Quality, Reliability, Security and Robustness in Heterogeneous Systems
This book constitutes the refereed post-conference proceedings of the 19th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2023, held in October 2023. The 78 full papers included in these proceedings were carefully reviewed and selected from 200 submissions. They are organized in these topical sections: Part I: E-Health networks; transportation networks; reliability and scalability; E-Health networks II; artificial intelligence and machine learning I; networks and applications. Part II: Robustness; Network Security and Privacy; Quality of Service (QoS) and Quality of Experience (QoE); Artificial Intelligence and Machine Learning II; Autonomous Vehicles.
Quality, Reliability, Security and Robustness in Heterogeneous Systems
This book constitutes the refereed post-conference proceedings of the 19th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2023, held in October 2023. The 78 full papers included in these proceedings were carefully reviewed and selected from 200 submissions. They are organized in these topical sections: Part I: E-Health networks; transportation networks; reliability and scalability; E-Health networks II; artificial intelligence and machine learning I; networks and applications. Part II: Robustness; Network Security and Privacy; Quality of Service (QoS) and Quality of Experience (QoE); Artificial Intelligence and Machine Learning II; Autonomous Vehicles.
Data and Applications Security and Privacy XXXVIII
This book constitutes the proceedings from the 38th Annual IFIP 11.3 Conference on Data and Applications Security and Privacy XXXVIII, DBSec 2024, held in San Jose, CA, USA, during July 15-17, 2024. The 14 full papers and 6 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in the following topical sections: access control; crypto application; privacy; attack; ml attack, vulnerability; security user studies; and differential privacy.
Automating Security Detection Engineering
Accelerate security detection development with AI-enabled technical solutions using threat-informed defenseKey Features- Create automated CI/CD pipelines for testing and implementing threat detection use cases- Apply implementation strategies to optimize the adoption of automated work streams- Use a variety of enterprise-grade tools and APIs to bolster your detection program- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionToday's global enterprise security programs grapple with constantly evolving threats. Even though the industry has released abundant security tools, most of which are equipped with APIs for integrations, they lack a rapid detection development work stream. This book arms you with the skills you need to automate the development, testing, and monitoring of detection-based use cases.You'll start with the technical architecture, exploring where automation is conducive throughout the detection use case lifecycle. With the help of hands-on labs, you'll learn how to utilize threat-informed defense artifacts and then progress to creating advanced AI-powered CI/CD pipelines to bolster your Detection as Code practices. Along the way, you'll develop custom code for EDRs, WAFs, SIEMs, CSPMs, RASPs, and NIDS. The book will also guide you in developing KPIs for program monitoring and cover collaboration mechanisms to operate the team with DevSecOps principles. Finally, you'll be able to customize a Detection as Code program that fits your organization's needs.By the end of the book, you'll have gained the expertise to automate nearly the entire use case development lifecycle for any enterprise.What you will learn- Understand the architecture of Detection as Code implementations- Develop custom test functions using Python and Terraform- Leverage common tools like GitHub and Python 3.x to create detection-focused CI/CD pipelines- Integrate cutting-edge technology and operational patterns to further refine program efficacy- Apply monitoring techniques to continuously assess use case health- Create, structure, and commit detections to a code repositoryWho this book is forThis book is for security engineers and analysts responsible for the day-to-day tasks of developing and implementing new detections at scale. If you're working with existing programs focused on threat detection, you'll also find this book helpful. Prior knowledge of DevSecOps, hands-on experience with any programming or scripting languages, and familiarity with common security practices and tools are recommended for an optimal learning experience.Table of Contents- Detection as Code Architecture and Lifecycle- Scoping and Automating Threat-Informed Defense Inputs- Developing Core CI/CD Pipeline Functions- Leveraging AI for Use Case Development- Implementing Logical Unit Tests- Creating Integration Tests- Leveraging AI for Testing- Monitoring Detection Health- Measuring Program Efficiency- Operating Patterns by Maturity
High-Level Synthesis Based Methodologies for Hardware Security, Trust and IP Protection
High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection presents state-of-the art high-level synthesis methodologies for hardware security and trust, including IP protection through synthesis-based watermarking and structural obfuscation. All modern electronic gadgets have complex system-on-chips (SoCs) that rely heavily on data intensive application specific processors, for digital signal processing (DSP), machine learning, and image processing applications. These data-intensive cores, in the form of intellectual property (IP), form an integral part of various modern equipment and consumer applications, such as smart phones, smart watches, and tablets. High level synthesis (HLS) frameworks play a pivotal role in designing these application specific processors. However, the design of such processors can be exposed to several trust issues and hardware security threats, such as IP piracy, fraud IP ownership, and reverse engineering. Written by an expert author, this book is a source of information for readers on HLS solutions for hardware security. It covers topics such as HLS-based watermarking using retinal biometrics, HLS-based structural obfuscation, and detective countermeasure against HLS-based hardware Trojan attacks. This book is a useful resource for researchers, graduate students, and practising engineers working in electronics and chip design.
Mastering Open Source Threat Analysis Strategies
The book is designed for a practical approach to learning, with examples based on scenarios. It covers possible OSINT blueprints from the beginning to an advanced levelDESCRIPTION OSINT is a powerful technology used to gather and analyze information from publicly available sources. It empowers cybersecurity professionals to proactively detect and mitigate threats. This book serves as a comprehensive guide offering strategic approaches and practical insights into leveraging OSINT for cybersecurity defense.This book is an all-encompassing guide to open-source intelligence (OSINT). It meticulously details tools, techniques, and applications across a multitude of domains. The book explores OSINT's use in social media, email domains, IP addresses, images, videos, documents, mobile numbers, companies, job postings, and the dark web. It probes OSINT's application for threat intelligence, data leak detection, understanding encryption, and digital certificates, assessing fake news, reverse image search, geolocation workarounds, real image identification, finding banned organizations, handling sensitive information like Aadhar and Social Security Numbers, while also tracking fraudulent SMS.By the end of this book, readers will emerge as competent cybersecurity professionals equipped with the skills and expertise to navigate the ever-evolving landscape of cyber threats with confidence and proficiency.KEY FEATURES ● Learn about OSINT and how to set up an OSINT environment for investigations.● Master techniques for tracking fraud SMS and investigating emails.WHAT YOU WILL LEARN● Understand the fundamentals of OSINT in cybersecurity.● Securing web browsers and ensuring online privacy.● Investigating emails and tracking cyber threats.● Gain insights into tracking mobile identities and domain or IP investigations.WHO THIS BOOK IS FORThis book is essential for cybersecurity professionals, investigators, law enforcement, and digital forensics analysts seeking advanced OSINT strategies.
Cost Savvy Secure Cloud
In "Cost Savvy Secure Cloud," author Preity Gupta challenges the misconception that security is solely a technological issue, not a business concern. With over 20 years of expertise, Preity Gupta navigates through the complexities faced by business owners in cloud security dilemmas that "Is Security a Boon or a Budgetary Burden". Through real-world case studies and strategic insights, this book unveils the true significance of Cloud Security across industries. From choosing the right cloud provider for cost efficiency to integrating Generative AI, readers learn to strike the perfect balance between Cloud Security and budgetary constraints. Dive into practical strategies for implementing cost-effective Cloud Security measures, leveraging AI-driven threat detection, and ensuring governance for business advancement. Are you ready to revolutionize your approach to Cloud Security and cost management for sustainable growth and success?Embark on a journey through the dynamic realm of Cost Savvy Secure Cloud with Preity Gupta, a distinguish Multi-Cloud Business Security Strategist experienced, as Advisor, Consultant, Manager, and Architect. With over 20 years of expertise, Preity leads transformative projects and guides organizations towards secure cloud solutions. Recognized for her visionary approach and robust analytical skills, she excels in compliance management and risk assessment. Join Preity as she navigates the complexities of cloud environments, delivering innovative AI-enabled solutions and shaping the future of cloud security.Connect with her on LinkedIn: /preitygupta.
