0403_卡芙涅
0401~0403_4月選書

英文書 > 全部商品

WordPress WooCommerce

Roy,Sahupala  著
Ingram 出版
2024/04/08 出版

Create a webshop with WooCommerce. This book is for anyone who wants to create a webshop without technical knowledge.In this book, you'll find: - Setting up WordPress- Installing WooCommerce- Configuring Your System- Theme and Sample Products- Simple, Variable, and Bundled Products- Organizing Product Categories- Setting Up Payment Methods- Consumer (B2C) or Business (B2B) Webshop- Offering Discounts and Special Deals- Importing Customers and Products- Managing Customer Groups and Special Customers - Exploring Useful PluginsFor both MacOS and Windows users.Check it out at wp-books.com

9 特價1146
立即代訂
下次再買

Digital Armor

Ingram 出版
2024/04/06 出版

In "Digital Armor: Confessions of a Reformed Hacker," delve into the captivating world of cybersecurity through the eyes of a former hacker turned cybersecurity expert. This book offers a unique perspective on cyber threats and provides invaluable insights into defending against them.Starting with an exploration of the hacker's mind, the author unveils the motivations and mindset behind cyber-attacks. From there, readers are guided through the anatomy of various cyber threats, accompanied by real-life scenarios and their consequences.Learn how to fortify your digital fortress with fundamental cybersecurity practices, including password management, authentication, and safeguarding personal information. Discover strategies for defending against social engineering techniques and securing both home networks and mobile devices effectively.Understanding the importance of encryption and VPNs is crucial in today's digital landscape, and this book offers comprehensive coverage on their role in protecting digital assets. Additionally, it provides insights into securing financial information, online transactions, and mitigating the risk of data loss."Cultivating a Cybersecurity Mindset" explores the importance of promoting awareness and responsible online behaviour, emphasizing cybersecurity's critical role in various sectors. The book also anticipates emerging cybersecurity trends and technologies, preparing readers for the challenges of tomorrow.Finally, "Digital Armor" offers a deep dive into enhancing CCTV security practices, highlighting the intersection of physical and cyber defence. Real-world case studies and future trends in CCTV security provide actionable insights for safeguarding against cyber threats.Whether you're a cybersecurity professional, a business owner, or an individual concerned about protecting your digital identity, "Digital Armor" equips you with the knowledge and tools to fortify your defences in an increasingly interconnected world.

9 特價1573
立即代訂
下次再買

Rewrite for Readability

Ingram 出版
2024/04/01 出版

"Rewrite for Readability" is a captivating memoir of 1 year in the life of the author, a multifaceted artist and technologist, that intertwines his personal journey with the evolving landscape of Artificial Intelligence. Born in a small German village in the 1980s, the author's life is a vivid tapestry of creativity and technological exploration. From his early days drawing fantastic beasts, inspired by the serene nature of the Harz Mountains, to his dynamic career spanning computer science, music composition, and AI, this book offers a unique perspective on the synergy of human creativity and machine intelligence. The author's narrative is deeply personal, recounting his upbringing in a quintessential German family, his transformative childhood and youth, and his academic pursuits. Professionally, the author has achieved a doctorate in Computer Science, with a focus on Artificial Intelligence, and has successfully published creative music influenced by computational methods. His philosophy is rooted in the power of learning and creativity to unlock human potential, a theme that resonates throughout his story. "Rewrite for Readability" is not just a memoir; it is a testament to the harmonious collaboration between human thought and AI. The author shares his experiences as an AI Music Artist in Residence and his involvement with the innovative ensemble Hexagon Machine, illustrating how AI has become an integral part of his creative process. The book is adorned with AI-generated images, complementing the narrative and inviting readers to engage their own imagination. This book is a must-read for anyone interested in the intersection of technology, creativity, and personal growth.

9 特價994
立即代訂
下次再買

The Routledge Companion to Media Disinformation and Populism

Routledge 出版
2024/03/29 出版

This companion brings together a diverse set of concepts used to analyse dimensions of media disinformation and populism globally.

9 特價3287
立即代訂
下次再買

Advanced Computing

Deepak,Garg  著
Springer 出版
2024/03/28 出版

The two-volume set CCIS 2053 and 2054 constitutes the refereed post-conference proceedings of the 13th International Advanced Computing Conference, IACC 2023, held in Kolhapur, India, during December 15-16, 2023.The 66 full papers and 6 short papers presented in these proceedings were carefully reviewed and selected from 425 submissions. The papers are organized in the following topical sections: Volume I: The AI renaissance: a new era of human-machine collaboration; application of recurrent neural network in natural language processing, AI content detection and time series data analysis; unveiling the next frontier of AI advancement.Volume II: Agricultural resilience and disaster management for sustainable harvest; disease and abnormalities detection using ML and IOT; application of deep learning in healthcare; cancer detection using AI.

9 特價5741
立即代訂
下次再買

#DigitalMarket

Ingram 出版
2024/03/28 出版

The aim of this study was to understand and analyze the new forms of sociability on the Internet, through a deeper understanding of cyberculture and cyberspace, to identify the factors driving the growth not only of the digital market in Brazil and Bel矇m, but also the ways in which companies have come to communicate with their clients. Based on the foundations of theorists and thinkers on the digital scene, research was also carried out on the advertising market in Bel矇m, where three advertising agencies in the city were interviewed and analyzed in order to understand the current market situation and demand in the region.

9 特價2754
立即代訂
下次再買

Cyber Safety for Everyone

Jaago,Teens  著
Ingram 出版
2024/03/28 出版

This book is a step-by-step guide that handholds you through all the essential aspects of internet safety. The content is presented in a simple and easy-to-understand manner. True incidents, practical tips, survey results, conversation starters, and teaching ideas given in the book, make the reading experience truly enriching. It covers various aspects of online safety, including understanding trends and security measures in digital payments (focusing on India), exploring cybersecurity challenges, and identifying and avoiding online scams. It emphasizes practical strategies for safe online behavior, such as balancing online and physical life, using digital platforms responsibly, and protecting oneself from online threats like cyberbullying and online predators.

9 特價1833
立即代訂
下次再買

Bitcoin Development Philosophy

Ingram 出版
2024/03/26 出版

Bitcoin Development Philosophy is a comprehensive guide aimed at developers who have a foundational understanding of Bitcoin concepts and processes such as Proof-of-Work, block building, and the transaction life cycle. This book delves into the intricacies of Bitcoin's design trade-offs and philosophy, offering insights and context that help developers absorb over a decade of development lessons and debates. The book is organized into several chapters, each focusing on pivotal topics within Bitcoin, such as decentralization, trustlessness, privacy, finite supply, and scaling, among others. Every chapter is enriched with links and QR codes leading to recommended articles or videos, written by seasoned Bitcoin developers. It not only provides practical insights but also encourages independent exploration and critical thinking about contradictory ideas prevalent in the Bitcoin community.

9 特價1057
立即代訂
下次再買

Cyber Security

Ingram 出版
2024/03/26 出版

There has been an increase in cybercrime and a search for government or private company assets that have failed security and support critical infrastructure services. This paper addresses the issue of cyber security and its importance on the world stage. Cyberspace contains various information and critical infrastructure services that must be given special attention by the actors involved. In this context, cyber security policies are fundamental, as they establish the regulatory framework from which actions will be established and monitored, roles and responsibilities are defined. This study evaluates Brazil's Cyber Defence Policy (CDP) with the aim of contributing to the enrichment of discussions on this topic. To this end, the cyber security policies of other countries are analysed and their guidelines compared with the PCD. The relevance of the results is checked with an expert in the field. The work also presents aspects of the UCP that deserve attention.

9 特價1468
立即代訂
下次再買

Deploying Juniper Data Centers with Evpn Vxlan

Addison-Wesl 出版
2024/03/25 出版

Learn to deploy Juniper Data Centers with EVPN VXLAN and master the only intent-based multivendor solution for deploying and monitoring EVPN-based VXLAN fabrics! Deploying Juniper Data Centers with EVPN VXLAN is designed for engineers and architects designing, deploying, and/or maintaining small to large data centers. This book will increase productivity and streamline processing and communication by helping you understand BGP EVPN-based VXLAN, data center design and deployment using Junos, and interconnecting multiple data centers for various deployment applications. Aninda Chatterjee's straightforward prose and industry experience also gives you the foundational knowledge necessary for Juniper Data Center certification from the JNCIA-DC to the JNCIE-DC. The book's structure is unique in its chapter-by-chapter approach with one-pager quick reference guides at the end of the book. The author also puts theory to practice using a combination of packet captures and packet walks. Learn to design, deploy, and maintain a data center using Junos OS and Junos Evolved. Understand how to troubleshoot BGP EVPN-based VXLAN. Maximize learning with with packet captures and packet walks. Build foundational knowledge for Juniper Data Center certification. Gain a deep understanding of data center design.

9 特價3671
立即代訂
下次再買

To Halt or Not to Halt? That Is the Question

Ingram 出版
2024/03/25 出版

This is a book about the 'Halting Problem', arguably the most (in)famous computer-related problem: can an algorithm decide in finite time whether an arbitrary computer program eventually stops? This seems a dull, petty question: after all, you run the program and wait till it stops. However, what if the program does not stop in a reasonable time, a week, a year, or a decade? Can you infer that it will never stop? The answer is negative. Does this raise your interest? If not, consider these questions: Can mathematics be done by computers only? Can software testing be fully automated? Can you write an anti-virus program which never needs any updates? Can we make the Internet perfectly secure? Your guess is correct: the answer to each question is negative. The Halting Problem is 'hidden' in many subjects, from logic (is mathematics free of contradictions?), physics (is quantum randomness perfect?), to philosophy (do humans have free will, or do our brains generate our thoughts and decisions in a deterministic way?) and quantum computing (why we don't have a quantum Halting Problem?) -- this book will visit each of them.Written in an informal and thought-provoking language, supported with suggestive illustrations and applications and almost free of arcane mathematics (formal arguments are relegated to particular parts dedicated to the mathematically-oriented reader), the book will stimulate the curiosity and participation of the reader interested in the consequences of the limits of computing and in various attempts to cope with them.

9 特價6681
立即代訂
下次再買

Security Monitoring with Wazuh

Packt 出版
2024/03/21 出版

Learn how to set up zero-cost security automation, incident response, file integrity monitoring systems, and cloud security monitoring from scratchKey FeaturesGet a thorough overview of Wazuh's features and learn how to make the most of themDetect network and host-based intrusion, monitor for known vulnerabilities and exploits, and detect anomalous behaviorBuild a monitoring system for security compliance that adheres to frameworks such as MITRE ATT&CK, PCI DSS, and GDPRPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionExplore the holistic solution that Wazuh offers to improve your organization's cybersecurity posture with this insightful guide. Security Monitoring with Wazuh is a comprehensive resource, covering use cases, tool integration, and compliance monitoring to equip you with the skills you need to build an enterprise-level defense system.The book begins by setting up an Intrusion Detection System (IDS), integrating the open-source tool Suricata with the Wazuh platform, and then explores topics such as network and host-based intrusion detection, monitoring for known vulnerabilities, exploits, and detecting anomalous behavior. As you progress, you'll learn how to leverage Wazuh's capabilities to set up Security Orchestration, Automation, and Response (SOAR). The chapters will lead you through the process of implementing security monitoring practices aligned with industry standards and regulations. You'll also master monitoring and enforcing compliance with frameworks such as PCI DSS, GDPR, and MITRE ATT&CK, ensuring that your organization maintains a strong security posture while adhering to legal and regulatory requirements.By the end of this book, you'll be proficient in harnessing the power of Wazuh and have a deeper understanding of effective security monitoring strategies.What you will learnFind out how to set up an intrusion detection system with WazuhGet to grips with setting up a file integrity monitoring systemDeploy Malware Information Sharing Platform (MISP) for threat intelligence automation to detect indicators of compromise (IOCs)Explore ways to integrate Shuffle, TheHive, and Cortex to set up security automationApply Wazuh and other open source tools to address your organization's specific needsIntegrate Osquery with Wazuh to conduct threat huntingWho this book is forThis book is for SOC analysts, security architects, and security engineers who want to set up open-source SOC with critical capabilities such as file integrity monitoring, security monitoring, threat intelligence automation, and cloud security monitoring. Managed service providers aiming to build a scalable security monitoring system for their clients will also find valuable insights in this book. Familiarity with basic IT, cybersecurity, cloud, and Linux concepts is necessary to get started.Table of ContentsIntrusion Detection System (IDS) Using WazuhMalware Detection Using WazuhThreat Intelligence and AnalysisSecurity Automation and Orchestration Using ShuffleIncident Response with WazuhThreat Hunting with WazuhVulnerability Detection and Configuration AssessmentAppendixGlossary

9 特價2064
立即代訂
下次再買

Architecting ASP.NET Core Applications - Third Edition

Packt 出版
2024/03/21 出版

Backend design like you've never seen it before - a guide to building SOLID ASP.NET Core web apps that stand the test of time. Featuring more Minimal APIs, more testing, a new e-commerce project, and the modular monolith!Purchase of the print or Kindle book includes a free PDF eBook.Key FeaturesLearn multiple ways to organize your application code and become a more flexible ASP.NET Core developerExplore hands-on design patterns, learn architectural principles, and how to sidestep anti-patternsRefactor code toward modern application design, such as feature-based vertical slice and clean architectureBook DescriptionThis unique ASP.NET Core book will fill in the gaps in your REST API and backend designs. Learn how to build robust, maintainable, and flexible apps using Gang of Four (GoF) design patterns and modern architectural principles. This new edition is updated for .NET 8 and focuses exclusively on the backend, with new content on REST APIs, the REPR pattern, and building modular monoliths.You'll start by covering foundational concepts like REST, the SOLID principles, Minimal APIs, dependency injection in .NET, and other ASP.NET Core 8 mechanisms. Then, you'll learn to develop components using design patterns, including many from the GoF. Finally, you'll explore organizing your application code with patterns that vary from layers to feature-oriented vertical slice designs, covering CQS and a deep dive into microservices along the way. A brand-new e-commerce project at the end of the book will tie it all together.This how-to guide will teach you how to assemble your own APIs from building blocks, to suit whatever real-world requirements you may have.What you will learnApply the SOLID principles for building flexible and maintainable softwareTest your apps effectively with automated tests, including black-box testingEmbark on mastering ASP.NET Core dependency injectionWork with GoF design patterns including strategy, decorator, facade, and compositeDesign REST APIs using Minimal APIs and ASP.NET Core MVCDiscover layering and the tenets of clean architectureUse feature-oriented techniques as an alternative to layeringExplore microservices, CQS, REPR, vertical slice architecture, and many more patternsWho this book is forThis book is for intermediate-level ASP.NET Core developers who want to improve their C# app code structure and API design skills. ASP.NET developers who want to modernize their knowledge and enhance their technical architecture skills will also like this book. It's also a good refresher for those in software design roles with more experience looking to update their expertise.A good knowledge of C# programming and a basic understanding of web concepts is necessary to get the most out of this book, though some refreshers are included along the way.Table of ContentsIntroductionAutomated TestingArchitectural PrinciplesREST APIsMinimal APIsModel-View-ControllerStrategy, Abstract Factory, and Singleton Design PatternsDependency InjectionApplication Configuration and the Options PatternLogging PatternsStructural PatternsBehavioral PatternsOperation Result PatternLayering and Clean ArchitectureObject MappersMediator and CQS PatternsGetting Started with Vertical Slice ArchitectureRequest-EndPoint-Response (REPR)Introduction to Microservices Architecture Modular Monolith

9 特價2156
立即代訂
下次再買

Microsoft 365 Security and Compliance for Administrators

Packt 出版
2024/03/20 出版

Master the art of configuring and securing Microsoft 365, emphasizing robust security and compliance features, and managing privacy and risk in the Microsoft 365 environmentKey FeaturesProtect and defend your organization with the capabilities of the Microsoft 365 Defender familyDiscover, classify, and safeguard sensitive organizational data against loss, leakage, and exposureCollaborate securely while adhering to regulatory compliance and governance standardsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIn today's hostile cyber landscape, securing data and complying with regulations is paramount for individuals, businesses, and organizations alike. Learn how Microsoft 365 Security and Compliance offers powerful tools to protect sensitive data and defend against evolving cyber threats with this comprehensive guide for administrators.Starting with an introduction to Microsoft 365 plans and essential compliance and security features, this book delves into the role of Azure Active Directory in Microsoft 365, laying the groundwork for a robust security framework. You'll then advance to exploring the complete range of Microsoft 365 Defender security products, their coverage, and unique protection services to combat evolving threats.From threat mitigation strategies to governance and compliance best practices, you'll gain invaluable insights into classifying and protecting data while mastering crucial data lifecycle capabilities in Microsoft 365.By the end of this book, you'll be able to elevate the security and compliance posture of your organization significantly.What you will learnMaintain your Microsoft 365 security and compliance posturePlan and implement security strategiesManage data retention and lifecycleProtect endpoints and respond to incidents manually and automaticallyImplement, manage, and monitor security and compliance solutionsLeverage Microsoft Purview to address risk and compliance challengesUnderstand Azure Active Directory's role in Microsoft 365 SecurityWho this book is forThis book is for security professionals, security administrators, and security responders looking to increase their knowledge and technical depth when it comes to Microsoft 365 security and compliance solutions and features. However, anyone aiming to enhance their security and compliance posture within the Microsoft 365 environment will find this book useful. Familiarity with fundamental Microsoft 365 concepts and navigating and accessing portals, along with basic Microsoft 365 administration experience is assumed.Table of ContentsGetting Started with Microsoft 365 Security and ComplianceRole of Microsoft Entra ID in Microsoft 365 SecurityMicrosoft Defender for Office 365Microsoft Defender for EndpointGetting Started with Microsoft PurviewMicrosoft Defender for Cloud AppsMicrosoft Defender Vulnerability ManagementMicrosoft Defender For IdentityMicrosoft Purview Insider Risk ManagementMicrosoft Purview Information ProtectionUnderstanding the Lifecycle of Auditing and Records

9 特價2294
立即代訂
下次再買

555 Powerful AI Prompts for Coaching, Mentoring and Leadership Mastery in Business

Ingram 出版
2024/03/20 出版

Are you struggling to make a significant impact with your leadership? In a world brimming with business books and leadership guides, even the most dedicated leaders can find themselves lost in the shuffle, unable to break through to the next level.You might feel that despite your efforts, the traditional methods of coaching and mentoring lack the edge.This book is a pioneering guide among business leadership books that harnesses the power of Artificial Intelligence (AI). This isn't just another coaching book; it's a strategic ally, a 24/7 AI-powered mentor designed to revolutionize you. Discover the path to exceptional leadership with 555 pioneering prompts and their formulas. Adapt these prompts to align with your role, industry & goals. Suitable to ChatGPT, Bing Chat, Google Bard, and other AI prompt bots.Advance with confidence into the future, equipped with AI as an essential component of your leadership resources, cultivating your leadership skills. Explore the Transformative Benefits of this Book: Speedy Implementation: Swiftly forge actionable coaching and leadership plans, specific to your industry & role.Quality Enhancement: Harness AI to supercharge your approach to business, coaching & mentoring.Customization: Transition from a rigid to a flexible leadership strategy.Innovative Thinking: Challenge the norms with AI prompts for business, revolutionizing problem-solving and strategy.Personal Empowerment: Gain the acumen for developing leadership skills that align with business goals.Valuable Bonuses Exclusive to Your Purchase: Exclusive access to 'My Coaching, Mentoring & Leadership Advisor' GPT: Offers personalized leadership, coaching, & mentoring guidance, significantly enhancing your professional growth with custom-tailored insights & strategies. GPT developed with OpenAI's GPT technology.E-copy of the book: Achieve efficiency with our PDF. Effortlessly copy, paste, & tailor prompts to you. No more retyping.555 Prompt Formulas: Gain a tactical advantage in business, by adapting the prompts to different challenges and opportunities. They enhance your coaching skills, ensuring you stay ahead.Essential AI ChatGPT Resource Guide: Enter the AI world with confidence. Our guide demystifies AI, offering a straightforward method to integrate AI-led strategies into your work. 1100 Follow-Up Prompts: Foster consistent growth in both your personal & professional spheres. Follow-up prompts provide innovative & engaging ideas.Who Needs This Book?: Professionals seeking easy-to-learn transformative leadership skills. Mentors and coaches dedicated to growth and helping others.Organizations focused on surpassing goals.Leaders pursuing transformation and positive impact.More than just another title in leadership books. This book is an innovative solution to leadership challenges, blending the visionary aspects of Artificial Intelligence prompts with practical, actionable strategies.This is your invitation to redefine leadership! Click "Buy Now" to secure your journey to leadership transformation today.

9 特價1403
立即代訂
下次再買

111 AI ChatGPT Transformative Prompts for Leadership Development & Maximum Potential

Ingram 出版
2024/03/20 出版

Supercharge your leadership journey with innovative AI Prompt strategies-Are you ready to lead, coach, and mentor your team and colleagues with AI-driven precision? Imagine a ChatGPT Prompt Mastery experience that transforms the way you lead, develop teams, and reach your goals! This is your essential AI prompt book for an era where AI prompt engineering stands at the forefront of innovation. This book includes 111 game-changing prompts and their formulas. Apply them to your specific role, industry, and ambition-become the leader you want to be! Prompts are suitable for ChatGPT, Microsoft Copilot, Bing Chat, Google Bard, Meta Llama, and other popular AI prompt bots.Discover the Book's Unmatched Advantages: Immediate Action Plans: Craft laser-focused AI prompts for business that redefine coaching, mentoring, and leadership, all in less time than it takes to read this sentence.Quality, Upgraded: AI ChatGPT isn't just a tool-it's your partner in making every interaction more potent, skyrocketing your team's performance.Personalized Scaling: Your leadership skills made easy with AI's help, allowing you to tailor your approach and unleash the full potential of your team.Rethink Leadership: Discard stale strategies and embrace ChatGPT prompts to pioneer groundbreaking methods that will place you among top leaders. And empower yourself.Exclusive Bonuses Included with Your Purchase: Exclusive access to 'My Coaching, Mentoring & Leadership Advisor' GPT: This unique GPT offers personalized leadership, coaching, and mentoring guidance, significantly enhancing your professional growth with custom-tailored strategies. GPT was developed with OpenAI's GPT technology. 222 Real-World AI Prompt Examples: Gain a competitive edge in business coaching. These examples will sharpen your skills and enhance your coaching techniques, keeping you ahead in the evolving world of AI.E-copy of the book: Maximize your efficiency with our PDF. Effortlessly copy, paste, and tailor prompts to your needs. No more retyping!Comprehensive AI ChatGPT Guide: Dive into the world of AI with ease. Our straightforward guide demystifies AI, providing you with a clear pathway to integrate AI-guided strategies into your work. Perfect for beginners and seasoned professionals. 1100 Follow-Up Prompts: Foster continuous personal and professional growth. The follow-up prompts ensure you always have a fresh perspective and new ideas at your fingertips, making every interaction more insightful.Why This Book Is Your Ultimate Leadership Development Books Investment?ROI Concerns?: The returns on this business book's investment echo through your career, beyond mere leadership skills.Crushed for Time?: Our AI Prompts business book's strategies are built for lean efficiency-eliminate complexity.Non-Techie Friendly: No advanced degree required-our book ensures anyone can become an AI-empowered leader.Not Just a Book-It's your leadership revolution. Transform your leadership. Transcend your limitations.Turn this book into your secret weapon for unmatched personal and organizational growth. Click "Buy Now" today to begin your transformative leadership journey with the coaching effect you can gain with this business book.

9 特價761
立即代訂
下次再買

The Zero Trust Framework and Privileged Access Management (PAM)

Ravindra,Das  著
Ingram 出版
2024/03/20 出版

This book is about the Zero Trust Framework. Essentially, this is a methodology where an IT/Network Infrastructure of a business is segmented into smaller islands, each having their own lines of defenses.

9 特價5480
立即代訂
下次再買

The Zero Trust Framework and Privileged Access Management (PAM)

Ravindra,Das  著
Ingram 出版
2024/03/20 出版

This book is about the Zero Trust Framework. Essentially, this is a methodology where an IT/Network Infrastructure of a business is segmented into smaller islands, each having their own lines of defenses.

9 特價2400
立即代訂
下次再買

Advances in Cryptology - Eurocrypt 2024

Marc,Joye  著
Springer 出版
2024/03/19 出版

The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.

9 特價4436
立即代訂
下次再買

Digital Forensics and Watermarking

Bin,Ma  著
Springer 出版
2024/03/19 出版

This book constitutes the refereed post proceedings of the 22nd International Workshop on Digital Forensics and Watermarking, IWDW 2023, held in Jinan, China, during November 25-26, 2023. The 22 full papers included in this book were carefully reviewed and selected from 48 submissions. The workshop focuses on subjects such as novel research, development and application of digital watermarking, data hiding, and forensic techniques for multimedia security.

9 特價6263
立即代訂
下次再買

Machine Learning for Cyber Security

Springer 出版
2024/03/19 出版

This book constitutes the referred proceedings of the 5th International Conference on Machine Learning for Cyber Security, ML4CS 2023, held in Yanuca Island, Fiji, during December 4-6, 2023. The 11 full papers presented in this book were carefully reviewed and selected from 35 submissions. They cover a variety of topics, including cybersecurity, AI security, machine learning security, encryption, authentication, data security and privacy, cybersecurity forensic analysis, vulnerability analysis, malware analysis, anomaly and intrusion detection.

9 特價6785
立即代訂
下次再買

ChatGPT for Cybersecurity Cookbook

Packt 出版
2024/03/18 出版

Master ChatGPT and the OpenAI API and harness the power of cutting-edge generative AI and large language models to revolutionize the way you perform penetration testing, threat detection, and risk assessment.Key Features: - Enhance your skills by leveraging ChatGPT to generate complex commands, write code, and create tools- Automate penetration testing, risk assessment, and threat detection tasks using the OpenAI API and Python programming- Revolutionize your approach to cybersecurity with an AI-powered toolkit- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Are you ready to unleash the potential of AI-driven cybersecurity? This cookbook takes you on a journey toward enhancing your cybersecurity skills, whether you're a novice or a seasoned professional. By leveraging cutting-edge generative AI and large language models such as ChatGPT, you'll gain a competitive advantage in the ever-evolving cybersecurity landscape.ChatGPT for Cybersecurity Cookbook shows you how to automate and optimize various cybersecurity tasks, including penetration testing, vulnerability assessments, risk assessment, and threat detection. Each recipe demonstrates step by step how to utilize ChatGPT and the OpenAI API to generate complex commands, write code, and even create complete tools. You'll discover how AI-powered cybersecurity can revolutionize your approach to security, providing you with new strategies and techniques for tackling challenges. As you progress, you'll dive into detailed recipes covering attack vector automation, vulnerability scanning, GPT-assisted code analysis, and more. By learning to harness the power of generative AI, you'll not only expand your skillset but also increase your efficiency.By the end of this cybersecurity book, you'll have the confidence and knowledge you need to stay ahead of the curve, mastering the latest generative AI tools and techniques in cybersecurity.What You Will Learn: - Master ChatGPT prompt engineering for complex cybersecurity tasks- Use the OpenAI API to enhance and automate penetration testing- Implement artificial intelligence-driven vulnerability assessments and risk analyses- Automate threat detection with the OpenAI API- Develop custom AI-enhanced cybersecurity tools and scripts- Perform AI-powered cybersecurity training and exercises- Optimize cybersecurity workflows using generative AI-powered techniquesWho this book is for: This book is for cybersecurity professionals, IT experts, and enthusiasts looking to harness the power of ChatGPT and the OpenAI API in their cybersecurity operations. Whether you're a red teamer, blue teamer, or security researcher, this book will help you revolutionize your approach to cybersecurity with generative AI-powered techniques. A basic understanding of cybersecurity concepts along with familiarity in Python programming is expected. Experience with command-line tools and basic knowledge of networking concepts and web technologies is also required.Table of Contents- Getting Started: ChatGPT, the OpenAI API, and Prompt Engineering- Vulnerability Assessment- Code Analysis and Secure Development- Governance, Risk, and Compliance (GRC)- Security Awareness and Training- Red Teaming and Penetration Testing- Threat Monitoring and Detection- Incident Response- Using Local Models and Other Frameworks- The Latest OpenAI Features

9 特價2294
立即代訂
下次再買

Europrivacy(TM)/(R)

Alice,Turley  著
Ingram 出版
2024/03/18 出版

On 12 October 2022, the EDPB (European Data Protection Board) endorsed the Europrivacy(TM)/(R) certification scheme. This is the first certification mechanism, or data protection seal, that entities can achieve to demonstrate their compliance with the GDPR (General Data Protection Regulation) and other national data privacy obligations.This guide introduces the following key elements of Europrivacy: Preparing for certification.The certification criteria.The GDPR core criteria.Complementary contextual checks and controls.Technical and organisational checks and controls .National requirements.The certification process. There are considerable advantages for entities that certify some, or all, of their personal data processing activities to Europrivacy: Demonstrate to customers, clients, employees, suppliers and other stakeholders that protection of personal data being processed is of utmost importance.Reduce the financial and legal risks of non-compliance with the requirements of the GDPR. Non-compliance could lead to fines of up to 瞿17.5 million ( 20 million) or 4% of total worldwide turnover, whichever is greater.Get peace of mind that Europrivacy checks and controls are continually updated to take into account any regulatory or legislative changes, advice and guidance from the EDPB, and changes to national and domain-specific obligations. Buy this guide today to begin your Europrivacy compliance journey!

9 特價1184
立即代訂
下次再買

The OSINT Handbook

Packt 出版
2024/03/18 出版

Get to grips with top open-source Intelligence (OSINT) tools, build threat intelligence, and create a resilient cyber defense against evolving online threatsFree with your book: DRM-free PDF version + access to Packt's next-gen Reader*Key Features: - Familiarize yourself with the best open-source intelligence tools such as Maltego, Shodan, and Aircrack-ng- Develop an OSINT-driven threat intelligence program to mitigate cyber risks- Leverage the power of information through OSINT with real-world case studiesBook Description: The OSINT Handbook offers practical guidance and insights to enhance your OSINT capabilities and counter the surge in online threats that this powerful toolset was built to tackle.Starting with an introduction to the concept of OSINT, this book will take you through all the applications, as well as the legal and ethical considerations associated with OSINT research. You'll conquer essential techniques for gathering and analyzing information using search engines, social media platforms, and other web-based resources. As you advance, you'll get to grips with anonymity and techniques for secure browsing, managing digital footprints, and creating online personas. You'll also gain hands-on experience with popular OSINT tools such as Recon-ng, Maltego, Shodan, and Aircrack-ng, and leverage OSINT to mitigate cyber risks with expert strategies that enhance threat intelligence efforts. Real-world case studies will illustrate the role of OSINT in anticipating, preventing, and responding to cyber threats. By the end of this book, you'll be equipped with both the knowledge and tools to confidently navigate the digital landscape and unlock the power of information using OSINT.*Email sign-up and proof of purchase requiredWhat You Will Learn: - Work with real-life examples of OSINT in action and discover best practices- Automate OSINT collection and analysis- Harness social media data for OSINT purposes- Manage your digital footprint to reduce risk and maintain privacy- Uncover and analyze hidden information within documents- Implement an effective OSINT-driven threat intelligence program- Leverage OSINT techniques to enhance organizational securityWho this book is for: This book is for ethical hackers and security professionals who want to expand their cybersecurity toolbox and stay one step ahead of online threats by gaining comprehensive insights into OSINT tools and techniques. Basic knowledge of cybersecurity concepts is required.Table of Contents- The Secrets Hiding in Plain Sight - Unveiling the Power of OSINT- Invisible and Untouchable - The Importance of Anonymity in OSINT Analysis- The OSINT Toolbox - Methods and Techniques for Gathering and Analyzing Information- Exploring the Unknown - How Discovery Tools Reveal Hidden Information- From Recon-ng to Trace Labs - A Tour of the Best Open Source Intelligence Tools- The Eyes and Ears of Threat Intelligence - How OSINT Helps Mitigate Cyber Risks- Protecting Your Identity and Organization from Cyber Threats

9 特價1605
立即代訂
下次再買

Tales from the Cyber Crypt

Hygge Books 出版
2024/03/17 出版

Spoof-Proof YourselfThe future belongs to the cyber-resilient. Whether you're an individual navigating the vast online landscape or a business owner safeguarding your enterprise, 9 Tales from The Cyber Crypt provides essential skills and resources to emerge unscathed from the cyber jungle.In February this year, cybercriminals scammed a well-known bank out of $25 million using video deep fakes purporting to be executive staff issuing transfer instructions. Known as whale attacks, the dark arts of digital scammers have grown more lethal in 2024.Using technology that exploits the characteristics that make us human - empathy, compassion, loneliness, and greed - AI scams are a burgeoning industry with tentacles reaching into social media, dating sites, company data, and individual banking apps.Speaking anonymously, the cyber-security boss of one of the world's biggest financial institutions reveals to ghostwriter Stella Firewall how sophisticated criminals exploit AI's digital cloning abilities to prey on individuals and corporations in 9 true tales traversing the current spectrum of cyber threats.Unveil the Secrets to Digital ResilienceFrom pig butchering to vishing, smishing, mobile phone trojans, spear-phishing, and whale attacks - 9 Tales from The Cyber Crypt is your key to understanding what you're up against with 69 simple but effective ways to spot a scam before it starts.Stella Firewall's engaging prose takes you into the narratives of real-life cybercrime victims. Each tale brings to life the heart-pounding sagas of individuals trapped in an AI algorithm net. Use 9 Tales from The Cyber Crypt to: Glean insider weaponized social engineering tactics tips for better awareness.Spoof-proof yourself in the battle against scams and deep fakes.Outwit digital adversaries with over 69 simple yet powerful strategies. Stay out of cyber crime's reach.

9 特價444
立即代訂
下次再買

Representation and Processing of Natural Language

Leonard,Bolc  著
de Gruyter 出版
2024/03/17 出版

No detailed description available for "Representation and Processing of Natural Language".

9 特價8179
立即代訂
下次再買

Database and Application Security

Addison-Wesl 出版
2024/03/13 出版

An all-encompassing guide to securing your database and applications against costly cyberattacks! In a time when the average cyberattack costs a company $9.48 million, organizations are desperate for qualified database administrators and software professionals. Hackers are more innovative than ever before. Increased cybercrime means front-end applications and back-end databases must be finetuned for a strong security posture. Database and Application Security: A Practitioner's Guide is the resource you need to better fight cybercrime and become more marketable in an IT environment that is short on skilled cybersecurity professionals. In this extensive and accessible guide, Dr. R. Sarma Danturthi provides a solutions-based approach to help you master the tools, processes, and methodologies to establish security inside application and database environments. It discusses the STIG requirements for third-party applications and how to make sure these applications comply to an organization's security posture. From securing hosts and creating firewall rules to complying with increasingly tight regulatory requirements, this book will be your go-to resource to creating an ironclad cybersecurity database. In this guide, you'll find: Tangible ways to protect your company from data breaches, financial loss, and reputational harm Engaging practice questions (and answers) after each chapter to solidify your understanding Key information to prepare for certifications such as Sec+, CISSP, and ITIL Sample scripts for both Oracle and SQL Server software and tips to secure your code Advantages of DB back-end scripting over front-end hard coding to access DB Processes to create security policies, practice continuous monitoring, and maintain proactive security postures Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

9 特價2294
立即代訂
下次再買

Cryptography

Sean,Murphy  著
Ingram 出版
2024/03/13 出版

Cryptography is a part of everyday life for almost all of us, though we may not realise we're using it. We are a far cry from the historical prediction that cryptography would only be used by militaries and governments. With vast quantities of sensitive information transferred online by individuals, companies, organizations, and nation states, cryptography is increasingly important to everyone, and most of us, often without realising, use it daily. Cryptography: A Very Short Introduction demystifies the art of cryptography by tracing its historical use, explaining how it works, and providing examples of its practical use. These include online shopping, chip and PIN bank cards, and communicating via mobile phone. While many of these uses have been mainstream for some time now, the development and deployment of cryptography has changed enormously in the last twenty years. In this second edition, Sean Murphy and Rachel Player highlight the important advances in both academic cryptography research and its everyday use. Using non-technical language and without assuming advanced mathematical knowledge, they introduce symmetric and public-key cryptography and provide a detailed discussion of the design of cryptographic algorithms that are secure against quantum computers and the development of cryptographic algorithms with advanced functionalities. They also consider the new applications of cryptography such as blockchain, secure messaging apps, and electronic voting. ABOUT THE SERIES: The Very Short Introductions series from Oxford University Press contains hundreds of titles in almost every subject area. These pocket-sized books are the perfect way to get ahead in a new subject quickly. Our expert authors combine facts, analysis, perspective, new ideas, and enthusiasm to make interesting and challenging topics highly readable.

9 特價444
立即代訂
下次再買

Django in Production

Arghya,Saha  著
Packt 出版
2024/03/13 出版

Enhance your Django skills and elevate your employability by mastering the tools and practices employed by seasoned senior developersKey FeaturesGain a comprehensive understanding of the available deployment strategies for Django applicationsExplore techniques and best practices to enhance the efficiency and performance of your Django applicationTroubleshoot common production issues through efficient error logging and handling techniquesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionYou may have got your first Django developer job after a six-week bootcamp or online course, and that's great, but what's next? In small companies, mentorship can be hard to come by and gaining the traits of a senior developer without that can take a long time. This is precisely where Django in Production comes into play.This book will first delve into the true meaning of "good practice" and help you understand the rationale behind industry professionals building websites in specific ways to develop a solid foundation for your Django projects. Next, you will uncover hidden Django secrets through hands-on exploration, leveraging the power of Docker and version control to your advantage. You will gain insights into mastering Git hooks for efficient code maintenance, establishing a robust CI pipeline, and harnessing the capabilities of AWS Beanstalk. These tools will empower you to develop highly scalable products-an essential skill set for aspiring developers transitioning from junior to senior roles. Later, you will understand the significance of monitoring and be introduced to industry-standard tools utilized by professionals for effective monitoring practices.By the end of this book, you will have set yourself apart from the crowd, equipped with the knowledge and expertise to thrive as a seasoned Django developer.What you will learnWrite scalable and maintainable code like a Django expertBecome proficient in Docker for Django and experience platform-agnostic developmentExplore intelligent practices for continuous integrationLeverage the power of AWS to seamlessly deploy your application in a production environmentOptimize unstable systems through effective performance monitoringEffortlessly handle authentication and authorization issuesAutomate repetitive tasks by creating custom middlewareThoroughly test your code using factory_boy and craft comprehensive API testsWho this book is forThis book is for Python and Django developers who aspire to elevate their Django skills to an advanced level. It assumes an intermediate level of proficiency in Python and Django programming and aims to impart comprehensive knowledge on optimizing the production environment and utilizing associated toolsets. By implementing these best practices, you will enhance the efficiency, robustness, and scalability of your production systems, thereby accelerating your career growth and professional development.Table of ContentsSetting up Django with DRFExploring Django ORM, Models, and MigrationsSerializing Data with DRFExploring Django Admin and Management CommandsMastering Django Authentication and AuthorizationCaching, Logging, and ThrottlingUsing Pagination, Django Signals, and Custom MiddlewareUsing Celery with DjangoWriting tests in DjangoExploring Conventions in DjangoDockerizing Django ApplicationsWorking with Git and CI pipelines using DjangoDeploying Django in AWSMonitoring Django Applications

9 特價1697
立即代訂
下次再買

Mastering Large Language Models

Ingram 出版
2024/03/12 出版

Do not just talk AI, build it: Your guide to LLM application developmentDESCRIPTION Transform your business landscape with the formidable prowess of large language models (LLMs). The book provides you with practical insights, guiding you through conceiving, designing, and implementing impactful LLM-driven applications.This book explores NLP fundamentals like applications, evolution, components and language models. It teaches data pre-processing, neural networks, and specific architectures like RNNs, CNNs, and transformers. It tackles training challenges, advanced techniques such as GANs, meta-learning, and introduces top LLM models like GPT-3 and BERT. It also covers prompt engineering. Finally, it showcases LLM applications and emphasizes responsible development and deployment. With this book as your compass, you will navigate the ever-evolving landscape of LLM technology, staying ahead of the curve with the latest advancements and industry best practices.WHAT YOU WILL LEARN● Grasp fundamentals of natural language processing (NLP) applications.● Explore advanced architectures like transformers and their applications.● Master techniques for training large language models effectively.● Implement advanced strategies, such as meta-learning and self-supervised learning.● Learn practical steps to build custom language model applications.WHO THIS BOOK IS FORThis book is tailored for those aiming to master large language models, including seasoned researchers, data scientists, developers, and practitioners in natural language processing (NLP).

9 特價1833
立即代訂
下次再買

BGP from Theory to Practice

Ingram 出版
2024/03/12 出版

The book describes the main aspects of BGP (Border Gateway Protocol) and its most important practical applications, such as traffic management policies, scalable architectures, stability and security mechanisms, and its role in big Enterprises and ISP networks. For each topic covered, also the implementation aspects in Cisco and Juniper technologies are included, essential to fully understand the main mechanisms of the protocol and its applications. The central idea behind the book is combining theory and practice, to avoid turning it only into a (debatable) presentation of the standard. This is why, apart from explaining in detail and with many examples how the protocol works, and its role in IP networks, the book also includes many practical application suggestions, resulting from many decades of experience.

9 特價3900
立即代訂
下次再買

OpenAI API Cookbook

Henry,Habib  著
Packt 出版
2024/03/11 出版

Explore the vast possibilities of integrating the ChatGPT API across various domains, from creating simple wrappers to developing knowledge-based assistants, multi-model applications, and conversational interfacesKey Features- Understand the different elements, endpoints, and parameters of the OpenAI API- Build tailored intelligent applications and workflows with the OpenAI API- Create versatile assistants with for a multitude of tasks- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionAs artificial intelligence continues to reshape industries with OpenAI at the forefront of AI research, knowing how to create innovative applications such as chatbots, virtual assistants, content generators, and productivity enhancers is a game-changer. This book takes a practical, recipe-based approach to unlocking the power of OpenAI API to build high-performance intelligent applications in diverse industries and seamlessly integrate ChatGPT in your workflows to increase productivity.You'll begin with the OpenAI API fundamentals, covering setup, authentication, and key parameters, and quickly progress to the different elements of the OpenAI API. Once you've learned how to use it effectively and tweak parameters for better results, you'll follow advanced recipes for enhancing user experience and refining outputs. The book guides your transition from development to live application deployment, setting up the API for public use and application backend. Further, you'll discover step-by-step recipes for building knowledge-based assistants and multi-model applications tailored to your specific needs.By the end of this book, you'll have worked through recipes involving various OpenAI API endpoints and built a variety of intelligent applications, ready to apply this experience to building AI-powered solutions of your own.What you will learn- Grasp the fundamentals of the OpenAI API- Navigate the API's capabilities and limitations of the API- Set up the OpenAI API with step-by-step instructions, from obtaining your API key to making your first call- Explore advanced features such as system messages, fine-tuning, and the effects of different parameters- Integrate the OpenAI API into existing applications and workflows to enhance their functionality with AI- Design and build applications that fully harness the power of ChatGPTWho this book is forThis book is perfect for developers, data scientists, AI/tech enthusiasts, citizen developers, and no-code aficionados keen on using and mastering the OpenAI API. Whether you're a beginner or experienced professional, this book is ideal for quickly creating intelligent applications such as chatbots or content generators, through step-by-step recipes that take you from the basics of the API to creating sophisticated applications systematically.The OpenAI API is accessed with Python in this book, so familiarity with Python and APIs is preferred but not mandatory.Table of Contents- Unlocking OpenAI and Setting Up Your API Playground Environment- OpenAI API Endpoints Explained- Understanding Key Parameters and Their Impact on Generated Responses- Incorporating Additional Features from the OpenAI API- Staging the OpenAI API for Application Development- Building Intelligent Applications with the OpenAI API- Building Assistants with the OpenAI API

9 特價1835
立即代訂
下次再買

Building Transformer Models with Pytorch 2.0

Prem,Timsina  著
Ingram 出版
2024/03/08 出版

This book covers transformer architecture for various applications including NLP, computer vision, speech processing, and predictive modeling with tabular data. It is a valuable resource for anyone looking to harness the power of transformer architecture in their machine learning projects. The book provides a step-by-step guide to building transformer models from scratch and fine-tuning pre-trained open-source models. It explores foundational model architecture, including GPT, VIT, Whisper, TabTransformer, Stable Diffusion, and the core principles for solving various problems with transformers. The book also covers transfer learning, model training, and fine-tuning, and discusses how to utilize recent models from Hugging Face.

9 特價1833
立即代訂
下次再買

Modern Data Mining with Python

Ingram 出版
2024/03/08 出版

"Modern Data Mining with Python" is a guidebook for responsibly implementing data mining techniques that involve collecting, storing, and analyzing large amounts of structured and unstructured data to extract useful insights and patterns. Enter into the world of data mining and machine learning. Use insights from various data sources, from social media to credit card transactions. Master statistical tools, explore data trends, and patterns. Understand decision trees and artificial neural networks (ANNs). Manage high-dimensional data with dimensionality reduction. Explore binary classification with logistic regression. Spot concealed patterns with unsupervised learning. Analyze text with recurrent neural networks (RNNs) and visuals with convolutional neural networks (CNNs). Ensure model compliance with regulatory standards.

9 特價1833
立即代訂
下次再買

A Non-Techie Beginners' Guide to Cybersecurity and Privacy

Ingram 出版
2024/03/07 出版

If you are worried about falling victim to cyber threats and having your sensitive data compromised, then keep reading...Are you tired of constantly worrying about hackers getting into your personal information and compromising your online privacy?Do you feel vulnerable in the digital world and don't know how to protect yourself or your business from cybercriminals?Do you feel overwhelmed by the ever-evolving landscape of cybersecurity threats?If so, this book is for you!Unfortunately, protecting yourself from cybercrime can seem like a difficult and overwhelming task.Thankfully, you don't have to be an IT expert or even particularly tech-savvy to set up an efficient cybersecurity system for your personal or business-related use of computers, smartphones, and more.Unlike other technical books on cybersecurity, this book is specifically tailored for everyday non-technical users who may not have a background in technology or cybersecurity.Here's a glimpse of what you'll uncover: 10 most common types of cyber threats that can wreak havoc on your business and personal data - and how to defend yourself proactivelyA simple yet powerful 5-step strategy to keep your data from falling into the wrong handsCommon misconceptions about cybersecurity that can leave you vulnerable to cyber threatsCutting-edge technologies that are reshaping the landscape of internet safety... and how to leverage them to safeguard your digital presencePractical case studies and real-world examples that illustrate the importance of cybersecurity for everyday users in today's digital landscapeExpert insights into the latest trends to stay ahead of cyber criminals and protect your online identityHands-on guidance on encryption, password management, and multi-factor authenticationThe legal and ethical aspects of cybersecurityHow to respond to cyber attacks, conduct security assessments, and develop a cybersecurity mindset that keeps you and your business safePlus a whole lot more!Don't be intimidated by the complexity of cybersecurity. While it's true that cyber threats can be sophisticated, understanding the basics of cybersecurity is within your reach.Embrace the knowledge and take control of your online security.It's not as scary as it seems and it is a whole lot less scary than having a cybercriminal steal your information!If you want to safeguard your digital life and prevent cyber threats from compromising your privacy, then get your copy now!

9 特價1025
立即代訂
下次再買

Infrastructure Attack Strategies for Ethical Hacking

Ingram 出版
2024/03/05 出版

Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies.Book DescriptionEmbark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive infrastructure compromise.Encompassing both external and internal enumeration techniques, the book delves into attacking routers and services, establishing footholds, privilege escalation, lateral movement, and exploiting databases and Active Directory. You will gain proficiency in methodologies and tools for ethically compromising systems, navigating through networks, collecting intelligence, and providing effective remediation advice.This handbook places a strong emphasis on interactive learning, focusing on playing with hashes, tickets, and keys. With its practical approach and expert guidance, this book serves as an invaluable resource, empowering you to confidently master advanced infrastructure attack strategies and bolster your cybersecurity expertise.What you will learn● Master the intricacies of infrastructure attacks and ethical system compromise techniques.● Execute external and internal network reconnaissance to collect intelligence and pinpoint potential attack vectors.● Utilize routers, services, databases, and Active Directory to secure initial access, establish persistence, and enable lateral movement.● Systematically enumerate Windows and Linux systems, escalating privileges and extracting sensitive data with precision.Table of Contents1. Introduction to Infrastructure Attacks2. Initial Reconnaissance and Enumeration3. Attacking Routers4. Looking for a Foothold5. Getting Shells6. Enumeration On Microsoft Windows7. Enumeration on Linux8. Internal Network Reconnaissance9. Lateral Movement10. Achieving First-level Pivoting11. Attacking Databases12. AD Reconnaissance and Enumeration13. Path to Domain Admin14. Playing with Hashes and Tickets Index

9 特價1649
立即代訂
下次再買

Mastering Secure Java Applications

Ingram 出版
2024/03/05 出版

Elevate your Java security skills for the modern cloud eraDESCRIPTION This book offers a comprehensive guide to implementing Zero-Trust security principles, cloud-based defenses, and robust application development practices. Through practical examples and expert advice, readers will gain the skills needed to design and develop secure Java applications that easily can tackle today's cyber threats.It builds focus on securing your source code through analysis, vulnerability detection, and automation. It also ensures the safety of your runtime environment for managing traffic and enables multi-factor authentication. While addressing data security concerns with encryption, anonymization, and cloud-based solutions, it also uses tools like OpenTelemetry for real-time threat detection. It manages sensitive information securely with Vault integration and explores passwordless authentication. Reference architectures, secure coding patterns, and automation practices are also provided to aid implementation. By the end of this book, you'll be well-equipped to build secure Java applications with confidence and deliver applications that are robust, reliable, and compliant.WHAT YOU WILL LEARN● Implement Zero-Trust principles in Java applications.● Secure Java apps in cloud environments like AWS, GCP, and Azure.● Develop applications with security best practices from the ground up.● Understand and mitigate common security vulnerabilities in Java.● Apply modern security tools and techniques in Java development. WHO THIS BOOK IS FORThis book is ideal for Java developers and software architects seeking to enhance their security expertise, particularly in cloud environments.

9 特價1833
立即代訂
下次再買

Stepping Through Cybersecurity Risk Management

Wiley 出版
2024/03/05 出版

Stepping Through Cybersecurity Risk Management Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management. Stepping Through Cybersecurity Risk Management covers the professional practice of cybersecurity from the perspective of enterprise governance and risk management. It describes the state of the art in cybersecurity risk identification, classification, measurement, remediation, monitoring and reporting. It includes industry standard techniques for examining cybersecurity threat actors, cybersecurity attacks in the context of cybersecurity-related events, technology controls, cybersecurity measures and metrics, cybersecurity issue tracking and analysis, and risk and control assessments. The text provides precise definitions for information relevant to cybersecurity management decisions and recommendations for collecting and consolidating that information in the service of enterprise risk management. The objective is to enable the reader to recognize, understand, and apply risk-relevant information to the analysis, evaluation, and mitigation of cybersecurity risk. A well-rounded resource, the text describes both reports and studies that improve cybersecurity decision support. Composed of 10 chapters, the author provides learning objectives, exercises and quiz questions per chapter in an appendix, with quiz answers and exercise grading criteria available to professors. Written by a highly qualified professional with significant experience in the field, Stepping Through Cybersecurity Risk Management includes information on: Threat actors and networks, attack vectors, event sources, security operations, and CISO risk evaluation criteria with respect to this activity Control process, policy, standard, procedures, automation, and guidelines, along with risk and control self assessment and compliance with regulatory standards Cybersecurity measures and metrics, and corresponding key risk indicators The role of humans in security, including the "three lines of defense" approach, auditing, and overall human risk management Risk appetite, tolerance, and categories, and analysis of alternative security approaches via reports and studies Providing comprehensive coverage on the topic of cybersecurity through the unique lens of perspective of enterprise governance and risk management, Stepping Through Cybersecurity Risk Management is an essential resource for professionals engaged in compliance with diverse business risk appetites, as well as regulatory requirements such as FFIEC, HIIPAA, and GDPR, as well as a comprehensive primer for those new to the field. A complimentary forward by Professor Gene Spafford explains why "This book will be helpful to the newcomer as well as to the hierophants in the C-suite. The newcomer can read this to understand general principles and terms. The C-suite occupants can use the material as a guide to check that their understanding encompasses all it should."

9 特價4360
立即代訂
下次再買

Optimizing AI and Machine Learning Solutions

Ingram 出版
2024/03/04 出版

This book approaches data science solution building using a principled framework and case studies with extensive hands-on guidance. It will teach the readers optimization at each step, whether it is problem formulation or hyperparameter tuning for deep learning models. This book keeps the reader pragmatic and guides them toward practical solutions by discussing the essential ML concepts, including problem formulation, data preparation, and evaluation techniques. Further, the reader will be able to learn how to apply model optimization with advanced algorithms, hyperparameter tuning, and strategies against overfitting. They will also benefit from deep learning by optimizing models for image processing, natural language processing, and specialized applications. The reader can put theory into practice with hands-on case studies and code examples, reinforcing their understanding.

9 特價1833
立即代訂
下次再買

Semantic Annotation of View-based Object Representations Using Online Search Engines

Anonymous  著
Ingram 出版
2024/02/29 出版

Master's Thesis from the year 2015 in the subject Computer Science - Internet, New Technologies, grade: 1.3, University of Paderborn (Institute of Electrical Engineering and Information Technology), language: English, abstract: In this master's thesis, an automatic image annotation algorithm for object recognition systems is being developed and evaluated. Addressing the semantic gap problem, it is investigated by which means images of objects can automatically be labelled with textual tags that represent corresponding semantic information. A central question in this context is to what extent online databases are exploitable for such an annotation algorithm. Representative works from the literature normally use large scale databases containing images along their features and their semantic information. Queued images can be annotated by searching the database for images with similar features and using the provided semantics. This work focuses another approach, where the semantic information are extracted from additional sources, such as texts according to visually similar images on websites. Those images are found in online databases or on the web using search engines. By this means, a broad range of objects can be handled without the need to create a database. Techniques will be implemented and analyzed that find websites containing images similar to the image to be annotated and that mine semantic information from corresponding texts. Eventually the system will be tested with a range of images with objects of different difficulties.

9 特價2940
立即代訂
下次再買

Machine Learning with Rust

Ingram 出版
2024/02/28 出版

In this stimulating journey of Rust, you'll learn how to use the Rust programming language in conjunction with machine learning. It's not a full guide to learning machine learning with Rust. Instead, it's more of a journey that shows you what's possible when you use Rust to solve machine learning problems. Some people like Rust because it is quick and safe. This book shows how those qualities can help machine learning a lot.To begin, we will show you what Rust is and how it works. This is so that everyone, even those who are new to Rust, can follow along. Then, we look at some basic machine learning concepts, such as linear and logistic regression, and show how to use Rust's tools and libraries to make these ideas work.You will learn more complex techniques like decision trees, support vector machines, and how to work with data as we go along. It goes all the way up to neural networks and image recognition, and we show you how to use Rust for these types of tasks step by step. We use real-world examples, such as COVID data and the CIFAR-10 image set, to show how Rust works with issues that come up in the real world.This book is all about discovery and experimentation. To see what you can do with them, we use various Rust tools for machine learning. It's a fun way to see how Rust can be used in machine learning, and it will make you want to try new things and learn more on your own. This is only the beginning; there is so much more to uncover as you continue to explore machine learning with Rust. Key LearningsExploit Rust's efficiency and safety to construct fast machine learning models.Use Rust's ndarray crate for numerical computations to manipulate complex machine learning data.Find out how Rust's extensible machine learning framework, linfa, works across algorithms.Use Rust's precision and speed to construct linear and logistic regression.See how Rust crates simplify decision trees and random forests for prediction and categorization.Learn to implement and optimize probabilistic classifiers, SVMs and closest neighbor methods in Rust.Use Rust's computing power to study neural networks and CNNs for picture recognition and processing.Apply learnt strategies to COVID and CIFAR-10 datasets to address realistic problems and obtain insights. Table of ContentRust Basics for Machine LearningData Wrangling with RustLinear Regression by ExampleLogistic Regression for ClassificationDecision Trees in ActionMastering Random ForestsSupport Vector Machines in ActionSimplifying Naive Bayes and k-NNCrafting Neural Networks with Rust

9 特價2736
立即代訂
下次再買

Building Dynamic Web Experiences with PHP

Ingram 出版
2024/02/28 出版

This book covers a wide range of topics starting with the introduction of web applications, including client-side and server-side scripting, different categories of web applications, and the installation process of popular server environments like WAMP, LAMP, XAMPP, and MAMP. The book contains the basics of PHP, including its history, features, and advantages, with setting up a PHP development environment. It covers PHP basics like variables, constants, data types, operators, control structures, and functions, providing a solid foundation for web development. Next, you will learn about forms, user input, cookies, and sessions, creating web pages with GUI components, validating user input both client-side and server-side, and handling cookies and sessions in PHP. It also covers PHP strings, file handling, and database operations, including connecting to a MySQL database and using database handling functions.

9 特價1833
立即代訂
下次再買

Foundations and Practice of Security

Springer 出版
2024/02/27 出版

This book constitutes the refereed proceedings of the 16th International Symposium on Foundations and Practice of Security, FPS 2023, held in Bordeaux, France, during December 11-13, 2023. The 27 regular and 8 short papers presented in this book were carefully reviewed and selected from 80 submissions. The papers have been organized in the following topical sections: Part I: AI and cybersecurity, security analysis, phishing and social network, vulnerabilities and exploits, network and system threat, malware analysis.Part II: security design, short papers.

9 特價4697
立即代訂
下次再買

Remaining Human in the Age of Artificial Intelligence

Independentl 出版
2024/02/26 出版

Remaining human in the age of AI is a guide to understanding ourselves and the traits that make us human as well as understanding AI and how it is impacting our lives today and into the future. In a future so inexorably soaked in technology, characteristics such as creativity, empathy, and emotional intelligence will become more important than ever before.As the world continues to digitise and deploy artificial intelligence technology, it will change humans' position in the world. What does our future look like? How is the environment being impacted and what can we do to protect it? What work will we be doing? How will we maintain our culture and society? How will we - remain human in the age of AI?

9 特價1026
立即代訂
下次再買

Security-Driven Software Development

Packt 出版
2024/02/26 出版

Trace security requirements through each development phase, mitigating multiple-layer attacks with practical examples, and emerge equipped with the skills to build resilient applicationsKey Features- Explore the practical application of secure software development methodologies- Model security vulnerabilities throughout the software development lifecycle (SDLC)- Develop the skills to trace requirements, from requirements gathering through to implementation- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionExtend your software development skills to integrate security into every aspect of your projects. Perfect for any programmer or developer working on mission-critical applications, this hands-on guide helps you adopt secure software development practices. Explore core concepts like security specifi cation, modeling, and threat mitigation with the iterative approach of this book that allows you to trace security requirements through each phase of software development. You won't stop at the basics; you'll delve into multiple-layer att acks and develop the mindset to prevent them. Through an example application project involving an entertainment ticketing software system, you'll look at high-profi le security incidents that have aff ected popular music stars and performers. Drawing from the author's decades of experience building secure applications in this domain, this book off ers comprehensive techniques where problem-solving meets practicality for secure development.By the end of this book, you'll have gained the expertise to systematically secure software projects, from crafting robust security specifi cations to adeptly mitigating multifaceted threats, ensuring your applications stand resilient in the face of evolving cybersecurity challenges.What you will learn- Find out non-functional requirements crucial for software security, performance, and reliability- Develop the skills to identify and model vulnerabilities in software design and analysis- Analyze and model various threat vectors that pose risks to software applications- Acquire strategies to mitigate security threats specific to web applications- Address threats to the database layer of an application- Trace non-functional requirements through secure software designWho this book is forMany software development jobs require developing, maintaining, enhancing, administering, and defending software applications, websites, and scripts. This book is designed for software developers and web developers seeking to excel in these roles, offering concise explanations and applied example use-cases.Table of Contents- Security Principles- Designing a Secure Functional Model- Designing a Secure Object Model- Designing a Secure Dynamic Model- Designing a Secure System Model- Threat Modeling- Authentication and Authorization- Input Validation and Sanitization- Standard Web Application Vulnerabilities- Database Security- Unit Testing- Regression Testing- Integration, System, and Acceptance Testing- Software Penetration Testing

9 特價1835
立即代訂
下次再買

WordPress Styling with Blocks, Patterns, Templates, and Themes

Packt 出版
2024/02/26 出版

Embrace WordPress to unlock creative possibilities, discovering new design tools and patterns that will elevate your website's aestheticKey FeaturesExplore WordPress pattern directory for free patterns and create captivating designs with less codingLearn to use design tools effectively, stay updated on their evolution, and find tools for third-party blocksMaster block styles by understanding their concepts, applications, and seamless theme integrationPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionExperience a revolutionary WordPress styling transformation with WordPress Styling with Blocks, Patterns, Templates, and Themes by uncovering a wealth of features that redefine the future of WordPress. This guide introduces you to full-site editing and block design tools that enable you to shape the overall aesthetics and layout of your dream website with unprecedented ease. Get ready to harness the power of diverse cutting-edge features as you delve into this WordPress book, focusing on the Gutenberg editing experience. Guided by examples that demonstrate effortless customization entirely suited to your preferences, you'll master the design tools, patterns, and full site editing capabilities to shape impactful websites that mirror your distinct vision and creativity. As you immerse yourself in the core of WordPress styling, you'll understand the rationale and terminology underpinning each element and how to use it to its full potential.By the end of this book, you'll be equipped to build your dream website, reflecting your distinctive style.What you will learnAcquire skills in block recognition, CSS-free customization, and identifying supported block design toolsRecognize the significance of global styles in modern WordPress themesLocate sources for block themes and kickstart personal creationsDiscover, create, and share editor patterns and integrate them into themesComprehend the WordPress Pattern Directory, locating and adding patternsMaster the effective use, availability, and implementation of website design toolsWho this book is forThis book is your go-to resource for exploring and unleashing your creative potential using the latest styling features available in WordPress. Whether you're a non-coder, a hobbyist, or a seasoned WordPress user, this guide will help you discover the full range of new options. With no prior knowledge assumed, each step is carefully explained to ensure that you make the most of the latest version. Starting with a no-code approach, the book progressively introduces some coding for those interested in taking their learning further.Table of ContentsIntroducing blocksBlock design toolsBlock stylesBlock and styles wrap-upUnderstanding block patternsDiscovering and creating block patternsDiscovering the WordPress Pattern DirectoryWrapping up patternsAn introduction to full site editingDiscovering and creating template partsDiscovering and creating templatesTemplates wrap-upUnderstanding how themes have changedDiscovering stylesDiscovering WordPress block themesWrapping up themes

9 特價2064
立即代訂
下次再買

Detecting, Troubleshooting, and Preventing Congestion in Storage Networks

Paresh,Gupta  著
Cisco Press 出版
2024/02/22 出版

The complete practical guide to architect storage networks for maximum efficiency, and to quickly troubleshoot congestion issues. Data is the most important entity in a data center. In addition to being stored securely for the long term, data must be accessible to applications with low latency so that high performance can be maintained 24/7. To meet this performance goal of applications, the storage infrastructure services must be designed accordingly. In Detecting, Troubleshooting, and Preventing Congestion in Storage Networks, leading Cisco experts take a practical approach to explaining the congestion handling mechanisms of the transport technologies like FC, FCoE, RoCE, and TCP. The authors share proven troubleshooting methodology developed through years of firsthand experience as well as analytical techniques for monitoring the storage fabrics and gaining predictive insights. Through real-world experiences and case study examples, you'll learn what questions to ask, how to start planning, what exists today, what components still must evolve, and how to drive value in building custom applications in detecting congestion in large-scale storage networks. Optimize user experience with faster resolution of congestion in storage networks in production data centers Master congestion handling mechanisms in technologies like FC, FCoE, RoCE, and TCP Applicable to networks connected to all storage array types and vendors including Dell, HPE, IBM, NetApp, Hitachi Real-world case studies and troubleshooting methodology ensuring storage SLAs are consistently met Increase uptime with custom analytical tools for predicting and resolving congestion Boost storage infrastructure efficiency in a hybrid cloud model Save on employee training and reduce support ticket hassles with vendors

9 特價3212
立即代訂
下次再買

The agile comms handbook

Ingram 出版
2024/02/21 出版

This is a short, practical guide for people and teams who are keen to start working in the open. Agile comms is a set of simple techniques for bringing work and comms closer together - it helps teams communicate about work, as it happens. Giles Turnbull has worked with lots of teams in government and the private sector, helping them bring a more accessible, human tone to their communication material. This book brings together the things he's learned along the way. Agile comms isn't the same as content design, but the two ideas have a lot in common. This book is useful for content designers, product owners, delivery managers, user researchers, comms professionals, strategists, founders, digital transformation professionals and senior leaders. It's lively, accessible, readable and short. There are tea-related jokes.

9 特價1290
立即代訂
下次再買
頁數31/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing