0403_卡芙涅
0401~0403_4月選書

英文書 > 全部商品

Witnessing Trauma Black Youth on Social Media

Nick E,Evans  著
Ingram 出版
2023/12/03 出版

This project delves into the intersection of past and present modes of curating Black trauma, specifically examining the transition from traditional scrapbooking methods used by the Emmett Till Generation to contemporary practices on social media platforms like Instagram, Facebook, and Twitter by the Trayvon Generation. The central argument posits that these digital spaces serve as an extension of historical scrapbooking, revealing parallels in the ways Black communities curate and disseminate traumatic experiences.

9 特價957
立即代訂
下次再買

Modern Typescript

Apress 出版
2023/12/03 出版

Dive into the world of TypeScript, a popular superset of the JavaScript language that enhances the development experience with static typing. This book covers every aspect of TypeScript in a concise and easy-to-understand style, making it the ultimate resource for mastering TypeScript. Author Ben Beattie-Hood provides comprehensive coverage of TypeScript's features, such as structural typing, optionality and union types, computed and recursive types, and much more. Each chapter is packed with practical, real-world examples and insider tips drawn from his 20 years of experience as a trainer, ensuring you understand the most important concepts and learn how to avoid common pitfalls. Modern TypeScript will put you on the path to becoming a TypeScript expert, help you greatly reduce errors, and boost your delivery velocity. Whether you're building small projects or large-scale applications, this book will give you the skills and confidence to write cleaner, scalable, and more maintainable code. Don't miss this opportunity to elevate your TypeScript proficiency and stay at the forefront of modern development. What You'll Learn Understand how TypeScript works and how it fits into the JavaScript ecosystemWork with the type system, including primitives, interfaces, classes, and functionsLeverage the advanced type system with mapped and conditional types, in useful real-world examplesExplore tooling and debugging methods available for TypeScriptFutureproof development projects for scale using the TypeScript tooling Who This Book Is For Developers, designers, and engineers who are writing front end web sites or apps, or using JavaScript-based back end systems, looking to supercharge their skills and knowledge.

9 特價1368
立即代訂
下次再買

Financial Cryptography and Data Security

Springer 出版
2023/12/03 出版

The two-volume set LNCS 13950 and 13951 constitutes revised selected papers from the 27th International Conference on Financial Cryptography and Data Security, FC 2023, which was held from May 1-5, 2023, in Bol, Croatia. The 39 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 182 submissions. They were organized in topical sections as follows: Part I: Consensus; cryptographic protocols; decentralized finance; Part II: Proof of X; Layer 2; attack techniques, defenses, and attack case studies; empirical studies and more decentralized finance; game theory and protocols.

9 特價3914
立即代訂
下次再買

WhatsApp's Culture Shift

Sam,Loray  著
Ingram 出版
2023/12/02 出版

WhatsApp, in its excursion from a basic informing application to a worldwide correspondence behemoth, has been at the front of a social change in the manner individuals collaborate and share data. This social change is profoundly interlaced with the stage's elements, openness, and the developing elements of advanced correspondence. At the core of WhatsApp's social impact is its obligation to straightforwardness and easy to understand plan. The stage's instinctive point of interaction and direct informing highlights have made it open to a different worldwide crowd. This inclusivity has added to a social shift where people from different foundations, paying little mind to mechanical capability, can consistently participate in computerized discussions. WhatsApp's impact stretches out past the well informed to embrace a more extensive range of clients, encouraging a social shift towards more boundless and popularity based computerized correspondence. The stage's job as a connector of individuals across geological limits has fundamentally influenced social elements. WhatsApp has turned into a necessary piece of how families, companions, and networks stay associated, rising above the restrictions of distance. The promptness and continuous nature of correspondence on WhatsApp have reshaped social assumptions, establishing a climate where steady network is the standard. This social shift mirrors a more extensive pattern in the public eye, where computerized correspondence stages reclassify the speed and nature of relational connections. The sight and sound highlights of WhatsApp, for example, photograph and video sharing, have acquainted a visual component with computerized discussions, further impacting social communications. The social shift towards more visual correspondence has suggestions for how people put themselves out there and offer encounters. Emoticon loaded discussions, picture based announcements, and the sharing of media content have become vital parts of the contemporary advanced correspondence culture, worked with and advocated by WhatsApp. WhatsApp's job in business correspondence has likewise added to a social change in how endeavors draw in with clients and partners. The quickness of correspondence, combined with highlights like WhatsApp Business, has changed client assistance and promoting procedures. The social assumption for expeditious and customized cooperations with organizations is an immediate consequence of WhatsApp's impact on the elements of client commitment.

9 特價855
立即代訂
下次再買

Bug Bytes

Clint,Watts  著
Ingram 出版
2023/12/02 出版

We live in a world that is filled with misinformation and disinformation. In our precarious digital environment, the need for awareness about this risk is greater than ever.In Bug Byes, investigator Ava Williams uses her wits and journalism skills to uncover a disinformation campaign set to damage critical American communications infrastructure. With help from a few allies along the way, Ava races to expose the web of lies being spun online.Created by the CISA (the U.S. Cybersecurity and Infrastructure Security Agency), Bug Bytes is the second graphic novel in the Resilience Series, which was created to illustrate the threat that inaccurate information (fake news) can have on important events that shape the future of our democracy. Yes, the threat is real, and very dangerous. Everyone needs to understand how it works and how to recognize the truth. This exciting and entertaining little book can help.

9 特價685
立即代訂
下次再買

Financial Cryptography and Data Security

Springer 出版
2023/12/01 出版

The two-volume set LNCS 13950 and 13951 constitutes revised selected papers from the 27th International Conference on Financial Cryptography and Data Security, FC 2023, which was held from May 1-5, 2023, in Bol, Croatia. The 39 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 182 submissions. They were organized in topical sections as follows: Part I: Consensus; cryptographic protocols; decentralized finance; Part II: Proof of X; Layer 2; attack techniques, defenses, and attack case studies; empirical studies and more decentralized finance; game theory and protocols.

9 特價6263
立即代訂
下次再買

Trace, Log, Text, Narrative, Data

Ingram 出版
2023/11/30 出版

General trace and log analysis patterns allow the application of uniform diagnostics and anomaly detection across diverse software environments. This pattern language covers any execution artifact from a small debugging trace to a distributed log with billions of messages from hundreds of computers, thousands of software components, threads, and processes. Pattern-oriented trace and log analysis is applicable to troubleshooting and debugging Windows, macOS, Linux, FreeBSD, Android, iOS, z/OS, and any other possible computer platform, including networking and IoT. Its pattern catalog is a part of pattern-oriented software data analysis, diagnostics, anomaly detection, forensics, prognostics, root cause analysis, and debugging developed by Software Diagnostics Institute. Also, the scope of applicability of such analysis patterns is much wider than just software execution artifacts or temporal data and now includes general data, narratives, text, and image analysis (space-like narratology). This reference reprints with corrections almost 230 patterns originally published in Memory Dump Analysis Anthology volumes 3 - 14 and Software Diagnostics Library. It also includes additional 19 analysis patterns from the forthcoming volume 15, bringing the total analysis pattern count to 229. Full-color diagrams accompany almost all pattern descriptions. The fifth edition includes 28 more patterns, updated diagram pictures, classification, and the list of narratological and mathematical influences, and now includes the long-awaited introduction and two new appendixes.

9 特價3672
立即代訂
下次再買

Artificial Intelligence Research

Anban,Pillay  著
Springer 出版
2023/11/29 出版

This book constitutes the refereed proceedings of the 4th Southern African Conference on Artificial Intelligence Research, SACAIR 2023, held in Muildersdrift, South Africa, in December 2023. The 22 full papers presented in these proceedings were carefully reviewed and selected from 66 submissions. The papers are organized in the following topical sections: Responsible and Ethical AI Track; Socio-Technical and Human-Centered AI Track; Algorithmic, and Data Driven and Symbolic AI.

