part I - Tracking and Detection; IoT; Federated learning; Networks; Activity recognition; Security Management; Urban/Mobile Crowdsensing. Part II - Urban/Mobile Crowdsensing; Edge computing; Crowdsourcing, Platforms and localization; Activity recognition and prediction; AI and machine learning; Mobile edge and fog computing; Mobile augmented reality and applications for mobile computing; interaction technologies; AutoQuitous workshop.
Computer Viruses Exposed
In a world where cyber threats are ever-present, safeguarding your digital life has never been more critical. "Computer Viruses Exposed: No More Infections" is your essential handbook for protecting your computer from malicious attacks. This comprehensive guide demystifies the complexities of viruses, malware, and other online threats, providing clear, actionable steps to identify, remove, and prevent infections. Whether you're a tech novice or a seasoned user, you'll discover practical tips and expert advice on using antivirus software, recognizing suspicious activity, and implementing robust security practices. Empower yourself with the knowledge to keep your digital world safe and secure with "Computer Viruses Exposed: No More Infections". Here's a little of what you'll learn in this book: - Types of Malware: Viruses, Adware, and Spyware - How Malware Infects Your Computer - Recognizing Signs of Malware Infection - Importance of Regular Software Updates - Using Antivirus Software: What to Look For - The Role of Firewalls in Malware Protection - Safe Browsing Practices to Avoid Malware - Avoiding Phishing Scams - Importance of Strong, Unique Passwords - Multi-Factor Authentication: An Extra Layer of Security - Risks of Downloading Free Software - Safely Downloading and Installing Software - Email Attachments: How to Handle Them Safely - The Danger of Malicious Links in Emails and Messages - How to Recognize and Avoid Malvertising - Keeping Your Operating System Secure - Using Secure Wi-Fi Networks - The Importance of Regular Backups - Securing Your Mobile Devices Against Malware - Understanding Ransomware and How to Protect Against It - The Role of VPNs in Protecting Your Privacy - Avoiding Fake Antivirus Scams - Regularly Scanning Your Computer for Malware - How to Secure Your Home Network - Understanding and Using Browser Security Settings - Risks of Using Public Wi-Fi and How to Mitigate Them - Parental Controls and Protecting Kids Online - Recognizing Social Engineering Attacks - Importance of Security Training and Awareness - Using Encryption to Protect Sensitive Data - How to Respond to a Malware Infection - Protecting Against Keyloggers - The Role of Ad Blockers in Preventing Adware - Ensuring Safe Online Shopping and Banking - And More!
The CyberSecurity Leadership Handbook for the CISO and the CEO - Updated Edition
The updated and expanded edition of the "Cybersecurity Leadership Handbook for the CISO and the CEO" released in February 2023A selection of key articles from veteran infosec thought-leader and Corix Partners Founder JC Gaillard, an essential handbook for all leaders around cybersecurity and a compendium of good advice, looking beyond the technology horizon, into corporate organization, management, governance, and the real dynamics of security transformation.A must-have for anyone interested in learning how a comprehensive, integrated approach to cybersecurity can help organizations overcome legacy and current risks and build a robust, adaptive defense against cyber threats in the corporate worldThe author (JC Gaillard) has been involved with information security matters for over 20 years and started writing regularly on the topic in 2015.Talking to CISOs, CIO, CEOs and their teams as part of his day-to-day field work as consultant, he became gradually horrified by what he was seeing in too many large corporates in terms of security maturity levels and the actual problems some were still struggling with - something that goes way beyond anecdotal evidence and is at the heart of survey after survey every year.After all, information security good practices have been well established for over 20 years and many industry bodies have been promoting them and evolving them throughout that period.Why is it that large firms which have had fully functioning information security teams in place all that time, and have spent - collectively - hundreds of millions on the topic if not more on cyber security, are still struggling today with issues - such as patch management - which should have been on their radar for over 10 years?There is truly a cyber security lost decade for many between the CodeRed, Slammer and Blaster outbreaks of 2001-2003 and the Wannacry and Not Petya attacks of 2017.By failing to get the basics right in terms of security during that time, while continuing to engage in massive cloud-driven business transformation programmes that have turned the enterprise into a truly borderless hybrid, many large firms have dramatically increased their level of exposure to cyber threats. And now the acceleration of the digital transformation emboldened by the COVID crisis and its aftermath, and the emergence of disruptive artificial intelligence products, is making things even more complex.Politicians and regulators are now involved as the GDPR and other similar legislations across the world have shown us over the past few years, now with an even increased regulatory burden building up across the United States and worldwide.At Board level, the "when-not-if" paradigm around cyber-attacks has taken root, but it creates fundamentally different dynamics for CISOs and CIOs, as the focus shifts radically from risk and compliance towards execution and delivery, often in exchange of massive investments around security.To embed those different dynamics around cyber security and make true progress, large organisations must stop thinking of the topic in pure technological terms, look back and address urgently the underlying cultural and governance issues that have been the true roadblocks of that "lost decade".This is the theme the author has been developing since 2015 through his contribution to the Corix Partners blog and the second edition of this "Handbook" offers a selection of over 100 articles published between 2015 and 2024.They frame a true reflexion on those matters and offer elements of solution to start changing the narrative around cyber security.
Essential Guide to LLMOps
Unlock the secrets to mastering LLMOps with innovative approaches to streamline AI workflows, improve model efficiency, and ensure robust scalability, revolutionizing your language model operations from start to finishKey Features: - Gain a comprehensive understanding of LLMOps, from data handling to model governance- Leverage tools for efficient LLM lifecycle management, from development to maintenance- Discover real-world examples of industry cutting-edge trends in generative AI operation- Purchase of the print or Kindle book includes a free PDF eBookBook Description: The rapid advancements in large language models (LLMs) bring significant challenges in deployment, maintenance, and scalability. This Essential Guide to LLMOps provides practical solutions and strategies to overcome these challenges, ensuring seamless integration and the optimization of LLMs in real-world applications.This book takes you through the historical background, core concepts, and essential tools for data analysis, model development, deployment, maintenance, and governance. You'll learn how to streamline workflows, enhance efficiency in LLMOps processes, employ LLMOps tools for precise model fine-tuning, and address the critical aspects of model review and governance. You'll also get to grips with the practices and performance considerations that are necessary for the responsible development and deployment of LLMs. The book equips you with insights into model inference, scalability, and continuous improvement, and shows you how to implement these in real-world applications.By the end of this book, you'll have learned the nuances of LLMOps, including effective deployment strategies, scalability solutions, and continuous improvement techniques, equipping you to stay ahead in the dynamic world of AI.What You Will Learn: - Understand the evolution and impact of LLMs in AI- Differentiate between LLMOps and traditional MLOps- Utilize LLMOps tools for data analysis, preparation, and fine-tuning- Master strategies for model development, deployment, and improvement- Implement techniques for model inference, serving, and scalability- Integrate human-in-the-loop strategies for refining LLM outputs- Grasp the forefront of emerging technologies and practices in LLMOpsWho this book is for: This book is for machine learning professionals, data scientists, ML engineers, and AI leaders interested in LLMOps. It is particularly valuable for those developing, deploying, and managing LLMs, as well as academics and students looking to deepen their understanding of the latest AI and machine learning trends. Professionals in tech companies and research institutions, as well as anyone with foundational knowledge of machine learning will find this resource invaluable for advancing their skills in LLMOps.Table of Contents- Introduction to LLMs and LLMOps- Reviewing LLMOps Components- Processing Data in LLMOps Tools- Developing Models via LLMOps - LLMOps Review and Compliance- LLMOps Strategies for Inference, Serving, and Scalability- LLMOps Monitoring and Continuous Improvement- The Future of LLMOps and Emerging Technologies
Adversarial AI Attacks, Mitigations, and Defense Strategies
"The book not only explains how adversarial attacks work but also shows you how to build your own test environment and run attacks to see how they can corrupt ML models. It's a comprehensive guide that walks you through the technical details and then flips to show you how to defend against these very same attacks."- Elaine Doyle, VP and Cybersecurity Architect, SalesforceKey Features: - Understand the unique security challenges presented by predictive and generative AI- Explore common adversarial attack strategies as well as emerging threats such as prompt injection- Mitigate the risks of attack on your AI system with threat modeling and secure-by-design methods- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Adversarial attacks trick AI systems with malicious data, creating new security risks by exploiting how AI learns. This challenges cybersecurity as it forces us to defend against a whole new kind of threat. This book demystifies adversarial attacks and equips you with the skills to secure AI technologies, moving beyond research hype or business-as-usual activities. Learn how to defend AI and LLM systems against manipulation and intrusion through adversarial attacks such as poisoning, trojan horses, and model extraction, leveraging DevSecOps, MLOps, and other methods to secure systems.This strategy-based book is a comprehensive guide to AI security, combining structured frameworks with practical examples to help you identify and counter adversarial attacks. Part 1 introduces the foundations of AI and adversarial attacks. Parts 2, 3, and 4 cover key attack types, showing how each is performed and how to defend against them. Part 5 presents secure-by-design AI strategies, including threat modeling, MLSecOps, and guidance aligned with OWASP and NIST. The book concludes with a blueprint for maturing enterprise AI security based on NIST pillars, addressing ethics and safety under Trustworthy AI.By the end of this book, you'll be able to develop, deploy, and secure AI systems against the threat of adversarial attacks effectively.What You Will Learn: - Set up a playground to explore how adversarial attacks work- Discover how AI models can be poisoned and what you can do to prevent this- Learn about the use of trojan horses to tamper with and reprogram models- Understand supply chain risks- Examine how your models or data can be stolen in privacy attacks- See how GANs are weaponized for Deepfake creation and cyberattacks- Explore emerging LLM-specific attacks, such as prompt injection- Leverage DevSecOps, MLOps and MLSecOps to secure your AI systemWho this book is for: This book tackles AI security from both angles - offense and defence. AI developers and engineers will learn how to create secure systems, while cybersecurity professionals, such as security architects, analysts, engineers, ethical hackers, penetration testers, and incident responders will discover methods to combat threats to AI and mitigate the risks posed by attackers. The book also provides a secure-by-design approach for leaders to build AI with security in mind.To get the most out of this book, you'll need a basic understanding of security, ML concepts, and Python.Table of Contents- Getting Started with AI- Building Our Adversarial Playground- Security and Adversarial AI- Poisoning Attacks- Model Tampering with Trojan Horses and Model Reprogramming- Supply Chain Attacks and Adversarial AI- Evasion Attacks against Deployed AI- Privacy Attacks - Stealing Models(N.B. Please use the Read Sample option to see further chapters)
The Complete Guide to Defense in Depth
Gain comprehensive insights to safeguard your systems against advanced threats and maintain resilient security postureKey Features: - Develop a comprehensive understanding of advanced defense strategies to shape robust security programs- Evaluate the effectiveness of a security strategy through the lens of Defense in Depth principles- Understand the attacker mindset to deploy solutions that protect your organization from emerging threats- Purchase of the print or Kindle book includes a free PDF eBookBook Description: In an era of relentless cyber threats, organizations face daunting challenges in fortifying their defenses against increasingly sophisticated attacks. The Complete Guide to Defense in Depth offers a comprehensive roadmap to navigating the complex landscape, empowering you to master the art of layered security.This book starts by laying the groundwork, delving into risk navigation, asset classification, and threat identification, helping you establish a robust framework for layered security. It gradually transforms you into an adept strategist, providing insights into the attacker's mindset, revealing vulnerabilities from an adversarial perspective, and guiding the creation of a proactive defense strategy through meticulous mapping of attack vectors. Toward the end, the book addresses the ever-evolving threat landscape, exploring emerging dangers and emphasizing the crucial human factor in security awareness and training. This book also illustrates how Defense in Depth serves as a dynamic, adaptable approach to cybersecurity.By the end of this book, you'll have gained a profound understanding of the significance of multi-layered defense strategies, explored frameworks for building robust security programs, and developed the ability to navigate the evolving threat landscape with resilience and agility.What You Will Learn: - Understand the core tenets of Defense in Depth, its principles, and best practices- Gain insights into evolving security threats and adapting defense strategies- Master the art of crafting a layered security strategy- Discover techniques for designing robust and resilient systems- Apply Defense in Depth principles to cloud-based environments- Understand the principles of Zero Trust security architecture- Cultivate a security-conscious culture within organizations- Get up to speed with the intricacies of Defense in Depth for regulatory compliance standardsWho this book is for: This book is for security engineers, security analysts, and security managers who are focused on secure design and Defense in Depth. Business leaders and software developers who want to build a security mindset will also find this book valuable. Additionally, students and aspiring security professionals looking to learn holistic security strategies will benefit from the book. This book doesn't assume any prior knowledge and explains all the fundamental concepts. However, experience in the security industry and awareness of common terms will be helpful. Table of Contents- Navigating Risk, Classifying Assets, and Unveiling Threats- Practical Guide to Defense in Depth- Building a Framework for Layered Security- Understanding the Attacker Mindset- Uncovering Weak Points through an Adversarial Lens- Mapping Attack Vectors and Gaining an Edge- Building a Proactive Layered Defense Strategy- Understanding Emerging Threats and Defense in Depth - The Human Factor - Security Awareness and Training- Defense in Depth - A Living, Breathing Approach to Security
Threat Modeling Gameplay with EoP
Work with over 150 real-world examples of threat manifestation in software development and identify similar design flaws in your systems using the EoP game, along with actionable solutionsKey Features: - Apply threat modeling principles effectively with step-by-step instructions and support material- Explore practical strategies and solutions to address identified threats, and bolster the security of your software systems- Develop the ability to recognize various types of threats and vulnerabilities within software systems- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Are you looking to navigate security risks, but want to make your learning experience fun? Here's a comprehensive guide that introduces the concept of play to protect, helping you discover the threats that could affect your software design via gameplay. Each chapter in this book covers a suit in the Elevation of Privilege (EoP) card deck (a threat category), providing example threats, references, and suggested mitigations for each card. You'll explore the methodology for threat modeling-Spoofing, Tampering, Repudiation, Information Disclosure, and Elevation of Privilege (S.T.R.I.D.E.) with Privacy deck and the T.R.I.M. extension pack. T.R.I.M. is a framework for privacy that stands for Transfer, Retention/Removal, Inference, and Minimization. Throughout the book, you'll learn the meanings of these terms and how they should be applied. From spotting vulnerabilities to implementing practical solutions, the chapters provide actionable strategies for fortifying the security of software systems.By the end of this book, you will be able to recognize threats, understand privacy regulations, access references for further exploration, and get familiarized with techniques to protect against these threats and minimize risks.What You Will Learn: - Understand the Elevation of Privilege card game mechanics- Get to grips with the S.T.R.I.D.E. threat modeling methodology- Explore the Privacy and T.R.I.M. extensions to the game- Identify threat manifestations described in the games- Implement robust security measures to defend against the identified threats- Comprehend key points of privacy frameworks, such as GDPR to ensure complianceWho this book is for: This book serves as both a reference and support material for security professionals and privacy engineers, aiding in facilitation or participation in threat modeling sessions. It is also a valuable resource for software engineers, architects, and product managers, providing concrete examples of threats to enhance threat modeling and develop more secure software designs. Furthermore, it is suitable for students and engineers aspiring to pursue a career in application security. Familiarity with general IT concepts and business processes is expected.Table of Contents- Game Play- Spoofing- Tampering- Repudiation- Information Disclosure- Denial of Service- Elevation of Privilege- Privacy- Transfer- Retention/Removal- Inference- Minimization- Glossary- Further Reading
Generative AI Foundations in Python
Begin your generative AI journey with Python as you explore large language models, understand responsible generative AI practices, and apply your knowledge to real-world applications through guided tutorialsKey Features: - Gain expertise in prompt engineering, LLM fine-tuning, and domain adaptation- Use transformers-based LLMs and diffusion models to implement AI applications- Discover strategies to optimize model performance, address ethical considerations, and build trust in AI systems- Purchase of the print or Kindle book includes a free PDF eBookBook Description: The intricacies and breadth of generative AI (GenAI) and large language models can sometimes eclipse their practical application. It is pivotal to understand the foundational concepts needed to implement generative AI. This guide explains the core concepts behind -of-the-art generative models by combining theory and hands-on application.Generative AI Foundations in Python begins by laying a foundational understanding, presenting the fundamentals of generative LLMs and their historical evolution, while also setting the stage for deeper exploration. You'll also understand how to apply generative LLMs in real-world applications. The book cuts through the complexity and offers actionable guidance on deploying and fine-tuning pre-trained language models with Python. Later, you'll delve into topics such as task-specific fine-tuning, domain adaptation, prompt engineering, quantitative evaluation, and responsible AI, focusing on how to effectively and responsibly use generative LLMs.By the end of this book, you'll be well-versed in applying generative AI capabilities to real-world problems, confidently navigating its enormous potential ethically and responsibly.What You Will Learn: - Discover the fundamentals of GenAI and its foundations in NLP- Dissect foundational generative architectures including GANs, transformers, and diffusion models- Find out how to fine-tune LLMs for specific NLP tasks- Understand transfer learning and fine-tuning to facilitate domain adaptation, including fields such as finance- Explore prompt engineering, including in-context learning, templatization, and rationalization through chain-of-thought and RAG- Implement responsible practices with generative LLMs to minimize bias, toxicity, and other harmful outputsWho this book is for: This book is for developers, data scientists, and machine learning engineers embarking on projects driven by generative AI. A general understanding of machine learning and deep learning, as well as some proficiency with Python, is expected.Table of Contents- Understanding Generative AI: An Introduction- Surveying GenAI Types and Modes: An Overview of GANs, Diffusers, and Transformers- Tracing the Foundations of Natural Language Processing and the Impact of the Transformer- Applying Pretrained Generative Models: From Prototype to Production- Fine-Tuning Generative Models for Specific Tasks- Understanding Domain Adaptation for Large Language Models- Mastering the Fundamentals of Prompt Engineering- Addressing Ethical Considerations and Charting a Path Toward Trustworthy Generative AI