Recent Advances in Computational Intelligence and Cyber Security
In the ever-accelerating tapestry of our digital age, the symbiotic relationship between computational intelligence and cyber security has become the linchpin of progress.
Practical Backscatter Communication for the Internet of Things
This book is devoted to offering a comprehensive and detailed discussion of the design of high-reliability, high-efficiency spectrum utilization, cross-technology support and concurrent backscatter schemes. It begins with the introductory Chapter 1, introducing the background of backscatter communication, including its concepts and characteristics. Then it highlights the potential IoT applications assisted by backscatter communication. The importance of high-reliability, high-efficiency spectrum utilization, cross-technology and concurrent backscatter schemes is emphasized to actualize these applications. Chapters 2 thru 5 discuss in detail how to achieve reliable backscatter (Chapter 2), spectrum-efficient backscatter (Chapter 3), cross-technology backscatter (Chapter 4) and concurrent backscatter (Chapter 5). Chapter 6 summarizes this book and provides a vision for future research directions to bring a broad class of IoT applications into our everyday lives. This book targets scientists, researchers, engineers and advanced-level students studying or working in pervasive computing, IoT, backscatter communication and other related areas. Professionals working in this related field will also want to purchase this book finding it a valuable resource.
Real-Time Communication
Forget siloed work and delayed learning. "Real-time communication" has emerged as the crucial backbone of collaboration in today's dynamic world. Imagine a classroom where ideas bounce back and forth in real-time, or a work team brainstorming solutions together, instantly. This is the power of real-time communication tools. These tools go beyond outdated email chains. Instant messaging platforms like Slack or Microsoft Teams allow for quick exchanges, fostering a constant flow of information and questions. Collaborative platforms like Google Docs enable multiple users to edit documents simultaneously, streamlining project development. Video conferencing tools like Zoom bridge physical gaps, allowing for face-to-face interaction and real-time feedback. The benefits are undeniable. Firstly, real-time communication fosters a more dynamic learning environment. Students can engage in active discussions, ask clarifying questions on the spot, and build upon each other's ideas. Secondly, it revolutionizes teamwork. Instant feedback and updates keep projects on track, while brainstorming sessions become more interactive and productive. This fosters a sense of shared purpose and accountability within teams. However, real-time communication also necessitates establishing clear communication protocols to avoid information overload and distractions. Despite this, these tools provide a powerful bridge for collaboration, propelling both work and learning environments towards a future of efficiency, active engagement, and shared success.
API Security for White Hat Hackers
Become an API security professional and safeguard your applications against threats with this comprehensive guideKey Features: - Gain hands-on experience in testing and fixing API security flaws through practical exercises- Develop a deep understanding of API security to better protect your organization's data- Integrate API security into your company's culture and strategy, ensuring data protection- Purchase of the print or Kindle book includes a free PDF eBookBook Description: APIs have evolved into an essential part of modern applications, making them an attractive target for cybercriminals. Written by a multi-award-winning cybersecurity leader, this comprehensive guide offers practical insights into testing APIs, identifying vulnerabilities, and fixing them.With a focus on hands-on learning, this book guides you through securing your APIs in a step-by-step manner. You'll learn how to bypass authentication controls, circumvent authorization controls, and identify vulnerabilities in APIs using open-source and commercial tools. Moreover, you'll gain the skills you need to write comprehensive vulnerability reports and recommend and implement effective mitigation strategies to address the identified vulnerabilities. This book isn't just about hacking APIs; it's also about understanding how to defend them. You'll explore various API security management strategies and understand how to use them to safeguard APIs against emerging threats.By the end of this book, you'll have a profound understanding of API security and how to defend against the latest threats. Whether you're a developer, security professional, or ethical hacker, this book will ensure that your APIs are secure and your organization's data is protected.What You Will Learn: - Implement API security best practices and industry standards- Conduct effective API penetration testing and vulnerability assessments- Implement security measures for API security management- Understand threat modeling and risk assessment in API security- Gain proficiency in defending against emerging API security threats- Become well-versed in evasion techniques and defend your APIs against them- Integrate API security into your DevOps workflow- Implement API governance and risk management initiatives like a proWho this book is for: If you're a cybersecurity professional, web developer, or software engineer looking to gain a comprehensive understanding of API security, this book is for you. The book is ideal for those who have beginner to advanced-level knowledge of cybersecurity and API programming concepts. Professionals involved in designing, developing, or maintaining APIs will also benefit from the topics covered in this book. Table of Contents- Introduction to API Architecture and Security- The Evolving API Threat Landscape and Security Considerations- OWASP API Security Top 10 Explained- API Attack Strategies and Tactics- Exploiting API Vulnerabilities- Bypassing API Authentication and Authorization Controls- Attacking API Input Validation and Encryption Techniques- API Vulnerability Assessment and Penetration Testing- Advanced API Testing: Approaches, Tools, and Frameworks- Using Evasion Techniques- Best Practices for Secure API Design and Implementation- Challenges and Considerations for API Security in Large Enterprises- Implementing Effective API Governance and Risk Management Initiatives
Mastering PyTorch - Second Edition
Master advanced techniques and algorithms for machine learning with PyTorch using real-world examplesUpdated for PyTorch 2.x, including integration with Hugging Face, mobile deployment, diffusion models, and graph neural networksPurchase of the print or Kindle book includes a free eBook in PDF formatKey Features: - Understand how to use PyTorch to build advanced neural network models- Get the best from PyTorch by working with Hugging Face, fastai, PyTorch Lightning, PyTorch Geometric, Flask, and Docker- Unlock faster training with multiple GPUs and optimize model deployment using efficient inference frameworksBook Description: PyTorch is making it easier than ever before for anyone to build deep learning applications. This PyTorch deep learning book will help you uncover expert techniques to get the most out of your data and build complex neural network models.You'll build convolutional neural networks for image classification and recurrent neural networks and transformers for sentiment analysis. As you advance, you'll apply deep learning across different domains, such as music, text, and image generation, using generative models, including diffusion models. You'll not only build and train your own deep reinforcement learning models in PyTorch but also learn to optimize model training using multiple CPUs, GPUs, and mixed-precision training. You'll deploy PyTorch models to production, including mobile devices. Finally, you'll discover the PyTorch ecosystem and its rich set of libraries. These libraries will add another set of tools to your deep learning toolbelt, teaching you how to use fastai to prototype models and PyTorch Lightning to train models. You'll discover libraries for AutoML and explainable AI (XAI), create recommendation systems, and build language and vision transformers with Hugging Face.By the end of this book, you'll be able to perform complex deep learning tasks using PyTorch to build smart artificial intelligence models.What You Will Learn: - Implement text, vision, and music generation models using PyTorch- Build a deep Q-network (DQN) model in PyTorch- Deploy PyTorch models on mobile devices (Android and iOS)- Become well versed in rapid prototyping using PyTorch with fastai- Perform neural architecture search effectively using AutoML- Easily interpret machine learning models using Captum- Design ResNets, LSTMs, and graph neural networks (GNNs)- Create language and vision transformer models using Hugging FaceWho this book is for: This deep learning with PyTorch book is for data scientists, machine learning engineers, machine learning researchers, and deep learning practitioners looking to implement advanced deep learning models using PyTorch. This book is ideal for those looking to switch from TensorFlow to PyTorch. Working knowledge of deep learning with Python is required.Table of Contents- Overview of Deep Learning using PyTorch- Deep CNN architectures- Combining CNNs and LSTMs- Deep Recurrent Model Architectures- Advanced Hybrid Models- Graph Neural Networks- Music and Text Generation with PyTorch- Neural Style Transfer- Deep Convolutional GANs- Deep Reinforcement Learning- Model Training Optimisations- Operationalizing PyTorch Models into Production- PyTorch on Mobile and Embedded Devices- Rapid Prototyping with PyTorch- PyTorch and AutoML- PyTorch and ExplainableAI- Recommendation systems with TorchRec- Recommendation systems with TorchRec- PyTorch x HuggingFace
Ransomware Analysis
This book presents the development of a classification scheme to organize and represent ransomware threat knowledge through the implementation of an innovative methodology centred around the semantic annotation of domain-specific source documentation.
Using Stable Diffusion with Python
Master AI image generation by leveraging GenAI tools and techniques such as diffusers, LoRA, textual inversion, ControlNet, and prompt design in this hands-on guide, with key images printed in colorKey Features- Master the art of generating stunning AI artwork with the help of expert guidance and ready-to-run Python code- Get instant access to emerging extensions and open-source models- Leverage the power of community-shared models and LoRA to produce high-quality images that captivate audiences- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionStable Diffusion is a game-changing AI tool that enables you to create stunning images with code. The author, a seasoned Microsoft applied data scientist and contributor to the Hugging Face Diffusers library, leverages his 15+ years of experience to help you master Stable Diffusion by understanding the underlying concepts and techniques.You'll be introduced to Stable Diffusion, grasp the theory behind diffusion models, set up your environment, and generate your first image using diffusers. You'll optimize performance, leverage custom models, and integrate community-shared resources like LoRAs, textual inversion, and ControlNet to enhance your creations. Covering techniques such as face restoration, image upscaling, and image restoration, you'll focus on unlocking prompt limitations, scheduled prompt parsing, and weighted prompts to create a fully customized and industry-level Stable Diffusion app. This book also looks into real-world applications in medical imaging, remote sensing, and photo enhancement. Finally, you'll gain insights into extracting generation data, ensuring data persistence, and leveraging AI models like BLIP for image description extraction.By the end of this book, you'll be able to use Python to generate and edit images and leverage solutions to build Stable Diffusion apps for your business and users.What you will learn- Explore core concepts and applications of Stable Diffusion and set up your environment for success- Refine performance, manage VRAM usage, and leverage community-driven resources like LoRAs and textual inversion- Harness the power of ControlNet, IP-Adapter, and other methodologies to generate images with unprecedented control and quality- Explore developments in Stable Diffusion such as video generation using AnimateDiff- Write effective prompts and leverage LLMs to automate the process- Discover how to train a Stable Diffusion LoRA from scratchWho this book is forIf you're looking to gain control over AI image generation, particularly through the diffusion model, this book is for you. Moreover, data scientists, ML engineers, researchers, and Python application developers seeking to create AI image generation applications based on the Stable Diffusion framework can benefit from the insights provided in the book.Table of Contents- Introducing Stable Diffusion- Setting Up the Environment for Stable Diffusion- Generating Images Using Stable Diffusion- Understanding the Theory Behind Diffusion Models- Understanding How Stable Diffusion Works- Using Stable Diffusion Models- Optimizing Performance and VRAM Usage- Using Community-Shared LoRAs- Using Textual Inversion- Overcoming 77-Token Limitations and Enabling Prompt Weighting- Image Restore and Super-Resolution- Scheduled Prompt Parsing- Generating Images with ControlNet- Generating Video Using Stable Diffusion- Generating Image Descriptions using BLIP-2 and LLaVA- Exploring Stable Diffusion XL(N.B. Please use the Read Sample option to see further chapters)
Mastering Transformers - Second Edition
Explore transformer-based language models from BERT to GPT, delving into NLP and computer vision tasks, while tackling challenges effectively Key Features- Understand the complexity of deep learning architecture and transformers architecture- Create solutions to industrial natural language processing (NLP) and computer vision (CV) problems- Explore challenges in the preparation process, such as problem and language-specific dataset transformation- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionTransformer-based language models such as BERT, T5, GPT, DALL-E, and ChatGPT have dominated NLP studies and become a new paradigm. Thanks to their accurate and fast fine-tuning capabilities, transformer-based language models have been able to outperform traditional machine learning-based approaches for many challenging natural language understanding (NLU) problems.Aside from NLP, a fast-growing area in multimodal learning and generative AI has recently been established, showing promising results. Mastering Transformers will help you understand and implement multimodal solutions, including text-to-image. Computer vision solutions that are based on transformers are also explained in the book. You'll get started by understanding various transformer models before learning how to train different autoregressive language models such as GPT and XLNet. The book will also get you up to speed with boosting model performance, as well as tracking model training using the TensorBoard toolkit. In the later chapters, you'll focus on using vision transformers to solve computer vision problems. Finally, you'll discover how to harness the power of transformers to model time series data and for predicting.By the end of this transformers book, you'll have an understanding of transformer models and how to use them to solve challenges in NLP and CV.What you will learn- Focus on solving simple-to-complex NLP problems with Python- Discover how to solve classification/regression problems with traditional NLP approaches- Train a language model and explore how to fine-tune models to the downstream tasks- Understand how to use transformers for generative AI and computer vision tasks- Build transformer-based NLP apps with the Python transformers library- Focus on language generation such as machine translation and conversational AI in any language- Speed up transformer model inference to reduce latencyWho this book is forThis book is for deep learning researchers, hands-on practitioners, and ML/NLP researchers. Educators, as well as students who have a good command of programming subjects, knowledge in the field of machine learning and artificial intelligence, and who want to develop apps in the field of NLP as well as multimodal tasks will also benefit from this book's hands-on approach. Knowledge of Python (or any programming language) and machine learning literature, as well as a basic understanding of computer science, are required.Table of Contents- From Bag-of-Words to the Transformer- A Hands-On Introduction to the Subject- Autoencoding Language Models- Autoregressive Language Models- Fine-Tuning Language Model for Text Classification- Fine-Tuning Language Models for Token Classification- Text Representation- Boosting Your Model Performance- Parameter Efficient Fine-Tuning- Zero-Shot and Few-Shot Learning in NLP- Explainable AI (XAI) for NLP- Working with Efficient Transformers- Cross-Lingual Language Modeling- Serving Transformer Models(N.B. Please use the Read Sample option to see further chapters)
Efficient Online Incentive Mechanism Designs for Wireless Communications
This book initially delves into its fundamentals to initiate the exploration of online incentive mechanisms in wireless communications. Three case studies are provided to elaborate details on designing online mechanism design in practical system. For crowdsensing with random task arrivals, this book introduces a linear online incentive mechanism model with insurance of the quality of information for each incoming task. In the context of edge computing systems, the authors model a nonlinear online incentive mechanism with the consideration of mobile users' energy budget constraints. It also explores online incentive mechanism for collaborative task offloading in mobile edge computing to achieve on-arrival instant responses. This book not only disseminates current knowledge but also sheds light on future research directions. The design of incentive mechanisms in wireless communication systems is of paramount importance as it encourages dormant terminals within networks to contribute their valuable resources. The consideration of randomness of network processes enhances the mechanism design under online settings and decision making on the fly. This book endeavours to bridge existing knowledge gaps by comprehensively presenting and developing fundamental insights into online incentive mechanisms and their design methods in the realm of wireless communications. It's one of the first books to provide a comprehensive understanding of the fundamental principles of online incentive mechanisms and their intricately designed methods in the dynamic world of wireless communications. Future research directions include an investigation in the evolving domain of online incentive mechanism designs within wireless communications. This book strikes a balance between theoretical knowledge and practical application, making it a valuable resource for both researchers and practitioners in the field of wireless communications and network economics. Advanced-level students majoring in computer science and/or electrical engineering will want to purchase this book as a study guide.
Designing Real-World Multi-Domain Networks
The comprehensive guide to design integration in a multi-domain environment providing consistent design across large-scale environments. Prajapati, Bowman, and Suvarna's more than 50 years of combined customer network-building experience will help you translate your organization's business and technical intent into a fully functioning, secure, and efficient network. Catalyst SDA, Catalyst SD-WAN, ACI MPLS, CNFs, Cloud, and Security technology domains account for a large market share in consumer networks as a replacement for traditional monolothic networks. Designing Real-World Multi-Domain Networks is designed for architects and engineers who want to integrate these new and emerging multi-domain technologies so you can be at the front of this inevitable network change. Written with great care, this technical book is divided into three clear sections, guiding readers into the world of blending architecture with technology. Each chapter focuses on a different aspect, explaining how modern technology integrates and interoperates with other architectures. You have the freedom to choose how you read. You can go through the book from start to finish like a story, or you can jump straight to the parts that interest you the most. The layout is made to be flexible, suiting both those who like to read in order, and those who want quick solutions. The book ends with five real-life examples, connecting theoretical ideas to practical results. These stories make the lessons clear, giving you the understanding and skills needed for real-world projects. Understand how Cisco Catalyst SD-Access, Catalyst SD-WAN, ACI, MPLS, CNFs, Cloud, and Security interoperate with each other to form end-to-end segmented and secure networks Understand details on how a packet behaves as it transits one technology domain to another Get answers to big what, whys, and hows surrounding multi-domain networks Learn from actual real-world deployment of Cisco customers Gain valuable insight from the authors' previous large-scale deployments Utilize reference architecture for using these technologies in tandem
Mobile Internet Security
This book constitutes the refereed post-proceedings of the 7th International Conference on Mobile Internet Security, MobiSec 2023, held in Okinawa, Japan, in December 19-21, 2023. The 21 full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in the following topical sections: 5G and 6G security; cryptography; machine learning-based security; identification and authentication; network design and security.
Big Data and Security
The two-volume set constitutes the refereed proceedings of the 5th International Conference on Big Data and Security, ICBDS 2023, held in Nanjing, China, during December 22-24, 2023. The 35 full papers and 1 short paper were carefully reviewed and selected from 161 submissions. They are organized in topical sections as follows: Part One: Big Data & New Method and Artificial Intelligence & Machine Learning Part Two: Data Technology & Network Security and IoT Security & Privacy Protection.
Detection of Intrusions and Malware, and Vulnerability Assessment
This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2024, held in Lausanne, Switzerland, during July 17-19, 2024. The 22 full papers and 6 short paper presented in this volume were carefully reviewed and selected from 110 submissions. The papers are organized in thematical sections named: vulnerability detection and defense; malware and threats; mobile and web application security; AI for security; hardware and firmware security; cyber physical systems and IoT.
Responsive Web Development
Bridging web and mobile for next-gen user experiencesDESCRIPTION The book explores how modern web and mobile technologies come together. It focuses on using the same strategies to ensure smooth user experiences on different platforms. It highlights how to build applications that share common code but also adapt to the specific needs of each platform.This guide helps you build modern, responsive websites that work perfectly on any device. Learn core responsive design principles with media queries and breakpoints. Create intuitive navigation for web and mobile, use CSS3 Flexbox and Grid for mobile-first designs, optimize performance, ensure quality with testing tools, and follow security best practices. Explore Progressive Web Apps (PWAs), voice search optimization, offline functionality, and Web Content Accessibility Guidelines (WCAG) for inclusive design.By following this guide, you will become a well-rounded web and mobile developer, equipped to create innovative and high-performing applications that thrive in the ever-changing digital world.WHAT YOU WILL LEARN● Responsive design principles and frameworks like Bootstrap, Foundation, etc.● CSS preprocessors (such as SASS or LESS) for streamlined styling.● Mobile optimization techniques like media queries, flexbox, and grid layouts.● Progressive Web Apps (PWAs) for enhanced web experiences on mobile.● Performance optimization tools for faster loading times.● Offline data caching and synchronization technologies for mobile apps. WHO THIS BOOK IS FORThis book is perfect for developers, software engineers, and tech enthusiasts looking for a thorough understanding of unified web and mobile application development.
Adaptive Neuro-Fuzzy Inference System as a Universal Estimator
This book presents some recent specialized works of a theoretical study in the domain of adaptive neuro-fuzzy inference systems (ANFIS) for specialists, engineers, professors, and students. It includes five chapters that present new fuzzy systems concepts and promotes them for practical applications, including control of tillage depth, solar radiation prediction, control of power systems, and dynamics of macroeconomic systems. The studies published in the book, through scientific achievements of high-level analysis and design, develop new applications that demonstrate the capabilities of ANFIS. The authors present examples and case studies from their research, providing new solutions and answers to questions related to the emerging concepts and applications of ANFIS.
The Definitive Guide to KQL
Turn the avalanche of raw data from Azure Data Explorer, Azure Monitor, Microsoft Sentinel, and other Microsoft data platforms into actionable intelligence with KQL (Kusto Query Language). Experts in information security and analysis guide you through what it takes to automate your approach to risk assessment and remediation, speeding up detection time while reducing manual work using KQL. This accessible and practical guide--designed for a broad range of people with varying experience in KQL--will quickly make KQL second nature for information security. Solve real problems with Kusto Query Language-- and build your competitive advantage: Learn the fundamentals of KQL--what it is and where it is used Examine the anatomy of a KQL query Understand why data summation and aggregation is important See examples of data summation, including count, countif, and dcount Learn the benefits of moving from raw data ingestion to a more automated approach for security operations Unlock how to write efficient and effective queries Work with advanced KQL operators, advanced data strings, and multivalued strings Explore KQL for day-to-day admin tasks, performance, and troubleshooting Use KQL across Azure, including app services and function apps Delve into defending and threat hunting using KQL Recognize indicators of compromise and anomaly detection Learn to access and contribute to hunting queries via GitHub and workbooks via Microsoft Entra ID
Elevate Your Productivity Using ChatGPT
Unlock the Secrets of Artificial Intelligence with a Deep Dive into ChatGPT's Revolutionary Mechanics and Applications. In an era dominated by rapid technological advancements, "Elevate Your Productivity Using ChatGPT" emerges as a seminal book exploring Artificial Intelligence (AI), with a special focus on ChatGPT, a leading-edge development in natural language processing. This book comprehensively analyzes the sophisticated mechanisms that empower ChatGPT, including its dual-phase training process involving pretraining on a vast corpus of data and meticulous fine-tuning.Key Features: Deep Learning Decoded: Gain a fundamental understanding of how deep learning, a subset of machine learning, serves as the backbone of ChatGPT, enabling it to emulate nuanced human-like text conversations.From Theory to Application: Explore the initial pretraining stage where ChatGPT absorbs and learns from an extensive array of web-sourced texts, developing its ability to predict text sequences and refine its linguistic prowess.What You Will Learn: How AI is transforming industries by automating complex cognitive tasks.Effective strategies for integrating AI tools like ChatGPT into business practices to enhance productivity and innovation.Who Should Read This Book?Technology enthusiasts eager to understand the inner workings of AI and its future trajectory.Professionals across various sectors looking to leverage AI for enhanced decision-making and operational efficiency.Exclusive Bonuses with Your Book Purchase: 1100 Follow-Up Prompts: Promote ongoing growth and creativity. Follow-up prompts are a continual flow of new and innovative ideas.Whether you're a novice intrigued by AI or a seasoned professional aiming to deepen your expertise, this book provides invaluable insights into the transformative power of artificial intelligence.Order your copy today and start transforming knowledge into action.