9 特價4697
立即代訂
下次再買

Bug Hunting 101

Ingram 出版
2023/11/29 出版

���� Explore the Ultimate Bug Hunting & Cybersecurity Journey! ����️Introducing the "Bug Hunting 101: Novice to Virtuoso" book bundle, accompanied by "Web Application Security for Ethical Hackers." Dive into a world where cybersecurity meets ethical hacking, and become a true virtuoso in the art of cyber defense.���� Book 1 - Bug Hunting: A Novice's Guide to Software Vulnerabilities ���� Are you new to bug hunting and cybersecurity? This book is your stepping stone. Learn the fundamentals of software vulnerabilities, ethical hacking, and essential skills to embark on your bug hunting journey. Real-world examples will guide you in building a strong foundation.���� Book 2 - Intermediate Bug Hunting Techniques: From Novice to Skilled Hunter ����️]♂️ Ready to level up? This intermediate guide takes you deeper into the world of bug hunting. Explore advanced techniques in vulnerability discovery, scanning, and enumeration. Gain confidence as you tackle complex security challenges with practical insights.���� Book 3 - Advanced Bug Bounty Hunting: Mastering the Art of Cybersecurity ���� Elevate your skills with advanced bug bounty hunting strategies. Discover cryptographic flaws, master network intrusion, and explore advanced exploitation techniques. This book guides you in strategically engaging with bug bounty programs, taking your expertise to new heights.���� Book 4 - Virtuoso Bug Hunter's Handbook: Secrets of the Elite Ethical Hackers ���� Uncover the secrets of elite ethical hackers. Dive into the mindset, techniques, and advanced artifacts used by the virtuosos. Maximize your participation in bug bounty programs, and navigate legal and ethical considerations at the elite level of bug hunting.���� Secure Your Cyber Future Today! ���� This book bundle equips you with the knowledge, skills, and ethical responsibility required to safeguard the digital world. As the digital landscape continues to evolve, ethical hackers and bug hunters like you play a pivotal role in ensuring its security.Whether you're a beginner or an experienced professional, this bundle caters to all levels. Join us on this transformative journey from novice to virtuoso, and become a guardian of the digital realm.���� Don't miss this opportunity to own the complete "Bug Hunting 101: Novice to Virtuoso" book bundle with "Web Application Security for Ethical Hackers." Get your copy now and empower yourself in the exciting world of cybersecurity! ����

9 特價1833
立即代訂
下次再買

Drupal 10 Masterclass

Packt 出版
2023/11/29 出版

Get started with Drupal 10 using this comprehensive guide for beginners and learn key concepts such as building, installing, maintaining, managing content, and advanced topics through real-world examples and use casesKey FeaturesExplore Drupal 10 concepts in depth and discover how you can engage with the Drupal open-source communityBuild Drupal applications with powerful features such as structured content, media, views, and displaysLearn how to create modules and themes with metadata, hooks, and Drupal's customization pluginsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionLearning Drupal can be challenging because of its robust, extensible, and powerful capability for digital experiences, making it difficult for beginners to grasp and use it for application development. If you're looking to break into Drupal with hands-on knowledge, this Drupal 10 Masterclass is for you.With this book, you'll gain a thorough knowledge of Drupal by understanding its core concepts, including its technical architecture, frontend, backend, framework, and latest features. Equipped with foundational knowledge, you'll bootstrap and install your first project with expert guidance on maintaining Drupal applications. Progressively, you'll build applications using Drupal's core features such as content structures, multilingual support, users, roles, Views, search, and digital assets. You'll discover techniques for developing modules and themes and harness Drupal's robust content management through layout builder, blocks, and content workflows. The book familiarizes you with prominent tools such as Git, Drush, and Composer for code deployments and DevOps practices for Drupal application management. You'll also explore advanced use cases for content migration and multisite implementation, extending your application's capabilities.By the end of this book, you'll not only have learned how to build a successful Drupal application but may also find yourself contributing to the Drupal community.What you will learnUnderstand Drupal's architecture and infrastructure dependenciesBootstrap, install, and configure your first Drupal projectMaintain Drupal through updates, automation, and DevOps practicesHarness Drupal features like multilingual, search, Views, and content moderationUnderstand content management and how to effectively put it into actionExplore advanced topics such as Git, Drush, DevOps, and ComposerLeverage Drupal's framework for modules and themesDiscover advanced use cases for migration and multisite managementWho this book is forIf you are a CMS professional new to Drupal and want to learn all aspects of building and maintaining Drupal websites, this book is for you. While hands-on experience with Drupal is not assumed, having foundational knowledge of CMS development will help you get the most out of this book.Table of ContentsWhat is Drupal?Core, Contributed, and Custom Projects (Modules, Themes)Infrastructure and Overview of Technical ArchitectureDrupal TerminologyWhat is new in Drupal 10?Bootstrapping, installing, and configuring a new Drupal projectMaintaining DrupalContent Structures and MultilingualUsers, Roles, and PermissionsDeveloping Drupal Views and Display ModesManaging Static AssetsBuilding Search in DrupalUser Engagement with Contact FormsManaging Content and MediaVisual Content ManagementModerated content with workflows(N.B. Please use the Look Inside option to see further chapters)

9 特價1835
立即代訂
下次再買

Developing Extensions for Joomla! 5

Packt 出版
2023/11/29 出版

Harness the full potential of Joomla! through this comprehensive take on Joomla! extensions from conception through to releaseKey Features: Discover the complete cycle of extension development from conception to releaseLeverage built-in features such as categories, ACL, and custom fields to enrich your extensionsLearn how to build extensions that integrate with the Joomla! API and the new Joomla! CLIPurchase of the print or Kindle book includes a free PDF eBookBook Description: Joomla! 5 is a groundbreaking CMS that helps you take a significant leap into the world of content management systems. Joomla! 5 features a variety of impressive new features that align with current web standards and enable you to experience lightning-fast performance for optimal web page optimization, leverage the new code architecture, and tap into the WebService API, among others.This book takes you on a journey of extending Joomla's capabilities by developing your own extensions. The chapters not only explain the key concepts behind Joomla's architecture but also equip you with the latest techniques for crafting components and plugins. You'll discover how to leverage existing features within Joomla! to empower your extensions and create tailored solutions. The book takes you from the initial stages of planning your extension development to a fully featured finished product. As you advance, you'll learn invaluable techniques for testing your extension, addressing common issues, and preparing it for publication. The concluding chapters of this comprehensive guide teach you how to test your extension for common issues, along with how to publish the extension for everyone to use.By the end of this book, you'll have the confidence and skills to complete the cycle of extension development.What You Will Learn: Find out how to plan the development of a new extension from scratchUnderstand the basic structure of a Joomla! extensionGet to grips with the Joomla! Forms systemUse Joomla! features effectively to enrich your extensionsDiscover how to add a WebService API to your extensionCreate a Joomla! CLI command for your extensionDevelop a Joomla! Child Template for your projectsTest your extensions before the releaseWho this book is for: This book is for Joomla! developers and web designers who want to extend the functionalities of Joomla! and find innovative ways to customize their content management systems, e-commerce websites, business websites, and more. Basic familiarity with Joomla! will help you get the most out of this book.

9 特價1605
立即代訂
下次再買

Burp Suite

Ingram 出版
2023/11/28 出版

Introducing the "Burp Suite: Novice to Ninja" Book Bundle - Your Path to Becoming a Cybersecurity Expert!Are you ready to unlock the secrets of ethical hacking and penetration testing? Do you want to master the art of securing web applications, networks, mobile devices, and cloud environments? Look no further, because our comprehensive book bundle has you covered!What's Inside: ���� Book 1 - Burp Suite Fundamentals: A Novice's Guide to Web Application Security: Dive into the world of web application security and learn the basics of identifying vulnerabilities. Harness the power of Burp Suite to secure your web applications effectively.���� Book 2 - Mastering Burp Suite: Pen Testing Techniques for Web Applications: Take your skills to the next level with advanced pen testing techniques. Become proficient in leveraging Burp Suite to identify vulnerabilities, execute precise attacks, and secure web applications.���� Book 3 - Penetration Testing Beyond Web: Network, Mobile & Cloud with Burp Suite: Extend your expertise beyond web applications as you explore network, mobile, and cloud security. Adapt Burp Suite to assess and fortify diverse digital landscapes.���� Book 4 - Burp Suite Ninja: Advanced Strategies for Ethical Hacking and Security Auditing: Ascend to the status of a security auditing ninja. Learn advanced strategies, customization techniques, scripting, and automation to identify vulnerabilities, craft comprehensive security reports, and develop effective remediation strategies.Why Choose "Burp Suite: Novice to Ninja?"����️ Comprehensive Knowledge: Covering web applications, networks, mobile devices, and cloud environments, this bundle provides a 360-degree view of cybersecurity.���� Expert Guidance: Benefit from insider tips, advanced techniques, and practical insights shared by experienced cybersecurity professionals.���� Hands-On Learning: Each book offers practical exercises and real-world scenarios, allowing you to apply your knowledge effectively.���� Four Books in One: Get access to a wealth of information with four comprehensive books, making it a valuable resource for beginners and experts alike.���� Versatile Skills: Master Burp Suite, one of the most popular tools in the industry, and adapt it to various cybersecurity domains.���� Career Advancement: Whether you're an aspiring professional or a seasoned expert, this bundle will help you enhance your skills and advance your cybersecurity career.���� Stay Ahead: Keep up with the ever-evolving cybersecurity landscape and stay ahead of emerging threats.Don't miss this opportunity to become a cybersecurity champion. With the "Burp Suite: Novice to Ninja" bundle, you'll gain the knowledge, skills, and confidence needed to excel in the world of ethical hacking and security auditing. Secure your digital future - get your bundle now!

9 特價1833
立即代訂
下次再買

Metasploit Masterclass For Ethical Hackers

Ingram 出版
2023/11/28 出版

Introducing the "Metasploit Masterclass for Ethical Hackers" Book Bundle - Your Path to Becoming a Cybersecurity Expert!���� Are you fascinated by the world of ethical hacking and cybersecurity? ���� Do you want to master the art of securing networks, web applications, wireless devices, and IoT technology? ���� Are you ready to embark on a journey that will turn you into a cybersecurity pro?Look no further! This exclusive book bundle brings together four comprehensive volumes designed to make you a cybersecurity expert. Say hello to the "Metasploit Masterclass for Ethical Hackers" - your ultimate guide to becoming a highly skilled ethical hacker and a defender of the digital world.���� Book 1: Network Reconnaissance and Vulnerability Scanning Learn the fundamentals of ethical hacking, network reconnaissance, and vulnerability scanning. Gather critical information about target networks, identify potential vulnerabilities, and become a pro at scanning for weaknesses.���� Book 2: Web Application Penetration Testing Dive deep into the realm of web application security. Discover how to assess, exploit, and secure vulnerabilities in web applications. Your expertise in web application security will be in high demand.���� Book 3: Wireless and IoT Hacking With the rise of wireless networks and IoT devices, new threats emerge. Uncover the secrets of wireless and IoT hacking - from exploiting vulnerabilities to securing these technologies effectively.���� Book 4: Advanced Threat Detection and Defense Stay on the cutting edge of cybersecurity. Explore advanced threat detection methods, proactive threat hunting, and the use of Metasploit for defensive purposes. Protect against even the most sophisticated cyber threats.This book bundle is your gateway to a world of cybersecurity excellence. Whether you're starting your cybersecurity journey or seeking to enhance your skills, these books offer a holistic and hands-on approach to mastering the art and science of ethical hacking.���� Why Choose the "Metasploit Masterclass for Ethical Hackers" Bundle?- Expert Guidance: Learn from experienced cybersecurity professionals.- Hands-On Learning: Gain practical skills through real-world examples and exercises.- Comprehensive Coverage: Master various aspects of ethical hacking and cybersecurity.- Career Advancement: Boost your career prospects in the high-demand field of cybersecurity.Secure your digital future and become a guardian of cyberspace with the "Metasploit Masterclass for Ethical Hackers" book bundle. Get started on your path to becoming a cybersecurity expert today!Don't miss this opportunity to invest in your cybersecurity knowledge. Click the link to grab your bundle and start your journey towards becoming a cybersecurity pro! ��������

9 特價1833
立即代訂
下次再買

Computer Security - Esorics 2023

Gene,Tsudik  著
Springer 出版
2023/11/28 出版

The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which took place in The Hague, The Netherlands, during September 25-29, 2023. The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows: Part I: Crypto. Part II: Network, web and internet; privacy; and remote. Part III: Attacks; blockchain; and miscellaneous. Part IV: Machine learning; software and systems security.

9 特價4697
立即代訂
下次再買

Computer Security - Esorics 2023

Gene,Tsudik  著
Springer 出版
2023/11/28 出版

The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which took place in The Hague, The Netherlands, during September 25-29, 2023. The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows: Part I: Crypto. Part II: Network, web and internet; privacy; and remote. Part III: Attacks; blockchain; and miscellaneous. Part IV: Machine learning; software and systems security.

9 特價4697
立即代訂
下次再買

Security, Privacy, and Applied Cryptography Engineering

Springer 出版
2023/11/28 出版

This book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2023, held in Roorkee, India, in December 2023.The 14 papers included in these proceedings were carefully reviewed and selected from 45 submissions. They focus on various aspects of security, privacy, applied cryptography, and cryptographic engineering.

9 特價3653
立即代訂
下次再買

Computer Security - Esorics 2023

Gene,Tsudik  著
Springer 出版
2023/11/28 出版

The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which took place in The Hague, The Netherlands, during September 25-29, 2023. The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows: Part I: Crypto. Part II: Network, web and internet; privacy; and remote. Part III: Attacks; blockchain; and miscellaneous. Part IV: Machine learning; software and systems security.

9 特價4697
立即代訂
下次再買

Ransomware

Ravindra,Das  著
Ingram 出版
2023/11/27 出版

Ransomware attacks have become much more covert and stealthier, than when they first came out. In this book, the author provides an overview of what Ransomware is all about, and the timeline of its evolution.

9 特價2243
立即代訂
下次再買

Okta Administration Up and Running - Second Edition

Packt 出版
2023/11/27 出版

Get to grips with the fundamentals of Zero trust, IAM, and Okta, while learning how to carry out foundational configuration of your own tenants with the help of step-by-step instructionsKey Features: Discover how to use Okta for complete identity and access management in your organizationExplore agentless desktop single sign-on, multifactor authentication, and lifecycle management for enhanced securityLearn about no-code and low-code automation functionalities, also known as Okta WorkflowsPurchase of the print or Kindle book includes a free PDF eBookBook Description: Identity and access management (IAM) is a set of policies and technologies used to ensure an organization's security, by carefully assigning roles and access to users and devices. This book will get you up and running with Okta, an IAM service that can help you manage both employees and customers.The book begins by helping you understand how Okta can be used as an IAM platform, before teaching you about Universal Directory and how to integrate with other directories and apps, as well as set up groups and policies for Joiner, Mover, and Leaver flows.This updated edition helps you to explore agentless desktop single sign-on (SSO) and multifactor authentication (MFA) solutions, and showing how to utilize Okta to meet NIST requirements. The chapters also walk you through Okta Workflows, low-/no-code automation functionalities, and custom API possibilities used to improve lifecycle management. Finally, you'll delve into API access auditing and management, where you'll discover how to leverage Advanced Server Access (ASA) for your cloud servers.By the end of this book, you'll have learned how to implement Okta to enhance your organization's security and be able to use the book as a reference guide for the Okta certification exam.What You Will Learn: Get a clear overview of Okta's advanced featuresIntegrate Okta with directories and applications using hands-on instructionsGet practical recommendations on managing policies for SSO, MFA, and lifecycle managementDiscover how to manage groups and group rules for Joiner, Mover, Leaver events in Okta using examplesManage your Okta tenants using APIs and oversee API access with OktaSet up and manage your organization's Okta environment, ensuring a secure IAM practiceFind out how to extend your Okta experience with Workflows and ASAWho this book is for: If you are an IT consultant, business decision-maker, system administrator, system and security engineer, or anyone looking to use Okta to plan, design, and implement identity and access management solutions, this book is for you. A basic understanding of authentication and authorization is necessary to understand the topics present in this book.

9 特價2294
立即代訂
下次再買

Implementing DevSecOps Practices

Packt 出版
2023/11/24 出版

Integrate Shift-Left Security, automation, IaC, and compliance into every stage of development, ensuring strong application security and continuous protection for modern software with DevSecOps best practicesKey Features- Understand security posture management to maintain a resilient operational environment- Master DevOps security and blend it with software engineering to create robust security protocols- Adopt the left-shift approach to integrate early-stage security in DevSecOps- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionDevSecOps is built on the idea that everyone is responsible for security, with the goal of safely distributing security decisions at speed and scale to those who hold the highest level of context. This practice of integrating security into every stage of the development process helps improve both the security and overall quality of the software. This book will help you get to grips with DevSecOps and show you how to implement it, starting with a brief introduction to DevOps, DevSecOps, and their underlying principles.After understanding the principles, you'll dig deeper into different topics concerning application security and secure coding before learning about the secure development lifecycle and how to perform threat modeling properly. You'll also explore a range of tools available for these tasks, as well as best practices for developing secure code and embedding security and policy into your application. Finally, you'll look at automation and infrastructure security with a focus on continuous security testing, infrastructure as code (IaC), protecting DevOps tools, and learning about the software supply chain.By the end of this book, you'll know how to apply application security, safe coding, and DevSecOps practices in your development pipeline to create robust security protocols.What you will learn- Find out how DevSecOps unifies security and DevOps, bridging a significant cybersecurity gap- Discover how CI/CD pipelines can incorporate security checks for automatic vulnerability detection- Understand why threat modeling is indispensable for early vulnerability identification and action- Explore chaos engineering tests to monitor how systems perform in chaotic security scenarios- Find out how SAST pre-checks code and how DAST finds live-app vulnerabilities during runtime- Perform real-time monitoring via observability and its criticality for security managementWho this book is forThis book is for individuals new to DevSecOps and want to implement its practices successfully and efficiently. DevSecOps Engineers, Application Security Engineers, Developers, Pentesters, and Security Analysts will find plenty of useful information in this book. Prior knowledge of the software development process and programming logic is beneficial, but not mandatory.Table of Contents- Introducing DevSecOps- DevSecOps Principles- Understanding the Security Posture- Understanding Observability- Understanding Chaos Engineering- Continuous Integration and Continuous Deployment- Threat Modeling- Software Composition Analysis (SCA)- Static Application Security Testing (SAST)- Infrastructure-as-Code (IaC) Scanning- Dynamic Application Security Testing (DAST)- Setting Up a DevSecOps Program with Open Source Tools- Licenses Compliance, Code Coverage, and Baseline Policies- Setting Up a Security Champions Program- Case Studies- Conclusion

9 特價1605
立即代訂
下次再買

You Are Being Watched

Ingram 出版
2023/11/24 出版

In You Are Being Watched, immerse yourself in travel influencer, James' digital mishap, as all his social media accounts were compromised due to his lax approach to cybersecurity. Yet, hope emerges when Amber, his tech-savvy girlfriend, not only rescues his accounts but also improves his security posture through her ingenious three-fold strategy: self-awareness, protecting his digital lifestyle, and staying updated-all depicted through vivid metaphors and clear analogies, making learning and implementing personal cybersecurity easyfor everyone. Embrace insightful "over-to-you" moments that provoke reflection and action. At the same time, the appendix offers a goldmine of hands-on tips to fortify your online presence. Indulge in Amber and James's sharp, playful, and heartelt conversations to learn what else you can do to protect your digital lifestyle.

9 特價634
立即代訂
下次再買

Blue Team Operations

Ingram 出版
2023/11/22 出版

Unlock the Power of Blue Team Defense!���� Introducing "Blue Team Operations: Defense" - Your Comprehensive Cybersecurity SolutionAre you ready to take on the challenges of the ever-evolving digital threat landscape? Equip yourself with the knowledge and skills needed to excel in the realm of cybersecurity defense with our exclusive book bundle, "Blue Team Operations: Defense." This comprehensive collection of four essential volumes covers operational security, incident response, digital forensics, and advanced threat defense, offering you a holistic approach to safeguarding your organization's digital assets.���� Book 1 - Blue Team Essentials: A Beginner's Guide to Operational SecurityStart your journey with "Blue Team Essentials," designed for both newcomers and those seeking a refresher on operational security. Explore fundamental concepts of threat assessment, risk management, and secure communication practices. Whether you're a novice or a seasoned professional, this beginner's guide sets the stage for a deep dive into the world of blue team defense.���� Book 2 - Mastering Incident Response: Strategies for Blue Teams"Mastering Incident Response" takes you to the heart of incident handling, empowering you to develop robust response plans, detect threats rapidly, and orchestrate effective strategies. Real-world scenarios and expert guidance ensure you have the skills needed to handle security incidents swiftly and decisively.���� Book 3 - Digital Forensics for Blue Teams: Advanced Techniques and InvestigationsUncover the art of digital forensics with "Digital Forensics for Blue Teams." Dive into advanced methods for collecting and analyzing digital evidence, equipping you to conduct thorough investigations that uncover the truth behind security incidents. Whether you're dealing with cybercrime or insider threats, these advanced techniques will set you apart.���� Book 4 - Expert Blue Team Operations: Defending Against Advanced ThreatsIn our final volume, "Expert Blue Team Operations," we tackle advanced adversaries, covering threat hunting, threat intelligence, and tactics for defending against the most sophisticated attacks. Insights from seasoned professionals prepare you to defend your organization against the ever-evolving threat landscape.���� Your Blueprint for Cybersecurity Excellence Awaits!Get ready to defend your organization against cyber threats with confidence. "Blue Team Operations: Defense" is your comprehensive toolkit for operational security, incident response, digital forensics, and advanced threat defense. Whether you're an aspiring cybersecurity professional or a seasoned defender, this bundle will empower you to protect and secure your digital assets effectively.����️ Don't Wait! Take Your Cybersecurity Defense to the Next Level Today!Click the link below to get your hands on "Blue Team Operations: Defense" and embark on a journey to becoming a cybersecurity guardian of tomorrow. Don't let cyber threats catch you off guard - fortify your defenses and secure your digital future now!

9 特價1833
立即代訂
下次再買

Ultimate ChatGPT Handbook for Enterprises

Harald,Gunia  著
Ingram 出版
2023/11/22 出版

Empowering the Global Workforce with ChatGPT Expertise.Book Description"Ultimate ChatGPT Handbook for Enterprises" is your indispensable resource for navigating the transformative world of ChatGPT within the enterprise domain. It provides a deep dive into ChatGPT's evolution, capabilities, and its potential to democratize technology interactions through natural language.Throughout its chapters, you'll embark on a journey that spans from comprehending the lineage of GPT models to mastering advanced prompt engineering techniques. It will help you take a step into a futuristic enterprise landscape where ChatGPT seamlessly collaborates with human intelligence, fundamentally transforming daily work routines across various enterprise roles.The latter chapters will help you attain proficiency in managing GPT projects, and discovering the agile and iterative approach to GPT solution life cycles using real-world scenarios. You will also be introduced to practical GPT implementation frameworks for both Python and Java.This book offers practical insights and applicable skills, fostering informed dialogue and active participation in the ongoing enterprise AI revolution. If you want to stay at the forefront of the rapidly evolving AI landscape and unlock enterprise excellence through ChatGPT, this book is your go-to companion.Table of Contents1. ​​From GPT-1 to ChatGPT-4: The Evolution Towards Generative AI2. CapabilityGPT An Enterprise AI-Capability Framework for ChatGPT3. The Impact of ChatGPT on the Enterprise4. Architecture Patterns enabled by GPT-Models5. Advanced GPT Prompt Engineering Techniques6. Designing Prompt-based Intelligent Assistants7. Mastery of GPT-Projects8. LangChain: GPT Implementation Framework for Python9. predictive-powers: GPT Implementation Framework for Java APPENDIX A: APPENDIX B:

9 特價1833
立即代訂
下次再買

Malware Science

Packt 出版
2023/11/22 出版

Unlock the secrets of malware data science with cutting-edge techniques, AI-driven analysis, and international compliance standards to stay ahead of the ever-evolving cyber threat landscapeKey FeaturesGet introduced to three primary AI tactics used in malware and detectionLeverage data science tools to combat critical cyber threatsUnderstand regulatory requirements for using AI in cyber threat managementPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIn today's world full of online threats, the complexity of harmful software presents a significant challenge for detection and analysis. This insightful guide will teach you how to apply the principles of data science to online security, acting as both an educational resource and a practical manual for everyday use.Malware Science starts by explaining the nuances of malware, from its lifecycle to its technological aspects before introducing you to the capabilities of data science in malware detection by leveraging machine learning, statistical analytics, and social network analysis. As you progress through the chapters, you'll explore the analytical methods of reverse engineering, machine language, dynamic scrutiny, and behavioral assessments of malicious software. You'll also develop an understanding of the evolving cybersecurity compliance landscape with regulations such as GDPR and CCPA, and gain insights into the global efforts in curbing cyber threats.By the end of this book, you'll have a firm grasp on the modern malware lifecycle and how you can employ data science within cybersecurity to ward off new and evolving threats.What you will learnUnderstand the science behind malware data and its management lifecycleExplore anomaly detection with signature and heuristics-based methodsAnalyze data to uncover relationships between data points and create a network graphDiscover methods for reverse engineering and analyzing malwareUse ML, advanced analytics, and data mining in malware data analysis and detectionExplore practical insights and the future state of AI's use for malware data scienceUnderstand how NLP AI employs algorithms to analyze text for malware detectionWho this book is forThis book is for cybersecurity experts keen on adopting data-driven defense methods. Data scientists will learn how to apply their skill set to address critical security issues, and compliance officers navigating global regulations like GDPR and CCPA will gain indispensable insights. Academic researchers exploring the intersection of data science and cybersecurity, IT decision-makers overseeing organizational strategy, and tech enthusiasts eager to understand modern cybersecurity will also find plenty of useful information in this guide. A basic understanding of cybersecurity and information technology is a prerequisite.Table of ContentsMalware Data Science Life Cycle OverviewAn Overview of the International History of Cyber Malware ImpactsTopological Data Analysis for Malware Detection and AnalysisArtificial Intelligence for Malware Data Analysis and DetectionBehavior-Based Malware Data Analysis and DetectionThe Future State of Malware Data Analysis and DetectionThe Future State of Key International Compliance RequirementsEpilogue - A Harmonious Overture to the Future of Malware Data Science and Cybersecurity

9 特價1559
立即代訂
下次再買

Zero Day

Ingram 出版
2023/11/21 出版

���� ZERO DAY: Novice No More - Unlock the Secrets of CybersecurityAre you ready to embark on a transformative journey into the world of cybersecurity? Look no further than the "ZERO DAY: Novice No More" book bundle, your comprehensive guide to exposing software vulnerabilities and eliminating bugs. This bundle is your ticket to mastering the art of safeguarding digital systems, whether you're a beginner or a seasoned IT professional.���� What's Inside the Bundle: ���� Book 1 - ZERO DAY DEMYSTIFIED: Start your cybersecurity journey with a solid foundation. This beginner's guide breaks down complex concepts into easily digestible pieces, making it accessible to all. Learn how to identify, understand, and address software vulnerabilities confidently.���� Book 2 - ZERO DAY EXPOSED: Transition from novice to intermediate with this book, where you'll explore advanced techniques for identifying and patching software bugs. Bridge the gap between basic understanding and comprehensive expertise.���� Book 3 - MASTERING ZERO DAY: Are you ready to become an advanced practitioner? This book unveils cutting-edge strategies and methodologies used by cybersecurity experts. Tackle even the most challenging vulnerabilities with confidence and precision.���� Book 4 - ZERO DAY UNLEASHED: Dive into the world of expert-level tactics for exploiting and protecting against software vulnerabilities. Learn both offensive and defensive tactics used by professionals to safeguard digital systems.���� Why Choose the ZERO DAY Bundle?- Comprehensive Learning: This bundle covers the entire spectrum of cybersecurity, from beginners to experts. Whether you're new to the field or seeking advanced knowledge, there's something for everyone.- Expert Insights: Benefit from the wisdom of cybersecurity professionals who share their real-world experiences and knowledge gained through years of practice.- Practical Skills: Gain hands-on skills and techniques that you can apply immediately in real-world scenarios, making you an invaluable asset to any organization.- Secure Your Future: With the increasing prevalence of cyber threats, cybersecurity skills are in high demand. Invest in your future by acquiring the expertise to protect digital systems effectively.���� Your Path to Cybersecurity Excellence Starts Here: Take the first step toward becoming a cybersecurity expert or enhancing your existing skills. The "ZERO DAY: Novice No More" book bundle is your roadmap to success in the dynamic and crucial field of cybersecurity. Don't miss this opportunity to gain the knowledge and skills needed to secure digital systems and protect against vulnerabilities.����️ Protect. Secure. Thrive. Start Your Journey Today!Click the link below to purchase the "ZERO DAY: Novice No More" bundle and embark on a cybersecurity adventure that will transform you from novice to expert. Your digital world awaits, and it's time to become its guardian.

9 特價1833
立即代訂
下次再買

Red Team Operations

Ingram 出版
2023/11/21 出版

Introducing "Red Team Operations: Attack" Book Bundle!���� Are you fascinated by the world of cybersecurity? ���� Do you want to learn the art of ethical hacking and penetration testing? ���� Are you curious about the tactics used by cyber adversaries?Look no further! Our exclusive "Red Team Operations: Attack" book bundle is your ultimate guide to mastering the intricate world of cybersecurity, ethical hacking, social engineering, and web application security. With four meticulously crafted volumes, this collection is designed to equip you with the skills needed to excel in today's ever-evolving digital battlefield.���� Book 1 - Red Team Essentials: A Beginner's Guide to Attack Strategies This volume lays the foundation for understanding red teaming and ethical hacking. Perfect for beginners, it explores the essentials of planning, reconnaissance, and attack methodologies. Learn the mindset required to emulate adversaries effectively and discover techniques to assess and fortify security defenses.���� Book 2 - Unlocking the Black Box: Advanced Techniques in Ethical Hacking Building on your foundational knowledge, this book delves into advanced penetration testing and vulnerability assessment techniques. Equip yourself with the skills needed to uncover hidden weaknesses within systems and applications.���� Book 3 - Mastering the Art of Social Engineering: Tactics for Red Team Professionals Understanding the human element of security is crucial. This volume dives deep into the psychology of social engineering, teaching you the art of manipulating individuals to gain unauthorized access. Discover the tactics used by red team professionals to raise awareness and protect against social engineering attacks.���� Book 4 - Web App Scanning Mastery: Expert Techniques for Red Team Specialists In the digital age, securing web applications is paramount. This book provides in-depth knowledge of scanning, vulnerability assessment, API authentication, and techniques to evade Web Application Firewall (WAF) detection. Become an expert in securing web applications.Why choose our "Red Team Operations: Attack" bundle?✅ Comprehensive: Covers all aspects of red teaming, ethical hacking, social engineering, and web application security. ✅ Beginner to Advanced: Suitable for newcomers and seasoned professionals looking to expand their skill set. ✅ Practical: Each volume is packed with real-world examples and hands-on exercises. ✅ Expert Authors: Authored by cybersecurity experts with years of practical experience. ✅ Stay Ahead: Keep up with the latest cybersecurity trends and threats. ✅ Protect and Defend: Learn how to safeguard sensitive information and critical infrastructure. ✅ Unlock Career Opportunities: Gain the knowledge needed to excel in the field of cybersecurity.Don't miss this opportunity to embark on a journey into the exciting and essential world of cybersecurity. Equip yourself with the skills and knowledge needed to protect against evolving threats and make a difference in the digital realm.Get your "Red Team Operations: Attack" book bundle today and join the ranks of cybersecurity professionals who are making a positive impact in the fight against cybercrime.Secure your bundle now and take the first step toward becoming a cybersecurity expert! ������������

9 特價1833
立即代訂
下次再買

High-Performance Computing Systems and Technologies in Scientific Research, Automation of Control and Production

Springer 出版
2023/11/21 出版

This book constitutes the revised selected papers of the 13th International Conference on HPCST 2023, held in Barnaul, Russia, during May 19-20, 2023.The 21 full papers included in this book were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections as follows: Hardware for High-Performance Computing and Signal Processing; Information Technologies and Computer Simulation of Physical Phenomena; Computing Technologies in Data Analysis and Decision Making; Information and Computing Technologies in Automation and Control Science; Computing Technologies in Information Security Applications.

9 特價4436
立即代訂
下次再買

Euro-Par 2023: Parallel Processing Workshops

Springer 出版
2023/11/21 出版

This book constitutes revised selected papers from the workshops held at the 29th International Conference on Parallel and Distributed Computing, Euro-Par 2023, which took place in Limassol, Cyprus, during August 28-September 1, 2023. The 42 full papers presented in this book together with 11 symposium papers and 14 demo/poster papers were carefully reviewed and selected from 55 submissions. The papers cover covering all aspects of parallel and distributed processing, ranging from theory to practice, from small to the largest parallel and distributed systems and infrastructures, from fundamental computational problems to applications, from architecture, compiler, language and interface design and implementation, to tools, support infrastructures, and application performance aspects.LNCS 14351: First International Workshop on Scalable Compute Continuum (WSCC 2023). First International Workshop on Tools for Data Locality, Power and Performance (TDLPP 2023). First International Workshop on Urgent Analytics for Distributed Computing (QuickPar 2023). 21st International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Platforms (HETEROPAR 2023). LNCS 14352: Second International Workshop on Resource AWareness of Systems and Society (RAW 2023). Third International Workshop on Asynchronous Many-Task systems for Exascale (AMTE 2023). Third International Workshop on Performance and Energy-efficiency in Concurrent and Distributed Systems (PECS 2023) First Minisymposium on Applications and Benefits of UPMEM commercial Massively Parallel Processing-In-Memory Platform (ABUMPIMP 2023). First Minsymposium on Adaptive High Performance Input / Output Systems (ADAPIO 2023).

9 特價4436
立即代訂
下次再買

Frontiers in Cyber Security

Haomiao,Yang  著
Springer 出版
2023/11/21 出版

This volume constitutes the refereed proceedings of the 6th International Conference on Frontiers in Cyber Security, FCS 2023, held in Chengdu, China, in August 2023.The 44 full papers included in this book were carefully reviewed and selected from 89 submissions. They were organized in topical sections as follows: Blockchain and Distributed Systems; Network Security and Privacy Protection; Cryptography and Encryption Techniques; Machine Learning and Security; and Internet of Things and System Security.

9 特價6263
立即代訂
下次再買

Reconnaissance 101

Ingram 出版
2023/11/17 出版

Introducing the "RECONNAISSANCE 101" Book Bundle: Unleash Your Ethical Hacking Potential!Are you ready to embark on a thrilling journey into the world of ethical hacking and information gathering? Look no further, because the "RECONNAISSANCE 101" Book Bundle is here to equip you with the essential knowledge and skills you need to excel in this exciting field.���� BOOK 1: RECONNAISSANCE 101: A BEGINNER'S GUIDE TO FOOTPRINTING & INFORMATION GATHERINGIf you're new to ethical hacking, this beginner's guide is your perfect starting point. Dive into the fundamentals of reconnaissance and information gathering, learning the ropes of footprinting in a clear and approachable manner. Lay a solid foundation for your ethical hacking journey.���� BOOK 2: MASTERING FOOTPRINTING: ADVANCED INFORMATION GATHERING STRATEGIES FOR ETHICAL HACKERSReady to take your skills to the next level? In this volume, you'll explore advanced information gathering techniques used by ethical hackers worldwide. Discover how to navigate the digital landscape with precision and uncover hidden insights to enhance your cybersecurity prowess.���� BOOK 3: THE ETHICAL HACKER'S FIELD GUIDE TO TARGET DATA ACQUISITIONEthical hacking isn't just about collecting data-it's about doing so responsibly and ethically. Book 3 delves into the principles of responsible data acquisition, ensuring you gather valuable information while maintaining the highest ethical standards. Learn how to identify vulnerabilities and strengthen security.���� BOOK 4: RECONNAISSANCE PRO: THE ULTIMATE HANDBOOK FOR ELITE INFORMATION GATHERERSAre you ready to become an elite information gatherer? This ultimate handbook will elevate your skills to the highest echelons of the field. Uncover the secrets and tactics employed by the best ethical hackers, propelling you into the realm of elite information gatherers.���� Why Choose the "RECONNAISSANCE 101" Book Bundle?- Comprehensive Knowledge: Covering everything from the basics to elite strategies, this bundle provides a complete understanding of reconnaissance and ethical hacking.- Responsible Hacking: Embrace ethical principles, responsible disclosure, and legal compliance in your journey to become an ethical hacker.- Expert Guidance: Benefit from the expertise of seasoned professionals who have distilled their knowledge into these invaluable books.- Stay Ahead: In the ever-evolving world of cybersecurity, staying updated is crucial. This bundle equips you with the latest insights and strategies.Don't miss this opportunity to become a master of reconnaissance and ethical hacking. Whether you're a beginner or looking to sharpen your skills, the "RECONNAISSANCE 101" Book Bundle is your ticket to success in the exciting world of ethical hacking. Secure your copy today and unlock the doors to a promising cybersecurity career!

9 特價1833
立即代訂
下次再買

From PHP to Ruby on Rails

Packt 出版
2023/11/16 出版

Become a proficient Ruby developer and expand your skill set by exploring the world of Ruby from a PHP developer's perspectiveKey FeaturesUnderstand the notable differences between Ruby and PHP developmentGain practical experience and proficiency in Ruby by contrasting PHP examples with their equivalent Ruby counterpartsExplore how Ruby integrates into the Ruby on Rails framework and make insightful comparisons with PHP frameworksPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionAre you a PHP developer looking to take your first steps into the world of Ruby development? From PHP to Ruby on Rails will help you leverage your existing knowledge to gain expertise in Ruby on Rails. With a focus on bridging the gap between PHP and Ruby, this guide will help you develop the Ruby mindset, set up your local environment, grasp the syntax, master scripting, explore popular Ruby frameworks, and find out about libraries and gems.This book offers a unique take on Ruby from the perspective of a seasoned PHP developer who initially refused to learn other technologies, but never looked back after taking the leap. As such, it teaches with a language-agnostic approach that will help you feel at home in any programming language without learning everything from scratch. This approach will help you avoid common mistakes such as writing Ruby as if it were PHP and increase your understanding of the programming ecosystem as a whole.By the end of this book, you'll have gained a solid understanding of Ruby, its ecosystem, and how it compares to PHP, enabling you to build robust and scalable applications using Ruby on Rails.What you will learnSet up a robust development environment by configuring essential tools and dependenciesUnderstand the MVC model and learn effective techniques for working with Ruby libraries and frameworksIntegrate authentication functionality into your Rails application by leveraging gemsFind out how to process data from forms, URLs, and sessions within a Ruby on Rails applicationGain proficiency in using functions and gems for debugging and troubleshooting your Rails projectCreate a simple Rails application, run it, and debug it in production modeWho this book is forThis book is for PHP developers new to Ruby and Ruby on Rails. Whether you're a seasoned PHP developer or just starting out, this book will show you how you can transfer your existing PHP knowledge to Ruby and build web applications using the powerful Ruby on Rails framework.Table of ContentsUnderstanding the Ruby Mindset and CultureSetting Up Our Local EnvironmentComparing Basic Ruby Syntax to PHPRuby Scripting versus PHP ScriptingLibraries and Class SyntaxLibraries vs GemsRuby Class SyntaxDebugging RubyBringing It All TogetherConsiderations for Hosting Rails Applications vs PHP Applications

9 特價1697
立即代訂
下次再買

5G and Cloud

Ingram 出版
2023/11/16 出版

The convergence of fifth-generation wireless (5G) technology and cloud computing heralds the advent of a revolutionary new age in the rapidly developing field of telecommunications. This exciting confluence of cutting-edge technology is altering the ways in which we interact with one another, communicate with one another, and conduct business. The article "5G and Cloud Synergy Transforms Telecommunications" dives into this convergence, illuminating the significant effect that it has on the world. The introduction of 5G, also known as the fifth generation of wireless technology, has caused a significant upheaval in the field of telecommunications. The foundation of the digital ecosystem of the next generation is comprised of its characteristics, which include vastly improved data transfer rates, decreased latency, and massively enhanced device connectivity. The first part of the book is dedicated to demystifying 5G by elucidating its theoretical foundations and demonstrating the numerous opportunities that will become available as a result of its implementation. Readers will learn that 5G technology isn't only about quicker cellphones; rather, it is a catalyst for innovation across a wide variety of industries, including healthcare, manufacturing, transportation, and entertainment. On the other side, cloud computing, a technology that has been around for a while, has emerged as the technology that drives our data-driven world. It provides scalable services that can be used on demand, making it possible for enterprises to store and analyze data with a level of flexibility and efficiency not seen before. This book delves into the fundamentals of cloud computing, elaborating on its various services and deployment types, and shedding light on the crucial role that cloud computing plays in the overall journey toward digital transformation. The combination of fifth-generation wireless (5G) networks with cloud computing forms the core of the story. Readers will develop a deeper understanding, chapter by chapter, of the ways in which these various technologies complement one another. The infrastructure that is produced as a result of the combination of the high-speed and low-latency connections provided by 5G and the massive computational capabilities of the cloud is capable of supporting a wide variety of cutting-edge software programs. The authors dig into real-world case studies, illuminating the triumphs achieved and the difficulties encountered by pioneers who have successfully exploited this synergy. Industries across the board, from telemedicine to smart cities to entertainment and agriculture, are discovering new methods to harness this potential, thereby ushering in a new digital era. In the same way as with any other technical advancement, protecting one's privacy and security is of the utmost importance. This book analyzes the difficulties posed by data protection in 5G and cloud contexts and investigates several methods for ensuring data safety. In addition to this, it guides readers through the complicated world of regulatory frameworks and compliance, so ensuring that they are prepared to handle an environment that is both complex and always changing. In addition, the article "5G and Cloud Synergy Transforms Telecommunications" investigates the consequences for the entire world. In addition to delving into the geopolitical climate of the telecommunications industry, this article investigates the potential for these technologies to close the digital divide by opening up new doors for less developed countries.

9 特價957
立即代訂
下次再買

Wireless Security Masterclass

Ingram 出版
2023/11/15 出版

Introducing the "Wireless Security Masterclass" Book Bundle - Your Path to Becoming a Wireless Security Expert!���� Are you concerned about the security of your wireless networks? ���� Want to learn the ins and outs of penetration testing and ethical hacking? ���� Seeking a comprehensive resource to master wireless security from beginner to expert level?Look no further! Our "Wireless Security Masterclass" book bundle is your one-stop solution to mastering the art of wireless network security. With four carefully curated books, this bundle caters to beginners, intermediate learners, and seasoned experts alike.���� Book 1 - Wireless Network Security Essentials: A Beginner's Guide If you're new to wireless security, this book is your starting point. Learn the fundamentals of encryption, authentication, and security protocols. Lay a solid foundation to build your expertise.���� Book 2 - Hacking Wi-Fi Networks: Intermediate Techniques for Penetration Testers Ready to take your skills to the next level? Explore intermediate-level techniques used by ethical hackers. Crack Wi-Fi passwords, conduct wireless reconnaissance, and understand advanced attacks.���� Book 3 - Advanced Wireless Exploitation: A Comprehensive Guide to Penetration Testing Ready to delve into the advanced realm? This book equips you with skills to identify hidden SSIDs, exploit Wi-Fi protocol weaknesses, and evade intrusion detection systems.���� Book 4 - Wireless Network Mastery: Expert-Level Penetration Testing and Defense Reach the pinnacle of wireless security mastery. Explore expert-level penetration testing, advanced network mapping, and the art of exploiting misconfigurations. Learn how to maintain persistent access and employ anti-forensic techniques.���� Why Choose the "Wireless Security Masterclass" Bundle?✅ Comprehensive Learning: Cover all aspects of wireless security from beginner to expert. ✅ Real-World Techniques: Learn practical skills used by ethical hackers and penetration testers. ✅ Expert Authors: Our books are authored by experts with extensive industry experience. ✅ Ongoing Updates: Stay current with the latest wireless security trends and techniques. ✅ Career Advancement: Boost your career prospects by becoming a certified wireless security professional.���� Get Started Today! ����Invest in your future, enhance your skills, and fortify your networks with the "Wireless Security Masterclass" bundle. Click the link below to order now and embark on your journey to wireless security mastery!

9 特價1833
立即代訂
下次再買

OSINT 101 Handbook

Ingram 出版
2023/11/15 出版

Unlock the World of Intelligence with the "OSINT 101 Handbook" Bundle!Discover the power of Open Source Intelligence (OSINT) with our comprehensive book bundle-your key to expert-level intelligence gathering, advanced reconnaissance, threat assessment, and counterintelligence.���� BOOK 1 - OSINT Fundamentals: A Beginner's Guide Embark on your OSINT journey with this beginner's guide. Learn the significance of open source intelligence, master fundamental techniques, and acquire the skills to navigate the digital landscape.���� BOOK 2 - Advanced OSINT Strategies: Mastering Techniques Take your OSINT skills to the next level! Craft complex search queries, harness the power of automation, and explore expert-level OSINT tools. Elevate your expertise and unlock the true potential of OSINT.���� BOOK 3 - Digital Footprint Analysis: Profiling and Investigations Uncover the secrets hidden within digital footprints. Dive into behavioral analysis, extract insights from social media activity, and become a master of profiling and investigations.���� BOOK 4 - Expert OSINT: Cyber Reconnaissance and Threat Intelligence Immerse yourself in the world of cyber reconnaissance and threat intelligence. Explore real-world examples of expert-level operations and safeguard critical assets from cyber adversaries.With the "OSINT 101 Handbook" bundle, you'll: ✅ Master OSINT techniques from beginner to expert. ✅ Uncover hidden threats and make informed decisions. ✅ Navigate the complex digital terrain with confidence. ✅ Elevate your intelligence gathering and reconnaissance skills. ✅ Harness OSINT for cybersecurity and threat assessment.Don't miss out on this opportunity to become an OSINT expert. Get the "OSINT 101 Handbook" bundle today and unlock the world of intelligence!

9 特價1833
立即代訂
下次再買

The Social Media Entrepreneur

Ingram 出版
2023/11/15 出版

Title: "The Social Media Entrepreneur: Building Brands Online"Description: Unlock the secrets of social media entrepreneurship with this comprehensive guide. From defining your niche and creating compelling content to growing your audience, monetizing your online presence, and staying relevant in the ever-evolving digital landscape, this book provides a roadmap for success. Learn how to build a strong brand identity, overcome challenges, and leverage your passion to shape the future of your online brand. Discover the power of authenticity and innovation as you embark on an exciting journey to create, inspire, and impact in the digital world.

9 特價1539
立即代訂
下次再買

Demystifying Devsecops in Aws

Paul,Picklu  著
Ingram 出版
2023/11/14 出版

"Demystifying DevSecOps in AWS" is a practical and insightful handbook designed to empower you in your pursuit of securing modern enterprises within Amazon Web Services (AWS) environments. This book delves deep into the world of DevSecOps, offering a thorough understanding of its fundamentals, principles, methodologies, and real-world implementation strategies. It equips you with the knowledge and skills needed to seamlessly integrate security into your development and operations workflows, fostering a culture of continuous improvement and risk mitigation. With step-by-step guidance and real-world examples, this comprehensive guide navigates the intricate landscape of AWS, showcasing how to leverage its services and tools to enhance security throughout the DevSecOps lifecycle.

9 特價1833
立即代訂
下次再買

Hands-On Artificial Intelligence for IoT

Lulu.com 出版
2023/11/14 出版

The reader starts by learning the basics of AI and IoT devices and how to read IoT data from various sources and streams. Then we introduce various ways to implement AI with examples in TensorFlow, scikit learn, and Keras. The topics covered include machine learning, deep learning, genetic algorithms, reinforcement learning, and generative adversarial networks. We also show the reader how to implement AI using distributed technologies and on the cloud. Once the reader is familiar with AI techniques, then we introduce various techniques for different kinds of data generated and consumed by IoT devices, such as time series, images, audio, video, text, and speech. After explaining various AI techniques on various kinds of IoT data, finally, we share some case studies with the reader from the four major categories of IoT solutions: personal IoT, home IoT, industrial IoT, and smart city IoT.

9 特價1901
立即代訂
下次再買

Computer Security - Esorics 2023

Gene,Tsudik  著
Springer 出版
2023/11/14 出版

The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which took place in The Hague, The Netherlands, during September 25-29, 2023. The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows: Part I: Crypto. Part II: Network, web and internet; privacy; and remote. Part III: Attacks; blockchain; and miscellaneous. Part IV: Machine learning; software and systems security.

9 特價4175
立即代訂
下次再買

Translation Technology in Accessible Health Communication

Meng,Ji  著
Ingram 出版
2023/11/13 出版

Digital health translation is an important application of machine translation and multilingual technologies, and there is a growing need for accessibility in digital health translation design for disadvantaged communities. This book addresses that need by highlighting state-of-the-art research on the design and evaluation of assistive translation tools, along with systems to facilitate cross-cultural and cross-lingual communications in health and medical settings. Using case studies as examples, the principles of designing assistive health communication tools are illustrated. These are (1) detectability of errors to boost user confidence by health professionals; (2) customizability for health and medical domains; (3) inclusivity of translation modalities to serve people with disabilities; and (4) equality of accessibility standards for localised multilingual websites of health contents. This book will appeal to readers from natural language processing, computer science, linguistics, translation studies, public health, media, and communication studies. This title is available as open access on Cambridge Core.

9 特價4206
立即代訂
下次再買

Practical Java Programming with ChatGPT

Alan S,Bluck  著
Ingram 出版
2023/11/09 出版

How to use ChatGPT to write fast validated Java codeDESCRIPTIONEmbark on a Fascinating Journey into AI-Powered Software Development with ChatGPT. This transformative book challenges the conventional speed of software development by showcasing a diverse array of inquiries directed at cutting-edge AI tools, including Ask AI, ChatGPT 3.5, Perplexity AI, Microsoft Bing Chatbot based on ChatGPT 4.0, and the Phed mobile app. Diving deep into the integration of Java and ChatGPT, this book provides readers with a comprehensive understanding of their synergy in programming. Each carefully crafted question serves as a testament to ChatGPT's exceptional ability to swiftly generate Java programs. The resulting code undergoes rigorous validation using the latest open-source Eclipse IDE and the Java language, empowering readers to craft efficient code in a fraction of the usual time. The journey doesn't end there-this book looks ahead to the promising future of ChatGPT, unveiling exciting potential enhancements planned by OpenAI. These innovations are poised to usher in even more formidable AI-driven capabilities for software development. TABLE OF CONTENTS1. Getting Started with ChatGPT2. Java Programming - Best Practices as Stated by ChatGPT3. Developing Java Code for Utilizing the ChatGPT API4. Java Program for Using Binary Search5. Installation of the Latest Open-source Eclipse Java IDE6. ChatGPT Generated Java Code for Fourier Analysis7. ChatGPT Generated Java Code for the Fast Fourier Transform8. ChatGPT Generated Java Code for Indexing a Document9. ChatGPT-generated Java Code for Saltikov Particle Distribution10. ChatGPT-generated Java Code to Invert a Triangular Matrix11. ChatGPT Generated Java Code to Store a Document in the IBM FileNet System12. Conclusions and the Future of ChatGPT for Program Development13. Appendices for Additional QuestionsIndex

9 特價1743
立即代訂
下次再買

Social Media and Cultural Influence

Imran,Khan  著
Ingram 出版
2023/11/09 出版

Every book has its own individual message and goal in the broad world of literature. The theme and aim of a book serve as its basis, defining the narrative, characters, and ideas within its pages. Our investigation delves into the fascinating world of themes and goals, illuminating their significance in the realms of narrative and information transfer. Theme StatementThe central idea or feeling that drives the story forward is known as the book's theme. It's the story's driving force, the thing everyone is talking about. Love, friendship, courage, redemption, societal conflicts, and existential musings are just a few examples of possible themes. The story's essence can be better grasped when the story's theme is clearly articulated and serves as a lens through which the story's events and characters can be interpreted. Discovering MeaningWhile a book's topics are its intellectual and emotional backbone, the book's purpose is what drives its creation. Authors embark on their creative travels with various purposes, be it to entertain, educate, provoke thinking, challenge society conventions, or push for change. When readers know why they're reading a book, they're better able to analyze it critically and get fully invested in the subject matter. The Reflective Power of Literature on CultureIn many ways, literature is a reflection of the times in which it was produced. They are powerful means of commenting on society and illuminating the issues, ideas, and cultural nuances of the time. Authors illustrate the nuances of the human experience via skillfully weaved ideas and deliberate storytelling, evoking empathy and compassion in their readers. Literature thus serves as a unifying force in the face of cultural and generational differences. Purpose and Central Ideas across GenresThematic and functional questions can be probed in a variety of ways, depending on the genre. To keep readers on the edge of their seats, a mystery novel's central theme could center on the search for truth and justice. Science fiction explores ideas of the future and frequently considers the moral implications of new technologies. Romance books delve into the nuances of interpersonal relationships and center on universal themes like love, trust, and fortitude. Authors can appeal to a wider range of readers with different expectations and tastes by tailoring their work to various genres. Empowering Readers and Igniting Change Books offer the potential to inspire change. Authors who skillfully weave stories around issues of social injustice, equality, or environmental conservation can spark debate, confront biases, and galvanize audiences to take action. Literature can serve as a catalyst for social advancement when its themes and goals are in harmony, prompting its readers to examine their own values and consider how they might make a good difference in the world.

9 特價872
立即代訂
下次再買

Data Privacy Across Borders

Ingram 出版
2023/11/08 出版

Apply a step-by-step approach to develop your organization's global data privacy strategy. Data is everywhere. Organizations continuously use data in new ways, often generating cross-border data flows. At the same time, concern about the use of personal data is growing. Every year, more countries adopt data privacy laws and our expectations increase on how companies respect our private data. A data privacy strategy is no longer just about compliance-it is good business. A clear and effective data privacy program can build customer trust and strengthen a brand's reputation. We cover the art of crafting an effective data privacy strategy that aligns with business objectives and brand positioning yet ensures compliance with relevant laws. Gain a foundational understanding of data privacy issues as a prerequisite to developing a custom strategy. Use our review of the major legislations around the world to guide you in creating a data privacy strategy. Benefit from our insights on the relation between data privacy programs and a data strategy, an IT strategy, and risk management frameworks. Be able to apply methodologies to help you stay on track, such as Privacy by Design and data minimization. Incorporate the cultural and ethical considerations of data privacy across different countries where you may operate. Know how emerging privacy enhancing technologies (PETs) can be powerful tools in implementing your strategy, and pinpoint the intersection between data privacy and AI.The stakes for data privacy have never been higher and this book will help you up your game.

9 特價1708
立即代訂
下次再買

Gray Hat

Ingram 出版
2023/11/08 出版

���� GRAY HAT VULNERABILITY SCANNING & PENETRATION TESTING ����Are you ready to dive into the fascinating world of ethical hacking and cybersecurity? Look no further than the "Gray Hat Vulnerability Scanning & Penetration Testing" book bundle. ���� Book 1: Gray Hat Essentials - A Beginner's Guide to Vulnerability Scanning- Start your journey with the fundamentals of vulnerability scanning.- Learn how to identify weaknesses and assess risks in digital systems.- Understand the essential tools and techniques used by cybersecurity professionals.- Perfect for beginners looking to build a strong foundation in cybersecurity.���� Book 2: Intermediate Gray Hat Tactics - Penetration Testing Demystified- Elevate your skills to the next level with this intermediate guide.- Explore the tactics and techniques used by ethical hackers to uncover vulnerabilities.- Gain hands-on experience in conducting penetration tests.- Ideal for those looking to expand their knowledge and career prospects in cybersecurity.���� Book 3: Advanced Gray Hat Exploits - Beyond the Basics- Take a deep dive into advanced exploits and vulnerabilities.- Learn how real-world hackers think and strategize.- Discover sophisticated techniques to secure systems against advanced threats.- Perfect for professionals seeking to confront complex cybersecurity scenarios.���� Book 4: Mastering Gray Hat Ethical Hacking - Expert-Level Penetration Testing- Become a cybersecurity expert with the final volume in the bundle.- Master advanced exploitation techniques and post-exploitation strategies.- Designed for those aiming to reach the pinnacle of ethical hacking mastery.

9 特價1833
立即代訂
下次再買

Cloud Penetration Testing for Red Teamers

Kim,Crawley  著
Packt 出版
2023/11/08 出版

Get to grips with cloud exploits, learn the fundamentals of cloud security, and secure your organization's network by pentesting AWS, Azure, and GCP effectivelyKey Features: - Discover how enterprises use AWS, Azure, and GCP as well as the applications and services unique to each platform- Understand the key principles of successful pentesting and its application to cloud networks, DevOps, and containerized networks (Docker and Kubernetes)- Get acquainted with the penetration testing tools and security measures specific to each platform- Purchase of the print or Kindle book includes a free PDF eBookBook Description: With AWS, Azure, and GCP gaining prominence, understanding their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you'll explore the intricacies of cloud security testing and gain valuable insights into how pentesters evaluate cloud environments effectively.In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set.By the end of this cloud security book, you'll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments.What You Will Learn: - Familiarize yourself with the evolution of cloud networks- Navigate and secure complex environments that use more than one cloud service- Conduct vulnerability assessments to identify weak points in cloud configurations- Secure your cloud infrastructure by learning about common cyber attack techniques- Explore various strategies to successfully counter complex cloud attacks- Delve into the most common AWS, Azure, and GCP services and their applications for businesses- Understand the collaboration between red teamers, cloud administrators, and other stakeholders for cloud pentestingWho this book is for: This book is for aspiring Penetration Testers, and the Penetration Testers seeking specialized skills for leading cloud platforms-AWS, Azure, and GCP. Those working in defensive security roles will also find this book useful to extend their cloud security skills.Table of Contents- How Do Enterprises Utilize and Implement Cloud Networks?- How Are Cloud Networks Cyber Attacked?- Key Concepts for Pentesting Today's Cloud Networks- Security Features in AWS- Pentesting AWS Features through Serverless Applications and Tools- Pentesting Containerized Applications in AWS- Security Features in Azure- Pentesting Azure Features through Serverless Applications and Tools- Pentesting Containerized Applications in Azure- Security Features in GCP- Pentesting GCP Features through Serverless Applications and Tools- Pentesting Containerized Applications in GCP- Best Practices and Summary

9 特價1835
立即代訂
下次再買

Web Application Security

Ingram 出版
2023/11/08 出版

In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense. In this revised and updated second edition, he examines dozens of related topics, from the latest types of attacks and mitigations to threat modeling, the secure software development lifecycle (SSDL/SDLC), and more. Hoffman, senior staff security engineer at Ripple, also provides information regarding exploits and mitigations for several additional web application technologies such as GraphQL, cloud-based deployments, content delivery networks (CDN) and server-side rendering (SSR). Following the curriculum from the first book, this second edition is split into three distinct pillars comprising three separate skill sets: Pillar 1: Recon--Learn techniques for mapping and documenting web applications remotely, including procedures for working with web applications Pillar 2: Offense--Explore methods for attacking web applications using a number of highly effective exploits that have been proven by the best hackers in the world. These skills are valuable when used alongside the skills from Pillar 3. Pillar 3: Defense--Build on skills acquired in the first two parts to construct effective and long-lived mitigations for each of the attacks described in Pillar 2.

9 特價2257
立即代訂
下次再買

Advances in Cryptology - Asiacrypt 2023

Jian,Guo  著
Springer 出版
2023/11/07 出版

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs andsecurity models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

9 特價4436
立即代訂
下次再買

Advances in Cryptology - Asiacrypt 2023

Jian,Guo  著
Springer 出版
2023/11/07 出版

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs andsecurity models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

9 特價4697
立即代訂
下次再買
頁數35/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing