Advances in Production Management Systems. Smart Manufacturing and Logistics Systems: Turning Ideas Into Action
This two-volume set, IFIP AICT 663 and 664, constitutes the thoroughly refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2022, held in Gyeongju, South Korea in September 2022.The 139 full papers presented in these volumes were carefully reviewed and selected from a total of 153 submissions. The papers of APMS 2022 are organized into two parts. The topics of special interest in the first part included: AI & Data-driven Production Management; Smart Manufacturing & Industry 4.0; Simulation & Model-driven Production Management; Service Systems Design, Engineering & Management; Industrial Digital Transformation; Sustainable Production Management; and Digital Supply Networks. The second part included the following subjects: Development of Circular Business Solutions and Product-Service Systems through Digital Twins; "Farm-to-Fork" Production Management in Food Supply Chains; Urban Mobility and City Logistics; Digital Transformation Approaches in Production Management; Smart Supply Chain and Production in Society 5.0 Era; Service and Operations Management in the Context of Digitally-enabled Product-Service Systems; Sustainable and Digital Servitization; Manufacturing Models and Practices for Eco-Efficient, Circular and Regenerative Industrial Systems; Cognitive and Autonomous AI in Manufacturing and Supply Chains; Operators 4.0 and Human-Technology Integration in Smart Manufacturing and Logistics Environments; Cyber-Physical Systems for Smart Assembly and Logistics in Automotive Industry; and Trends, Challenges and Applications of Digital Lean Paradigm.
Optimal Spending on Cybersecurity Measures
This book aims to discuss the integration of risk management methodologies within the DevOps process. It introduces the cyber risk investment model and the cybersecurity risk management framework within the DevOps process.
Cyber Guardians
A comprehensive overview for directors aiming to meet their cybersecurity responsibilities In Cyber Guardians: Empowering Board Members for Effective Cybersecurity, veteran cybersecurity advisor Bart McDonough delivers a comprehensive and hands-on roadmap to effective cybersecurity oversight for directors and board members at organizations of all sizes. The author includes real-world case studies, examples, frameworks, and blueprints that address relevant cybersecurity risks, including the industrialized ransomware attacks so commonly found in today's headlines. In the book, you'll explore the modern cybersecurity landscape, legal and regulatory requirements, risk management and assessment techniques, and the specific role played by board members in developing and promoting a culture of cybersecurity. You'll also find: Examples of cases in which board members failed to adhere to regulatory and legal requirements to notify the victims of data breaches about a cybersecurity incident and the consequences they faced as a result Specific and actional cybersecurity implementation strategies written for readers without a technical background What to do to prevent a cybersecurity incident, as well as how to respond should one occur in your organizationA practical and accessible resource for board members at firms of all shapes and sizes, Cyber Guardians is relevant across industries and sectors and a must-read guide for anyone with a stake in robust organizational cybersecurity.
TensorFlow Developer Certification Guide
Designed with both beginners and professionals in mind, the book is meticulously structured to cover a broad spectrum of concepts, applications, and hands-on practices that form the core of the TensorFlow Developer Certificate exam. Starting with foundational concepts, the book guides you through the fundamental aspects of TensorFlow, Machine Learning algorithms, and Deep Learning models.The initial chapters focus on data preprocessing, exploratory analysis, and essential tools required for building robust models. The book then delves into Convolutional Neural Networks (CNNs), Long Short-Term Memory Networks (LSTMs), and advanced neural network techniques such as GANs and Transformer Architecture. Emphasizing practical application, each chapter is peppered with detailed explanations, code snippets, and real-world examples, allowing you to apply the concepts in various domains such as text classification, sentiment analysis, object detection, and more.A distinctive feature of the book is its focus on various optimization and regularization techniques that enhance model performance. As the book progresses, it navigates through the complexities of deploying TensorFlow models into production. It includes exhaustive sections on TensorFlow Serving, Kubernetes Cluster, and edge computing with TensorFlow Lite. The book provides practical insights into monitoring, updating, and handling possible errors in production, ensuring a smooth transition from development to deployment.The final chapters are devoted to preparing you for the TensorFlow Developer Certificate exam. From strategies, tips, and coding challenges to a summary of the entire learning journey, these sections serve as a robust toolkit for exam readiness. With hints and solutions provided for challenges, you can assess your knowledge and fine-tune your problem solving skills. In essence, this book is more than a mere certification guide; it's a complete roadmap to mastering TensorFlow. It aligns perfectly with the objectives of the TensorFlow Developer Certificate exam, ensuring that you are not only well-versed in the theoretical aspects but are also skilled in practical applications.Key LearningsComprehensive guide to TensorFlow, covering fundamentals to advanced topics, aiding seamless learning.Alignment with TensorFlow Developer Certificate exam, providing targeted preparation and confidence.In-depth exploration of neural networks, enhancing understanding of model architecture and function.Hands-on examples throughout, ensuring practical understanding and immediate applicability of concepts.Detailed insights into model optimization, including regularization, boosting model performance.Extensive focus on deployment, from TensorFlow Serving to Kubernetes, for real-world applications.Exploration of innovative technologies like BiLSTM, attention mechanisms, Transformers, fostering creativity.Step-by-step coding challenges, enhancing problem-solving skills, mirroring real-world scenarios.Coverage of potential errors in deployment, offering practical solutions, ensuring robust applications.Continual emphasis on practical, applicable knowledge, making it suitable for all levelsTable of ContentsIntroduction to Machine Learning and TensorFlow 2.xUp and Running with Neural NetworksBuilding Basic Machine Learning ModelsImage Recognition with CNNObject Detection AlgorithmsText Recognition and Natural Language ProcessingStrategies to Prevent Overfitting & UnderfittingAdvanced Neural Networks for NLPProductionizing TensorFlow ModelsPreparing for TensorFlow Developer Certificate Exam
Code-Based Cryptography
This book constitutes the refereed proceedings of the 11th International Conference on Code-Based Cryptography, CBCrypto 2023, held in Lyon, France, during April 22-23, 2023. The 8 full papers included in this book were carefully reviewed and selected from 28 submissions. The conference offers a wide range of many important aspects of code-based cryptography such as cryptanalysis of existing schemes, the proposal of new cryptographic systems and protocols as well as improved decoding algorithms.
Practical Data Analytics for BFSI
DESCRIPTIONAre you looking to unlock the transformative potential of data analytics in the dynamic world of Banking, Financial Services, and Insurance (BFSI)? This book is your essential guide to mastering the intricate interplay of data science and analytics that underpins the BFSI landscape.Designed for intermediate-level practitioners, as well as those aspiring to join the ranks of BFSI analytics professionals, this book is your compass in the data-driven realm of banking. Address the unique challenges and opportunities of the BFSI sector using Artificial Intelligence and Machine Learning models for a data-driven analysis.TABLE OF CONTENTS 1. Introduction to BFSI and Data-Driven Banking 2. Introduction to Analytics and Data Science 3. Major Areas of Analytics Utilization4. Understanding Infrastructures behind BFSI for Analytics5. Data Governance and AI/ML Model Governance in BFSI 6. Domains of BFSI and team planning 7. Customer Demographic Analysis and Customer Segmentation 8. Text Mining and Social Media Analytics 9. Lead Generation Through Analytical Reasoning and Machine Learning10. Cross Sell and Up Sell of Products through Machine Learning11. Pricing Optimization12. Data Envelopment Analysis 13. ATM Cash Forecasting14. Unstructured Data Analytics 15. Fraud Modelling 16. Detection of Money Laundering and Analysis 17. Credit Risk and Stressed Assets 18. High Performance Architectures: On-Premises and Cloud 19. Growing Trends in the Data-Driven Future of BFSI
YouTube Hacks
"YouTube Hacks: Secrets to Boost Your Views and Engagement" is your comprehensive guide to mastering the intricate world of YouTube content creation. Dive deep into the tactics and strategies that seasoned YouTubers employ to capture the attention of millions. Whether you're a budding content creator or an established vlogger looking to invigorate your channel, this book provides invaluable insights. From the art of crafting compelling titles and thumbnails to understanding the YouTube algorithm's nuances, you'll discover tools to propel your content to the forefront of the platform. Beyond the views, the book emphasizes community-building, monetization, and leveraging YouTube success across the digital domain. Navigate the dynamic landscape of YouTube with expertise, and transform your passion into a thriving digital venture.
The CyberSecurity Leadership Handbook for the CISO and the CEO
In this timely book, veteran information security advisor and thought leader JC Gaillard explains how a common thread in many of the highly publicized data security breaches that have rocked the corporate world in recent years is the neglect of basic cyber security practices. Gaillard doesn't merely cover how these security lapses occur-he also describes concrete steps organizations can take to bring their information security procedures in line with modern best practices. This guidance makes The Cyber Security Leadership Handbook for the CISO and the CEO an indispensable manual for individuals and organizations interested in boosting their knowledge of what it takes to protect their data in today's threat rich environment.Gaillard, who has advised many CEOs, CISOs, and CIOs on how to optimize their cyber security practices, takes an in-depth look at why many large firms have struggled with information security. In many cases, legacy issues which should have been resolved years ago are to blame. These organizations often compound the problem and expose themselves to significant risks by engaging in massive digital transformation efforts without covering their basic cyber security bases.The book features a collection of articles written from 2015-2022 on the topic of how organizations can improve their ability to counter threats to the security of their data. Throughout the book, Gaillard provides extensive advice to help CISOs and other executives bring their companies into compliance with the latest cybersecurity principles and plug any gaps in their defenses.With regulations like GDPR and CCPA privacy legislations building up across the U.S. and worldwide, a "when-not-if" paradigm around cyber-attacks has taken root at the Board level. Gaillard convincingly demonstrates that large organizations, and their CEOS and CISOs, must stop thinking of the topic in pure technological terms and address the underlying cultural and governance issues that have been the true roadblocks to robust cyber security. The solution Gaillard presents is intended to help change the narrative around cyber security and enable organizations to benefit from the greater security engendered by the approach he describes. The Cyber Security Leadership Handbook for the CISO and the CEO provides a roadmap designed to help take an organization's cyber defenses to the next level. It's a must-have for anyone interested in learning how a comprehensive, integrated approach can help organizations overcome legacy and current risks and build a robust, adaptive defense against cyber threats in the corporate world.
Chat GPT
"Chat GPT: How It Works and How to Earn with Artificial Intelligence Technology" is a comprehensive and detailed guide that provides in-depth information about the workings of Chat GPT's Artificial Intelligence technology and the various ways it can be used for earning opportunities. The book is divided into four chapters, each focusing on a specific aspect of Chat GPT technology and its utilization for earning purposes. The first chapter introduces the concept of Artificial Intelligence and explains how Chat GPT operates. The main algorithms used by Chat GPT to generate coherent and relevant responses to user queries are described. Concrete examples of real-world applications of the technology in various fields, such as finance, healthcare, and education, are also provided. The second chapter of the book concentrates on utilizing Chat GPT for earning opportunities. Different avenues for earning through Chat GPT technology are presented, such as creating chatbots for businesses and selling personalized responses to individuals. Success stories of entrepreneurs who have leveraged Chat GPT technology to create innovative and thriving businesses are showcased. The third chapter is dedicated to establishing a business based on the use of Chat GPT. Practical advice and tips on starting a successful venture using Chat GPT as the primary tool are offered. Examples of entrepreneurs who have built successful businesses by harnessing Chat GPT technology as a foundational resource are also provided. The fourth and final chapter provides an overview of the latest trends in Chat GPT and its future evolution. The latest developments in Artificial Intelligence are described, along with how they might influence the future of Chat GPT. A discussion on the ethical and social implications of utilizing Chat GPT technology is also included. In summary, "Chat GPT: How It Works and How to Earn with Artificial Intelligence Technology" is a comprehensive and detailed guide for anyone looking to gain in-depth knowledge of how this technology operates and discover how to effectively and creatively utilize it for earning opportunities. With its detailed structure and numerous practical examples, the book is suitable for both industry professionals and less-experienced users seeking to explore the world of Chat GPT technology.
Chat GPT
"Chat GPT: How It Works and How to Earn with Artificial Intelligence Technology" is a comprehensive and detailed guide that provides in-depth information about the workings of Chat GPT's Artificial Intelligence technology and the various ways it can be used for earning opportunities. The book is divided into four chapters, each focusing on a specific aspect of Chat GPT technology and its utilization for earning purposes. The first chapter introduces the concept of Artificial Intelligence and explains how Chat GPT operates. The main algorithms used by Chat GPT to generate coherent and relevant responses to user queries are described. Concrete examples of real-world applications of the technology in various fields, such as finance, healthcare, and education, are also provided. The second chapter of the book concentrates on utilizing Chat GPT for earning opportunities. Different avenues for earning through Chat GPT technology are presented, such as creating chatbots for businesses and selling personalized responses to individuals. Success stories of entrepreneurs who have leveraged Chat GPT technology to create innovative and thriving businesses are showcased. The third chapter is dedicated to establishing a business based on the use of Chat GPT. Practical advice and tips on starting a successful venture using Chat GPT as the primary tool are offered. Examples of entrepreneurs who have built successful businesses by harnessing Chat GPT technology as a foundational resource are also provided. The fourth and final chapter provides an overview of the latest trends in Chat GPT and its future evolution. The latest developments in Artificial Intelligence are described, along with how they might influence the future of Chat GPT. A discussion on the ethical and social implications of utilizing Chat GPT technology is also included. In summary, "Chat GPT: How It Works and How to Earn with Artificial Intelligence Technology" is a comprehensive and detailed guide for anyone looking to gain in-depth knowledge of how this technology operates and discover how to effectively and creatively utilize it for earning opportunities. With its detailed structure and numerous practical examples, the book is suitable for both industry professionals and less-experienced users seeking to explore the world of Chat GPT technology.
Building AI Applications with ChatGPT APIs
Enhance your application development skills by building a ChatGPT clone, code bug fixer, quiz generator, translation app, email auto-reply, PowerPoint generator, and more in just one read!Key Features: Become proficient in building AI applications with ChatGPT, DALL-E, and WhisperUnderstand how to select the optimal ChatGPT model and fine-tune it for your specific use caseMonetize your applications by integrating the ChatGPT API with StripePurchase of the print or Kindle book includes a free PDF eBookBook Description: Combining ChatGPT APIs with Python opens doors to building extraordinary AI applications. By leveraging these APIs, you can focus on the application logic and user experience, while ChatGPT's robust NLP capabilities handle the intricacies of human-like text understanding and generation.This book is a guide for beginners to master the ChatGPT, Whisper, and DALL-E APIs by building ten innovative AI projects. These projects offer practical experience in integrating ChatGPT with frameworks and tools such as Flask, Django, Microsoft Office APIs, and PyQt.Throughout this book, you'll get to grips with performing NLP tasks, building a ChatGPT clone, and creating an AI-driven code bug fixing SaaS application. You'll also cover speech recognition, text-to-speech functionalities, language translation, and generation of email replies and PowerPoint presentations. This book teaches you how to fine-tune ChatGPT and generate AI art using DALL-E APIs, and then offers insights into selling your apps by integrating ChatGPT API with Stripe.with practical examples available on GitHub, the book gradually progresses from easy to advanced topics, cultivating the expertise required to develop, deploy, and monetize your own groundbreaking applications by harnessing the full potential of ChatGPT APIs.What You Will Learn: Develop a solid foundation in using the ChatGPT API for natural language processing tasksBuild, deploy, and capitalize on a variety of desktop and SaaS AI applicationsSeamlessly integrate ChatGPT with established frameworks such as Flask, Django, and Microsoft Office APIsChannel your creativity by integrating DALL-E APIs to produce stunning AI-generated art within your desktop applicationsExperience the power of Whisper API's speech recognition and text-to-speech featuresDiscover techniques to optimize ChatGPT models through the process of fine-tuningWho this book is for: with best practices, tips, and tricks for building applications using the ChatGPT API, this book is for programmers, entrepreneurs, and software enthusiasts. Python developers interested in AI applications involving ChatGPT, software developers who want to integrate AI technology, and web developers looking to create AI-powered web applications with ChatGPT will also find this book useful. A fundamental understanding of Python programming and experience of working with APIs will help you make the most of this book.
Full-Stack Flask and React
Get to grips with UI interaction, data modeling, API development, and documentation while building modern web apps for cloud deploymentKey Features: Combine Flask's pagination techniques with React's dynamic rendering for an enhanced user experienceImplement robust API development within Flask applications by performing CRUD operationsImprove Flask app scalability with blueprints using a modular development approachPurchase of the print or Kindle book includes a free PDF eBookBook Description: Developing an interactive, efficient, and fast enterprise web application requires both the right approach and tooling. If you are a web developer looking for a way to tap the power of React's reusable UI components and the simplicity of Flask for backend development to develop production-ready, scalable web apps in Python, then this book is for you.Starting with an introduction to React, a JavaScript library for building highly interactive and reusable user interfaces, you'll progress to data modeling for the web using SQLAlchemy and PostgreSQL, and then get to grips with Restful API development. This book will aid you in identifying your app users and managing access to your web application. You'll also explore modular architectural design for Flask-based web applications and master error-handling techniques. Before you deploy your web app on AWS, this book will show you how to integrate unit testing best practices to ensure code reliability and functionality, making your apps not only efficient and fast but also robust and dependable.By the end of this book, you'll have acquired deep knowledge of the Flask and React technology stacks, which will help you undertake web application development with confidence.What You Will Learn: Explore the fundamentals of React for building user interfacesUnderstand how to use JSX to render React componentsHandle data and integrate third-party libraries and APIs into React applicationsSecure your Flask application with user authentication and authorizationDiscover how to use Flask RESTful API to build backend services with React frontendBuild modular and scalable Flask applications using blueprintsWho this book is for: This book is for Python web developers who want to build full-stack applications, as well as for frontend developers seeking to expand their skillset by employing Flask as a backend development tool. You'll gain proficiency in both frontend and backend skills, and acquire the knowledge necessary to deploy solutions in the cloud using AWS. Prior knowledge of basic HTML, CSS, JavaScript, and Python programming will help you to get the most out of this book.
Applications and Usability of Interactive TV
This book constitutes the refereed proceedings of the 11th Iberoamerican Conference on Applications and Usability of Interactive TV, jAUTI 2022, Cordoba, Spain, November 17-18, 2022. The 9 full papers included in this book were carefully reviewed and selected from 25 submissions. They were organized in topical sections as follows: Content Creation and Interaction, Audiovisual Consumption, e-inclusion, Digital Infrastructure.
Information Security Practice and Experience
This book constitutes the refereed proceedings of the 18th International Conference on Information Security Practice and Experience, ISPEC 2023, held in Copenhagen, Denmark, in August 2023.The 27 full papers and 8 short papers included in this volume were carefully reviewed and selected from 80 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
Codebreaking
If you liked Dan Brown's Da Vinci Code--or want to solve similarly baffling cyphers yourself--this is the book for you! A thrilling exploration of history's most vexing codes and ciphers that uses hands-on exercises to teach you the most popular historical encryption schemes and techniques for breaking them. Solve history's most hidden secrets alongside expert codebreakers Elonka Dunin and Klaus Schmeh, as they guide you through the world of encrypted texts. With a focus on cracking real-world document encryptions--including some crime-based coded mysteries that remain unsolved--you'll be introduced to the free computer software that professional cryptographers use, helping you build your skills with state-of-the art tools. You'll also be inspired by thrilling success stories, like how the first three parts of Kryptos were broken. Each chapter introduces you to a specific cryptanalysis technique, and presents factual examples of text encrypted using that scheme--from modern postcards to 19-century newspaper ads, war-time telegrams, notes smuggled into prisons, and even entire books written in code. Along the way, you'll work on NSA-developed challenges, detect and break a Caesar cipher, crack an encrypted journal from the movie The Prestige, and much more. You'll learn: How to crack simple substitution, polyalphabetic, and transposition ciphers How to use free online cryptanalysis software, like CrypTool 2, to aid your analysisHow to identify clues and patterns to figure out what encryption scheme is being usedHow to encrypt your own emails and secret messagesCodebreaking is the most up-to-date resource on cryptanalysis published since World War II--essential for modern forensic codebreakers, and designed to help amateurs unlock some of history's greatest mysteries.
Beginning Aws Security
Improve cloud security within your organization by leveraging AWS's Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework. This book will show you to use these tools to make the best decisions for securing your cloud environment. You'll start by understanding why security is important in the cloud and then review the relevant services offered to meet an organization's needs. You'll then move on to the finer points of building a secure architecture and take a deep look into the differences of responsibility of managed services and those that allow customers more control. With multiple AWS services available, organizations must weigh the tradeoffs between those that provide granular control (IaaS), a managed service (PaaS), delivering applications remotely over the internet instead of locally on machines (SaaS). This book will help you to identify the appropriate resources and show you how to implement them to meet an organization's business, technical, and security perspective in the Cloud Adoption Framework. Finally, you'll see how organizations can launch a secure and optimized cloud architecture and use monitoring tools to be proactive in security measures. With Beginning AWS Security, you'll understand frameworks, models, and the services needed to build a secure architecture. You will: Review the similarities and differences between cloud and traditional computing. See how security changes when using on-site, hybrid, and cloud models Develop an understanding that security is not "one and done" Reinforce the need for updates and monitoring as a continued part of AWS securityWho This Book Is ForCloud computing architects, security professionals, security engineers, and software professionals interested in Cloud security.
Python for Cybersecurity Cookbook
Learn how to use Python for vulnerability scanning, malware analysis, penetration testing, and moreDESCRIPTION Python is a powerful and versatile programming language that can be used for a wide variety of tasks, including general-purpose applications and specific use cases in cybersecurity.This book is a comprehensive guide to solving simple to moderate complexity problems in cybersecurity using Python. It starts with fundamental issues in reconnaissance and then moves on to the depths of the topics such as forensic analysis, malware and phishing analysis, and working with wireless devices. Furthermore, it also covers defensive and offensive security topics, such as system hardening, discovery and implementation, defensive security techniques, offensive security techniques, and penetration testing.By the end of this book, you will have a strong understanding of how to use Python for cybersecurity and be able to solve problems and create solutions independently. WHAT YOU WILL LEARN● Learn how to use Python for cyber forensic analysis.● Explore ways to analyze malware and phishing-based compromises.● Use network utilities to gather information, monitor network activity, and troubleshoot issues.● Learn how to extract and analyze hidden information in digital files.● Examine source code for vulnerabilities and reverse engineering to understand software behavior.WHO THIS BOOK IS FORThe book is for a wide range of people interested in cybersecurity, including professionals, researchers, educators, students, and those considering a career in the field.KEY FEATURES ● Get familiar with the different aspects of cybersecurity, such as network security, malware analysis, and penetration testing.● Implement defensive strategies to protect systems, networks, and data from cyber threats.
The Rise of Politically Motivated Cyber Attacks
This book outlines the complexity in understanding different forms of cyber-attacks, the actors involved, and their motivations. It explores key challenges in investigating and prosecuting politically motivated cyber-attacks, the lack of consistency in regulatory frameworks, and the grey zone this creates for cybercriminals to operate in.
Design and Development of a Secure, Privacy Preserving, and Scalable Blockchain Framework
Doctoral Thesis / Dissertation from the year 2021 in the subject Computer Science - IT-Security, grade: A, language: English, abstract: Blockchain is an emerging technology, leveraged with features of decentralization, tamper-proof records storage model based on a Peer-to-Peer architecture. It has been mostly applied in financial applications, and extended to various applications, viz., healthcare, supply-chain, and identity management. However, privacy, security, and scalability are the key challenges in blockchain-based applications that immensely limit the extensive adoption of these extended applications. The work in this thesis addresses the aforementioned challenges, while preserving better privacy, security, and scalability in blockchain-based applications. We propose access control techniques to facilitate better privacy, security in the blockchain network and improve scalability off-chain storage model. First, we propose an access control technique to preserve privacy across the blockchain network such that authorized peers can access the resources. Initially, the access control technique is designed for resource privacy. Further, we extend the policy to preserve privacy in blockchain network by categorizing both peers and resources. In this thesis, we also address another important problem, i.e., scalability in blockchain network while storing large size of data in secure off-chain storage. We use a secure distributed off-chain storage model to address the problem of scalability, based on the structure of the blockchain network. Lastly, we propose two-level of privacy preservation approach in blockchain network, while maintaining the scalability in the network. The proposed approach uses BlockCloud-BlockFog structure for deployment and IPFS-based off-chain storage model for large size data storage. All the proposed frameworks are evaluated using real-world data sets.
Interviewing Users
Interviewing is easy, right? Anyone can do it... but few do it well enough to unlock the benefits and insights that interviewing users and customers can yield.In this new and updated edition of the acclaimed classic Interviewing Users, Steve Portigal quickly and effectively dispels the myth that interviewing is trivial. He shows how research studies and logistics can be used to determine concrete goals for a business and takes the reader on a detailed journey into the specifics of interviewing techniques, best practices, fieldwork, documentation, and how to make sense of uncovered data. Then Steve takes the process even further-showing the methods and details behind asking questions-from the words themselves to the interviewer's actions and how they influence an interview. There is even a chapter on making sure that information gleaned from the research study is used by the business in such a way to make it impactful and worthwhile. Oh, and for good measure he throws in information about Research Operations.Everyone will get something from this book. But beyond the requisite information, it's simply a good read.
Enhancing Business Continuity and IT Capability
This book addresses several aspects on how modern server operation environments and system administration can help reduce downtime and ensure higher levels of applications availability. It focuses on the main high-availability features of modern servers and their operating environments in relation to IT capability and firm performance.
Philosophy of Cybersecurity
This is a book for everyone - a wide audience. Experts, academic lecturers, as well as students of technical fields such as computer science and social sciences will find the content interesting.
Innovation unleashed
Exploring the cutting-edge concepts of the manual AITEK 6 platform: auto-ML, custom vector base, autonomous process management and predictive dashboards with innovative knowledge cartridges.
Internet of Energy Handbook
This handbook of research on Internet of Energy provides knowledge in the field of energy management with an Internet of Things perspective. It covers the technological developments for energy management leading to reduction in energy consumption through topics like smart energy systems, sensors, communication, techniques and utilization.
Philosophy of Cybersecurity
This is a book for everyone - a wide audience. Experts, academic lecturers, as well as students of technical fields such as computer science and social sciences will find the content interesting.
High Performance Computing
This volume constitutes the papers of several workshops which were held in conjunction with the 38th International Conference on High Performance Computing, ISC High Performance 2023, held in Hamburg, Germany, during May 21-25, 2023. The 49 revised full papers presented in this book were carefully reviewed and selected from 70 submissions. ISC High Performance 2023 presents the following workshops: ​2nd International Workshop on Malleability Techniques Applications in High-Performance Computing (HPCMALL) 18th Workshop on Virtualization in High-Performance Cloud Computing (VHPC 23) HPC I/O in the Data Center (HPC IODC) Workshop on Converged Computing of Cloud, HPC, and Edge (WOCC'23) 7th International Workshop on In Situ Visualization (WOIV'23) Workshop on Monitoring and Operational Data Analytics (MODA23) 2nd Workshop on Communication, I/O, and Storage at Scale on Next-Generation Platforms: Scalable Infrastructures First International Workshop on RISC-V for HPC Second Combined Workshop on Interactive and Urgent Supercomputing (CWIUS) HPC on Heterogeneous Hardware (H3)
Advances in Information and Computer Security
This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29-31, 2023. This event was held in hybrid mode. The 14 full papers presented in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: System and Hardware Security; Symmetric Key Cryptography; Public Key Cryptography; Zero Knowledge Proofs; and Card Based Cryptography.
Practical Next.Js for E-Commerce
Leverage the power of Next.js to quickly produce efficient e-commerce sites. This project-oriented book will simplify the process of setting up a starter e-commerce site using Next.js from start to finish, creating a usable e-commerce offer with little more than a text editor or free software. It will equip you with a starting toolset you can use to develop future projects, incorporate into your existing workflow, and help you to take your websites to the next level, reducing reliance on tools that are bloated, prone to being hacked, and not the most efficient. Practical Next.js for E-Commerce is an excellent resource for getting started creating and manipulating e-commerce sites using a static site generator approach. It takes the view that you don't have to create something complex and unwieldy; you can build something quickly, then extend it using the power of the API or plugins over time, without sacrificing speed or features. What You Will Learn Implement e-commerce sites using Next.jsExplore some of the options for architecting an e-commerce site using this frameworkWork through a project from start to finish, understanding what can be achieved using Next.js, and where other tools may need to be brought into play Who This Book Is For Web developers and designers who are interested in learning how to implement the Next.js framework in an e-commerce capacity.
Learn Ethereum - Second Edition
Explore the beacon chain, Ethereum's PoS consensus, and the upcoming merge of Eth1 and Eth2, along with the challenges of scaling Ethereum, and an overview of L1 and L2 scaling solutionsPurchase of the print or Kindle book includes a free PDF eBookKey Features: Learn new development with Ethereum 2.0 and the planned merge of Eth1 and Eth2Build, develop, and test end-to-end Ethereum dApps using Solidity, Node.js, and Web3Setup private blockchains with Ethereum and delve into its wallets systemBook Description: Ethereum is a blockchain-based, decentralized computing platform that allows you to run smart contracts. With this book, you'll discover the latest Ethereum tools, frameworks, wallets, and layer 2, along with setting up and running decentralized applications for the complete, end-to-end development experience.Learn Ethereum, 2nd Edition is a comprehensive overview of the Ethereum ecosystem, exploring its concepts, mechanisms, and decentralized application development process. You'll delve into Ethereum's internals, technologies, and tools, including Ethereum 2.0 and the Ethereum Virtual Machine (EVM), gas, and its account systems. You'll also explore Ethereum's transition to proof of stake, L1/L2 scaling solutions, DeFi protocols, and the current marketplace. Additionally, you'll learn about EVM-compatible blockchains, connectivity techniques, and advanced topics such as sharding, off-chain scaling, DAOs, Metaverse, and NFTs.By the end of this book, you'll be well-equipped to write smart contracts and develop, test, and deploy DApps using various tools, wallets, and frameworks.What You Will Learn: Understand blockchain, cryptocurrency, and architecturesExplore decentralized finance protocolsGrasp how EVM-compatible blockchain networks workDiscover the latest developments in EthereumUse Solidity and Web3 API fundamentals on blockchain frameworksDevelop your own personalized cryptocurrencyBuild tailor-made smart contracts and NFT marketplace DAppsSet up an Ethereum private chainWho this book is for: This book is for blockchain developers and architects looking to learn the Ethereum blockchain fundamentals and those who want to build real-world decentralized applications using Solidity. Basic knowledge of an object-oriented programming language such as JavaScript will be useful but not mandatory.
How to Make Money Online Using ChatGPT
Want to say bye to your 9-5 job and say hello to online wealth? Let this roadmap reveal how ChatGPT has the answers to this question...Tired of the daily grind and dreaming of a life where you can work in your pajamas and make money online?Perhaps you've even started following popular influencers and entrepreneurs on social media, eagerly devouring their posts about digital nomadism and their multiple streams of income.But as you scroll through their picture-perfect feeds, you can't help but feel a twinge of doubt... Is this all too good to be true? Will you be able to replicate their success, or are they just lucky outliers?Despite the nagging doubts, the allure of these captivating possibilities remains irresistible.And as you constantly strive for more information about how to make money online, convincing yourself that this could also be your ticket to financial freedom, your questions are still always left unanswered - it is like trying to follow a recipe without the key ingredient...This might be hard to hear before you can even start, but it is important to be realistic: Statistics show that on average, only 10% of online businesses succeed while a staggering 90% fail within the first 120 days.However, there's a new tool that could increase your chances of success: ChatGPT.By incorporating ChatGPT into your strategy, you can tap into a wealth of knowledge and insights that can help take your venture to the next level.And that's where this book comes in - it not only guides you on how to utilize this revolutionary AI tool effectively but also helps you navigate the process of starting and scaling your own online money-making venture until you can finally quit your job.Here is just a fraction of what you will discover in this life-changing guide: Why ChatGPT is like having a super-smart virtual friend and a 24/7 business partnerThe key requirements, aside from your entrepreneurial spirit, for a successful money-making venture - no deep pockets required!15 productivity hacks with ChatGPT - get more done in less time and achieve success fasterA strategy to effectively target and dominate your market, bringing in more customers and boosting your revenueA step-by-step guide to starting making money with ChatGPT, no matter what online business model you chooseEverything you need to know about freelancing -from the basics of freelancing with ChatGPT to knowing when to scale up and start your own freelance agencyChatGPT prompts tailored to each stage of your business, from ideation to launch and beyondAnd much more.Although ChatGPT has its current limitations, such as not being able to make future predictions and having a limited knowledge base, this book provides valuable insights to help you succeed in the ever-changing landscape of making money online.Don't just watch from the sidelines...be the one to take the leap and take control of your future by starting now.If you're truly committed to crafting your own tale of online wealth, don't hesitate to take action - get your own copy now.
Ultimate Tailwind CSS Handbook
DESCRIPTIONThis book is an in-depth guide that merges machine learning techniques with OpenCV, the most popular computer vision library, using Python. The book introduces fundamental concepts in machine learning and computer vision, progressing to practical implementation with OpenCV. Concepts related to image preprocessing, contour and thresholding techniques, motion detection and tracking are explained in a step-by-step manner using code and output snippets. Hands-on projects with real-world datasets will offer you an invaluable experience in solving OpenCV challenges with machine learning. It's an ultimate guide to explore areas like deep learning, transfer learning, and model optimization, empowering readers to tackle complex tasks. Every chapter offers practical tips and tricks to build effective ML models. TABLE OF CONTENTS 1. Getting Started with HTML, CSS, and Tailwind CSS 2. Design Principles for Tailwind CSS 3. Utility-First Classes and Customization Options 4. Element-Specific Styling with Utility- First Classes 5. Developing a Website with Tailwind CSS 6. Advanced Website Development with Tailwind CSS 7. Best Practices for Tailwind CSS Index
Digital Transformation, Cyber Security and Resilience
This volume constitutes revised and selected papers presented at the First International Conference on Digital Transformation, Cyber Security and Resilience, DIGILIENCE 2020, held in Varna, Bulgaria, in September - October 2020.The 17 papers presented were carefully reviewed and selected from the 119 submissions. They are organized in the topical sections as follows: ​cyber situational awareness, information sharing and collaboration; protecting critical infrastructures and essential services from cyberattacks; big data and artificial intelligence for cybersecurity; advanced ICT security solutions; education and training for cyber resilience; ICT governance and management for digital transformation.
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Master the art of designing, developing, and operating secure infrastructures on Google CloudKey Features: Prepare for the certification exam with clear explanations, real-world examples, and self-assessment questionsReview Google Cloud security best practices for building a secure and compliant cloud environmentExplore advanced concepts like Security Command Center, BeyondCorp Zero Trust, and container securityBook Description: Google Cloud security offers powerful controls to assist organizations in establishing secure and compliant cloud environments. With this book, you'll gain in-depth knowledge of the Professional Cloud Security Engineer certification exam objectives, including Google Cloud security best practices, identity and access management (IAM), network security, data security, and security operations.The chapters go beyond the exam essentials, helping you explore advanced topics such as Google Cloud Security Command Center, the BeyondCorp Zero Trust architecture, and container security. With step-by-step explanations, practical examples, and practice exams to help you improve your skills for the exam, you'll be able to efficiently review and apply key concepts of the shared security responsibility model. Finally, you'll get to grips with securing access, organizing cloud resources, network and data security, and logging and monitoring.By the end of this book, you'll be proficient in designing, developing, and operating security controls on Google Cloud and gain insights into emerging concepts for future exams.What You Will Learn: Understand how Google secures infrastructure with shared responsibilityUse resource hierarchy for access segregation and implementing policiesUtilize Google Cloud Identity for authentication and authorizationsBuild secure networks with advanced network featuresEncrypt/decrypt data using Cloud KMS and secure sensitive dataGain visibility and extend security with Google's logging and monitoring capabilitiesWho this book is for: This book is for IT professionals, cybersecurity specialists, system administrators, and tech enthusiasts aspiring to strengthen their understanding of Google Cloud security and elevate their career trajectory. Earning this certification not only validates your expertise but also makes you part of an elite group of GCP security engineers, opening doors to opportunities that can significantly advance your career. Prior knowledge of the foundational concepts of Google Cloud or GCP Associate Engineer Certification is strongly recommended.
Progress in Cryptology - Latincrypt 2023
This book constitutes the refereed proceedings of the 8th International Conference on Progress in Cryptology, LATINCRYPT 2023, held in Quito, Ecuador, in October 2023. The 19 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Symmetric-Key Cryptography; Multi-Party Computation; Isogeny-Based Cryptography; Discrete Logarithm Problem; Cryptographic Protocols; Real-World Cryptography; and Zero-Knowledge Proofs.
Deep Learning for Data Architects
"Deep Learning for Data Architects" is a comprehensive guide that bridges the gap between data architecture and deep learning. It provides a solid foundation in Python for data science and serves as a launchpad into the world of AI and deep learning. The book begins by addressing the challenges of transforming raw data into actionable insights. It provides a practical understanding of data handling and covers the construction of neural network-based predictive models. The book then explores specialized networks such as convolutional neural networks (CNNs), recurrent neural networks (RNNs), and generative adversarial networks (GANs). The book delves into the theory and practical aspects of these networks and offers Python code implementations for each.
Connect & Act - Systematic Social Selling
Do you want to win on LinkedIn?Social Selling is a clever approach of adding social media and digital tools to enhance business conversations. This book helps professionals in small businesses and corporate employees who want to turn missing out into a mission to succeed on social.The book covers 42 topics on the journey from passive profile to active attraction with four tips each to apply the learning directly into tangible action. 21 experts share their wisdom to complement the content as a diversified experience."I'm very impressed with your efforts and continued focus in this space. You have become a genuine authority on Social Selling now!" Graham Hawkins, SalesTribeIn this book, you will learn these steps of Social Selling: Complete your profile into a magnetic snapshot of our digital reputationConnect with the right target audience to build a network of raving fansContent mastery from commenting and curating to creating own materialConvert the engagement to advance your business agenda (and theirs, too)The four chapters include insightful interviews with Roger Christie (Propel, podcast host of "Your Digital Reputation"), Wendy Lloyd Curley (Strategic Networking, author of "Stop Wasting Your Time Networking"), Scott Rogerson (UpContent) and sales trainer Mark McInnes (author of "Tactical Pipeline Growth").This book is for you if...You are seeking new customers, partners or alliancesYou want to engage with existing clientsYou want to build a magnetic personal brandYou want to learn commenting with insightsYou want to master creating engaging contentYou want to get practical tips to put into actionYou want social to work for you instead of wasting timeThe book comes with dedicated landing pages per topic with QR codes for easy access to provide further reading and to keep the book up to date.
Maximize Your Podcast for Low Cost
In the digital era, the power of podcasting has taken the world by storm, allowing individuals to share their voices, passions, and expertise with a global audience. Have you ever dreamed of starting your own podcast but hesitated due to concerns about the financial investment? Look no further! "Maximize Your Podcast for Low Cost" is a comprehensive guide that will lead you through the exciting world of podcasting without breaking the bank.Authored by the podcasting guru, Dakota Frandsen, in collaboration with the innovative Bald and Bonkers Network LLC, this book is the perfect companion to the renowned online course bearing the same name. With a wealth of experience in the industry, Dakota Frandsen and his team have mastered the art of building an online media presence without hefty expenditures.Inside this book, you will discover: Strategic Planning: Unearth the secrets of successful podcast planning, from niche selection to target audience identification. Learn how to optimize your content to engage and captivate listeners from the very first episode.Budget Equipment Essentials: Discover the essential tools and equipment needed to produce high-quality audio without spending a fortune. Dakota Frandsen shares his handpicked recommendations, proving that professional podcasting is achievable on a shoestring budget.Recording and Editing Mastery: Dive into the art of recording and editing like a pro. Explore free or low-cost software options, tips for noise reduction, and ways to enhance your podcast's overall production value.Creative Cover Art and Branding: Learn how to design captivating cover art and create a strong podcast brand that resonates with your target audience.Hosting and Distribution Hacks: Unlock the secrets of reliable and affordable podcast hosting services while ensuring your episodes reach a broader audience on multiple platforms.Marketing on a Budget: Master the art of marketing your podcast without spending a fortune on advertising. Explore organic growth strategies, social media promotion, and collaborating with other podcasters.Monetization for Beginners: Turn your passion project into a source of income with insightful guidance on monetizing your podcast. Discover various revenue streams and how to effectively implement them.Whether you're a budding podcaster or a seasoned media enthusiast, "Maximize Your Podcast for Low Cost" equips you with the knowledge and techniques necessary to establish a compelling online media presence on a minimal budget. Embrace the expertise of Dakota Frandsen and the Bald and Bonkers Network LLC, and let your voice be heard without spending more than the price of your daily coffee!Get ready to unleash your podcasting potential and connect with audiences worldwide. It's time to share your story, inspire others, and make a significant impact-all without draining your bank account. Grab your copy today and embark on an exhilarating podcasting journey!
Web Programming with HTML, CSS, Bootstrap, JavaScript, React.JS, PHP, and MySQL Fourth Edition
Welcome to this beginner's guide tailored with college students in mind. Prior familiarity with concepts like file extensions, Web URLs, and major browsers is recommended. This comprehensive textbook serves as your gateway into the world of web programming, equipping you with foundational knowledge to embark on your coding journey.Covering HTML, CSS, Bootstrap, JavaScript, React.JS, PHP, and MySQL at the introductory level, this book distinguishes itself through its focus on pragmatic problem-solving rather than delving into intricate language intricacies. By adopting this approach, readers gain a holistic perspective on web programming, allowing them to comprehend the bigger picture. For more in-depth insights on specific subjects, readers can explore online resources.This book offers a unique hands-on experience, offering a plethora of review questions and practice projects. Through these exercises, readers not only absorb information but also engage in active coding, encountering challenges and relishing the euphoria of triumph as their programs come to life. Emphasizing practicality, this learning journey isn't a quick sprint but rather a fulfilling marathon, spanning approximately 10 hours per week over two months. While not exhaustive in its coverage of any particular topic, this approach ensures you can complete the book within a semester.In this updated edition, you'll find coverage of Bootstrap 5.3.1 and React JS.18, showcasing the latest tools in web development. An informative appendix illustrates the symbiotic relationship between React JS as the frontend and PHP with a backend database. We extend our heartfelt gratitude to Dr. Youlong Zhuang for his invaluable contributions in reviewing this edition.Embark on your web programming voyage with this book and unravel the art of crafting dynamic and interactive digital experiences. Your coding potential awaits-happy learning!
The Business of Cyber
This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners. The content is strongly rooted in available research, presented in an accessible manner, with a number of business-related case studies.
Adversarial Learning and Secure AI
Providing a logical framework for student learning, this is the first textbook on adversarial learning. It introduces vulnerabilities of deep learning, then demonstrates methods for defending against attacks and making AI generally more robust. To help students connect theory with practice, it explains and evaluates attack-and-defense scenarios alongside real-world examples. Feasible, hands-on student projects, which increase in difficulty throughout the book, give students practical experience and help to improve their Python and PyTorch skills. Book chapters conclude with questions that can be used for classroom discussions. In addition to deep neural networks, students will also learn about logistic regression, na簿ve Bayes classifiers, and support vector machines. Written for senior undergraduate and first-year graduate courses, the book offers a window into research methods and current challenges. Online resources include lecture slides and image files for instructors, and software for early course projects for students.
Network Programmability and Automation
Network engineers are finding it harder than ever to rely solely on manual processes to get their jobs done. New protocols, technologies, delivery models, and the need for businesses to become more agile and flexible have made network automation essential. The updated second edition of this practical guide shows network engineers how to use a range of technologies and tools, including Linux, Python, APIs, and Git, to automate systems through code. This edition also includes brand new topics such as network development environments, cloud, programming with Go, and a reference network automation architecture. Network Programmability and Automation will help you automate tasks involved in configuring, managing, and operating network equipment, topologies, services, and connectivity. Through the course of the book, you'll learn the basic skills and tools you need to make this critical transition. You'll learn: Programming skills with Python and Go: data types, conditionals, loops, functions, and more How to work with Linux-based systems, the foundation for modern networking and cloud platforms Data formats and models: JSON, XML, YAML, and YANG Jinja templating for creating network device configurations The role of application programming interfaces (APIs) in network automation Source control with Git to manage code changes during the automation process Cloud-native technologies like Docker and Kubernetes How to automate network devices and services using Ansible, Salt, and Terraform Tools and technologies for developing and continuously integrating network automation
The Angular Mini-Book
The Angular Mini-Book is a guide to getting started with Angular. You'll learn how to develop a bare-bones application, test it, and deploy it. Then you'll move on to adding Bootstrap, Angular Material, continuous integration, and authentication. Spring Boot is a popular framework for building REST APIs. You'll learn how to integrate Angular with Spring Boot and use security best practices like HTTPS and a content security policy. What about deploying your Angular app to the cloud? Yep, it covers that too! This third edition (v3.0) uses Angular 15 and Spring Boot 3.0. Follow @mraible on Twitter for book updates. Purpose of the book: I think building web and mobile applications with Angular, Bootstrap, and Spring Boot is a great experience. I'd like to encourage more developers to try it.
Online Predators, an Internet Insurgency
Jeffrey Lee teaches parents and stakeholders to use the tech against itself to protect children.