Cybersecurity Risk Management
Cybersecurity refers to the set of technologies, practices, and strategies designed to protect computer systems, networks, devices, and data from unauthorized access, theft, damage, disruption, or misuse. It involves identifying and assessing potential threats and vulnerabilities, and implementing controls and countermeasures to prevent or mitigate them. Some major risks of a successful cyberattack include: data breaches, ransomware attacks, disruption of services, damage to infrastructure, espionage and sabotage. Cybersecurity Risk Management: Enhancing Leadership and Expertise explores this highly dynamic field that is situated in a fascinating juxtaposition with an extremely advanced and capable set of cyber threat adversaries, rapidly evolving technologies, global digitalization, complex international rules and regulations, geo-politics, and even warfare. A successful cyber-attack can have significant consequences for individuals, organizations, and society as a whole. With comprehensive chapters in the first part of the book covering fundamental concepts and approaches, and those in the second illustrating applications of these fundamental principles, Cybersecurity Risk Management: Enhancing Leadership and Expertise makes an important contribution to the literature in the field by proposing an appropriate basis for managing cybersecurity risk to overcome practical challenges.
ChatGPT for Conversational AI and Chatbots
Explore ChatGPT technologies to create state-of-the-art chatbots and voice assistants, and prepare to lead the AI revolutionKey Features: - Learn how to leverage ChatGPT to create innovative conversational AI solutions for your organization- Harness LangChain and delve into step-by-step LLM application development for conversational AI- Gain insights into security, privacy, and the future landscape of large language models and conversational AI- Purchase of the print or Kindle book includes a free PDF eBookBook Description: ChatGPT for Conversational AI and Chatbots is a definitive resource for exploring conversational AI, ChatGPT, and large language models.This book introduces the fundamentals of ChatGPT and conversational AI automation. You'll explore the application of ChatGPT in conversation design, the use of ChatGPT as a tool to create conversational experiences, and a range of other practical applications. As you progress, you'll delve into LangChain, a dynamic framework for LLMs, covering topics such as prompt engineering, chatbot memory, using vector stores, and validating responses. Additionally, you'll learn about creating and using LLM-enabling tools, monitoring and fine tuning, LangChain UI tools such as LangFlow, and the LangChain ecosystem. You'll also cover popular use cases, such as using ChatGPT in conjunction with your own data. Later, the book focuses on creating a ChatGPT-powered chatbot that can comprehend and respond to queries directly from your unique data sources. The book then guides you through building chatbot UIs with ChatGPT API and some of the tools and best practices available.By the end of this book, you'll be able to confidently leverage ChatGPT technologies to build conversational AI solutions.What You Will Learn: - Gain a solid understanding of ChatGPT and its capabilities and limitations- Understand how to use ChatGPT for conversation design- Discover how to use advanced LangChain techniques, such as prompting, memory, agents, chains, vector stores, and tools- Create a ChatGPT chatbot that can answer questions about your own data- Develop a chatbot powered by ChatGPT API- Explore the future of conversational AI, LLMs, and ChatGPT alternativesWho this book is for: This book is for tech-savvy readers, conversational AI practitioners, engineers, product owners, business analysts, and entrepreneurs wanting to integrate ChatGPT into conversational experiences and explore the possibilities of this game-changing technology. Anyone curious about using internal data with ChatGPT and looking to stay up to date with the developments in large language models will also find this book helpful. Some expertise in coding and standard web design concepts would be useful, along with familiarity with conversational AI terminology, though not essential.Table of Contents- Introduction to Chatbots, Conversational AI, and ChatGPT- Using ChatGPT with Conversation Design- ChatGPT Mastery - Unlocking Its Full Potential- Prompt Engineering and the ChatGPT API- LangChain - Introduction and Getting Started- Advanced LangChain - LangChain Debugging Techniques, Memory, Agents, and Tools- Retrieval-Augmented Generation - Utilizing Vector Stores as a Knowledge Base- Chatting About Your Data - Creating Your Own ChatGPT Application- The Future of Conversational AI with LLMs