Mastering Gemini Artificial Intelligence Prompting for Google Workspace
Explore the transformative capabilities of Gemini AI within Google Workspace in this essential guide. Mastering Gemini AI prompting for Google Workspace provides a clear & direct pathway to enhancing your workflow & increasing productivity using artificial intelligence.Google Workspace includes Google Docs, Gmail, Google Sheets, Google Slides, Google Meet and gemini.google.com.AI Prompt Book's Key Features & Benefits: Effective Prompt Writing: Master the art of creating efficient prompts that harness Gemini's full potential to streamline your tasks.Skill Development: Progress from basic techniques to advanced scenarios tailored for diverse professional roles.Practical Use Cases: Implement Gemini in real-world scenarios, from routine tasks to intricate project management challenges.What You Will Learn: Integration Techniques: Discover the most effective ways to incorporate Gemini AI into your Google Workspace for enhanced daily operations.AI-Driven Decision Making: Utilize AI prompts to refine decision-making processes and boost team productivity.Management and Organization: Apply Gemini AI strategies to optimize management tasks and improve organizational efficiency.Exclusive Bonus with Your Book Purchase: - 70+ Ready-to-Use Prompts: Kick-start your Gemini AI usage with a vast array of ready-made prompts for various business needs.Mastering Gemini AI for Google Workspace isn't just a book; it's your guide to excelling in the digital workspace by utilizing one of the most adaptable AI tools available. Order your copy today & start improving your performance!
The Death of Truth
How did we become a world where facts--shared truths--have lost their power to hold us together as a community, as a country, globally? How have we allowed the proliferation of alternative facts, hoaxes, even conspiracy theories, to destroy our trust in institutions, leaders, and legitimate experts? Best-selling journalist Steven Brill documents the forces and people, from Silicon Valley to Madison Avenue to Moscow to Washington, that have created and exploited this world of chaos and division--and offers practical solutions for what we can do about it. "A precise description of the punishment cell we have built around our minds and the first few steps back towards light and air." -Timothy Snyder, Author of On Tyranny and Professor of History, Yale University "A seminal, ground-breaking, documented and honest examination of two of the central dilemmas of our time--what is truth and where to find it." --Bob Woodward, associate editor at The Washington Post As the cofounder of NewsGuard, a company that tracks online misinformation, Steven Brill has observed the rise of fake news from a front-row seat. In The Death of Truth, with startling, often terrifying clarity, he explains how we got here--and how we can get back to a world where truth matters. None of this--conspiracy theories embraced, expertise ridiculed, empirical evidence ignored--has happened by accident. Brill takes us inside the decisions made by executives in Silicon Valley to code the algorithms embedded in their social media platforms to maximize profits by pushing divisive content. He unravels the ingenious creation of automated advertising buying systems that reward that click-baiting content and penalize reliable news publishers, and describes how the use of these ad-financed, misinformation platforms by politicians, hucksters, and conspiracy theorists deceives ordinary citizens. He documents how the most powerful adversaries of America have used American-made social media and advertising tools against us with massive disinformation campaigns--and how, with the development of generative artificial intelligence, everything could get exponentially worse unless we act. The stakes are high for all of us, including Brill himself, whose company's role in exposing Russian disinformation operations resulted in a Russian agent targeting him and his family. Crucially, Brill lays out a series of provocative but realistic prescriptions for what we can do now to reverse course--proposals certain to stir debate and even action that could curb the power of big tech to profit from division and chaos, tamp down polarization, and restore the trust necessary to bring us together.
Learn OpenAI Whisper
Master automatic speech recognition (ASR) with groundbreaking generative AI for unrivaled accuracy and versatility in audio processingKey Features- Uncover the intricate architecture and mechanics behind Whisper's robust speech recognition- Apply Whisper's technology in innovative projects, from audio transcription to voice synthesis- Navigate the practical use of Whisper in real-world scenarios for achieving dynamic tech solutions- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionAs the field of generative AI evolves, so does the demand for intelligent systems that can understand human speech. Navigating the complexities of automatic speech recognition (ASR) technology is a significant challenge for many professionals. This book offers a comprehensive solution that guides you through OpenAI's advanced ASR system.You'll begin your journey with Whisper's foundational concepts, gradually progressing to its sophisticated functionalities. Next, you'll explore the transformer model, understand its multilingual capabilities, and grasp training techniques using weak supervision. The book helps you customize Whisper for different contexts and optimize its performance for specific needs. You'll also focus on the vast potential of Whisper in real-world scenarios, including its transcription services, voice-based search, and the ability to enhance customer engagement. Advanced chapters delve into voice synthesis and diarization while addressing ethical considerations.By the end of this book, you'll have an understanding of ASR technology and have the skills to implement Whisper. Moreover, Python coding examples will equip you to apply ASR technologies in your projects as well as prepare you to tackle challenges and seize opportunities in the rapidly evolving world of voice recognition and processing.What you will learn- Integrate Whisper into voice assistants and chatbots- Use Whisper for efficient, accurate transcription services- Understand Whisper's transformer model structure and nuances- Fine-tune Whisper for specific language requirements globally- Implement Whisper in real-time translation scenarios- Explore voice synthesis capabilities using Whisper's robust tech- Execute voice diarization with Whisper and NVIDIA's NeMo- Navigate ethical considerations in advanced voice technologyWho this book is forLearn OpenAI Whisper is designed for a diverse audience, including AI engineers, tech professionals, and students. It's ideal for those with a basic understanding of machine learning and Python programming, and an interest in voice technology, from developers integrating ASR in applications to researchers exploring the cutting-edge possibilities in artificial intelligence.
Prompt Engineering for Generative AI
Large language models (LLMs) and diffusion models such as ChatGPT and Stable Diffusion have unprecedented potential. Because they have been trained on all the public text and images on the internet, they can make useful contributions to a wide variety of tasks. And with the barrier to entry greatly reduced today, practically any developer can harness LLMs and diffusion models to tackle problems previously unsuitable for automation. With this book, you'll gain a solid foundation in generative AI, including how to apply these models in practice. When first integrating LLMs and diffusion models into their workflows, most developers struggle to coax reliable enough results from them to use in automated systems. Authors James Phoenix and Mike Taylor show you how a set of principles called prompt engineering can enable you to work effectively with AI. Learn how to empower AI to work for you. This book explains: The structure of the interaction chain of your program's AI model and the fine-grained steps in between How AI model requests arise from transforming the application problem into a document completion problem in the model training domain The influence of LLM and diffusion model architecture--and how to best interact with it How these principles apply in practice in the domains of natural language processing, text and image generation, and code
Learning Devsecops
How can organizations integrate security while continuously deploying new features? How can some maintain 24-7-365 operations at internet scale? How do they integrate security into their DevOps organization? This practical guide helps you answer those questions and more. Author Steve Suehring provides unique content to help practitioners and leadership successfully implement DevOps and DevSecOps. Learning DevSecOps places an emphasis on prerequisites for success before looking at best practices, and then takes you through some of the tools and software used by successful DevSecOps-enabled organizations. You'll learn how DevOps and DevSecOps can eliminate the walls that exist between development, operations, and security so that you can tackle the needs of other teams early in the development lifecycle. With this book, you will: Learn why DevSecOps is about culture and processes, with tools to support the processes Understand why DevSecOps practices are key elements to deploying software in a 24-7 environment Deploy software using a DevSecOps toolchain and create scripts to assist Integrate processes from other teams earlier in the software development lifecycle Help team members learn the processes important for successful software development
Mastering Gemini Artificial Intelligence Prompting for Google Workspace
Explore the transformative capabilities of Gemini AI within Google Workspace in this essential guide. Mastering Gemini AI prompting for Google Workspace provides a clear & direct pathway to enhancing your workflow & increasing productivity using artificial intelligence.Google Workspace includes Google Docs, Gmail, Google Sheets, Google Slides, Google Meet and gemini.google.com.AI Prompt Book's Key Features & Benefits: Effective Prompt Writing: Master the art of creating efficient prompts that harness Gemini's full potential to streamline your tasks.Skill Development: Progress from basic techniques to advanced scenarios tailored for diverse professional roles.Practical Use Cases: Implement Gemini in real-world scenarios, from routine tasks to intricate project management challenges.What You Will Learn: Integration Techniques: Discover the most effective ways to incorporate Gemini AI into your Google Workspace for enhanced daily operations.AI-Driven Decision Making: Utilize AI prompts to refine decision-making processes and boost team productivity.Management and Organization: Apply Gemini AI strategies to optimize management tasks and improve organizational efficiency.Exclusive Bonus with Your Book Purchase: - 70+ Ready-to-Use Prompts: Kick-start your Gemini AI usage with a vast array of ready-made prompts for various business needs.Mastering Gemini AI for Google Workspace isn't just a book; it's your guide to excelling in the digital workspace by utilizing one of the most adaptable AI tools available. Order your copy today & start improving your performance!
Npr's Podcast Start Up Guide
From NPR comes the definitive guide to podcasting--featuring step-by-step advice on how to find a unique topic, tell the best stories, and engage the most listeners, as well as the secrets that will take your pod to the next level. Whoever you are, whatever you love, there's a podcast audience waiting for you, and in today's booming audio storytelling landscape, it's never been easier to share your voice with the world. But while the barrier to entry for podcast production is relatively low (just the cost of a mic and a laptop), the learning curve is steep--and quality matters. That's where NPR comes in. In NPR's Podcast Start Up Guide, Glen Weldon draws on NPR's extensive educational materials and army of talent--from recognizable hosts, such as Guy Raz (How I Built This), Gene Demby (Code Switch), Linda Holmes (Pop Culture Happy Hour), and Yowei Shaw (Invisibilia), to indispensable behind-the-scenes players, such as producers, engineers, and editors--to guide aspiring podcasters through the conception, creation, and launch of a podcast. Part master class, part candid informational interview with the best in the business, this book is a must-read for anyone who wants to make their dream of starting a podcast a reality.
Protect Your Practice
Protect Your Practice incorporates the advice in Protect Your Business and adds specific guidance for the professions, especially in Chapter 7 on Data Privacy. As with Protect Your Business, every chapter provides prudent steps you can take right away to be more secure and provides "Pro Steps" to take it to the next level. It is the same price, only 10 pages longer, and is perfect for professional practices.
Selected Areas in Cryptography
This book constitutes the refereed post-conference proceedings of the 29th International Conference on Selected Areas in Cryptography, SAC 2022, held in Windsor, Canada, during August 24-26, 2022. The 21 full papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are categorized into the following topical sections: lattices and ECC; differential cryptanalysis; cryptographic primitives; isogeny-based cryptography I; block ciphers; differential cryptanalysis II; isogeny-based cryptography II; and protocols and PRFs.
Shadow Codes
Dive deep into the enigmatic world of cyber espionage with "Shadow Codes: The Master Spy of the Digital Age." Tailored for tech enthusiasts, cybersecurity students, or simply the curious, this book unravels the mysteries of digital spying, making it an essential read for anyone eager to understand this shadowy realm.Inside the Book: Begin your exploration by grasping the fundamentals of cyber spying and its significant impact on our digital lives.Travel back in time to the roots of cyber espionage, witnessing its evolution from basic hacking to a tool of state-level intelligence.Learn what it takes to become a master in the digital espionage arena, including the necessary skills, mindset, and ethical dilemmas.Uncover the extensive toolbox of cyber spies, ranging from cutting-edge software to psychological manipulation techniques.Discover the various faces of cyber espionage, from solitary hackers to organized government entities.Learn the devious tricks and strategies cyber spies employ to deceive and extract critical information.Find out who typically falls under the radar of cyber spies and why these individuals or entities are targeted.Delve into the methodologies used by cyber spies to collect and analyze data.Gain insights into the geopolitical landscape of cyber espionage, where nations vie for digital dominance.Venture into the dark web, a pivotal platform in the realm of digital espionage.Why Read "Shadow Codes"? Grasp the Intricacies of Digital Espionage: Gain a comprehensive understanding of the role and impact of cyber spying in today's interconnected world.Expand Your Knowledge: Whether you're a seasoned professional or a curious novice, this book provides a wealth of knowledge on the secret workings of digital espionage.Stay Secure and Informed: Equip yourself with the knowledge of how cyber spies operate, enhancing your ability to protect against digital threats.Embark on a journey through the covert world of cyber spying with "Shadow Codes." This book is your guide to understanding the digital battlefield that shapes our world today.
An Introduction to Universal Artificial Intelligence
The book provides a gentle introduction to Universal Artificial Intelligence (UAI), a theory that provides a formal underpinning of what it means for an agent to act intelligently in a general class of environments.
Encrypted Network Traffic Analysis
This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic. The authors provide research findings and objectives in the first 5 chapters, on encrypted network traffic, protocols and applications of the encrypted network traffic. The authors also analyze the challenges and issues with encrypted network traffic. It systematically introduces the analysis and classification of encrypted traffic and methods in detecting the anomalies in encrypted traffic. The effects of traditional approaches of encrypted traffic, such as deep packet inspection and flow based approaches on various encrypted traffic applications for identifying attacks is discussed as well. This book presents intelligent techniques for analyzing the encrypted network traffic and includes case studies. The first chapter also provides fundamentals of network traffic analysis, anomalies in the network traffic, protocols for encrypted network traffic. The second chapter presents an overview of the challenges and issues with encrypted network traffic and the new threat vectors introduced by the encrypted network traffic. Chapter 3 provides details analyzing the encrypted network traffic and classification of various kinds of encrypted network traffic. Chapter 4 discusses techniques for detecting attacks against encrypted protocols and chapter 5 analyzes AI based approaches for anomaly detection. Researchers and professionals working in the related field of Encrypted Network Traffic will purchase this book as a reference. Advanced-level students majoring in computer science will also find this book to be a valuable resource.
Modern Full-Stack React Projects
Polish your web development skills by working on real-world projects for different use-cases of full-stack web developmentFree with your book: DRM-free PDF version + access to Packt's next-gen Reader*Key Features- Understand how the different aspects of a MERN application come together through a series of practical projects- Set up frontend and backend projects that can be integrated and maintained together- Enhance your proficiency in building scalable and sustainable React projects- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionRecent trends show deeper integration between the two, opening numerous possibilities for building real-world web applications, through server-side technologies like Node.js, Express, and MongoDB.Written by the author of Learning Redux and Learn React Hooks, and CEO of TouchLay, Modern Full-Stack React Projects will guide you through the entire process of advancing from a frontend developer to a full-stack developer. Starting with how to set up robust projects that can be maintained for a long time, you'll then progress toward developing a backend system and integrating it with the frontend. Throughout the book, you'll learn how to build, test, and deploy a blog application and a chat application. You'll also explore MongoDB, Express, React, Node.js (MERN) stack, best practices for frontend and backend development, different full-stack architectures, unit and end-to-end testing, and deployment of full-stack web applications. Once you get to grips with the essential concepts, you'll progress to learn how to use Next.js, an enterprise-grade full-stack web framework for React.By the end, you'll be well-versed in the MERN stack and all set to create performant and scalable full-stack web applications.*Email sign-up and proof of purchase requiredWhat you will learn- Implement a backend using Express and MongoDB, and unit-test it with Jest- Deploy full-stack web apps using Docker, set up CI/CD and end-to-end tests using Playwright- Add authentication using JSON Web Tokens (JWT)- Create a GraphQL backend and integrate it with a frontend using Apollo Client- Build a chat app based on event-driven architecture using Socket.IO- Facilitate Search Engine Optimization (SEO) and implement server-side rendering- Use Next.js, an enterprise-ready full-stack framework, with React Server Components and Server ActionsWho this book is forThis book is for frontend developers, JavaScript engineers, and React developers who possess a solid understanding of JavaScript and React concepts. Specifically designed for those with limited experience in the development, creation, integration, and deployment of backend and full-stack systems, this book will equip you with the necessary skills to create high-quality web applications.Table of Contents- Preparing For Full-Stack Development- Getting to Know Node.js, NPM, and MongoDB- Implementing a Backend Service Using Express, Mongoose ODM, and Jest- Integrating Frontend with the Backend Using React and TanStack Query- Deploying the Application with Docker and CI/CD- Adding Authentication and Roles with JSON Web Tokens- Improving the Load Time Using Server-Side Rendering- Making Sure Customers Find You with Search Engine Optimization- Implementing End-to-End Tests Using Playwright- Aggregating and Visualizing Statistics Using MongoDB and Victory- Building a Backend with a GraphQL API- Interfacing with GraphQL on the Frontend Using Apollo Client(N.B. Please use the Read Sample option to see further chapters)
Pentest+ Exam Pass
���� Become a Certified Penetration Tester! ����Are you ready to level up your cybersecurity skills and become a certified penetration tester? Look no further! ����Introducing the ultimate resource for cybersecurity professionals: the "PENTEST+ EXAM PASS: (PT0-002)" book bundle! ��������This comprehensive bundle is designed to help you ace the CompTIA PenTest+ certification exam and excel in the dynamic field of penetration testing and vulnerability management. ��������️What's Inside: ���� Book 1 - PENTEST+ EXAM PASS: FOUNDATION FUNDAMENTALS: Master the foundational concepts and methodologies of penetration testing, vulnerability assessment, and risk management.���� Book 2 - PENTEST+ EXAM PASS: ADVANCED TECHNIQUES AND TOOLS: Dive deeper into advanced techniques and tools used by cybersecurity professionals to identify, exploit, and mitigate vulnerabilities.���� Book 3 - PENTEST+ EXAM PASS: NETWORK EXPLOITATION AND DEFENSE STRATEGIES: Learn about network exploitation and defense strategies to protect against sophisticated cyber threats.���� Book 4 - PENTEST+ EXAM PASS: EXPERT INSIGHTS AND REAL-WORLD SCENARIOS: Gain valuable insights and practical knowledge through expert insights and real-world scenarios, going beyond the exam syllabus.Why Choose Us? ���� Comprehensive Coverage: Covering all aspects of penetration testing and vulnerability management. ���� Expert Insights: Learn from industry experts and real-world scenarios. ���� Practical Approach: Gain hands-on experience with practical examples and case studies. ���� Exam Preparation: Ace the CompTIA PenTest+ exam with confidence.Don't miss out on this opportunity to enhance your cybersecurity career and become a certified penetration tester. Get your copy of the "PENTEST+ EXAM PASS: (PT0-002)" book bundle today! ��������
Practical XML Programming - Build and Deploy Web Apps
Welcome to "Practical XML Programming - Build and Deploy Web Apps"! In the present era of the digital world, the role of XML (eXtensible Markup Language) in the data interchange, web development and many other applications is still very important. The purpose of this book is not only to present you with useful and hands-on skills in the use of XML to develop sophisticated Web projects, but especially to make you understand the potential real life power of XML technologies. XML is a markup language, not the only one, but a very handy tool because it defines a standard form of data structuring and organization that makes it easy for data to be worked out, communicated and exchanged among various platforms and systems. Whether you are an experienced developer who wants to broaden your skill set or a beginner who is eager to learn, this book will show you the basic principles of XML programming and will enable you to create reliable web solutions. This book is filled with to-be-covered topics, ranging from XML document structure, XPath and XSLT transformations, through XML Schema validation to XML processing with various programming languages, to give just a few examples. Each chapter aims to deliver concise descriptions, real-world case studies, and self-paced assignments, so you can make the best use of the concepts, and as a result, achieve a comprehensive knowledge of XML. Happy coding!
Protect Your Business
Though it takes years of training to become a cybersecurity professional, anyone can take the prudent steps that make themselves and their company more secure. The 8 chapters in this book teach you the basics. This book uses plain language to tell you how to become more secure. It's not rocket science, but it does take discipline. That makes sense, right? If it was easy to be cyber-secure by buying a product or a service, we'd all be secure by now. Every chapter comes with prudent steps you can take right away to be more secure. It tells you what you must do, and each chapter provides "Pro Steps" so you can take it to the next level.
Justification of Cyber Harassment Among Turkish Youths
Violence and media are important issues in media theories and research. In the research conducted with the participation of 400 university students, the effects of the concepts of digital media literacy, cyber violence and emotional deafness (alexithymia) on the perception of individuals as justification violence are discussed as factors that cause individuals to perceive violence as legitimate through communication tools. It was determined that variables of being cyberbullying victim, being a cyberbully, digital media literacy and alexithymia (emotional deafness) were explanatory effects on the justification of cyber violence. It has come to the point that the use of digital media literacy and conscious internet using are important in order to prevent justification of cyber harassment.
Combatting Cyber Terrorism
In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat. This book discusses: Definitions of cyber terrorism;Ideologies and idealisations that can lead to cyber terrorism;How threat actors use computer systems to diversify, complicate and increase terrorist attack impacts;The role of Big Tech and social media organisations such as X (formerly Twitter) and Instagram within the cyber threat landscape; andHow organisations can prepare for acts of cyber terrorism via security planning and incident response strategies such as ISO 31000, ISO 27001 and the NIST Cybersecurity Framework.Increasingly, cyber security practitioners are confronted with a stark phrase: cyber terrorism. For many, it conveys fear and hopelessness. What is this thing called 'cyber terrorism' and what can we begin to do about it? Malicious-minded ICT users, programmers and even programs (including much AI-powered software) have all been instrumental in recruiting, inspiring, training, executing and amplifying acts of terrorism. This has resulted in the loss of life and/or life-changing physical injuries that could never have occurred without support and facilitation from the cyber sphere. These types of attacks can be encapsulated by the phrase 'cyber terrorism'. This book recounts case studies to show the types of threats we face and provides a comprehensive coverage of risk management tactics and strategies to protect yourself against such nefarious threat actors. These include key mitigation and controls for information security or security and HR-related professionals.
Network Automation with Nautobot
Transform the way your network teams think about and deploy enterprise network automation through the power of Nautobot's open-source platform Key FeaturesLearn how documenting your network in Nautobot can accelerate your network automation journeyApply NetDevOps to your network by leveraging Nautobot as a network source of truthMinimize tool sprawl by extending, using, or building Nautobot AppsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionNautobot enables network teams to build a scalable and extensible network source of truth that provides a foundation to power any network automation stack.With the help of this guide, you'll learn how to deploy, manage, and integrate Nautobot as a source of truth and network automation platform. As you progress, you'll learn what a network source of truth is, the relationship between data and network automation, and network data models. You'll also gain a broad understanding of Nautobot and its robust features that allow maximum flexibility. A dedicated section will show you how to construct a single source of truth with Nautobot and help you explore its programmatic APIs, including REST APIs, GraphQL, webhooks, and Nautobot Job Hooks. Later, you'll develop custom data models and custom apps for Nautobot and experience its extensibility and powerful developer API. In the last part of this book, you'll discover how to deploy configuration compliance and automated remediation once Nautobot is deployed as a network source of truth.By the end of this book, you'll be able to design and manage Nautobot as a network source of truth, understand its key features, and extend Nautobot by creating custom data models and apps that suit your network and your team.What you will learnUnderstand network sources of truth and the role they play in network automation architectureGain an understanding of Nautobot as a network source and a network automation platformConvert Python scripts to enable self-service Nautobot JobsUnderstand how YAML files in Git can be easily integrated into NautobotGet to grips with the NetDevOps ecosystem around Nautobot and its app ecosystemDelve into popular Nautobot Apps including Single Source of Truth and Golden ConfigWho this book is forThis book is for network engineers, network automation engineers, and software engineers looking to support their network teams by building custom Nautobot Apps. A basic understanding of networking (e.g. CCNA) and knowledge of the fundamentals of Linux, Python programming, Jinja2, YAML, and JSON are needed to get the most out of this book. Table of ContentsIntroduction to NautobotNautobot Data ModelsInstalling and Deploying NautobotUnderstanding the User Interface and Bootstrapping NautobotConfiguring Nautobot Core Data ModelsUsing Nautobot's Extensibility FeaturesManaging and Administering NautobotLearning about Nautobot APIs - REST, GraphQL, and WebhooksUnderstanding Nautobot Integrations for NetDevOps PipelinesEmbracing Infrastructure as Code with Nautobot, Git, and AnsibleAutomating Networks with Nautobot JobsData-Driven Network Automation ArchitectureLearning about the Nautobot App EcosystemIntro to Nautobot App DevelopmentBuilding Nautobot Data ModelsAutomating with Nautobot AppsAppendix 1: Nautobot ArchitectureAppendix 2: Integrating Distributed Data Sources of Truth with NautobotAppendix 3: Performing Config Compliance and Remediation with Nautobot
Critical Infrastructure Security
Venture through the core of cyber warfare and unveil the anatomy of cyberattacks on critical infrastructureKey Features: - Gain an overview of the fundamental principles of cybersecurity in critical infrastructure- Explore real-world case studies that provide a more exciting learning experience, increasing retention- Bridge the knowledge gap associated with IT/OT convergence through practical examples- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Discover the core of cybersecurity through gripping real-world accounts of the most common assaults on critical infrastructure - the body of vital systems, networks, and assets so essential that their continued operation is required to ensure the security of a nation, its economy, and the public's health and safety - with this guide to understanding cybersecurity principles.From an introduction to critical infrastructure and cybersecurity concepts to the most common types of attacks, this book takes you through the life cycle of a vulnerability and how to assess and manage it. You'll study real-world cybersecurity breaches, each incident providing insights into the principles and practical lessons for cyber defenders striving to prevent future breaches.From DDoS to APTs, the book examines how each threat activates, operates, and succeeds. Additionally, you'll analyze the risks posed by computational paradigms, such as the advancement of AI and quantum computing, to legacy infrastructure.By the end of this book, you'll be able to identify key cybersecurity principles that can help mitigate evolving attacks to critical infrastructure. What You Will Learn: - Understand critical infrastructure and its importance to a nation- Analyze the vulnerabilities in critical infrastructure systems- Acquire knowledge of the most common types of cyberattacks on critical infrastructure- Implement techniques and strategies for protecting critical infrastructure from cyber threats- Develop technical insights into significant cyber attacks from the past decade- Discover emerging trends and technologies that could impact critical infrastructure security- Explore expert predictions about cyber threats and how they may evolve in the coming yearsWho this book is for: This book is for SOC analysts, security analysts, operational technology (OT) engineers, and operators seeking to improve the cybersecurity posture of their networks. Knowledge of IT and OT systems, along with basic networking and system administration skills, will significantly enhance comprehension. An awareness of current cybersecurity trends, emerging technologies, and the legal framework surrounding critical infrastructure is beneficial.Table of Contents- What is Critical Infrastructure?- The Growing Threat of Cyberattacks on Critical Infrastructure- Critical Infrastructure Vulnerabilities- The Most Common Attacks Against CI- Analysis of the Top Cyberattacks on Critical Infrastructure- Protecting Critical Infrastructure - Part 1- Protecting Critical Infrastructure - Part 2- Protecting Critical Infrastructure - Part 3- The Future of CI
Post-Quantum Cryptography
​The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK, during June 12-14, 2024. The 28 full papers included in these proceedings were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Part I: Applications and protocols; code-based cryptography; group-action-based cryptography; lattice-based cryptography; Part II: Isogeny-Based cryptgraphy; multivariate cryptography; quantum algorithms; transforms and proofs.
Post-Quantum Cryptography
​The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK, during June 12-14, 2024. The 28 full papers included in these proceedings were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Part I: Applications and protocols; code-based cryptography; group-action-based cryptography; lattice-based cryptography; Part II: Isogeny-Based cryptgraphy; multivariate cryptography; quantum algorithms; transforms and proofs.
Information and Communications Technologies
This book constitutes the proceedings of the Second International Libyan Conference on Information and Communication Technologies, ILCICT 2023, which took place in Tripoli, Libya, in September 4-6, 2023. The 26 full papers were carefully reviewed and selected from 55 submissions. The papers are organized in subject areas as follows: communication systems; computer and information systems; image processing, computer vision and internet of things.