0403_卡芙涅
0401~0403_4月選書

英文書 > 全部商品

Information and Communications Technologies

Springer 出版
2024/05/07 出版

This book constitutes the proceedings of the Second International Libyan Conference on Information and Communication Technologies, ILCICT 2023, which took place in Tripoli, Libya, in September 4-6, 2023. The 26 full papers were carefully reviewed and selected from 55 submissions. The papers are organized in subject areas as follows: communication systems; computer and information systems; image processing, computer vision and internet of things.

9 特價6785
立即代訂
下次再買

Demystifying Large Language Models

James,Chen  著
Ingram 出版
2024/05/04 出版

This book is a comprehensive guide aiming to demystify the world of transformers -- the architecture that powers Large Language Models (LLMs) like GPT and BERT. From PyTorch basics and mathematical foundations to implementing a Transformer from scratch, you'll gain a deep understanding of the inner workings of these models.That's just the beginning. Get ready to dive into the realm of pre-training your own Transformer from scratch, unlocking the power of transfer learning to fine-tune LLMs for your specific use cases, exploring advanced techniques like PEFT (Prompting for Efficient Fine-Tuning) and LoRA (Low-Rank Adaptation) for fine-tuning, as well as RLHF (Reinforcement Learning with Human Feedback) for detoxifying LLMs to make them aligned with human values and ethical norms.Step into the deployment of LLMs, delivering these state-of-the-art language models into the real-world, whether integrating them into cloud platforms or optimizing them for edge devices, this section ensures you're equipped with the know-how to bring your AI solutions to life.Whether you're a seasoned AI practitioner, a data scientist, or a curious developer eager to advance your knowledge on the powerful LLMs, this book is your ultimate guide to mastering these cutting-edge models. By translating convoluted concepts into understandable explanations and offering a practical hands-on approach, this treasure trove of knowledge is invaluable to both aspiring beginners and seasoned professionals.

9 特價1436
立即代訂
下次再買

Tales from the Cyber Crypt

Ingram 出版
2024/05/04 出版

Spoof-Proof YourselfThe future belongs to the cyber-resilient. Whether you're an individual navigating the vast online landscape or a business owner safeguarding your enterprise, 9 Tales from The Cyber Crypt provides essential skills and resources to emerge unscathed from the cyber jungle.In February this year, cybercriminals scammed a well-known bank out of $25 million using video deep fakes purporting to be executive staff issuing transfer instructions. Known as whale attacks, the dark arts of digital scammers have grown more lethal in 2024.Using technology that exploits the characteristics that make us human - empathy, compassion, loneliness, and greed - AI scams are a burgeoning industry with tentacles reaching into social media, dating sites, company data, and individual banking apps.Speaking anonymously, the cyber-security boss of one of the world's biggest financial institutions reveals to ghostwriter Stella Firewall how sophisticated criminals exploit AI's digital cloning abilities to prey on individuals and corporations in 9 true tales traversing the current spectrum of cyber threats.Unveil the Secrets to Digital ResilienceFrom pig butchering to vishing, smishing, mobile phone trojans, spear-phishing, and whale attacks - 9 Tales from The Cyber Crypt is your key to understanding what you're up against with 69 simple but effective ways to spot a scam before it starts.Stella Firewall's engaging prose takes you into the narratives of real-life cybercrime victims. Each tale brings to life the heart-pounding sagas of individuals trapped in an AI algorithm net. Use 9 Tales from The Cyber Crypt to: 羹 Glean insider weaponized social engineering tactics tips for better awareness.羹 Spoof-proof yourself in the battle against scams and deep fakes.羹 Outwit digital adversaries with over 69 simple yet powerful strategies. 羹 Stay out of cyber crime's reach.

9 特價547
立即代訂
下次再買

Network Engineer's Bible

Ingram 出版
2024/05/03 出版

���� Introducing the Network Engineer's Bible ����Are you ready to unlock the secrets of network engineering? Look no further than the Network Engineer's Bible - the ultimate guide to mastering 100 protocols for communication, management, and security! ���������������� Book 1: Foundations of Networking ���� Get started on your networking journey with essential protocols for beginners! From TCP/IP basics to DNS and DHCP, this book lays the groundwork for your success in the world of networking.���� Book 2: Navigating Network Management ���� Master protocols for efficient network operations! Learn how to monitor and manage devices with SNMP, and gain remote access using SSH and Telnet. Take control of your network like a pro!���� Book 3: Securing the Network ���� Protect your data and safeguard your network from cyber threats! Discover encryption protocols like SSL/TLS, implement access control lists (ACLs), and deploy intrusion detection systems (IDS) to defend against hackers.���� Book 4: Advanced Protocol Dynamics ���� Dive deep into complex network communication strategies! Explore advanced routing protocols such as OSPF and BGP, and stay ahead of the curve with emerging technologies like Software-Defined Networking (SDN).With the Network Engineer's Bible, you'll gain the knowledge and skills needed to excel in the fast-paced world of networking. Whether you're a beginner or an experienced professional, this comprehensive bundle has something for everyone! ������������Get your copy now and take your networking expertise to new heights! ����✨

9 特價1833
立即代訂
下次再買

Endpoint Detection and Response Essentials

Guven,Boyraz  著
Packt 出版
2024/05/02 出版

Elevate your expertise in endpoint detection and response by mastering advanced EDR/XDR concepts through real-life examples and fortify your organization's cyber defense strategyKey FeaturesLearn how to tackle endpoint security problems in your organizationApply practical guidance and real-world examples to harden endpoint securityImplement EDR/XDR tools for optimal protection of digital assetsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIn this data-driven age, safeguarding sensitive data and privacy has become paramount, demanding a deep understanding of the intricacies of cyberspace and its associated threats. With a focus on endpoint defense, Endpoint Detection and Response Essentials guides you in implementing EDR solutions to stay ahead of attackers and ensure the overall security posture of your IT infrastructure.Starting with an insightful introduction to EDR and its significance in the modern cyber threat landscape, this book offers a quick overview of popular EDR tools followed by their practical implementation. From real-world case studies, best practices, and deployment strategies to maximizing the effectiveness of EDR, including endpoint hardening techniques and advanced DNS visibility methods, this comprehensive resource equips you with the knowledge and hands-on skills to strengthen your organization's defense against cyber attacks. Recognizing the role of the DNS protocol, you'll fortify your organization's endpoint defense proactively.By the end of this book, you'll have honed the skills needed to construct a resilient cybersecurity defense for yourself and your organization.What you will learnGain insight into current cybersecurity threats targeting endpointsUnderstand why antivirus solutions are no longer sufficient for robust securityExplore popular EDR/XDR tools and their implementationMaster the integration of EDR tools into your security operationsUncover evasion techniques employed by hackers in the EDR/XDR contextGet hands-on experience utilizing DNS logs for endpoint defenseApply effective endpoint hardening techniques within your organizationWho this book is forIf you're an IT professional seeking to safeguard yourself and your company's digital assets, this book is for you. To make the most of its content, a foundational understanding of GNU/Linux, operating systems, networks, and programming concepts is recommended. Additionally, security professionals eager to delve into advanced endpoint defense techniques will find this book invaluable.Table of ContentsIntroduction to Endpoint Security and EDREDR Architecture and Its Key ComponentsEDR Implementation and Deployment Unlocking Synergy - EDR Use Cases and ChatGPT IntegrationNavigating the Digital Shadows - EDR Hacking TechniquesBest Practices and Recommendations for Endpoint ProtectionLeveraging DNS Logs for Endpoint DefenseThe Road Ahead of Endpoint Security