Human Proxies in Cryptographic Networks
Human Proxies offer new directions to end-to-end encryption: End-A-to-End-Z encryption must be rethought when it turns out to be an End-B-to-End-Z encryption. And, Human Proxies raise questions that were neither answered by science, journalists nor the public. Regular Proxies on a network are forwarding Internet requests, e.g., to download a webpage. Also, in political and social settings a Proxy as an intermediate, deputy or representative with a similar function is given. Human Proxies now enable within the Encryption and Messenger Application Spot-On to choose a friend as a Human Proxy. The Spot-On program is a most modern and elaborated encryption suite available for several operation systems and provides many innovations in applied cryptography. It builds based on the Echo Protocol a cryptographic network, that is beyond Cryptographic Routing. With Human Proxies now a friend from the Messenger friends list sends out the chat message instead of the original sender. The construct of the "Inner Envelope" behind the Human Proxy function also creates new cryptographic challenges, provides plausible deniability to included nodes, and offers new perspectives in encryption, its analysis and decryption: As all messages in the network are encrypted, end-to-end encryption is new defined and gets with Human Proxies a potential second and plausible deniable start point. The essay in this book discusses some related aspects of Human Proxies and their referring's to encryption, networking, graph theory and comparable social and political processes of Proxies. This leads to a further general approach: Endpoints in Encryption are equipped by the application Spot-On with the vision of interoperability of endpoints in communications. English & German language.
Digital Transformation in Cloud Computing
With the rapid development of cloud computing and digital transformation, well-designed cloud-based architecture is always in urgent need. Illustrated by project cases from the Chinese technology company Alibaba, this book elaborates how to design a cloud-based application system and build them on the cloud.
Advances in Computational Collective Intelligence
This two-volume set CCIS 2165-2166 constitutes the refereed proceedings of the 16th International Conference on Computational Collective Intelligence, ICCCI 2024, held in Leipzig, Germany, during September 9-11, 2024. The 67 full papers included in this book were carefully reviewed and selected from 234 submissions. The main track, covering the methodology and applications of CCI, included: collective decision-making, data fusion, deep learning techniques, natural language processing, data mining and machine learning, social networks and intelligent systems, optimization, computer vision, knowledge engineering and application, as well as Internet of Things: technologies and applications. The special sessions, covering some specific topics of particular interest, included: cooperative strategies for decision making and optimization, security and reliability of information, networks and social media, anomalies detection, machine learning, deep learning, digital image processing, artificial intelligence, speech communication, IOT applications, natural language processing, innovative applications in data science.
Advances in Computational Collective Intelligence
This two-volume set CCIS 2165-2166 constitutes the refereed proceedings of the 16th International Conference on Computational Collective Intelligence, ICCCI 2024, held in Leipzig, Germany, during September 9-11, 2024. The 67 full papers included in this book were carefully reviewed and selected from 234 submissions. The main track, covering the methodology and applications of CCI, included: collective decision-making, data fusion, deep learning techniques, natural language processing, data mining and machine learning, social networks and intelligent systems, optimization, computer vision, knowledge engineering and application, as well as Internet of Things: technologies and applications. The special sessions, covering some specific topics of particular interest, included: cooperative strategies for decision making and optimization, security and reliability of information, networks and social media, anomalies detection, machine learning, deep learning, digital image processing, artificial intelligence, speech communication, IOT applications, natural language processing, innovative applications in data science.
Network Navigators
"Network Navigators: Exploring the World of Computer Networking" offers an insightful journey into the realm of computer networking. Authored by experts in the field, the book delves into fundamental concepts such as network architecture, protocols, and security. It provides practical guidance on designing, implementing, and managing networks, catering to both beginners and seasoned professionals. With real-world examples and case studies, "Network Navigators" equips readers with the knowledge needed to navigate the complexities of modern networking landscapes, making it an essential resource in the digital age.
Cloud Computing
Welcome to the exploration of Virtual Machine Migration in Cloud Computing Environments. This book delves into the intricate world of cloud computing, focusing specifically on virtual machine migration, the underlying queuing theories, and their implications on cloud performance and architecture. Join us as we uncover the complexities and innovations that drive efficient cloud operations.This book aims to serve as a comprehensive guide for researchers, practitioners, and enthusiasts interested in understanding the nuances of Virtual Machine Migration, Queuing Theory, and their impact on Cloud Computing. We hope that the insights provided within these pages will inspire further exploration and innovation in this rapidly evolving field.
Mastering Angular Test-Driven Development
Unlock the full potential of Angular test-driven development (TDD) with Jasmine, Karma, Protractor, and Cypress for effective unit testing, end-to-end testing, and CI/CDKey Features: - Implement test-driven development practices in Angular using tools like Jasmine, Karma, and Cypress- Understand end-to-end testing through real-world scenarios and practical examples- Discover best practices for incorporating TDD into continuous integration and deployment (CI/CD) processes- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Do you want to learn how to build robust, reliable, and impressive Angular applications? If yes, then Angular test-driven development is for you!Mastering Angular Test-Driven Development is a comprehensive guide that provides you with essential resources to enhance your skills and deliver high-quality Angular applications. With a practical approach and real-world examples, the book extensively covers TDD concepts, techniques, and tools, going beyond unit testing to explore testing Angular pipes, forms, and reactive programming.In this book, you'll learn how to validate and manipulate data using pipes, test Angular forms for input validation and user interactions, and handle asynchronous operations with reactive programming. Additionally, you'll discover end-to-end testing using Protractor, Cypress, and Playwright frameworks, gaining valuable insights into writing robust tests for web applications, navigation, element interaction, and behavior validation. You'll also understand how to integrate TDD with CI/CD, learning best practices for automating tests, deploying Angular applications, and achieving faster feedback loops.By the end of this book, you'll be able to successfully implement TDD in your Angular projects with the help of practical examples, best practices, and clear explanations.What You Will Learn: - Explore the fundamentals of TDD in Angular- Set up your development environment with Jasmine and Karma for effective unit testing- Discover advanced techniques for mocking and stubbing dependencies to isolate and test code units- Test Angular pipes, forms, and reactive programming for data validation and asynchronous operations- Understand end-to-end testing using Protractor, Cypress, and Playwright to validate application behavior- Get up to speed with best practices for automating tests and achieving faster feedback loopsWho this book is for: This book is for both experienced Angular developers and junior developers. Tech leads and architects who are responsible for code quality and scalability will also benefit from this book, as well as software development students looking to learn TDD concepts. Whether you're an experienced developer, a junior programmer, or a student, this book will equip you with the necessary knowledge to implement TDD in Angular projects. Table of Contents- Taking Your First Steps with TDD- Using Jasmine and Karma to Test Angular Applications- Writing Effective Unit Tests for Angular Components, Services, and Directives- Mocking and Stubbing Dependencies in Angular Tests- Testing Angular Pipes, Forms, and Reactive Programming- Exploring End-to-End Testing with Protractor, Cypress, and Playwright - Understanding Cypress and its Role in End-to-End Tests for Web Applications- Writing Effective End-to-End Component Tests with Cypress- Understanding Continuous Integration and Continuous Deployment (CI/CD) - Best Practices and Patterns for Angular TDD- Refactoring and Improving Angular Code through TDD
E-Connections
In the last few decades, the internet has revolutionized the way we live, work, and interact. From its humble beginnings as a government project to its current status as a global necessity, the internet has woven itself into the fabric of our daily lives. This book, E-Connections: The Impact of the Internet on Society, aims to explore this profound influence and to understand the myriad ways in which the internet shapes our world.The inspiration for this book came from observing the rapid changes in our society driven by the internet. Whether it's the way we communicate through social media, the transformation of shopping habits via e-commerce, or the shift in educational paradigms with online learning, the internet's impact is both pervasive and profound. Our goal is to provide a comprehensive overview of these changes, highlighting both the positive advancements and the challenges we face.We begin with the origins of the internet, tracing its development from a niche technology to a ubiquitous tool. From there, we delve into specific areas where the internet's influence is most pronounced: communication, social movements, commerce, education, and global connectivity.