Bots & Bosses
Bots & Bosses: The Hilariously Chaotic Symphony of Management in the Age of AI is a comprehensive yet accessible guide that helps managers understand how AI can enhance their work rather than threaten it. This book helps to illuminate how AI can automate routine tasks, help with data-driven decision-making, and even strengthen the personalization of employee management without erasing the human touch that is so integral to effective leadership.Moreover, addressing the ethical considerations when implementing AI is crucial, as these discussions are often overlooked yet vitally important. This book seeks to instill a sense of responsibility in readers, making them aware of their role in ensuring AI is used ethically and judiciously.This book approaches this potentially intimidating topic with humor and relatability to engage a broad range of readers. We hope this book provides knowledge to facilitate understanding, promote ethical AI use, and, hopefully, contribute to AI's practical and positive implementation in management.
Accelerators for Convolutional Neural Networks
Accelerators for Convolutional Neural Networks Comprehensive and thorough resource exploring different types of convolutional neural networks and complementary accelerators Accelerators for Convolutional Neural Networks provides basic deep learning knowledge and instructive content to build up convolutional neural network (CNN) accelerators for the Internet of things (IoT) and edge computing practitioners, elucidating compressive coding for CNNs, presenting a two-step lossless input feature maps compression method, discussing arithmetic coding -based lossless weights compression method and the design of an associated decoding method, describing contemporary sparse CNNs that consider sparsity in both weights and activation maps, and discussing hardware/software co-design and co-scheduling techniques that can lead to better optimization and utilization of the available hardware resources for CNN acceleration. The first part of the book provides an overview of CNNs along with the composition and parameters of different contemporary CNN models. Later chapters focus on compressive coding for CNNs and the design of dense CNN accelerators. The book also provides directions for future research and development for CNN accelerators. Other sample topics covered in Accelerators for Convolutional Neural Networks include: How to apply arithmetic coding and decoding with range scaling for lossless weight compression for 5-bit CNN weights to deploy CNNs in extremely resource-constrained systems State-of-the-art research surrounding dense CNN accelerators, which are mostly based on systolic arrays or parallel multiply-accumulate (MAC) arrays iMAC dense CNN accelerator, which combines image-to-column (im2col) and general matrix multiplication (GEMM) hardware acceleration Multi-threaded, low-cost, log-based processing element (PE) core, instances of which are stacked in a spatial grid to engender NeuroMAX dense accelerator Sparse-PE, a multi-threaded and flexible CNN PE core that exploits sparsity in both weights and activation maps, instances of which can be stacked in a spatial grid for engendering sparse CNN accelerators For researchers in AI, computer vision, computer architecture, and embedded systems, along with graduate and senior undergraduate students in related programs of study, Accelerators for Convolutional Neural Networks is an essential resource to understanding the many facets of the subject and relevant applications.
Cybersecurity Operations and Fusion Centers
With its comprehensive analysis of all aspects of the SOFC, from team building to incident response, this book is an invaluable resource to establish and operate a successful SOFC. The everyday operations of a SOFC are thoroughly examined, including the monitoring/detection process, security operations, incident response and remediation.
Blockchain and Trustworthy Systems
​The two-volume set CCIS 1896 and 1897 constitutes the refereed post-conference proceedings of the 5th International Conference on Blockchain and Trustworthy Systems, BlockSys 2023, which took place in Haikou, China during August 8-10, 2023. The 45 revised full papers presented in these proceedings were carefully reviewed and selected from 93 submissions. The papers are organized in the following topical sections: Part I: Anomaly detection on blockchain; edge intelligence and metaverse services; blockchain system security; empirical study and surveys; federated learning for blockchain. Part II: AI for blockchain; blockchain applications; blockchain architecture and optimization; protocols and consensus.
Cognitive Systems and Information Processing
The two-volume set CCIS 1918 and 1919 constitutes the refereed post-conference proceedings of the 8th International Conference on Cognitive Systems and Information Processing, ICCSIP 2023, held in Luoyang, China, during August 10-12, 2023. The 52 full papers presented in these proceedings were carefully reviewed and selected from 136 submissions. The papers are organized in the following topical sections: Volume I: Award; Algorithm & Control; and Application.Volume II: Robotics & Bioinformatics; and Vision.
Information Security Applications
This book constitutes the revised selected papers from the 24th International Conference on Information Security Applications, WISA 2023, held in Jeju Island, South Korea, during August 23-25, 2023.The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Cryptography; network and application security; privacy and management; attacks and defenses; post-quantum cryptography and quantum cryptanalysis.
Blockchain and Trustworthy Systems
​The two-volume set CCIS 1896 and 1897 constitutes the refereed post-conference proceedings of the 5th International Conference on Blockchain and Trustworthy Systems, BlockSys 2023, which took place in Haikou, China during August 8-10, 2023. The 45 revised full papers presented in these proceedings were carefully reviewed and selected from 93 submissions. The papers are organized in the following topical sections: Part I: Anomaly detection on blockchain; edge intelligence and metaverse services; blockchain system security; empirical study and surveys; federated learning for blockchain. Part II: AI for blockchain; blockchain applications; blockchain architecture and optimization; protocols and consensus.
Cognitive Systems and Information Processing
The two-volume set CCIS 1918 and 1919 constitutes the refereed post-conference proceedings of the 8th International Conference on Cognitive Systems and Information Processing, ICCSIP 2023, held in Luoyang, China, during August 10-12, 2023. The 52 full papers presented in these proceedings were carefully reviewed and selected from 136 submissions. The papers are organized in the following topical sections: Volume I: Award; Algorithm & Control; and Application.Volume II: Robotics & Bioinformatics; and Vision.
Secure Multi-Party Computation Against Passive Adversaries
This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authors present seminal possibility and feasibility results in this model and includes formal security proofs. Even though the passive corruption model may seem very weak, achieving security against such a benign form of adversary turns out to be non-trivial and demands sophisticated and highly advanced techniques. MPC is a fundamental concept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their private inputs to jointly and securely perform any computation on their inputs. Examples of such computation include, but not limited to, privacy-preserving data mining; secure e-auction; private set-intersection; and privacy-preserving machine learning. MPC protocols emulate the role of an imaginary, centralized trusted third party (TTP) that collects the inputs of the parties, performs the desired computation, and publishes the result. Due to its powerful abstraction, the MPC problem has been widely studied over the last four decades.
Bots & Bytes
Welcome to a delightful journey through the enthralling world of Artificial Intelligence (AI), where humor meets high-tech, and codes crack jokes-Have you ever wondered about the brainy secrets behind your digital assistant or why robots might want to attend school? Dive into the pages of Bots & Bytes: An Introduction to Artificial Intelligence, ChatGPT, and Machine Learning and unearth the captivating stories behind today's intelligent machines.This book is your guide from the whimsical beginnings of Artificial Intelligence (AI) in pop culture to its pivotal role in modern society. Explore how machines learn, the marvel of Neural Networks, and the all-too-human hiccups when algorithms go awry. With a dash of humor, a sprinkle of history, and a dollop of future gazing, we unravel the enigma of Artificial Intelligence (AI).
WEB DEVELOPMENT UNLEASHED A Practical Guide for Beginners
Welcome to "Web Development Unleashed: A Practical Guide for Beginners." In today's digital landscape, the ability to craft web experiences is a valuable skill, and this book is your key to unlocking that potential. Whether you're a complete novice or someone with a budding interest in web development, our goal is to demystify the complexities and guide you through the process of building websites from scratch. You'll embark on a journey that covers the fundamental building blocks: HTML, CSS, and JavaScript. We'll introduce you to the tools and techniques that make web development not just accessible but enjoyable. Along the way, you'll work on practical projects that reinforce your learning and give you the hands-on experience needed to create your own web presence. Responsive design, essential for modern websites, will become second nature as we explore how to make your creations look and function beautifully on all devices. And when your websites are ready for the world, we'll guide you through the steps to host and deploy them. "Web Development Unleashed" is designed to be your companion, providing clarity, guidance, and real-world examples. Whether you're looking to build a personal portfolio, enhance your professional skills, or simply satisfy your curiosity, this book equips you to make your mark on the web. So, let's embark on this exciting journey together, and unleash the web developer in you.
Front-End Web Development Techniques and Trends
In today's digital age, the front-end of a website is often its first impression-a dynamic, engaging interface that captures the user's attention and ensures a seamless browsing experience. "Front-End Web Development: Techniques and Trends" is your guide to mastering this dynamic discipline. This book covers HTML5, CSS3, JavaScript fundamentals, modern techniques like responsive web design, CSS Grid, ES6 JavaScript, and front-end frameworks. You'll also explore web accessibility, cross-browser compatibility, emerging trends, and portfolio building. Whether you're a newcomer or a seasoned developer, this book empowers you with the skills needed to excel in front-end development. Join us on this journey to create modern, accessible, and user-friendly web experiences!
Disinformation in Open Online Media
This book constitutes the refereed proceedings of the 5th Multidisciplinary International Symposium on Disinformation in Open Online Media, MISDOOM 2023, which was held in Amsterdam, The Netherlands, during November 21-22, 2023.The 13 full papers presented in this book were carefully reviewed and selected from 19 submissions. The papers focus on misinformation, disinformation, hate speech, disinformation campaigns, social network analysis, large language models, generative AI, and multi-modal embeddings.
Practical Cloud Security
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud. IBM Distinguished Engineer Chris Dotson shows you how to establish data asset management, identity and access management (IAM), vulnerability management, network security, and incident response in your cloud environment. Learn the latest threats and challenges in the cloud security space Manage cloud providers that store or process data or deliver administrative control Learn how standard principles and concepts--such as least privilege and defense in depth--apply in the cloud Understand the critical role played by IAM in the cloud Use best tactics for detecting, responding, and recovering from the most common security incidents Manage various types of vulnerabilities, especially those common in multicloud or hybrid cloud architectures Examine privileged access management in cloud environments
Typescript Basics
Jumpstart your working knowledge of Typescript with a quick, practical guide and start using this open source, object orientated language with confidence. This book highlights how Typescript works with JavaScript and its frameworks, giving it greater functionality, especially for larger enterprise projects. You'll start by reviewing some fundamentals such as how to run a TypeScript file and compile it to JavaScript as well as understand how it sits within the full ecosystem alongside React, Redux, Angular and Webpack. Using a practical project-led approach, you'll go through key concepts and aspects of Typescript such as compilers, arrays, classes and interfaces. Once you complete the fundamental basics, you'll move onto more complex topics like advanced types. You'll also learn about Decorators, which are a must-have feature in Angular. The book then presents a small To-do list project followed by a larger 'Drag and Drop' project. You'll see howto divide the drag and drop project into small manageable modules and learn to make the project more efficient with Webpack. Lastly, you'll create two more React projects, a party app with React and then one with React and Redux. Typescript Basics reveals how this JavaScript extension is currently the fastest growing language for web development with more and more developers and companies looking to utilize and adopt it within their current workflows and projects. What You'll LearnUnderstand the particulars of Typescript and how it feeds into the JS and Web development eco-systemImplement Typescript for enterprise projectsUse Typescript with practical projects and examplesSee how Typescript interacts with major frameworks like React and Angular Who This Book Is ForThose who want to learn about TypeScript and implement it in their Enterprise or hobby projects with React and Angular. Beginners will find it easy to learn the basic concepts and principles to get started and to progress onto more advanced projects and how to implement them.
Applied Cryptography and Network Security Workshops
This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023.The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops: - 1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023) - 5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023) - 4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023) - 5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023) - 3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023) - 5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023) - 4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023) - 4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023) - 5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023)
Stabilization, Safety, and Security of Distributed Systems
This book constitutes the proceedings of 25th International Symposium, SSS 2023, in Jersey City, NJ, USA, in October 2023.The 32 full papers presented together with 8 short papers were carefully reviewed and selected from 78 submissions. The conference was organized into five tracks reflecting major trends related to the conference: (i) Track A. Self-stabilizing Systems: Theory and Practice, (ii) Track B. Distributed and Concurrent Computing: Foundations, Fault-Tolerance and Scalability, (iii) Track C. Cryptogrophy and Security, (iv) Track D. Dynamic, Mobile and Nature-Inspired Computing Mobile Agents, (v) and Distributed Databases.
Computer Performance Engineering and Stochastic Modelling
This book constitutes the refereed proceedings of the 19th European Workshop on Computer Performance Engineering, EPEW 2023, and 27th International Conference on Analytical and Stochastic Modelling Techniques and Applications, ASMTA 2023, held in Florence, Italy, in June 2023.The 26 papers presented in this volume were carefully reviewed and selected from 35 submissions. The papers presented at the workshop reflect the diversity of modern performance engineering. The sessions covered a wide range of topics including robustness analysis, machine learning, edge and cloud computing, as well as more traditional topics on stochastic modelling, techniques and tools.
Blockchain - Icbc 2023
This book constitutes the proceedings of the 6th International Conference on Blockchain, ICBC 2023, held as part of the Services Conference Federation, SCF 2023, held in Honolulu, HI, USA, during September 23-26, 2023. The 9 full papers presented in this book were carefully reviewed and selected from 18 submissions. The conference focuses on new blockchain architecture, platform constructions, blockchain development, and blockchain services technologies as well as standards and blockchain services innovation lifecycle, including enterprise modeling, business consulting, solution creation, services orchestration, services optimization, services management, services marketing, and business process integration and management.
Artificial Intelligence and Mobile Services - Aims 2023
This book constitutes the refereed proceedings of the 12th International Conference on Artificial Intelligence and Mobile Services, AIMS 2023, Held as Part of the Services Conference Federation, SCF 2023, Honolulu, HI, USA, September 23-26, 2023.The 9 full papers presented together and selected from 16 submissions. The conference focuses on AI modeling; AI analysis; AI & mobile applications; AI architecture; AI management; AI engineering; mobile backend as a service (MBaaS); and user experience of AI & mobile services.
Crafting Docs for Success
Developer documentation is a powerful tool in developer relations because it provides all the necessary information during the onboarding process and keeps your users informed on changes such as release notes, status reports and new and updated topics. Using a design thinking approach, this book aims to provide an easy to follow blueprint for building successful developer documentation by using the award winning platformOS developer portal as inspiration.You'll work with practical usable templates, workflows, and tools validated and peer-reviewed by international experts in the fields of documentation, technical writing, developer relations, and UX design. This book reveals the many factors that must be considered while crafting developer documentation, such as hitting the right target audience, designing a seamless onboarding experience, and selecting the right workflows and data analysis methods. You'll delve into this complex mix of topics, each with its unique considerations, and understand why it's difficult for those working on developer documentation to understand the process, as well as all the necessary ingredients, tools, and resources to overcome that challenge. Crafting Docs for Success is your one-stop resource for empowering your team and community to contribute and help maintain your documentation, as well as further improve diversity and inclusion. What You'll LearnExamine how user research facilitates documentation developmentUtilize design thinking, community-driven documentation, and Docs as Code Understand editorial workflows and what happens at each stepWrite a style guide from scratch and use it for content productionReview how methods and strategies fall into place during technical implementationWho This Book Is ForSoftware developersand designers, documentation maintainers and managers, technical writers, developer relations practitioners and advocates, technical community managers, developer marketers, and start-up founders, CTOs, and CEOs
Creative Alchemy
Step into a world where art meets artificial intelligence, imagination merges with algorithms, and creativity knows no bounds. "Creative Alchemy: Unleashing Generative Al's Artistic Potential" is your passport to the forefront of artistic innovation, a compelling journey through the captivating realm of generative AI. Within these pages, you'll uncover the transformative power of AI in the world of art and creativity. Witness how machine learning and neural networks redefine artistic expression, breathing life into paintings, poetry, and music that challenge the boundaries of human creativity. Explore the foundations of generative AI, demystifying the inner workings of autoencoders, GANs, and recurrent neural networks. Delve into the depths of text generation, where language models craft stories, dialogues, and poetry that resonate with the soul. Yet, as we traverse this captivating landscape, we confront ethical dilemmas, copyright difficulties, and the delicate interplay between human and machine creativity. "Creative Alchemy: Unleashing Generative Al's Artistic Potential" navigates these complex waters, providing insight into the responsible use of AI in the arts. Prepare to be inspired, challenged, and enthralled as you embark on a journey into the limitless world of artistic potential. "Creative Alchemy: Unleashing Generative Al's Artistic Potential" is a testament to the fusion of human ingenuity and machine intelligence, a vivid reminder that the future of art is being redefined, one algorithm at a time.
HTML and CSS Fundamentals
The World Wide Web has become an integral part of our lives, and at its core are two essential languages: HTML (HyperText Markup Language) and CSS (Cascading Style Sheets). "HTML and CSS Fundamentals" is your key to understanding and mastering these foundational web development languages. Whether you're new to web development or an experienced professional, this book will empower you to create stunning web experiences from scratch. It covers everything from the basics to advanced techniques and best practices. Join us on this journey through the fascinating world of web development, where you'll learn to build, design, and deploy websites with confidence. Welcome to "HTML and CSS Fundamentals." Let's get started!
Understanding Analog Side Channels Using Cryptography Algorithms
This book offers the latest research results on analog side channels and their usage in cybersecurity. It demystifies analog side channels and demonstrates new use cases for them. The first part of this book discusses how analog side channels are generated, the physics behind it, the modeling and measurements of analog side channels, and their analogies to wireless communication systems. The second part of this book introduces new applications that benefit from leveraging side channels. In addition to breaking cryptography algorithms, it demonstrates how analog side channels can be used for malware detection, program profiling, hardware profiling, hardware/software attestation, hardware identification, and hardware Trojan detection.Side channel is one of the methods for obtaining information about program execution. Traditionally, they are used in computer science to extract information about a key in cryptographic algorithms. What makes them different from other ways of extracting information about program execution is that side channels rely on how a system implements program execution, rather than what the program's algorithm specifies. Analog side channels are particularly powerful because they are not easy to suppress or detect that someone is collecting information from the system. Although they are very powerful tools, they are poorly understood.This book targets advanced level students in computer science and electrical engineering as a textbook. Researchers and professionals working with analog side channels, how to model them, measure them, improve signal to noise ratio, and invent new signal processing techniques can also use this book. Computer scientists and engineers who want to learn new applications of side channels to improve system security, new techniques for breaking cryptography keys, new techniques for attestation, and new techniques for hardware Trojan detection will also want to purchase this book.
Intelligent Systems for IoE Based Smart Cities
The book content represents comprehensive exploration of the transformative potential and challenges of IoE-based smart cities, fueled by Artificial Intelligence (AI) and Machine Learning (ML) innovations. Key Topics: -Physical layer design considerations that underpin smart city infrastructure-Enabling technologies for intelligent systems within the context of smart computing environments-Smart sensors and actuators, their applications, challenges, and future trends in IoE-based smart cities-Applications, enabling technologies, challenges, and future trends of IoE for smart cities.-The integration of Artificial Intelligence, Natural Language Processing, and smart cities for enhanced urban experiences-Machine learning-based intrusion detection techniques for countering attacks on the Internet of Vehicles-Smartphone-based indoor positioning applications using trilateration and the role of sensors in IoT ecosystems-IoT, blockchain, and cloud-based technology for secure frameworks and data analytics-Blockchain and smart contracts in shaping the future of smart cities. This is a timely reference for researchers, professionals, and students interested in the convergence of IoT, intelligent systems and urban studies into smart city planning and design.
Advances in Optical Networks and Components
Aimed as an expert guide for students, researchers and practicing engineers, this books covers the advanced concepts, of network security, survivability and reliability of optical networks, and priority schemes used in wavelength routing.
Hybridity, Conflict, and the Global Politics of Cybersecurity
Cyberspace has become the ultimate frontier and central issue of international conflict, geopolitical competition, and security. Emerging threats and technologies continuously challenge the prospect of an open, secure, and free cyberspace. Additionally, the rising influence of technology on society and culture increasingly pushes international diplomacy to establish responsible state behavior in cyberspace and internet governance against the backdrop of fragmentation and polarization. In this context, novel normative practices and actors are emerging both inside and outside the conventional sites of international diplomacy and global governance.In this open access title, Fabio Cristiano and Bibi van den Berg explore the hybridity and conflict inherent to these recent processes of remodulation of the global politics of cybersecurity by analyzing emerging normative practices, threats and technologies, and actors. Through this comprehensive analysis, this edited volume ultimately sheds light on the problematic technical logic of emergence that informs the global politics of cybersecurity and delineates novel normative paths for cyberspace moving forward. The ebook editions of this book are available open access under a CC BY-NC-ND 4.0 licence on bloomsburycollections.com. Open access was funded by Leiden University
Secure It Systems
This book constitutes the proceedings of the 28th Nordic Conference, NordSec 2023, held in Oslo, Norway, during November 16-17, 2023. The 18 full papers included in this volume were carefully reviewed and selected from 55 submissions. This volume focuses on a broad range of topics within IT security and privacy.
Attribute-Based Encryption (Abe)
Attribute-based Encryption (ABE) Enables readers to understand applications of attribute-based encryption schemes in cloud computing with the support of blockchain technology With a focus on blockchain technology, Attribute-based Encryption (ABE) provides insight into the application of attribute-based encryption (ABE) schemes, discussing types of blockchains, fundamentals of blockchain, and how blockchains are constructed. Comprised of 16 chapters, the text provides an overview of the components that go into creating a dual ABE system of encryption proofs within the following: composite bilinear groups, dual pairing vector space framework, matrix pairing framework, framework for matrix pairing, and the application of cryptographic scheme on blockchain. The team of authors discuss the basic construction components of ABE and share the security models, including the selective and semi- adaptive security models, applying these to either prime order or composite order groups. The book also discusses the tools used for converting a composite order ABE scheme to prime order and an adaptive secure ABE scheme based on prime order. In Attribute-based Encryption (ABE), readers can expect to find information on: Mathematical background of ABE, covering group and cyclic group, elliptic curves, curve selection, supersingular curves, ordinary curves, and weil and tate pairing Basic construction components of ABE, covering access structure, monotone Boolean formula, linear secret-sharing scheme, and ordered binary decision diagram Tools for converting composite order ABE schemes to prime order, covering security assumptions and conversion based on vectors for preliminaries, scheme construction, and security proof technique Foundations of blockchain technology, covering blocks, miners, hash functions, and public key cryptography Attribute-based Encryption (ABE) is an essential resource for professionals working in the field of design and cybersecurity who wish to understand how to use blockchain and the ABE scheme to provide fine-grained access control in outsourced data on third-party cloud servers.
A Practical Guide on Security and Privacy in Cyber-Physical Systems
A Practical Guide on Security and Privacy in Cyber-Physical Systems offers an in-depth look at the recent security and privacy challenges of Cyber-Physical Systems (CPS) in multiple application domains. It provides readers with a comprehensive view of system architecture for cybersecurity systems before actual implementation.The book first presents a systematic overview on several CPS applications covering standard architectures before zooming into each of the layers of the architectureal design to describe the underpinning technological, security, and privacy issues currently facing some CPS research groups. The guiding principles that should be followed while planning future innovations for such mission-critical systems are also covered.This book captures the latest advancements from many different fields and is a well-balanced combination of academic contributions and industrial applications in CPS. Written for students and professionals at all levels, this book presents the best practices for individuals who want to advance their research and development in this exciting area.
Web Services - Icws 2023
This book constitutes the proceedings of the 30th International Conference on Web Services, ICWS 2023, held as Part of the Services Conference Federation, SCF 2023, held in Honolulu, HI, USA, in September 2023. The 7 full papers and one short paper presented in this volume were carefully reviewed and selected from 14 submissions. The papers cover topics in the field of: research track; application and industry track and short paper track.The International Conference on Web Services (ICWS) has been a prime international forum for both researchers and industry practitioners to exchange the latest fundamental advances in the state of the art and practice of Web-based services, identify emerging research topics, and define the future of Web-based services. All topics regarding Internet/Web services lifecycle study and management align with the theme of ICWS.
Vlsi-Soc: Technology Advancement on Soc Design
This book contains extended and revised versions of the best papers presented at the 29th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2021, held in Singapore, in October 2021*.The 12 full papers included in this volume were carefully reviewed and selected from the 44 papers (out of 75 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like low-power design of RF, analog and mixed-signal circuits, EDA tools for the synthesis and verification of heterogenous SoCs, accelerators for cryptography and deep learning and on-chip Interconnection system, reliability and testing, and integration of 3D-ICs.*The conference was held virtually.
Database-Driven Web Development
This book will teach you the essential knowledge required to be a successful and productive web developer with the ability to produce cutting-edge websites utilizing a database. This updated edition starts with the fundamentals of web development before delving into Perl and MySQL concepts such as script and database modelling, script-driven database interactions, content generation from a database, and information delivery from the server to the browser and vice versa. The only skills required to get the most from this book are basic knowledge of how the Internet works and a novice skill level with Perl and MySQL. The rest is intuitively presented code that most people can quickly and easily understand and employ. An extensive selection of practical, fully functional programming constructs in six different programming languages will give you the knowledge and tools required to create eye-catching, capable, and functionally impressive database-driven websites. Author Thomas Valentine has taken the concepts presented in the first edition of this book to new heights, offering in-depth discussions of each area of functionality required to develop fully formed database-driven web applications. He has expanded on the examples presented in the first edition and has included some very interesting and useful programming techniques for your consideration. Upon completing this book, you'll have gained the benefit of the author's decades worth of experience and will be able to apply your new knowledge and skills to your own projects. What You Will Learn Install, configure and use a trio of software packages (Apache Web Server, MySQL Database Server, and Perl Scripting Server)Create an effective web development workstation with databases in mindUse the PERL scripting language and MySQL databases effectivelyMaximize the Apache Web Server Who This Book Is For Those who already know web development basics and web developers who want to master database-driven web development. The skills required to understand the concepts put forth in this book are a working knowledge of PERL and basic MySQL.
The Art of Social Engineering
Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guideKey Features: Gain insights into the open source intelligence (OSINT) methods used by attackers to harvest dataUnderstand the evolving implications of social engineering on social networksImplement effective defensive strategies to mitigate the probability and impact of social engineering attacksPurchase of the print or Kindle book includes a free PDF eBookBook Description: Social engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities. This book serves as a comprehensive guide to understanding social engineering attacks and how to protect against them.The Art of Social Engineering starts by giving you an overview of the current cyber threat landscape, explaining the psychological techniques involved in social engineering attacks, and then takes you through examples to demonstrate how to identify those attacks.You'll learn the most intriguing psychological principles exploited by attackers, including influence, manipulation, rapport, persuasion, and empathy, and gain insights into how attackers leverage technology to enhance their attacks using fake logins, email impersonation, fake updates, and executing attacks through social media. This book will equip you with the skills to develop your own defensive strategy, including awareness campaigns, phishing campaigns, cybersecurity training, and a variety of tools and techniques.By the end of this social engineering book, you'll be proficient in identifying cyberattacks and safeguarding against the ever-growing threat of social engineering with your defensive arsenal.What You Will Learn: Grasp the psychological concepts and principles used in social engineering attacksDistinguish the different types of social engineering attacksExamine the impact of social engineering on social networksFind out how attackers leverage OSINT tools to perform more successful attacksWalk through the social engineering lifecycleGet a glimpse of the capabilities of Social Engineering Toolkit (SET)Who this book is for: This book is for cybersecurity enthusiasts, ethical hackers, penetration testers, IT administrators, cybersecurity analysts, or anyone concerned with cybersecurity, privacy, and risk management. It will serve as a valuable resource for managers, decision makers, and government officials to understand the impact and importance of social engineering and how to protect against this threat.
Communication, Networks and Computing
These two volumes constitute the selected and revised papers presented at the Second International Conference on Communication, Networks and Computing, CNC 2022, held in Gwalior, India, in December 2022.The 53 full papers were thoroughly reviewed and selected from the 152 submissions. They focus on ​the exciting new areas of wired and wireless communication systems, high-dimensional data representation and processing, networks and information security, computing techniques for efficient networks design, vehicular technology and applications and electronic circuits for communication systems that promise to make the world a better place to live in.
Communication, Networks and Computing
These two volumes constitute the selected and revised papers presented at the Second International Conference on Communication, Networks and Computing, CNC 2022, held in Gwalior, India, in December 2022. The 53 full papers were thoroughly reviewed and selected from the 152 submissions. They focus on ​the exciting new areas of wired and wireless communication systems, high-dimensional data representation and processing, networks and information security, computing techniques for efficient networks design, vehicular technology and applications and electronic circuits for communication systems that promise to make the world a better place to live in.
Software-Defined Networking for Future Internet Technology
Addresses the many challenges for network administrators with the growing usage of software-defined networks. The book investigates areas where SDN can help other emerging technologies for delivering more efficient services, such as IoT, industrial IoT, NFV, big data, blockchain, cloud computing, and edge computing.
Security and Trust Management
This book constitutes the proceedings of the 19th International Workshop on Security and Trust Management, STM 2023, co-located with the 28th European Symposium on Research in Computer Security, ESORICS 2023, held in The Hague, The Netherlands, during September 28th, 2023 The 5 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 15 submissions. The workshop presents papers with topics such as security and privacy, trust models, security services, authentication, identity management, systems security, distributed systems security, privacy-preserving protocols.
Fieldbus and Networking in Process Automation
Over the last two decades, fieldbus has totally revolutionized the way communication takes place in the fields of process control, automation, and manufacturing industries. Recent introduction of real-time fieldbuses has opened up its application in multi-axis motor control and other time-critical applications. Fieldbus is designed to ensure easy interoperability, smarter network designs, increased data availability, and lessened stress on the design aspects of safety protocols.This second edition of Fieldbus and Networking in Process Automation discusses the different facets of fieldbus technology including design, wiring, installation, and commissioning as well as safety aspects in hostile application areas. The book: - Explains basic communication principles and networking--a must for understanding fieldbuses- Considers the advantages and shortcomings of individual fieldbuses- Provides a broad spectrum of different fieldbuses used in both process control and manufacturing industries in a precise and to-the-point manner- Introduces Common Industrial Protocol (CIP), EtherNet/IP, EtherCAT, SERCOS III, Powerlink, and Profinet IRT, which are mostly sought after in control and automation fields- Discusses hard real-time communication in a succinct manner--so essential in today's multi-axis motor control systems- Updates and streamlines the extra details from the original book to make it more concise and reader friendlySunit Kumar Sen, a member of IET, holds advanced degrees from St Xavier's College and University of Calcutta, both in Kolkata, India. He was an ex-professor in the Instrumentation Engineering section of the Department of Applied Physics, University of Calcutta, and taught courses in digital electronics, communication, industrial instrumentation, microprocessors, electrical networks, and fieldbuses. He was the head of the Department of Applied Physics and University Science Instrumentation Center from 2008-2010 at the University of Calcutta. Previously, he was assistant manager, instrumentation (oprn.) at the Bokaro Steel Plant, Jharkhand, India, under the Steel Authority of India (SAIL). He has already written four books in the areas of instrumentation, microprocessors, and industrial automation technologies. He has been published in approximately 70 national and international journals and conferences.
Streamlit for Data Science - Second Edition
An easy-to-follow and comprehensive guide to creating data apps with Streamlit, including how-to guides for working with cloud data warehouses like Snowflake, using pretrained Hugging Face and OpenAI models, and creating apps for job interviews.Key Features: Create machine learning apps with random forest, Hugging Face, and GPT-3.5 turbo modelsGain an insight into how experts harness Streamlit with in-depth interviews with Streamlit power usersDiscover the full range of Streamlit's capabilities via hands-on exercises to effortlessly create and deploy well-designed appsBook Description: If you work with data in Python and are looking to create data apps that showcase ML models and make beautiful interactive visualizations, then this is the ideal book for you. Streamlit for Data Science, Second Edition, shows you how to create and deploy data apps quickly, all within Python. This helps you create prototypes in hours instead of days!Written by a prolific Streamlit user and senior data scientist at Snowflake, this fully updated second edition builds on the practical nature of the previous edition with exciting updates, including connecting Streamlit to data warehouses like Snowflake, integrating Hugging Face and OpenAI models into your apps, and connecting and building apps on top of Streamlit databases. Plus, there is a totally updated code repository on GitHub to help you practice your newfound skills.You'll start your journey with the fundamentals of Streamlit and gradually build on this foundation by working with machine learning models and producing high-quality interactive apps. The practical examples of both personal data projects and work-related data-focused web applications will help you get to grips with more challenging topics such as Streamlit Components, beautifying your apps, and quick deployment.By the end of this book, you'll be able to create dynamic web apps in Streamlit quickly and effortlessly.What You Will Learn: Set up your first development environment and create a basic Streamlit app from scratchCreate dynamic visualizations using built-in and imported Python librariesDiscover strategies for creating and deploying machine learning models in StreamlitDeploy Streamlit apps with Streamlit Community Cloud, AWS, and HerokuIntegrate Streamlit with Hugging Face, OpenAI, and SnowflakeBeautify Streamlit apps using themes and componentsImplement best practices for prototyping your data science work with StreamlitWho this book is for: This book is for data scientists and machine learning enthusiasts who want to get started with creating data apps in Streamlit. It is terrific for junior data scientists looking to gain some valuable new skills in a specific and actionable fashion and is also a great resource for senior data scientists looking for a comprehensive overview of the library and how people use it. Prior knowledge of Python programming is a must, and you'll get the most out of this book if you've used Python libraries like Pandas and NumPy in the past.
Building and Automating Penetration Testing Labs in the Cloud
Take your penetration testing career to the next level by discovering how to set up and exploit cost-effective hacking lab environments on AWS, Azure, and GCPKey FeaturesExplore strategies for managing the complexity, cost, and security of running labs in the cloudUnlock the power of infrastructure as code and generative AI when building complex lab environmentsLearn how to build pentesting labs that mimic modern environments on AWS, Azure, and GCPPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe significant increase in the number of cloud-related threats and issues has led to a surge in the demand for cloud security professionals. This book will help you set up vulnerable-by-design environments in the cloud to minimize the risks involved while learning all about cloud penetration testing and ethical hacking.This step-by-step guide begins by helping you design and build penetration testing labs that mimic modern cloud environments running on AWS, Azure, and Google Cloud Platform (GCP). Next, you'll find out how to use infrastructure as code (IaC) solutions to manage a variety of lab environments in the cloud. As you advance, you'll discover how generative AI tools, such as ChatGPT, can be leveraged to accelerate the preparation of IaC templates and configurations. You'll also learn how to validate vulnerabilities by exploiting misconfigurations and vulnerabilities using various penetration testing tools and techniques. Finally, you'll explore several practical strategies for managing the complexity, cost, and risks involved when dealing with penetration testing lab environments in the cloud.By the end of this penetration testing book, you'll be able to design and build cost-effective vulnerable cloud lab environments where you can experiment and practice different types of attacks and penetration testing techniques.What you will learnBuild vulnerable-by-design labs that mimic modern cloud environmentsFind out how to manage the risks associated with cloud lab environmentsUse infrastructure as code to automate lab infrastructure deploymentsValidate vulnerabilities present in penetration testing labsFind out how to manage the costs of running labs on AWS, Azure, and GCPSet up IAM privilege escalation labs for advanced penetration testingUse generative AI tools to generate infrastructure as code templatesImport the Kali Linux Generic Cloud Image to the cloud with easeWho this book is forThis book is for security engineers, cloud engineers, and aspiring security professionals who want to learn more about penetration testing and cloud security. Other tech professionals working on advancing their career in cloud security who want to learn how to manage the complexity, costs, and risks associated with building and managing hacking lab environments in the cloud will find this book useful.Table of ContentsGetting Started with Penetration Testing Labs in the CloudPreparing Our First Vulnerable Cloud Lab EnvironmentSucceeding with Infrastructure as Code Tools and StrategiesSetting Up Isolated Penetration Testing Lab Environments on GCPSetting Up Isolated Penetration Testing Lab Environments on AzureSetting Up Isolated Penetration Testing Lab Environments on AWSSetting Up an IAM Privilege Escalation LabDesigning and Building a Vulnerable Active Directory LabRecommended Strategies and Best Practices
Wix
The wix website for beginners is a comprehensive guide that has been specifically designed and written for people who are new to website building and want to create their first website with wix. The guide provides step-by-step instructions on how to use wix's drag-and-drop website builder to create a professional-looking website with ease. It contains detailed information on how to choose the right template, customize it, add content, and publish your website. In this book you will learn: Why you still need a website despite the explosion of the adoption of mobile phones and other hand held devices.3 things to do before you start building a conversion focused websiteHow to build a website works, one that generates traffic and converts the traffic to long term paying customers.9 principles of good web designThe top 10 techniques to make your website accessible7 techniques you can adopt to make your website mobile friendlyWays to make your website secureThis book is specifically designed for beginners or dummies who are new to website building and want to learn how to create a website with the wix web builder optimized for search engines.It starts with a simple step-by-step tutorial on creating and setting up your wix site, then delves into the critical aspect of seo, teaching readers how to optimize their wix website for search engines like google.
The CompTIA Network+ & Security+ Certification
Unlock Your IT Potential: The Definitive CompTIA Certification Study Guide & Test Prep, Master Your IT Journey: The Ultimate 2-in-1 Network+ and Security+ CompTIA Certification GuideIn a digital age that demands expertise in both networking and security, why settle for a guide that offers only half the equation? Backed by two decades of copywriting for the IT sector, I present a resource that understands the modern IT professional's needs. This dual guide is meticulously constructed to navigate both the realms of the Network+ and Security+ CompTIA certifications, ensuring you're armed with knowledge that's both broad and deep.Double the Expertise in a Single Guide: Dual Depth: Dive deep into both networking and security realms, ensuring a holistic IT skillset ready for today's challenges.Efficient Learning: Seamlessly interwoven topics provide you with a logical progression through both certifications, eliminating the disjointedness of studying from separate resources.Battle-Tested Strategies: Equip yourself with proven test-taking techniques, curated practice exams, and insights that illuminate both the Network+ and Security+ paths.Crystal Clear Comprehension: Demystify intricate networking and security topics with lucid explanations, ensuring robust understanding over mere memorization.Embrace the dual power of networking and security. With the combined prowess of Network+ and Security+ under your belt, not only will you be ready to ace those exams, but you'll also possess the practical knowledge needed to excel in the dynamic world of IT. Your path to becoming a double-certified IT maestro starts here. Welcome to comprehensive, top-tier CompTIA preparation.Scroll Up Now and Click the Buy Button to Get Started.
Emerging Technologies for Digital Infrastructure Development
Emerging Technologies for Digital Infrastructure Development is a comprehensive and insightful book that reviews the transformative impact of cutting-edge technologies on the digital landscape. It presents 16 topics, from e-commerce consumer behavior to AI applications in healthcare and cybersecurity, this book offers a detailed overview of the role of technology in shaping the modern world. With a focus on bridging the digital divide in education, the book presents innovative solutions to contemporary challenges. The editors also emphasize the importance of privacy and security in an interconnected world by discussing cybersecurity measures and threat detection strategies. The book serves as a valuable resource for technology professionals, researchers, and academics, offering a deep dive into the latest trends and applications in digital infrastructure. It also caters to business leaders, policy makers, and students seeking to understand the transformative potential of emerging technologies.
Global Digital Data Governance
This book provides a nuanced exploration of contemporary digital data governance, highlighting the importance of cooperation across sectors and disciplines in order to adapt to a rapidly evolving technological landscape. Most of the theory around global digital data governance remains scattered and focused on specific actors, norms, processes, or disciplinary approaches. This book argues for a polycentric approach, allowing readers to consider the issue across multiple disciplines and scales.Polycentrism, this book argues, provides a set of lenses that tie together the variety of actors, issues, and processes intertwined in digital data governance at subnational, national, regional, and global levels. Firstly, this approach uncovers the complex array of power centers and connections in digital data governance. Secondly, polycentric perspectives bridge disciplinary divides, challenging assumptions and drawing together a growing range of insights about the complexities of digital data governance. Bringing together a wide range of case studies, this book draws out key insights and policy recommendations for how digital data governance occurs and how it might occur differently.Written by an international and interdisciplinary team, this book will be of interest to students and scholars in the field of development studies, political science, international relations, global studies, science and technology studies, sociology, and media and communication studies.The Open Access version of this book, available at http: //www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND) 4.0 license.
Advances in Production Management Systems. Smart Manufacturing and Logistics Systems: Turning Ideas Into Action
This two-volume set, IFIP AICT 663 and 664, constitutes the thoroughly refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2022, held in Gyeongju, South Korea in September 2022.The 139 full papers presented in these volumes were carefully reviewed and selected from a total of 153 submissions. The papers of APMS 2022 are organized into two parts. The topics of special interest in the first part included: AI & Data-driven Production Management; Smart Manufacturing & Industry 4.0; Simulation & Model-driven Production Management; Service Systems Design, Engineering & Management; Industrial Digital Transformation; Sustainable Production Management; and Digital Supply Networks. The second part included the following subjects: Development of Circular Business Solutions and Product-Service Systems through Digital Twins; "Farm-to-Fork" Production Management in Food Supply Chains; Urban Mobility and City Logistics; Digital Transformation Approaches in Production Management; Smart Supply Chain and Production in Society 5.0 Era; Service and Operations Management in the Context of Digitally-enabled Product-Service Systems; Sustainable and Digital Servitization; Manufacturing Models and Practices for Eco-Efficient, Circular and Regenerative Industrial Systems; Cognitive and Autonomous AI in Manufacturing and Supply Chains; Operators 4.0 and Human-Technology Integration in Smart Manufacturing and Logistics Environments; Cyber-Physical Systems for Smart Assembly and Logistics in Automotive Industry; and Trends, Challenges and Applications of Digital Lean Paradigm.
Building Micro Frontends with React 18
Become a full life cycle developer by not only learning how to build micro frontends but also deploying and managing them efficiently in a cloud-native environmentKey Features: Go through strategies for building and deploying production-grade micro frontends on the cloudExplore the right choice and guiding principles to build different micro frontend patternsLearn how to use React the right way to build and deploy micro frontends with this step-by-step guidePurchase of the print or Kindle book includes a free PDF eBookBook Description: Although deservedly popular and highly performant tools for building modern web applications, React and single-page applications (SPAs) become more and more sluggish as your applications and teams grow. To solve this problem, many large web apps have started to break down monolith SPAs into independently deployable smaller apps and components-a pattern called micro frontends. But micro frontends aren't a perfect solution, but rather a double-edged sword. This book teaches you how to architect and build them with the right principles to reap all the benefits without the pitfalls.This book will take you through two patterns of building micro frontends, the multi-SPA pattern and the micro apps pattern. You'll find out which patterns to use and when, as well as take a look at the nuances of deploying these micro frontends using cloud-native technologies such as Kubernetes and Firebase. With the help of this book, you'll gain an in-depth understanding of state management, solving problems with routing, and deployment strategies between the different micro frontends.By the end of this book, you'll have learned how to design and build a React-based micro frontend application using module federation and deploy it to the cloud efficiently.What You Will Learn: Discover two primary patterns for building micro frontendsExplore how to set up monorepos for efficient team collaborationDeal with complexities such as routing and sharing state between different micro frontendsUnderstand how module federation works and use it to build micro frontendsFind out how to deploy micro frontends to cloud platformsFigure out how to build the right development experience for teamsWho this book is for: This book is for intermediate- to advanced-level developers with a working knowledge of React and web application development with JavaScript and TypeScript. Knowledge of concepts like client-side and server-side rendering, React, NodeJS, Webpack, and the basics of Kubernetes and serverless computing is desirable, but not necessary.
Cryptology and Network Security
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA.The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections: Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II.