9 特價1835
立即代訂
下次再買

Mastering WooCommerce - Second Edition

Packt 出版
2024/05/02 出版

Elevate your e-commerce journey with this comprehensive guide covering installation, product setup, sales management, POS integration, speed optimization, themes, landing pages, plugins, security, and much moreKey FeaturesHarness the power of WooCommerce and its plugins to build fully functional e-commerce websitesOptimize your website's speed and performance through image optimization and static information cachingMaster access control and risk mitigation for WooCommerce store securityPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionAuthor Patrick Rauland is a WooCommerce expert with a deep-rooted passion for the platform. Drawing from his multifaceted experience as a customer, WooCommerce support team member, core developer, release leader, and conference planner, he presents the latest edition of this guide to help you master every facet of launching and managing a successful WooCommerce store.From initiation to seamless integration of essential components such as payments, shipping, and tax configurations, this book takes you through the entire process of establishing your online store. You'll then customize your store's visual identity, optimizing for search engines and advanced sales management through Point of Sale (POS) systems, outsourced fulfillment solutions, and external reporting services.You'll then advance to enhancing the user experience, streamlining reorders, and simplifying the checkout process for your customers. With this new edition, you'll also gain insights into secure hosting and bug fixing and be prepared for updates. That's not all; you'll build a promotional landing page, ensure store safety, contribute to the WooCommerce community, and design custom plugins for your unique needs.By the end of this WooCommerce book, you'll emerge with the skills to run a complete WooCommerce store and customize every aspect of the store on the frontend as well as backend.What you will learnGrasp the fundamentals of e-commerce website development with WordPress and WooCommerceConfigure the essential payment, shipping, and tax settingsSet up various product types depending on your storeUse Gutenberg product blocks to display products across various categories on your websiteDevelop WordPress plugins to customize your website's functionalityUse product data syncing for enhanced user experience and store performance trackingPromote your products effectively using search engine optimization (SEO) and landing pagesWho this book is forThis book is for web developers, WordPress developers, e-commerce consultants, and anyone familiar with WordPress interested in building an e-commerce website from scratch. Working knowledge of WordPress development and general web development concepts is required.Table of ContentsInstalling WordPress & WooCommerceAll About Configuring ProductsOrganizing ProductsAttracting Traffic with Search Engine OptimizationManaging Sales Through WP AdminSyncing Product DataConfiguring In-Store POS SolutionsUsing Fulfillment SoftwareSpeeding Up Your StoreSetting Up Your ThemeCustomizing the Product PageBuilding a Landing PageCreating Plugins for WooCommerceNext Steps with WooCommerce

9 特價2064
立即代訂
下次再買

Privacy-Preserving Machine Learning

Packt 出版
2024/05/02 出版

Gain hands-on experience in data privacy and privacy-preserving machine learning with open-source ML frameworks, while exploring techniques and algorithms to protect sensitive data from privacy breachesKey Features: - Understand machine learning privacy risks and employ machine learning algorithms to safeguard data against breaches- Develop and deploy privacy-preserving ML pipelines using open-source frameworks- Gain insights into confidential computing and its role in countering memory-based data attacks- Purchase of the print or Kindle book includes a free PDF eBookBook Description: - In an era of evolving privacy regulations, compliance is mandatory for every enterprise- Machine learning engineers face the dual challenge of analyzing vast amounts of data for insights while protecting sensitive information- This book addresses the complexities arising from large data volumes and the scarcity of in-depth privacy-preserving machine learning expertise, and covers a comprehensive range of topics from data privacy and machine learning privacy threats to real-world privacy-preserving cases- As you progress, you'll be guided through developing anti-money laundering solutions using federated learning and differential privacy- Dedicated sections will explore data in-memory attacks and strategies for safeguarding data and ML models- You'll also explore the imperative nature of confidential computation and privacy-preserving machine learning benchmarks, as well as frontier research in the field- Upon completion, you'll possess a thorough understanding of privacy-preserving machine learning, equipping them to effectively shield data from real-world threats and attacksWhat You Will Learn: - Study data privacy, threats, and attacks across different machine learning phases- Explore Uber and Apple cases for applying differential privacy and enhancing data security- Discover IID and non-IID data sets as well as data categories- Use open-source tools for federated learning (FL) and explore FL algorithms and benchmarks- Understand secure multiparty computation with PSI for large data- Get up to speed with confidential computation and find out how it helps data in memory attacksWho this book is for: - This comprehensive guide is for data scientists, machine learning engineers, and privacy engineers- Prerequisites include a working knowledge of mathematics and basic familiarity with at least one ML framework (TensorFlow, PyTorch, or scikit-learn)- Practical examples will help you elevate your expertise in privacy-preserving machine learning techniquesTable of Contents- Introduction to Data Privacy, Privacy threats and breaches- Machine Learning Phases and privacy threats/attacks in each phase- Overview of Privacy Preserving Data Analysis and Introduction to Differential Privacy- Differential Privacy Algorithms, Pros and Cons- Developing Applications with Different Privacy using open source frameworks- Need for Federated Learning and implementing Federated Learning using open source frameworks- Federated Learning benchmarks, startups and next opportunity- Homomorphic Encryption and Secure Multiparty Computation- Confidential computing - what, why and current state- Privacy Preserving in Large Language Models

9 特價2064
立即代訂
下次再買

Insecure Digital Frontiers

Ingram 出版
2024/05/02 出版

'Insecure Digital Frontiers' is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize. This book delves into the vulnerabilities that define our interconnected world.

9 特價8352
立即代訂
下次再買

Artificial Intelligence, Ethics and the Future of Warfare

Kaushik,Roy  著
Ingram 出版
2024/05/02 出版

This volume examines how the adoption of AI technologies is likely to impact strategic and operational planning, and the possible future tactical scenarios for conventional, unconventional, cyber, space and nuclear force structures.

9 特價2922
立即代訂
下次再買

Insecure Digital Frontiers

Ingram 出版
2024/05/02 出版

'Insecure Digital Frontiers' is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize. This book delves into the vulnerabilities that define our interconnected world.

9 特價3339
立即代訂
下次再買

Demystifying Large Language Models

James,Chen  著
Ingram 出版
2024/05/01 出版

This book is a comprehensive guide aiming to demystify the world of transformers -- the architecture that powers Large Language Models (LLMs) like GPT and BERT. From PyTorch basics and mathematical foundations to implementing a Transformer from scratch, you'll gain a deep understanding of the inner workings of these models.That's just the beginning. Get ready to dive into the realm of pre-training your own Transformer from scratch, unlocking the power of transfer learning to fine-tune LLMs for your specific use cases, exploring advanced techniques like PEFT (Prompting for Efficient Fine-Tuning) and LoRA (Low-Rank Adaptation) for fine-tuning, as well as RLHF (Reinforcement Learning with Human Feedback) for detoxifying LLMs to make them aligned with human values and ethical norms.Step into the deployment of LLMs, delivering these state-of-the-art language models into the real-world, whether integrating them into cloud platforms or optimizing them for edge devices, this section ensures you're equipped with the know-how to bring your AI solutions to life.Whether you're a seasoned AI practitioner, a data scientist, or a curious developer eager to advance your knowledge on the powerful LLMs, this book is your ultimate guide to mastering these cutting-edge models. By translating convoluted concepts into understandable explanations and offering a practical hands-on approach, this treasure trove of knowledge is invaluable to both aspiring beginners and seasoned professionals.

9 特價1299
立即代訂
下次再買

Learning Subsequential Transducers. A Categorical Approach

Ingram 出版
2024/05/01 出版

Master's Thesis from the year 2024 in the subject Computer Sciences - Artificial Intelligence, Universit? degli Studi di Milano (Dipartimento di Matematica), course: Corso di Laurea Magistrale in Matematica, language: English, abstract: In this thesis, an algorithm for learning subsequential transducers is presented from two different perspectives: as an extension of Angluin's algorithm for learning deterministic finite automata and as an instantiation of a more generic categorical algorithm valid for a larger class of automata. The adopted categorical approach considers automata as functors from a category representing words to a certain output category. Some sufficient properties for yielding the existence of minimal automata are presented, together with some additional hypotheses relative to termination to ensure the correctness of the generic algorithm. Remarkably, the conditions required in Angluin's original algorithm and in its extended version for subsequential transducers naturally arise as the generic categorical algorithm is instantiated with the proper output categories. It is not uncommon to understand facts, processes and results better by looking at them from above: learning is not an exception. Learning is a crucial area in computer science, especially in artificial intelligence: knowing how to deal with communication, mistakes and experience plays an essential role to progress in learning. But even more important is learning what makes communication possible: a language. A language can be initially thought as a subset of a set of words over an alphabet, always supposed to be finite.The relation between languages and automata has become clearer and clearer in the last decades, since Noam Chomsky gave a mathematical model of a grammar in the second half of the last century. A deterministic finite automaton accepts a language, called regular, and for every regular language there exists a deterministic finite automaton being minimal, i.e. with a minim

9 特價2871
立即代訂
下次再買

The Inevitable Ai

Ingram 出版
2024/04/30 出版

Just like the discovery of fire catapulted humanity from cave dwellers to space explorers, AI promises to transform our civilization completely, carrying formidable potential for unparalleled advancement and tremendous destruction. It's essential for society at large to truly understand AI to harness and channelise the power. Through engaging storytelling, simple language, and vivid analogies, this book demystifies AI and presents a clear, accessible exploration of its foundational principles. By stripping away the jargon and media hype, this book offers a lucid narrative on why AI will be an eternal force to stay and not an ephemeral fad. Focusing on practical strategies, the book offers insights into innovative product ideas, investment opportunities, and clear risk-reward analyses. It also offers actionable advice for addressing job displacement and leveraging AI for personal and professional empowerment. It is a critical resource for a diverse audience, including professionals, leaders, investors, and policymakers, urging them to shape a future where AI actively enhances our reality. Offering a critical examination of our digital ecosystem's growing imbalance and foresight into raising children in an age of AI, this book is a compelling call to action for all who bear the weight of humanity's tomorrow.

9 特價1374
立即代訂
下次再買

Linking Online Engagement to Pandemic Responses

Lexing,Xie  著
Ingram 出版
2024/04/29 出版

A highly mathematical investigation of the mathematical underpinnings of the attention economy. Valuable reading for anyone interested in the topic, and a revealing glimpse at the level of resources and insight available to governments via organizations like the funder of this project, the Air Force Research Laboratory. The reader should expect to: - Gain valuable insights into the mathematical underpinnings of online attention markets and fair attention allocation, addressing the pressing issue of attention scarcity in an information-rich world. - Understand the novel neural model called Radflow that tackles the challenges of modeling networks of time series, providing valuable insights and predictions in domains like social networks, transportation systems, and financial markets. - Explore the comprehensive analysis of media consumption patterns and political dynamics during the COVID-19 pandemic, shedding light on media influence, political polarization, and the diversity of audience leanings, contributing to a more informed understanding of current public issues. This annotated edition illustrates the capabilities of the AI Lab for Book-Lovers to add context and ease-of-use to manuscripts. It includes several types of abstracts, building from simplest to more complex: TLDR (one word), ELI5, TLDR (vanilla), Scientific Style, and Action Items; essays to increase viewpoint diversity, such as Grounds for Dissent, Red Team Critique, and MAGA Perspective; and Notable Passages and Nutshell Summaries for each page.

9 特價1008
立即代訂
下次再買

The Inevitable Ai

Ingram 出版
2024/04/29 出版

Just like the discovery of fire catapulted humanity from cave dwellers to space explorers, AI promises to transform our civilization completely, carrying formidable potential for unparalleled advancement and tremendous destruction. It's essential for society at large to truly understand AI to harness and channelise the power. Through engaging storytelling, simple language, and vivid analogies, this book demystifies AI and presents a clear, accessible exploration of its foundational principles. By stripping away the jargon and media hype, this book offers a lucid narrative on why AI will be an eternal force to stay and not an ephemeral fad. Focusing on practical strategies, the book offers insights into innovative product ideas, investment opportunities, and clear risk-reward analyses. It also offers actionable advice for addressing job displacement and leveraging AI for personal and professional empowerment. It is a critical resource for a diverse audience, including professionals, leaders, investors, and policymakers, urging them to shape a future where AI actively enhances our reality.Offering a critical examination of our digital ecosystem's growing imbalance and foresight into raising children in an age of AI, this book is a compelling call to action for all who bear the weight of humanity's tomorrow.

9 特價1007
立即代訂
下次再買

React and React Native - Fifth Edition

Packt 出版
2024/04/29 出版

Get a big-picture view of modern React and React Native and see how they go hand-in-hand - covering TypeScript development, Vite, state management strategies, unit testing with Jest, and more.Purchase of the print or Kindle book includes a free PDF eBook.Key Features: - New content on TypeScript, React frameworks, state management strategies, and unit testing- Get to grips with React fundamentals and modern React techniques and architecture- Broaden your React expertise through mobile development with React NativeBook Description: Welcome to your big-picture guide to the React ecosystem.If you're new to React and looking to become a professional React developer, this book is for you. This updated fifth edition reflects the current state of React, including React framework coverage as well as TypeScript.Part 1 introduces you to React. You'll discover JSX syntax, hooks, functional components, and event handling, learn techniques to fetch data from a server, and tackle the tricky problem of state management. Once you're comfortable with writing React in JavaScript, you'll pick up TypeScript development in later chapters.Part 2 transitions you into React Native for mobile development. React Native goes hand-in-hand with React. With your React knowledge behind you, you'll appreciate where and how React Native differs as you write shared components for Android and iOS apps. You'll learn how to build responsive layouts, use animations, and implement geolocation.By the end of this book, you'll have a big-picture view of React and React Native and be able to build applications with both.What You Will Learn: - Explore React architecture, component properties, state, and context- Work with React Hooks for handling functions and components- Fetch data from a server using the Fetch API, GraphQL, and WebSockets- Dive into internal and external state management strategies- Build robust user interfaces (UIs) for mobile and desktop apps using Material-UI- Perform unit testing for your components with Vitest and mocking- Manage app performance with server-side rendering, lazy components, and SuspenseWho this book is for: This book is for any JavaScript or TypeScript developer who wants to start learning how to use React and React Native for web and mobile app development.No prior knowledge of React or React Native is required. However, a working knowledge of JavaScript is necessary to be able to follow along the content covered.Table of Contents- Why React?- Rendering with JSX- Understanding React Components and Hooks- Event Handling in the React Way- Crafting Reusable Components- Type-Checking and Validation with TypeScript- Handling Navigation with Routes- Code Splitting Using Lazy Components and Suspense- User Interface Framework Components- High-Performance State Updates- Fetching Data from a Server- State Management in React- Server-Side Rendering- Unit Testing in React- Why React Native?- React Native Under the Hood- Kickstarting React Native Projects- Building Responsive Layouts with Flexbox- Navigating Between Screens- Rendering Item Lists- Geolocation and Maps- Collecting User Input- Responding to User Gestures- Showing Progress- Displaying Modal Screens- Using Animations- Controlling Image Displays- Going Offline

9 特價2018
立即代訂
下次再買

Homeland and territorial security with AI

Ingram 出版
2024/04/27 出版

This book explores the innovative concept of a knowledge cartridge dedicated to internal and territorial security, employing the Aitek platform - a cutting-edge AI and Big Data framework enriched by 25,000 man-days of research and development. It delves into the foundational principles of the knowledge cartridge system and subsequently addresses the critical challenges inherent in homeland and territorial security, with a particular focus on counter-terrorism efforts. Through a detailed examination, the thesis presents how artificial intelligence can be strategically applied to these challenges, offering a novel approach to enhancing security measures and operational efficiency within the domain of internal and territorial security. This work not only contributes to the academic discourse on AI's role in security but also proposes practical AI-driven solutions to complex security problems, thereby bridging the gap between theoretical research and real-world application.

9 特價1375
立即代訂
下次再買

Storage Area Networks

Ajesh,Faizal  著
Ingram 出版
2024/04/26 出版

"Storage Area Networks: Design, Principles & Management" delves into the world of SAN technology, providing a comprehensive guide for those seeking to understand, design, and manage these high-performance networks. This book equips readers with the knowledge to navigate the intricacies of SAN components, protocols, and architectures, while also exploring best practices for implementation, operation, and troubleshooting. Whether you're a seasoned IT professional or embarking on your storage networking journey, this text serves as a valuable resource for maximizing the potential of your SAN environment.

9 特價2157
立即代訂
下次再買

Key Security Concepts that all CISOs Should Know-Cyber Guardians

Ingram 出版
2024/04/26 出版

Become the Cyber Guardian Your Organization Needs: Mastering the Art of Protecting the Digital RealmIn today's rapidly evolving digital landscape, the role of a Chief Information Security Officer (CISO) has never been more critical. Cyber Guardians: A CISO's Guide to Protecting the Digital World is your comprehensive roadmap to mastering the multifaceted aspects of cybersecurity leadership. Designed by experts for current and aspiring CISOs, this book dives deep into the complexities of securing modern enterprises against the ever-growing tide of cyber threats.From setting the strategic direction for your cybersecurity initiatives to building a resilient team that can face any challenge, this guide covers it all. Learn how to strike the perfect balance between confidentiality, integrity, and availability with our in-depth exploration of the CIA Triad. Discover the revolutionary concept of Zero Trust and how implementing its principles can bolster your security posture against insider and outsider threats alike.The digital battlefield is littered with emerging threats, from AI-driven attacks to sophisticated social engineering tactics. Cyber Guardians equips you with the knowledge to recognize these threats early and the strategies to defend against them effectively. Navigate through the complexities of compliance and regulatory requirements with ease, ensuring your organization not only meets but exceeds the global cybersecurity standards.Yet, managing the aftermath of a data breach is where many leaders find themselves unprepared. This book offers a proactive guide to incident response and crisis management, ensuring you can lead your organization through the storm with confidence. The extensive coverage doesn't stop there; delve into the future of cybersecurity for CISOs, preparing yourself for the challenges and opportunities that quantum computing and IoT will bring.Cyber Guardians: A CISO's Guide to Protecting the Digital World stands as an essential manifesto for every cybersecurity leader. By the end of this journey, you'll not only be equipped to safeguard your organization's digital assets but also to drive forward the security culture that will act as the ultimate linchpin in defending against the cyber threats of tomorrow. Empower yourself today to become the cyber guardian your organization needs.

9 特價615
立即代訂
下次再買

Online Identity - An Essential Guide

Rohit,Raja  著
Ingram 出版
2024/04/26 出版

In today's digital age, having a strong online identity has become more important than ever. This book aims to explore the many facets of this topic, from the importance of building a positive digital presence to managing one's online reputation and privacy. We want to cover different aspects of online identity. This book will focus on the importance of online identity and how it can affect our personal and professional lives. We also want to provide strategies for building a strong and authentic online identity, including tips on how to curate social media profiles and manage privacy settings. The book will also delve into the concept of digital footprints and the implications of our online actions, explore online reputation management and how to maintain a positive online image, and analyze the impact of online identity on mental health, including the effects of cyberbullying and social comparison. Finally, the book will look into the future of online identity, exploring emerging technologies such as blockchain-based identity solutions and virtual reality environments. With practical tips and insightful analysis, this book hopes to become an essential guide for anyone looking to navigate the complexities of online identity in the digital age.

9 特價6345
立即代訂
下次再買

Foundations and Practice of Security

Springer 出版
2024/04/26 出版

This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11-13, 2023.The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following topical sections: Part I: AI and cybersecurity, security analysis, phishing and social network, vulnerabilities and exploits, network and system threat, malware analysis.Part II: security design, short papers.

9 特價3131
立即代訂
下次再買

Penetration Testing with Kali NetHunter

Ingram 出版
2024/04/25 出版

Fortify your mobile world: Discover cutting-edge techniques for mobile security testingDESCRIPTION Mobile devices are vital in our lives, so securing the apps and systems on them is essential. Penetration testing with Kali NetHunter offers a detailed guide to this platform, helping readers perform effective security tests on Android and iOS devices.This mobile penetration testing guide helps you to find and fix security issues in mobile apps and systems. It covers threats to Android and iOS devices, sets up testing environments, and uses tools like Kali NetHunter. You will learn methods like reconnaissance, static analysis, dynamic analysis, and reverse engineering to spot vulnerabilities. The book discusses common weaknesses in Android and iOS, including ways to bypass security measures. It also teaches testing for mobile web apps and APIs. Advanced users can explore OS and binary exploitation. Lastly, it explains how to report issues and provides hands-on practice with safe apps.After finishing this book, readers will grasp mobile security testing methods and master Kali NetHunter for mobile penetration tests. Armed with these skills, they can spot vulnerabilities, enhance security, and safeguard mobile apps and devices from potential risks.WHAT YOU WILL LEARN● Comprehensive coverage of mobile penetration testing.● Mobile security skillsets from the basics to advanced topics.● Hands-on, practical exercises and walkthroughs.● Detailed explanation of Android and iOS device security.● Employ advanced mobile network attack techniques.WHO THIS BOOK IS FORThis book is designed for security and application development teams, IT professionals, mobile developers, cybersecurity enthusiasts, and anyone interested in learning about mobile penetration testing for Android and iOS devices. It aims to equip readers with the skills and knowledge needed to strengthen the security of their mobile applications and devices.

9 特價1833
立即代訂
下次再買

Implementing Palo Alto Networks Prisma(R) Access

Packt 出版
2024/04/25 出版

Deploy Prisma Access for mobile users, remote networks, and service connections harnessing advanced featuresKey Features- Find out how to activate, deploy, and configure Prisma Access- Configure mobile user and remote network security processing nodes- Understand user identification and the Cloud Identity Engine- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionDiscover how Palo Alto Networks' Prisma Access, a firewall as a service (FWaaS) platform, securely connects mobile users and branch offices to resources. This guide, written by renowned Palo Alto Networks expert Tom Piens, introduces cloud-delivered security and Prisma Access components. You'll learn how Prisma Access fits into the security landscape and benefits organizations with remote networks and mobile workforces, and gain essential knowledge and practical skills in setting up secure connections, implementing firewall policies, utilizing threat prevention, and securing cloud applications and data. By the end, you'll be able to successfully implement and manage a secure cloud network using Prisma Access.What you will learn- Configure and deploy the service infrastructure and understand its importance- Investigate the use cases of secure web gateway and how to deploy them- Gain an understanding of how BGP works inside and outside Prisma Access- Design and implement data center connections via service connections- Get to grips with BGP configuration, secure web gateway (explicit proxy), and APIs- Explore multi tenancy and advanced configuration and how to monitor Prisma Access- Leverage user identification and integration with Active Directory and AAD via the Cloud Identity EngineWho this book is forThis book is for network engineers, security engineers, security administrators, security operations specialists, security analysts, and anyone looking to integrate Prisma Access into their security landscape. Whether you're a newcomer to the field or a seasoned expert, this guide offers valuable insights for implementing and managing a secure cloud network effectively. Basic knowledge of Palo Alto will be helpful, but it's not a prerequisite.Table of Contents- Designing and Planning Prisma Access- Activating Prisma Access- Setting up Service Infrastructure- Deploying Service Connections- Configuring Remote Network SPNs- Configuring Mobile User SPNs- Securing Web Gateway- Setting Up Your Security Policy- User Identification and Cloud Identity Engine- Advanced Configurations and Insights- ZTNA Connector

9 特價2523
立即代訂
下次再買

Spring Security in Action, Second Edition

2024/04/24 出版

Don't let security be an afterthought. Spring Security in Action, Second Edition is your vital companion to robust, secure applications that are protected right from the first line of code. Spring Security in Action, Second Edition is a revised version of the bestselling original, fully updated for Spring Boot 3 and Oauth2/OpenID Connect. In Spring Security in Action, Second Edition you will learn essential security skills including how to: Implement and customize authentication and authorization Set up all components of an OAuth2/OpenID Connect system Utilize CRSF and CORS configurations Secure Spring reactive applications Write tests for security configurations Whether you're a beginner or a pro, Spring Security in Action, Second Edition teaches you how to secure your Java applications from the ground up. Author Laurentiu Spilca distills his years of experience as a skilled Java and Spring developer into an indispensable guide to everything security--from authentication and authorization, to testing security configurations. This new edition covers the latest patterns for application-level security in Spring apps, demonstrating how Spring Security simplifies every step of the security process. Foreword by Joe Grandja. Purchase of the print book includes a free eBook in PDF and ePub formats from Manning Publications. About the technology Spring Security makes it much, much easier to secure enterprise-scale Java applications. This powerful framework integrates with Spring apps end to end, with "secure by design" principles and ready-to-use features that help you implement robust authorization and authentication and protect against data theft and intrusions. And like everything else in the Spring ecosystem, it's free, open source, and backed by the awesome team at VMWare. About the book Spring Security in Action, Second Edition updates this bestselling guide to Spring Security to include deep coverage of OAuth2/OpenID Connect and security configuration using the new SecurityFilterChain. The crystal clear explanations and relevant examples, teach you how to build your own authorization server, configure secure endpoints, and prevent cross-site scripting and request forgery attacks. What's inside Custom authentication and authorization CRSF and CORS configurations Secure Spring reactive applications Write tests for security configurations About the reader For experienced Java and Spring developers. About the author Laurentiu Spilca is a skilled Java and Spring developer and an experienced technology instructor. He is also the author of Manning's Spring Start Here and Troubleshooting Java. Table of Contents PART 1 1 Security today 2 Hello, Spring Security PART 2 3 Managing users 4 Managing passwords 5 A web app's security begins with filters 6 Implementing authentications PART 3 7 Configuring endpoint-level authorization: Restricting access 8 Configuring endpoint-level authorization: Applying restrictions 9 Configuring CSRF protection 10 Configuring CORS 11 Implementing authorization at the method level 12 Implementing filtering at the method level PART 4 13 What are OAuth 2 and OpenID Connect? 14 Implementing an OAuth 2 authorization server 15 Implementing an OAuth 2 resource server 16 Implementing an OAuth 2 client PART 5 17 Implementing security in reactive applications PART 6 18 Testing security configurations

9 特價2538
立即代訂
下次再買

Methodology to Improve Control Plane Security in Sdn Environments

Ingram 出版
2024/04/24 出版

This book unveils a blueprint for safeguarding the very backbone of modern communication networks. It offers a roadmap towards fortifying SDN infrastructures against the relentless onslaught of cyber threats, ensuring resilience and reliability in an ever-evolving digital landscape.

9 特價4958
立即代訂
下次再買

Digital Contention in a Divided Society

Paul,Reilly  著
Ingram 出版
2024/04/23 出版

How are platforms such as Facebook and Twitter (now X) used by citizens to frame contentious parades and protests in 'post-conflict' Northern Ireland? What do these contentious episodes tell us about the potential of information and communication technologies to promote positive intergroup contact in the deeply divided society? These issues are addressed in what is the first in-depth qualitative exploration of how social media channels were used during the union flag protests (December 2012--March 2013) and the Ardoyne parade disputes (July 2014 and 2015). This updated version also examines the role of online platforms in the April 2021 'Brexit riots'. The book focuses on the extent to which affective publics, mobilised and connected via expressions of solidarity on social media, appear to escalate or de-escalate sectarian tensions caused by these hybrid media events. It also explores whether citizen activity on these online platforms has the potential to contribute to peacebuilding in Northern Ireland.

9 特價1644
立即代訂
下次再買

Node.js for Beginners

Packt 出版
2024/04/23 出版

Build your first production-grade web app from scratch using Node.js, Express, MongoDB, authentication, and testing with guidance from a member of the Express Technical Committee as well as a Node.js core collaborator and releaserKey Features: - Learn JavaScript, async programming, and event-driven architectures in Node.js- Discover best practices for secure deployment and testing of Node.js apps- Build a feature-rich web app from scratch using MongoDB, Express.js, and passport.js, including testing- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Node.js revolutionizes server-side JavaScript development and empowers developers to build efficient, scalable, and versatile applications across a range of use cases. This book is written by a Node.js core collaborator and releaser and is the only book for beginners on Node.js. It takes you on a progressive learning path that will give you the skills needed to leverage Node.js.You'll learn Node.js fundamentals and refresh your knowledge of JavaScript before transitioning to the development of modern web applications using Node.js, Express.js, and MongoDB. You'll get hands-on with complex topics such as asynchronous programming, npm libraries, event-driven patterns for HTTP servers, RESTful API, and JSON Web Tokens. The final chapters will walk you through the deployment process, offering insights into various strategies, including bare metal setups, virtual machines, and containerization with Docker. You'll also be guided through the use of Process Manager 2 (PM2) for efficient process management.By the end of this Node.js book, you'll have the skills to craft, test, and deploy Node.js web applications confidently and use this powerful stack in your day-to-day projects.What You Will Learn: - Build solid and secure Node.js applications from scratch- Discover how to consume and publish npm packages effectively- Master patterns for refactoring and evolving your applications over time- Gain a deep understanding of essential web development principles, including HTTP, RESTful API design, JWT, authentication, authorization, and error handling- Implement robust testing strategies to enhance the quality and reliability of your applications- Deploy your Node.js applications to production environments using Docker and PM2Who this book is for: This book is for developers eager to learn Node.js swiftly and utilize it for web app development. Front-end developers looking to delve into back-end development or become full-stack developers using Node.js will also benefit from this book's comprehensive coverage of topics. Before you get started with this book, you'll need to be familiar with the basics of coding (JavaScript programming or another language), Git and/or GitHub, and front-end development, as these topics aren't covered in the book.Table of Contents- Introduction to Node.js- Setting Up the Development Environment- JavaScript Fundamentals- Asynchronous Programming- Node.js Core Libraries- External Modules and NPM- Event-Driven Architecture- Testing in Node.js- Handling HTTP and REST API- Building Web Applications with Express- Building a Web Application Project from Scratch- Data Persistence with MongoDB- User Authentication and Authorization with Passport.js- Error Handling in Node.js- Securing Web Applications- Deploying Node.js Applications- Dockerizing a Node.js Application

9 特價2064
立即代訂
下次再買

Digital Armor

Ingram 出版
2024/04/23 出版

In "Digital Armor: Confessions of a Reformed Hacker," delve into the captivating world of cybersecurity through the eyes of a former hacker turned cybersecurity expert. This book offers a unique perspective on cyber threats and provides invaluable insights into defending against them.Starting with an exploration of the hacker's mind, the author unveils the motivations and mindset behind cyber-attacks. From there, readers are guided through the anatomy of various cyber threats, accompanied by real-life scenarios and their consequences.Learn how to fortify your digital fortress with fundamental cybersecurity practices, including password management, authentication, and safeguarding personal information. Discover strategies for defending against social engineering techniques and securing both home networks and mobile devices effectively.Understanding the importance of encryption and VPNs is crucial in today's digital landscape, and this book offers comprehensive coverage on their role in protecting digital assets. Additionally, it provides insights into securing financial information, online transactions, and mitigating the risk of data loss."Cultivating a Cybersecurity Mindset" explores the importance of promoting awareness and responsible online behaviour, emphasizing cybersecurity's critical role in various sectors. The book also anticipates emerging cybersecurity trends and technologies, preparing readers for the challenges of tomorrow.Finally, "Digital Armor" offers a deep dive into enhancing CCTV security practices, highlighting the intersection of physical and cyber defence. Real-world case studies and future trends in CCTV security provide actionable insights for safeguarding against cyber threats.Whether you're a cybersecurity professional, a business owner, or an individual concerned about protecting your digital identity, "Digital Armor" equips you with the knowledge and tools to fortify your defences in an increasingly interconnected world.

9 特價1422
立即代訂
下次再買

IT Troubleshooting Skills Training

Ingram 出版
2024/04/23 出版

���� Welcome to the ultimate resource for mastering IT troubleshooting skills! ����️Introducing the "IT Troubleshooting Skills Training" book bundle, your comprehensive toolkit for navigating the complexities of IT problem-solving like a pro. ����Whether you're an aspiring analyst or a seasoned manager, this bundle is your passport to success in the fast-paced world of IT. �������� Book 1 - Foundations of IT Troubleshooting: A Beginner's Guide Embark on your journey to IT mastery with this essential beginner's guide. From understanding the basics of IT systems to learning foundational troubleshooting methodologies, this book lays the groundwork for your success.���� Book 2 - Mastering Common IT Issues: Intermediate Troubleshooting Techniques Take your skills to the next level with intermediate troubleshooting techniques. Dive deep into resolving common IT issues with precision and efficiency, equipping yourself with the tools needed to tackle everyday challenges head-on.���� Book 3 - Advanced IT Problem-Solving Strategies: Expert-Level Troubleshooting Become an IT troubleshooting virtuoso with advanced problem-solving strategies. Learn how to tackle complex issues like a seasoned pro, leveraging expert-level techniques to overcome even the toughest IT challenges.���� Book 4 - Beyond the Basics: Specialized Approaches in IT Troubleshooting Explore the cutting-edge of IT troubleshooting with specialized approaches. From cloud computing to cybersecurity, this book delves into the latest trends and innovations, equipping you with the knowledge needed to stay ahead of the curve.With practical guidance, real-world examples, and actionable insights, the "IT Troubleshooting Skills Training" book bundle is your go-to resource for mastering IT problem-solving. ����Don't let IT issues hold you back - unlock your full potential and become a troubleshooting superstar today! ����Order now and take the first step towards IT excellence. ����

9 特價1833
立即代訂
下次再買

Risks and Security of Internet and Systems

Springer 出版
2024/04/23 出版

This book constitutes the revised selected papers of the 18th International Conference on Risks and Security of Internet and Systems, CRiSIS 2023, which took place in Rabat, Morocco, during December 6-8, 2023. The 13 full papers and 2 short papers included in this volume were carefully reviewed and selected from 25 submissions. The papers detail security issues in internet-related applications, networks and systems.

9 特價3653
立即代訂
下次再買

Mastering NLP from Foundations to LLMs

Lior,Gazit  著
Packt 出版
2024/04/23 出版

Enhance your NLP proficiency with modern frameworks like LangChain, explore mathematical foundations and code samples, and gain expert insights into current and future trends Key FeaturesLearn how to build Python-driven solutions with a focus on NLP, LLMs, RAGs, and GPTMaster embedding techniques and machine learning principles for real-world applicationsUnderstand the mathematical foundations of NLP and deep learning designsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionDo you want to master Natural Language Processing (NLP) but don't know where to begin? This book will give you the right head start. Written by leaders in machine learning and NLP, Mastering NLP from Foundations to LLMs provides an in-depth introduction to techniques. Starting with the mathematical foundations of machine learning (ML), you'll gradually progress to advanced NLP applications such as large language models (LLMs) and AI applications. You'll get to grips with linear algebra, optimization, probability, and statistics, which are essential for understanding and implementing machine learning and NLP algorithms. You'll also explore general machine learning techniques and find out how they relate to NLP. Next, you'll learn how to preprocess text data, explore methods for cleaning and preparing text for analysis, and understand how to do text classification. You'll get all of this and more along with complete Python code samples.By the end of the book, the advanced topics of LLMs' theory, design, and applications will be discussed along with the future trends in NLP, which will feature expert opinions. You'll also get to strengthen your practical skills by working on sample real-world NLP business problems and solutions.What you will learnMaster the mathematical foundations of machine learning and NLP Implement advanced techniques for preprocessing text data and analysis Design ML-NLP systems in PythonModel and classify text using traditional machine learning and deep learning methodsUnderstand the theory and design of LLMs and their implementation for various applications in AIExplore NLP insights, trends, and expert opinions on its future direction and potentialWho this book is forThis book is for deep learning and machine learning researchers, NLP practitioners, ML/NLP educators, and STEM students. Professionals working with text data as part of their projects will also find plenty of useful information in this book. Beginner-level familiarity with machine learning and a basic working knowledge of Python will help you get the best out of this book.Table of ContentsNavigating the NLP Landscape: A comprehensive introductionMastering Linear Algebra, Probability, and Statistics for Machine Learning and NLPUnleashing Machine Learning Potentials in NLPStreamlining Text Preprocessing Techniques for Optimal NLP PerformanceEmpowering Text Classification: Leveraging Traditional Machine Learning TechniquesText Classification Reimagined: Delving Deep into Deep Learning Language ModelsDemystifying Large Language Models: Theory, Design, and Langchain ImplementationAccessing the Power of Large Language Models: Advanced Setup and Integration with RAGExploring the Frontiers: Advanced Applications and Innovations Driven by LLMsRiding the Wave: Analyzing Past, Present, and Future Trends Shaped by LLMs and AIExclusive Industry Insights: Perspectives and Predictions from World Class Experts

9 特價2431
立即代訂
下次再買

Ultimate Penetration Testing with Nmap

Ingram 出版
2024/04/20 出版

Master one of the most essential tools a professional pen tester needs to know.Book DescriptionThis essential handbook offers a systematic journey through the intricacies of Nmap, providing both novice and seasoned professionals with the tools and techniques needed to conduct thorough security assessments with confidence. The purpose of this book is to educate and empower cyber security professionals to increase their skill set, and by extension, contribute positively to the cyber security posture of organizations through the use of Nmap.This book starts at the ground floor by establishing a baseline understanding of what Penetration Testing is, how it is similar but distinct from other types of security engagements, and just how powerful of a tool Nmap can be to include in a pen tester's arsenal. By systematically building the reader's proficiency through thought-provoking case studies, guided hands-on challenges, and robust discussions about how and why to employ different techniques, the reader will finish each chapter with new tangible skills.With practical best practices and considerations, you'll learn how to optimize your Nmap scans while minimizing risks and false positives.Table of Contents1. Introduction to Nmap and Security Assessments2. Setting Up a Lab Environment For Nmap3. Introduction to Attack Surface Mapping4. Identifying Vulnerabilities Through Reconnaissance and Enumeration5. Mapping a Large Environment6. Leveraging Zenmap and Legion7. Advanced Obfuscation and Firewall Evasion Techniques8. Leveraging the Nmap Scripting Engine9. Best Practices and Considerations APPENDIX A. Additional Questions APPENDIX B. Nmap Quick Reference Guide Index

9 特價1741
立即代訂
下次再買

Modern API Design with gRPC

Ingram 出版
2024/04/20 出版

Elevate Your Development with Effortless and Efficient API Communication.Book Description"Modern API Design with gRPC" is a definitive guide that empowers developers to leverage the full potential of gRPC in constructing efficient and scalable distributed systems.Beginning with an exploration of API evolution and its significance in software development, the book seamlessly transitions into the core concepts of gRPC architecture, protocol buffers, and stubs. Through practical examples and clear instructions, readers embark on a journey to establish their first gRPC server and client, laying a solid groundwork for further exploration.Delving deeper into advanced topics such as communication patterns, error handling, and load balancing strategies specific to gRPC. With a strong emphasis on security, readers learn to implement TLS encryption, mutual authentication, and authorization mechanisms to fortify their applications. The book provides invaluable insights into best practices for constructing production-grade gRPC applications, complemented by real-world case studies that illustrate the versatility and scalability of gRPC across diverse project landscapes. This book equips readers with the confidence to design, implement, and deploy robust gRPC applications, catalyzing a transformative shift in their distributed system development approach.Table of Contents1. API Evolution over Time2. Fundamentals of gRPC3. Getting Started with gRPC4. Communication Patterns in gRPC5. Advanced gRPC Concepts6. Load Balancing in gRPC7. Secured gRPC8. Production Grade gRPC Applications9. Case Studies of Projects Using gRPC Index

9 特價1741
立即代訂
下次再買

Cloud Native Microservices Cookbook

Varun,Yadav  著
2024/04/18 出版

The convergence of microservices and cloud technology represents a significant paradigm shift in software development. To fully leverage the potential of both, integration from the outset of application development is crucial. Cloud-native microservices cookbook serve as a conduit, harmonizing disparate elements of microservice construction by establishing a cohesive framework from inception to deployment. This book meticulously outlines the various stages involved in launching an application utilizing cloud-native microservices. It commences with the foundational aspects of application development, emphasizing microservice architecture principles such as configuration and service discovery, considering cloud infrastructure. Progressing through containerization, continuous integration (CI), and continuous deployment (CD) pipelines, the book explores the intricacies of orchestration, high availability (HA), auto scalability, and cloud security. Subsequently, it elucidates the significance of observability in monitoring microservices post-deployment, concluding with a comprehensive exploration of Infrastructure as Code (IaC) for cloud infrastructure provisioning.

9 特價1603
立即代訂
下次再買

Mastering Amazon EC2

Packt 出版
2024/04/18 出版

Master Amazon EC2 with this comprehensive guide to unleashing the full potential of cloud computing, optimizing performance, and revolutionizing your business processesKey Features- Gain an in-depth understanding of EC2 core components, connectivity, networking, and security best practices- Build resilient applications with load balancing, autoscaling and diverse storage options- Learn advanced concepts and use cases for serverless, containers, HPC, and hybrid/multi cloud architecture- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionThis comprehensive guide demystifies the complex landscape of Amazon EC2, from fundamentals to advanced concepts. You'll begin by understanding EC2 core components, creating and managing AMIs, selecting the right instance type and size, establishing networking and connectivity, and implementing security best practices. Next, you'll start building resilient apps on EC2, load balancing, auto scaling, storage options, performance optimization, monitoring, logging, and auditing. You'll also explore advanced concepts like containers, serverless, hybrid/multi-cloud architectures, high performance computing, big data, and disaster recovery strategies. By the end, you'll be equipped with the knowledge and confidence to harness the full potential of Amazon EC2.What you will learn- Discover how to create, manage, and select the right EC2 AMIs- Explore load balancing and auto scaling with Elastic Load Balancing (ELB) and Auto Scaling Groups (ASGs)- Study EC2 storage options and performance optimization- Master monitoring and maintenance with Amazon Web Services (AWS) tools- Understand containerization, serverless computing, and EC2 automation- Get up to speed with migration, modernization, and compliance in EC2Who this book is forThis Amazon book is for IT professionals, DevOps engineers, cloud architects and developers looking to delve into Amazon EC2 and cloud computing. No prior AWS experience is required as the book takes you through the fundamentals, gradually advancing toward more complex topics.Table of Contents- Introduction to Amazon EC2 and Its Benefits- Understanding Core Components of Amazon EC2- Creating and Managing Amazon EC2 Machine Images (AMI)- Choosing the Right Amazon EC2 Instance Type and Size- Networking and Connectivity in Amazon EC2- Implementing Security Best Practices in Amazon EC2- Load Balancing and Auto Scaling with Elastic Load Balancer and Auto Scaling Groups- Understanding and Optimizing Amazon EC2 Storage Options- Optimizing Performance with Amazon EC2 Placement Groups and Pricing Model- Monitoring, Logging, and Maintenance with Amazon CloudWatch, AWS CloudTrail, and Backup Strategies- Automating Amazon EC2 - AWS CloudFormation and Infrastructure as Code- Containerization and Serverless Computing in Amazon EC2- Leveraging AWS Services for Hybrid and Multi-Cloud Architectures- Optimizing Amazon EC2 for High-Performance Computing, Big Data, and Disaster Recovery Strategies- Migrating, Modernizing, and Ensuring Compliance in Amazon EC2 Environments

9 特價2064
立即代訂
下次再買

Hands-On Ethical Hacking Tactics

Packt 出版
2024/04/18 出版

Detect and mitigate diverse cyber threats with actionable insights into attacker types, techniques, and efficient cyber threat hunting Key FeaturesExplore essential tools and techniques to ethically penetrate and safeguard digital environmentsSet up a malware lab and learn how to detect malicious code running on the networkUnderstand different attacker types, their profiles, and mindset, to enhance your cyber defense planPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIf you're an ethical hacker looking to boost your digital defenses and stay up to date with the evolving cybersecurity landscape, then this book is for you. Hands-On Ethical Hacking Tactics is a comprehensive guide that will take you from fundamental to advanced levels of ethical hacking, offering insights into both offensive and defensive techniques. Written by a seasoned professional with 20+ years of experience, this book covers attack tools, methodologies, and procedures, helping you enhance your skills in securing and defending networks.The book starts with foundational concepts such as footprinting, reconnaissance, scanning, enumeration, vulnerability assessment, and threat modeling. Next, you'll progress to using specific tools and procedures for hacking Windows, Unix, web servers, applications, and databases. The book also gets you up to speed with malware analysis. Throughout the book, you'll experience a smooth transition from theoretical concepts to hands-on techniques using various platforms. Finally, you'll explore incident response, threat hunting, social engineering, IoT hacking, and cloud exploitation, which will help you address the complex aspects of ethical hacking.By the end of this book, you'll have gained the skills you need to navigate the ever-changing world of cybersecurity.What you will learnUnderstand the core concepts and principles of ethical hackingGain hands-on experience through dedicated labsExplore how attackers leverage computer systems in the digital landscapeDiscover essential defensive technologies to detect and mitigate cyber threatsMaster the use of scanning and enumeration toolsUnderstand how to hunt and use search information to identify attacksWho this book is forHands-On Ethical Hacking Tactics is for penetration testers, ethical hackers, and cybersecurity enthusiasts looking to explore attack tools, methodologies, and procedures relevant to today's cybersecurity landscape. This ethical hacking book is suitable for a broad audience with varying levels of expertise in cybersecurity, whether you're a student or a professional looking for job opportunities, or just someone curious about the field.Table of ContentsEthical Hacking ConceptsEthical Hacking Footprinting and ReconnaissanceEthical Hacking Scanning and EnumerationEthical Hacking Vulnerability Assessment and Threat ModelingHacking the Windows Operating SystemHacking the Linux Operating System Ethical Hacking of Web ServersHacking DatabasesEthical Hacking Protocol ReviewEthical Hacking for Malware AnalysisIncident Response and Threat HuntingSocial EngineeringEthical Hacking of the Internet of Things (IoT)Ethical Hacking in the Cloud

9 特價2294
立即代訂
下次再買

Constructive Side-Channel Analysis and Secure Design

Springer 出版
2024/04/18 出版

This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2024, held in Gardanne, France, during April 9-10, 2024. The 14 full papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: Analyses and Tools; Attack Methods; Deep-Learning-Based Side-Channel Attacks; PUF/RNG; and Cryptographic Implementations.

9 特價3653
立即代訂
下次再買

Information Security Theory and Practice

Springer 出版
2024/04/16 出版

This volume constitutes the refereed proceedings of the 14th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2024, held in Paris, France. The 12 full papers presented were carefully reviewed and selected from 30 submissions. The papers presented in this proceedings focus on emerging trends in security and privacy, including experimental studies of fielded systems while exploring the application of security technology, and highlighting successful system implementations.

9 特價3131
立即代訂
下次再買

Towards Resilient Social Iot Sensors and Networks

Springer 出版
2024/04/16 出版
9 特價7307
立即代訂
下次再買

Rust for Blockchain Application Development

Akhil,Sharma  著
Packt 出版
2024/04/15 出版

Save time, improve stability, and optimize program memory while building decentralized applications on a blockchain using the features and capabilities of Rust Key FeaturesImplement peer-to-peer blockchain using features of the Rust programming languageUse Rust to build dApps on popular blockchains like Ethereum, Solana, and NEAROptimize Rust code and enhance security updates to deploy a blockchain to productionPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionBefore Rust, blockchain developers didn't have a systems programming language that was type-safe, fast, and, at the same time, had stable and easy memory management. Rust proved to be a boon for developers and works as the perfect solution for not only blockchain and protocol development but also dApp development.Rust for Blockchain Application Development focuses on demonstrating solutions that can help blockchain developers productize decentralized applications using Rust, which is a complex language with a steep learning curve.This book starts with basic Rust language concepts and then builds on these concepts to enable you to develop your own blockchain from scratch. As you progress, you'll learn how to build dApps on popular chains like Solana and NEAR. You'll also be guided through creating Ethereum dApps using Foundry (Rust). Finally, you'll develop a custom blockchain using Substrate by Parity (Polkadot). The book provides a complete 360-degree view of Rust in the blockchain ecosystem.By the end of this Rust book, you'll have a thorough understanding of how to apply your Rust knowledge to building dApps and blockchains from scratch.What you will learnUnderstand essential Rust concepts required to build blockchainApply blockchain features such as nodes and p2 communication using RustUnderstand and implement consensus in blockchainBuild and deploy a dApp on Ethereum with the Foundry framework in RustDevelop and deploy a dApp on Solana and the NEAR protocolBuild a custom blockchain using the Substrate framework by PolkadotWho this book is forThis Rust programming book is for blockchain developers interested in building dApps on popular blockchains using Rust. Blockchain architects wanting to save time required to go through documentation and understand each technology can also use this book as a quick-start guide. Experience in building applications on blockchain is required, and familiarity with Rust will be helpful but not necessary.Table of ContentsIntroduction to Blockchains With RustRust - Necessary Concepts For Building BlockchainsBuilding A Custom BlockchainAdding more features to our Custom BlockchainFinishing up our Custom BlockchainUsing Foundry to Build on EthereumExploring the Solana chain and building a Dapp on SolanaExploring the NEAR blockchain and building a dApp on NEARExploring Polkadot, Kusama protocol and SubstrateBuilding Your Own Custom Blockchain From scratch using SubstrateThe Future Of Rust For Blockchains

9 特價1697
立即代訂
下次再買

The Accidental Administrator

Ingram 出版
2024/04/14 出版

Your easy-to-follow step-by-step guide to configuring a Cisco router from the ground up!The Accidental Administratortm: Cisco Router Step-by-Step Configuration Guide is packed with more than 30 easy-to-follow interactive exercises, loads of screen captures, and lots of step-by-step examples to help you build a working router from scratch. Easily the most straightforward approach to learning how to configure a Cisco router, this book is filled with practical tips and secrets learned from years of Don s teaching and consulting on Cisco network devices.As a bonus, you won t waste your time on boring theory. All the essentials are covered in chapters on installing, backups and restores, and TCP/IP. You ll learn the nitty-gritty on subnetting, remote administration, routing protocols, static routing, access-control lists, site-to-site VPNs, network address translation (NAT), DHCP, password recovery, and security. There s even an entire chapter on the new Internet Protocol version 6 (IPv6).Here's just some of what you'll find: How to configure and manage access listsHow to set up a site-to-site VPNHow to implement IPv6All the information is presented in a straightforward style that you can understand and use right away. With The Accidental Administrator: Cisco Router Step-by-Step Configuration Guide you ll be able to sit down with your routers and build a working configuration in a matter of minutes. Of course, some of the more advanced configs may take a little longer, but even so, you'll be able to "get 'er done" in a minimal amount of time!In addition, there are supporting videos and a supporting webpage to provide even more help and updated information.

9 特價1368
立即代訂
下次再買

Unveiling the NIST Risk Management Framework (RMF)

Packt 出版
2024/04/12 出版

Gain an in-depth understanding of the NIST Risk Management Framework life cycle and leverage real-world examples to identify and manage risksKey Features- Implement NIST RMF with step-by-step instructions for effective security operations- Draw insights from case studies illustrating the application of RMF principles in diverse organizational environments- Discover expert tips for fostering a strong security culture and collaboration between security teams and the business- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionThis comprehensive guide provides clear explanations, best practices, and real-world examples to help readers navigate the NIST Risk Management Framework (RMF) and develop practical skills for implementing it effectively. By the end, readers will be equipped to manage and mitigate cybersecurity risks within their organization.What you will learn- Understand how to tailor the NIST Risk Management Framework to your organization's needs- Come to grips with security controls and assessment procedures to maintain a robust security posture- Explore cloud security with real-world examples to enhance detection and response capabilities- Master compliance requirements and best practices with relevant regulations and industry standards- Explore risk management strategies to prioritize security investments and resource allocation- Develop robust incident response plans and analyze security incidents efficientlyWho this book is forThis book is for cybersecurity professionals, IT managers and executives, risk managers, and policymakers. Government officials in federal agencies, where adherence to NIST RMF is crucial, will find this resource especially useful for implementing and managing cybersecurity risks. A basic understanding of cybersecurity principles, especially risk management, and awareness of IT and network infrastructure is assumed.Table of Contents- Understanding Cybersecurity and Risk Management- NIST Risk Management Framework Overview- Benefits of Implementing the NIST Risk Management Framework- Preparing for RMF Implementation- The NIST RMF Life Cycle- Security Controls and Documentation- Assessment and Authorization- Continuous Monitoring and Incident Response- Cloud Security and the NIST RMF- NIST RMF Case Studies and Future Trends- A Look Ahead

9 特價1835
立即代訂
下次再買

Mastering Large Language Models with Python

Raj,Arun R  著
2024/04/12 出版

A Comprehensive Guide to Leverage Generative AI in the Modern EnterpriseBook Description"Mastering Large Language Models with Python" is an indispensable resource that offers a comprehensive exploration of Large Language Models (LLMs), providing the essential knowledge to leverage these transformative AI models effectively. From unraveling the intricacies of LLM architecture to practical applications like code generation and AI-driven recommendation systems, readers will gain valuable insights into implementing LLMs in diverse projects.Covering both open-source and proprietary LLMs, the book delves into foundational concepts and advanced techniques, empowering professionals to harness the full potential of these models. Detailed discussions on quantization techniques for efficient deployment, operational strategies with LLMOps, and ethical considerations ensure a well-rounded understanding of LLM implementation.Through real-world case studies, code snippets, and practical examples, readers will navigate the complexities of LLMs with confidence, paving the way for innovative solutions and organizational growth. Whether you seek to deepen your understanding, drive impactful applications, or lead AI-driven initiatives, this book equips you with the tools and insights needed to excel in the dynamic landscape of artificial intelligence.Table of Contents1. The Basics of Large Language Models and Their Applications2. Demystifying Open-Source Large Language Models3. Closed-Source Large Language Models4. LLM APIs for Various Large Language Model Tasks5. Integrating Cohere API in Google Sheets6. Dynamic Movie Recommendation Engine Using LLMs7. Document-and Web-based QA Bots with Large Language Models8. LLM Quantization Techniques and Implementation9. Fine-tuning and Evaluation of LLMs10. Recipes for Fine-Tuning and Evaluating LLMs11. LLMOps - Operationalizing LLMs at Scale12. Implementing LLMOps in Practice Using MLflow on Databricks13. Mastering the Art of Prompt Engineering14. Prompt Engineering Essentials and Design Patterns15. Ethical Considerations and Regulatory Frameworks for LLMs16. Towards Trustworthy Generative AI (A Novel Framework Inspired by Symbolic Reasoning) Index

9 特價2062
立即代訂
下次再買

A CISO Guide to Cyber Resilience

Debra,Baker  著
Packt 出版
2024/04/12 出版

Explore expert strategies to master cyber resilience as a CISO, ensuring your organization's security program stands strong against evolving threatsKey Features- Unlock expert insights into building robust cybersecurity programs- Benefit from guidance tailored to CISOs and establish resilient security and compliance programs- Stay ahead with the latest advancements in cyber defense and risk management including AI integration- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionThis book, written by the CEO of TrustedCISO with 30+ years of experience, guides CISOs in fortifying organizational defenses and safeguarding sensitive data. Analyze a ransomware attack on a fictional company, BigCo, and learn fundamental security policies and controls. With its help, you'll gain actionable skills and insights suitable for various expertise levels, from basic to intermediate. You'll also explore advanced concepts such as zero-trust, managed detection and response, security baselines, data and asset classification, and the integration of AI and cybersecurity. By the end, you'll be equipped to build, manage, and improve a resilient cybersecurity program, ensuring your organization remains protected against evolving threats.What you will learn- Defend against cybersecurity attacks and expedite the recovery process- Protect your network from ransomware and phishing- Understand products required to lower cyber risk- Establish and maintain vital offline backups for ransomware recovery- Understand the importance of regular patching and vulnerability prioritization- Set up security awareness training- Create and integrate security policies into organizational processesWho this book is forThis book is for new CISOs, directors of cybersecurity, directors of information security, aspiring CISOs, and individuals who want to learn how to build a resilient cybersecurity program. A basic understanding of cybersecurity concepts is required.Table of Contents- The Attack on BigCo- Identity and Access Management- Security Policies- Security and Risk Management- Secure Your Endpoints- Data Safeguarding- Security Awareness Culture- Vulnerability Management- Asset Inventory- Data Protection- Taking Your Endpoint Security to the Next Level- Secure Configuration Baseline- Classify Your Data and Assets- Cyber Resilience in the Age of Artificial Intelligence (AI)

9 特價1835
立即代訂
下次再買

Postman Cookbook

Oliver,James  著
Ingram 出版
2024/04/12 出版

For developers, programmers, and DevOps engineers venturing into the hard world of API development, the "Postman Cookbook" becomes a must-read. This short solutions book offers recipes and troubleshooting approaches to address typical API lifecycle management challenges. Using Postman's rich features, readers of all skill levels will learn how to create APIs that will improve workflows, increase productivity, and lead to operational success.The book covers a wide range of topics, from the fundamentals of web-based communication to more complex topics including protocol stacks, secure communication protocols, and the dynamics of WebSockets interactions. The following sections cover advanced subjects such as custom protocol handling, network troubleshooting, and proxy management, allowing readers to confidently solve complex networking challenges. This book covers more than simply the technical aspects of Kubernetes. It discusses the influence of security measures, maximizing performance, and successful scaling solutions. These features are critical for microservice architectures and cloud-native apps. This book teaches early developers and programmers the foundations of API testing and development, including networking and protocols.Key LearningsEnable real-time API connectivity for dynamic apps using WebSockets capability.Protect API endpoints from security flaws by configuring SSL/TLS in Postman.Define, implement, and debug bespoke protocols to connect proprietary systems to Postman.Master the art of network optimization and troubleshooting using Postman to ensure your API runs smoothly.Use Postman's proxy management to safely access APIs in a variety of network settings.Test APIs in Kubernetes and improve the deployment and development of microservices.Exploit Postman's features for thorough API tracking, logging, and analysis of performance.Secure API access with Postman's advanced authentication flows-OAuth, JWT, and more.Table of ContentUp and Running with PostmanDesigning Simple to Complex APIsAdvanced API Requests and WorkflowsTesting and Securing APIsManaging GraphQL and gRPC with PostmanContinuous Integration and Deployment (CI/CD)API Scalability and PerformanceIntegration with Third-Party ServicesWorking with Kubernetes and MicroservicesAPI Networking and Protocols

9 特價2394
立即代訂
下次再買

Computing with Words (CWW) Methodologies

Ingram 出版
2024/04/10 出版

As AI is increasingly taking on our lives, we see around us a number of artificially intelligent computing systems. For the computing system to be useful for human beings, we need a complete processing methodology in which the computing system is in the middle and a human being can interact with the system through everyday spoken words as well as receive output in the same format. Computing with Words(CWW) enables a computing system to think, reason, make decisions and solve problems using a "concepts" driven analytical framework that resembles human symbolic cognition. CWW methodology is a principled approach to achieve CWW for any CWW system.

9 特價3947
立即代訂
下次再買

Geomatics for Environmental Monitoring: From Data to Services

Springer 出版
2024/04/09 出版

This book constitutes the proceedings of the 26th Italian Conference on Geomatics for Environmental Monitoring: From Data to Services, ASITA 2023, which was held as a virtual event during December 18-20, 2023. The 19 full papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: Natural hazards monitoring and modelling; technological services for territory planning and Management; methodological advancements in data analysis and processing.

9 特價6785
立即代訂
下次再買

Nature of Computation and Communication

Springer 出版
2024/04/09 出版

This book constitutes the refereed post-conference proceedings of the 9th International Conference on Nature of Computation and Communication, ICTCC 2023, held in Ho Chi Minh City, Vietnam, in October 2023. The 12 revised full papers presented were carefully selected from 30 submissions. The papers of ICTCC 2023 cover formal methods for self-adaptive systems and discuss natural approaches and techniques for natural computing systems and their applications.

9 特價3653
立即代訂
下次再買
頁數30/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing