0403_卡芙涅
0401~0403_4月選書

英文書 > 全部商品

Unleashing the Millionaire Power of ChatGPT

Ingram 出版
2023/08/13 出版
9 特價917
立即代訂
下次再買

Controlling Privacy and the Use of Data Assets - Volume 2

Ulf,Mattsson  著
Ingram 出版
2023/08/13 出版

The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data Integrity, and Ledger. This book will use practical lessons in Data Integrity, and Trust, and data's business utility.

9 特價4592
立即代訂
下次再買

Controlling Privacy and the Use of Data Assets - Volume 2

Ulf,Mattsson  著
CRC Press 出版
2023/08/12 出版

The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data Integrity, and Ledger. This book will use practical lessons in Data Integrity, and Trust, and data's business utility.

9 特價3131
立即代訂
下次再買

Security Risk Management - The Driving Force for Operational Resilience

Jim,Seaman  著
Ingram 出版
2023/08/12 出版

The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful occurrences is its security risk management capabilities.In this book, we change the perspective on an organization's operational resilience capabilities so that it shifts from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book focus on risk profiles and how your business can reduce these profiles using effective mitigation measures.The book is divided into two sections: 1. Security Risk Management (SRM).All the components of security risk management contribute to your organization's operational resilience capabilities, to help reduce your risks.- Reduce the probability/ likelihood.2. Survive to Operate.If your SRM capabilities fail your organization, these are the components that are needed to allow you to quickly 'bounce back.'- Reduce the severity/ impact.Rather than looking at this from an operational resilience compliance capabilities aspect, we have written these to be agnostic of any specific operational resilience framework (e.g., CERT RMM, ISO 22316, SP 800- 160 Vol. 2 Rev. 1, etc.), with the idea of looking at operational resilience through a risk management lens instead.This book is not intended to replace these numerous operational resilience standards/ frameworks but, rather, has been designed to complement them by getting you to appreciate their value in helping to identify and mitigate your operational resilience risks.Unlike the cybersecurity or information security domains, operational resilience looks at risks from a business-oriented view, so that anything that might disrupt your essential business operations are risk-assessed and appropriate countermeasures identified and applied. Consequently, this book is not limited to cyberattacks or the loss of sensitive data but, instead, looks at things from a holistic business-based perspective.

9 特價3339
立即代訂
下次再買

Computer Safety, Reliability, and Security

Springer 出版
2023/08/12 出版

This book constitutes the refereed proceedings of the 42nd International Conference on Computer Safety, Reliability and Security, SAFECOMP 2023, which took place in Toulouse, France, in September 2023.The 20 full papers included in this volume were carefully reviewed and selected from 100 submissions. They were organized in topical sections as follows: Safety assurance; software testing and reliability; neural networks robustness and monitoring; model-based security and threat analysis; safety of autonomous driving; security engineering; AI safety; and neural networks and testing.

9 特價3653
立即代訂
下次再買

Test-Driven Development with React and Typescript

Juntao,Qiu  著
Apress 出版
2023/08/12 出版

Apply test-driven principles to create scalable and maintainable React applications. This book covers a wide range of topics, including setting up a testing environment and utilizing popular testing frameworks like Cypress, Jest, and the React Testing Library. It also delves into valuable refactoring techniques, as well as enhancing code maintainability and readability. What sets this comprehensive guide apart is its end-to-end project simulation, showcasing how TDD can be employed to build a complete application called "Bookish." Test-Driven Development with React and TypeScript elevates its code examples by leveraging TypeScript, the predominant language in modern frontend development, offering you a deeper understanding of how TDD principles can be applied to React projects. Furthermore, all code examples have been carefully revised and updated for this edition, incorporating reader feedback and reflecting current industry standards.After completing this book, you have the knowledge and skills necessary to develop high quality and scalable React applications. What You Will Learn Master essential refactoring techniques to enhance code qualityEmploy modern practices for writing maintainable React code, including testing and product implementationGain practical experience applying test-driven development (TDD) principles to real-world projects Craft high quality, scalable, and maintainable React applications using TDD principles and techniques Who This Book Is ForWeb application developers who wants to learn how to write high quality code using test-driven development.

9 特價1710
立即代訂
下次再買

ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide

Packt 出版
2023/08/11 出版

Prepare to pass the ISACA CRISC exam with confidence, gain high-value skills, and propel yourself toward IT risk management masteryKey Features: - Gain end-to-end coverage of all the topics assessed in the ISACA CRISC exam- Apply and embed your learning with the help of practice quizzes and self-assessment questions- Have an in-depth guide handy as you progress in your enterprise IT risk management career- Purchase of the print or Kindle book includes a free PDF eBookBook Description: For beginners and experienced IT risk professionals alike, acing the ISACA CRISC exam is no mean feat, and the application of this advanced skillset in your daily work poses a challenge. The ISACA Certified in Risk and Information Systems Control (CRISC(R)) Certification Guide is a comprehensive guide to CRISC certification and beyond that'll help you to approach these daunting challenges with its step-by-step coverage of all aspects of the exam content and develop a highly sought-after skillset in the process.This book is divided into six sections, with each section equipped with everything you need to get to grips with the domains covered in the exam. There'll be no surprises on exam day - from GRC to ethical risk management, third-party security concerns to the ins and outs of control design, and IDS/IPS to the SDLC, no stone is left unturned in this book's systematic design covering all the topics so that you can sit for the exam with confidence. What's more, there are chapter-end self-assessment questions for you to test all that you've learned, as well as two book-end practice quizzes to really give you a leg up.By the end of this CRISC exam study guide, you'll not just have what it takes to breeze through the certification process, but will also be equipped with an invaluable resource to accompany you on your career path.What You Will Learn: - Adopt the ISACA mindset and learn to apply it when attempting the CRISC exam- Grasp the three lines of defense model and understand risk capacity- Explore the threat landscape and figure out vulnerability management- Familiarize yourself with the concepts of BIA, RPO, RTO, and more- Get to grips with the four stages of risk response- Manage third-party security risks and secure your systems with ease- Use a full arsenal of InfoSec tools to protect your organization- Test your knowledge with self-assessment questions and practice quizzesWho this book is for: If you are a GRC or a risk management professional with experience in the management of IT audits or in the design, implementation, monitoring, and maintenance of IS controls, or are gearing up to take the CRISC exam, then this CRISC book is for you. Security analysts, penetration testers, SOC analysts, PMs, and other security or management professionals and executives will also benefit from this book.Table of Contents- Governance, Risk, and Compliance- CRISC Practice Areas and the ISACA Mindset- Organizational Governance, Policies, and Risk Management- The Three Lines of Defense and Cybersecurity- Legal Requirements and the Ethics of Risk Management- Risk Management Life Cycle- Threat, Vulnerability, and Risk- Risk Assessment Concepts, Standards, and Frameworks- Business Impact Analysis, and Inherent and Residual Risk- Risk Response and Control Ownership- Third-Party Risk Management- Control Design and Implementation- Log Aggregation, Risk and Control Monitoring, and Reporting(N.B. Please use the Read Sample option to see further chapters)

9 特價2523
立即代訂
下次再買

Docs-As-Ecosystem

Apress 出版
2023/08/11 出版

Investing in engineering documentation (Docs) means investing in community user experience. This book teaches readers how mastering the docs-as-code ecosystem empowers communities to understand better their favorite products and Open-Source (OSS) technologies better. Author Alejandra Quetzalli believes that "docs-as-ecosystem" represents a more comprehensive and collaborative approach to documentation development than "docsas- code" because it recognizes that documentation is more than just code. Docs involve technical writing, design, community feedback, community management, accessibility, SEO, UX, and today... even Artificial Intelligence tools! The word ecosystem promotes a paradigm where we treat documentation as a complex and dynamic system that must be managed and nurtured. In this book, you'll acquire practical skills such as creating public style guides, incorporating responsive and accessible design, designing user flows and information architecture, retrieving user feedback, and setting up Docs analytics. You'll learn to identify the difference in work processes between maintaining Docs for a product versus an OSS technology. You'll discover the secrets to managing technical writers and OSS contributions, all while building a thriving Docs community. To end on a futuristic note, you'll discover why technical writers who harness Artificial Intelligence (AI) tools (i.e., ChatGPT) need not fear a robot uprising anytime soon. What You'll LearnExamine accessibility and the user experienceUnderstand Information architecture Review docs-as-ecosystem processes Manage technical writersOversee OSS Docs contributions Retrieve and integrate user feedback Build Docs and Education communities Who This Book is ForDevelopers of all levels, VPs of Product/Engineering, Product Managers, and Designers,

9 特價1368
立即代訂
下次再買

Cloud Computing, Big Data & Emerging Topics

Springer 出版
2023/08/11 出版

This book constitutes the revised selected papers of the 11th International Conference on Cloud Computing, Big Data & Emerging Topics, JCC-BD&ET 2023, held in La Plata, Argentina*, in June 2023.The 14 full papers were carefully reviewed and selected from a total of 38 submissions. The papers are organized in topical sections on: Parallel and Distributed Computing, Big Data, Machine and Deep Learning, Smart Cities and E-Government, Visualization.

9 特價4436
立即代訂
下次再買

Artificial Intelligence

Ingram 出版
2023/08/11 出版

Fully revised and updated, this third edition includes three new chapters on neural networks and deep learning including generative AI, causality, and the social, ethical and regulatory impacts of artificial intelligence. All parts have been updated with the methods that have been proven to work. The book's novel agent design space provides a coherent framework for learning, reasoning and decision making. Numerous realistic applications and examples facilitate student understanding. Every concept or algorithm is presented in pseudocode and open source AIPython code, enabling students to experiment with and build on the implementations. Five larger case studies are developed throughout the book and connect the design approaches to the applications. Each chapter now has a social impact section, enabling students to understand the impact of the various techniques as they learn them. An invaluable teaching package for undergraduate and graduate AI courses, this comprehensive textbook is accompanied by lecture slides, solutions, and code.

9 特價4116
立即代訂
下次再買

Post-Quantum Cryptography

Springer 出版
2023/08/11 出版

This book constitutes the refereed proceedings of the 14th International Workshop on Post-Quantum Cryptography, PQCrypto 2022, held in College Park, MD, USA, in August 14-18, 2023. The 25 full papers presented in this book were carefully reviewed and selected from 51 submissions. They are categorized in the following topical sections: code-based cryptography; group-action-based cryptography; isogenye-based cryptography; lattice-based cryptography; multivariate cryptography; quantum algorithms, cryptanalysis and models; post-quantum protocols; side channel cryptanalysis and countermeasures.

9 特價6263
立即代訂
下次再買

The Quiet Crypto Revolution

Klaas,Jung  著
Apress 出版
2023/08/10 出版

Crypto is going to change the world, and for those tired of confusing financial jargon and complicated technical terminology, look no further. This book demystifies the world of cryptocurrencies and blockchain technology and explains in accessible language how it will affect your daily life. In The Quiet Crypto Revolution, Klaas Jung dives beneath the surface of Bitcoin to explore the engine that powers it - blockchain. Far surpassing the confines of cryptocurrencies, blockchain's potential for wide-ranging applications is enormous. It's crucial to understand that cryptocurrencies are merely a single manifestation of blockchain's capabilities. This book casts light on the broader spectrum of blockchain applications and the exciting future of this groundbreaking technology. With a focus on real-world applications, you'll gain a deeper understanding of the key concepts behind the innovative technology of blockchain, equipping you to make informed decisions. Whether you're a tech-savvy individual or a complete newcomer to the world of crypto and finance, this book will arm you with the knowledge and insights you need to understand the impact cryptocurrency and blockchain will have on your future.You WillLook at the future of blockchain technologyReview potential use cases for blockchain beyond cryptocurrencyStudy security strategies to avoid scams in the crypto spaceWho This Book Is ForBeginners who would like to gain a better understanding of cryptocurrency and the technology that supports it.

9 特價855
立即代訂
下次再買

Cyberterrorism and its Implications. An In-depth Analysis of India’s Cybersecurity

Purvi,Sharma  著
Ingram 出版
2023/08/09 出版

Master's Thesis from the year 2023 in the subject Computer Science - IT-Security, Symbiosis International University (Symbiosis school of international studies), course: International Studies, language: English, abstract: The objective of this paper is focused on the study of cyberterrorism and the level of threat it poses to a state and its people. It highlights the various aspects and factors in terms of cyber terrorism, analysing its format, the idea of harm, its threats and challenges and how it impacts the cyber security architecture of nations. It deals with the Indian state and how it has, in the last two decades, seen an accumulation of invasions on its key infrastructures that have forced it to improve its safety measures. It then goes on to showcase India's endeavour to strengthen its security preparedness actions to fight the rise of cyber terrorism through various government enterprises and legislations and immersed in bilateral and multilateral agreements. The analysis concludes by evaluating the gaps and suggesting suggestions to improve the cyber security framework of India.

9 特價1941
立即代訂
下次再買

Electronic Voting

Springer 出版
2023/08/08 出版

This open access book constitutes the proceedings of the 8th International Joint Conference on Electronic Voting held in Luxemburg in October 2023. The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social, or political aspects, amongst others. The 9 full papers presented were carefully reviewed and selected from 38 submissions. The selected papers cover a wide range of topics connected with electronic voting, including experiences and revisions of the actual uses of E-voting systems and corresponding processes in elections.

9 特價2609
立即代訂
下次再買

JavaScript for Web Developers

Mark,Simon  著
Apress 出版
2023/08/08 出版

Learn the basics of JavaScript to enhance your web pages. This book focuses on modern JavaScript programming and encourages a well-organized approach to programming in general. JavaScript for Web Developers explains each foundational concept of the language, followed by a practical implementation of that lesson to reinforce what you've learned. Author Mark Simon starts with the basics of JavaScript programming, followed by a tutorial on manipulating HTML elements. You will then learn to work with forms, along with CSS and Event Listeners. Hands-on projects will not only solidify each concept in your mind, but they will also give you greater confidence and help you absorb best practices. The book concludes with coverage of Ajax, which will enable you to send and retrieve data from a server asynchronously without interfering with the display and behavior of an existing web page. After reading this book, you will be able to use JavaScript to design and program your own web applications. What Will You Learn Understand the basics of JavaScript programmingManipulate and modify web pages with JavaScriptUse JavaScript to interact with HTML and CSSWork with data and understand the basics of working with Ajax Who Is This Book For Beginning web developers with little to no experience using JavaScript.

9 特價1539
立即代訂
下次再買

Beyond Handshakes

Ingram 出版
2023/08/08 出版

Revolutionize Your Networking: Thrive in the Digital Age of Business RelationshipsAre you ready to navigate the digital revolution and build meaningful business relationships online? Beyond Handshakes: Building Business Relationships in a Digital World is your comprehensive guide to mastering the art of online networking and fostering authentic connections in an increasingly digital-first world.From the evolution of networking from handshakes to hashtags, to understanding the influence of technology on business relationships, this book offers a deep dive into the digital landscape. It explores the social media effect, emerging digital platforms, and the rise of remote and digital-first workplaces, setting the stage for a new age of networking.But it's not just about understanding the digital revolution. Beyond Handshakes equips you with practical tools to create and develop business relationships online. Learn how to make a strong first impression, build an impactful online presence, and utilize social media for professional networking. Discover the etiquettes of online networking, the art of digital conversation, and strategies to establish trust and credibility in the virtual world.As you delve deeper, the book guides you on nurturing these online relationships. From regular interaction and engagement, using collaborative digital tools, to the role of webinars and virtual meetings, you'll learn how to overcome challenges in online networking, including managing digital fatigue and ensuring privacy and security in online interactions.Maintaining long-term relationships in a fast-paced digital world can be daunting. Beyond Handshakes helps you sustain engagement over time, personalize and customize your interactions, and adapt to changes in digital trends. It also shows you how to turn connections into collaborations, leveraging online networking for business opportunities, and collaborating in the cloud.With case studies of successful digital collaborations and insights into the future of business relationships, this book is more than a guide-it's a roadmap to thriving in the evolving networking landscape. Whether you're a seasoned professional or just starting your career, Beyond Handshakes: Building Business Relationships in a Digital World is your key to unlocking the power of digital networking and transforming your professional relationships.Don't get left behind in the digital revolution. Embrace the new age of networking and create meaningful, lasting business relationships online. The future of business relationships is here. Are you ready to go beyond handshakes?

9 特價511
立即代訂
下次再買

Machine Learning and Knowledge Discovery in Databases: Research Track

Danai,Koutra  著
Springer 出版
2023/08/08 出版

The multi-volume set LNAI 14169 until 14175 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2023, which took place in Turin, Italy, in September 2023.The 196 papers were selected from the 829 submissions for the Research Track, and 58 papers were selected from the 239 submissions for the Applied Data Science Track. The volumes are organized in topical sections as follows: Part I: Active Learning; Adversarial Machine Learning; Anomaly Detection; Applications; Bayesian Methods; Causality; Clustering.Part II: ​Computer Vision; Deep Learning; Fairness; Federated Learning; Few-shot learning; Generative Models; Graph Contrastive Learning. Part III: ​Graph Neural Networks; Graphs; Interpretability; Knowledge Graphs; Large-scale Learning. Part IV: ​Natural Language Processing; Neuro/Symbolic Learning; Optimization; Recommender Systems; Reinforcement Learning; Representation Learning.Part V: ​Robustness; Time Series; Transfer and Multitask Learning. Part VI: ​Applied Machine Learning; Computational Social Sciences; Finance; Hardware and Systems; Healthcare & Bioinformatics; Human-Computer Interaction; Recommendation and Information Retrieval.​Part VII: Sustainability, Climate, and Environment.- Transportation & Urban Planning.- Demo.

9 特價6263
立即代訂
下次再買

Machine Learning and Knowledge Discovery in Databases: Research Track

Danai,Koutra  著
Springer 出版
2023/08/08 出版

The multi-volume set LNAI 14169 until 14175 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2023, which took place in Turin, Italy, in September 2023.The 196 papers were selected from the 829 submissions for the Research Track, and 58 papers were selected from the 239 submissions for the Applied Data Science Track. The volumes are organized in topical sections as follows: Part I: Active Learning; Adversarial Machine Learning; Anomaly Detection; Applications; Bayesian Methods; Causality; Clustering.Part II: ​Computer Vision; Deep Learning; Fairness; Federated Learning; Few-shot learning; Generative Models; Graph Contrastive Learning.Part III: ​Graph Neural Networks; Graphs; Interpretability; Knowledge Graphs; Large-scale Learning.Part IV: ​Natural Language Processing; Neuro/Symbolic Learning; Optimization; Recommender Systems; Reinforcement Learning; Representation Learning.Part V: ​Robustness; Time Series; Transfer and Multitask Learning.Part VI: ​Applied Machine Learning; Computational Social Sciences; Finance; Hardware and Systems; Healthcare & Bioinformatics; Human-Computer Interaction; Recommendation and Information Retrieval.​Part VII: Sustainability, Climate, and Environment.- Transportation & Urban Planning.- Demo.

9 特價6263
立即代訂
下次再買

Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track

Springer 出版
2023/08/08 出版

The multi-volume set LNAI 14169 until 14175 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2023, which took place in Turin, Italy, in September 2023.The 196 papers were selected from the 829 submissions for the Research Track, and 58 papers were selected from the 239 submissions for the Applied Data Science Track. The volumes are organized in topical sections as follows: Part I: Active Learning; Adversarial Machine Learning; Anomaly Detection; Applications; Bayesian Methods; Causality; Clustering.Part II: ​Computer Vision; Deep Learning; Fairness; Federated Learning; Few-shot learning; Generative Models; Graph Contrastive Learning.Part III: ​Graph Neural Networks; Graphs; Interpretability; Knowledge Graphs; Large-scale Learning.Part IV: ​Natural Language Processing; Neuro/Symbolic Learning; Optimization; Recommender Systems; Reinforcement Learning; Representation Learning.Part V: ​Robustness; Time Series; Transfer and Multitask Learning.Part VI: ​Applied Machine Learning; Computational Social Sciences; Finance; Hardware and Systems; Healthcare & Bioinformatics; Human-Computer Interaction; Recommendation and Information Retrieval.​Part VII: Sustainability, Climate, and Environment.- Transportation & Urban Planning.- Demo.

9 特價5219
立即代訂
下次再買

Machine Learning and Knowledge Discovery in Databases: Research Track

Danai,Koutra  著
Springer 出版
2023/08/08 出版

The multi-volume set LNAI 14169 until 14175 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2023, which took place in Turin, Italy, in September 2023.The 196 papers were selected from the 829 submissions for the Research Track, and 58 papers were selected from the 239 submissions for the Applied Data Science Track. The volumes are organized in topical sections as follows: Part I: Active Learning; Adversarial Machine Learning; Anomaly Detection; Applications; Bayesian Methods; Causality; Clustering.Part II: ​Computer Vision; Deep Learning; Fairness; Federated Learning; Few-shot learning; Generative Models; Graph Contrastive Learning.Part III: ​Graph Neural Networks; Graphs; Interpretability; Knowledge Graphs; Large-scale Learning.Part IV: ​Natural Language Processing; Neuro/Symbolic Learning; Optimization; Recommender Systems; Reinforcement Learning; Representation Learning.Part V: ​Robustness; Time Series; Transfer and Multitask Learning.Part VI: ​Applied Machine Learning; Computational Social Sciences; Finance; Hardware and Systems; Healthcare & Bioinformatics; Human-Computer Interaction; Recommendation and Information Retrieval.​Part VII: Sustainability, Climate, and Environment.- Transportation & Urban Planning.- Demo.

9 特價6263
立即代訂
下次再買

Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track

Springer 出版
2023/08/08 出版

The multi-volume set LNAI 14169 until 14175 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2023, which took place in Turin, Italy, in September 2023.The 196 papers were selected from the 829 submissions for the Research Track, and 58 papers were selected from the 239 submissions for the Applied Data Science Track. The volumes are organized in topical sections as follows: Part I: Active Learning; Adversarial Machine Learning; Anomaly Detection; Applications; Bayesian Methods; Causality; Clustering.Part II: ​Computer Vision; Deep Learning; Fairness; Federated Learning; Few-shot learning; Generative Models; Graph Contrastive Learning.Part III: ​Graph Neural Networks; Graphs; Interpretability; Knowledge Graphs; Large-scale Learning.Part IV: ​Natural Language Processing; Neuro/Symbolic Learning; Optimization; Recommender Systems; Reinforcement Learning; Representation Learning.Part V: ​Robustness; Time Series; Transfer and Multitask Learning.Part VI: ​Applied Machine Learning; Computational Social Sciences; Finance; Hardware and Systems; Healthcare & Bioinformatics; Human-Computer Interaction; Recommendation and Information Retrieval.​Part VII: Sustainability, Climate, and Environment.- Transportation & Urban Planning.- Demo.

9 特價3653
立即代訂
下次再買

Critical Analysis of Ransomware in Relation to Cybercrime

Ingram 出版
2023/08/08 出版

Academic Paper from the year 2023 in the subject Computer Science - IT-Security, grade: A, language: English, abstract: Ransomware attacks are not a new idea, but their prevalence has risen dramatically in recent times. A key explanation for this is the financial compensation that the perpetrator stands to gain, as well as the fact that crypto-currency allows for anonymous transactions. Initially a single-host menace, ransomware is rapidly developing to conduct more sophisticated attacks by spreading through a network of hosts. One of the most difficult aspects of defending from these attacks is that every ransomware caucus is always evolving, rendering individual samples unidentifiable. Common signature-based countermeasures, such as those used to fight viruses, are made ineffective as a result. Furthermore, attempting to reverse engineer each sample in order to develop successful countermeasures or solutions is an expensive venture. Much more so now that ransomware writers are beginning to use complicated methods ensuring that getting to the original source code more difficult. The researcher believes that a more general detection approach can be used to find a solution. It should be focused on the traits that all ransomware families share. This should help to shift the focus of research from samples to families. I collect meta-data about the files that are read and written during ransomware attacks using easy and fast metrics and applied a qualitative mode of data collection. These attacks have a common pattern of attempting to encrypt all of the victims' data. Encrypted files have a significant increase in entropy while the data size remains relatively unchanged. These characteristics can also be seen in normal user behaviour, such as when a user encrypts a file. As a result, we must allow encryption while also imposing a frequency limit to ensure that regular user traffic does not result in false positives.

9 特價1814
立即代訂
下次再買

Machine Learning and Knowledge Discovery in Databases: Research Track

Danai,Koutra  著
Springer 出版
2023/08/08 出版

The multi-volume set LNAI 14169 until 14175 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2023, which took place in Turin, Italy, in September 2023.The 196 papers were selected from the 829 submissions for the Research Track, and 58 papers were selected from the 239 submissions for the Applied Data Science Track. The volumes are organized in topical sections as follows: Part I: Active Learning; Adversarial Machine Learning; Anomaly Detection; Applications; Bayesian Methods; Causality; Clustering.Part II: ​Computer Vision; Deep Learning; Fairness; Federated Learning; Few-shot learning; Generative Models; Graph Contrastive Learning.Part III: ​Graph Neural Networks; Graphs; Interpretability; Knowledge Graphs; Large-scale Learning.Part IV: ​Natural Language Processing; Neuro/Symbolic Learning; Optimization; Recommender Systems; Reinforcement Learning; Representation Learning.Part V: ​Robustness; Time Series; Transfer and Multitask Learning.Part VI: ​Applied Machine Learning; Computational Social Sciences; Finance; Hardware and Systems; Healthcare & Bioinformatics; Human-Computer Interaction; Recommendation and Information Retrieval.​Part VII: Sustainability, Climate, and Environment.- Transportation & Urban Planning.- Demo.

9 特價4175
立即代訂
下次再買

PowerShell Automation and Scripting for Cybersecurity

Packt 出版
2023/08/07 出版

Explore PowerShell's offensive and defensive capabilities to strengthen your organization's security with this practical guidePurchase of the print or Kindle book includes a free PDF eBookKey Features- Master PowerShell for security by configuring, auditing, monitoring, exploiting, and bypassing defenses- Research and develop methods to bypass security features and use stealthy tradecraft- Explore essential security features in PowerShell and protect your environment against exploits and bypassesBook DescriptionTake your cybersecurity skills to the next level with this comprehensive guide to PowerShell security! Whether you're a red or blue teamer, you'll gain a deep understanding of PowerShell's security capabilities and how to use them.After revisiting PowerShell basics and scripting fundamentals, you'll dive into PowerShell Remoting and remote management technologies. You'll learn how to configure and analyze Windows event logs and understand the most important event logs and IDs to monitor your environment. You'll dig deeper into PowerShell's capabilities to interact with the underlying system, Active Directory and Azure AD. Additionally, you'll explore Windows internals including APIs and WMI, and how to run PowerShell without powershell.exe. You'll uncover authentication protocols, enumeration, credential theft, and exploitation, to help mitigate risks in your environment, along with a red and blue team cookbook for day-to-day security tasks. Finally, you'll delve into mitigations, including Just Enough Administration, AMSI, application control, and code signing, with a focus on configuration, risks, exploitation, bypasses, and best practices.By the end of this book, you'll have a deep understanding of how to employ PowerShell from both a red and blue team perspective.What you will learn- Leverage PowerShell, its mitigation techniques, and detect attacks- Fortify your environment and systems against threats- Get unique insights into event logs and IDs in relation to PowerShell and detect attacks- Configure PSRemoting and learn about risks, bypasses, and best practices- Use PowerShell for system access, exploitation, and hijacking- Red and blue team introduction to Active Directory and Azure AD security- Discover PowerShell security measures for attacks that go deeper than simple commands- Explore JEA to restrict what commands can be executedWho this book is forThis book is for security professionals, penetration testers, system administrators, and red and blue teams looking to learn how to leverage PowerShell for security operations. A basic understanding of PowerShell, cybersecurity fundamentals, and scripting is a must. For some parts a basic understanding of active directory, C++/C#, and assembly can be beneficial.Table of Contents- Getting Started with PowerShell- PowerShell Scripting Fundamentals- Exploring PowerShell Remote Management Technologies and PowerShell Remoting- Detection - Auditing and Monitoring- PowerShell Is Powerful - System and API Access- Active Directory - Attacks and Mitigation- Hacking the Cloud - Exploiting Azure Active Directory/Entra ID- Red Team Tasks and Cookbook- Blue Team Tasks and Cookbook- Language Modes and Just Enough Administration (JEA)- AppLocker, Application Control, and Code Signing- Exploring the Antimalware Scan Interface (AMSI)- What Else? - Further Mitigations and Resources

9 特價2294
立即代訂
下次再買

Designing and Implementing Microsoft Azure Networking Solutions

Packt 出版
2023/08/07 出版

Pass the AZ-700 exam effortlessly with this comprehensive guide to Azure networking, covering all aspects of architecting, implementing, and managing Azure virtual networksPurchase of the print or Kindle book includes a free PDF eBookKey Features: Create and deploy a secure Azure network and implement dynamic routing and hybrid connectivityMaster Azure network design for performance, resilience, scalability, and securityEnhance your practical skills with hands-on labs aligned to the AZ-700 Network Engineer certificationBook Description: Designing and Implementing Microsoft Azure Networking Solutions is a comprehensive guide that covers every aspect of the AZ-700 exam to help you fully prepare to take the certification exam.Packed with essential information, this book is a valuable resource for Azure cloud professionals, helping you build practical skills to design and implement name resolution, VNet routing, cross-VNet connectivity, and hybrid network connectivity using the VPN Gateway and the ExpressRoute Gateway. It provides step-by-step instructions to design and implement an Azure Virtual WAN architecture for enterprise use cases.Additionally, the book offers detailed guidance on network security design and implementation, application delivery services, private platform service connectivity, and monitoring networks in Azure. Throughout the book, you'll find hands-on labs carefully integrated to align with the exam objectives of the Azure Network Engineer certification (AZ-700), complemented by practice questions at the end of each chapter, allowing you to test your knowledge.By the end of this book, you'll have mastered the fundamentals of Azure networking and be ready to take the AZ-700 exam.What You Will Learn: Recap the fundamentals of Azure networkingDesign and implement name resolutionImplement cross-VNet and VNet internet connectivityBuild site-to-site VPN connections using the VPN gatewayCreate an ExpressRoute connectionSecure your network with Azure Firewall and network security groupsImplement private access to Azure servicesChoose the right load balancing option for your networkWho this book is for: Whether you're an Azure network engineer or a professional looking to enhance your expertise in designing and implementing scalable and secure network solutions, this book is an invaluable resource. A basic understanding of cloud solutions will help you to get the most out of this book.

9 特價2294
立即代訂
下次再買

Building Modern Web Applications with ASP.NET Core Blazor

Brian,Ding  著
Ingram 出版
2023/08/05 出版

Building Modern Web Applications with ASP.NET Core Blazor is the ultimate guide to developing high-quality web applications with Blazor and .NET Core. Written by an experienced developer, this book provides a comprehensive overview of Blazor's architecture, components, deployment options, and best practices for optimizing performance and scalability. It begins by introducing WebAssembly, the technology that makes Blazor possible. It then discusses the different hosting models available for Blazor applications. Next, the book covers the basics of building Blazor applications, including how to create components, handle user input, and navigate between pages. The book then delves into more advanced topics, such as uploading and downloading files, using .NET and JavaScript interoperability, connecting to the world with HTTP, persisting data with EF Core, and protecting your application with identity.

9 特價1918
立即代訂
下次再買

Crafting Novel AI

Lulu.com 出版
2023/08/04 出版
9 特價1407
立即代訂
下次再買

Web Scraping with Python

2023/08/02 出版

If programming is magic, then web scraping is surely a form of wizardry. By writing a simple automated program, you can query web servers, request data, and parse it to extract the information you need. This thoroughly updated third edition not only introduces you to web scraping but also serves as a comprehensive guide to scraping almost every type of data from the modern web. Part I focuses on web scraping mechanics: using Python to request information from a web server, performing basic handling of the server's response, and interacting with sites in an automated fashion. Part II explores a variety of more specific tools and applications to fit any web scraping scenario you're likely to encounter. Parse complicated HTML pages Develop crawlers with the Scrapy framework Learn methods to store the data you scrape Read and extract data from documents Clean and normalize badly formatted data Read and write natural languages Crawl through forms and logins Scrape JavaScript and crawl through APIs Use and write image-to-text software Avoid scraping traps and bot blockers Use scrapers to test your website

9 特價2257
立即代訂
下次再買

Security Protocols XXVIII

Springer 出版
2023/08/01 出版

This book constitutes the refereed post-conference proceedings of the 28th International Workshop on Security Protocols, held in Cambridge, UK, during March 27-28, 2023. Thirteen papers out of 23 submissions were selected for publication in this book, presented together with the respective transcripts of discussions. The theme of this year's workshop was "Humans in security protocols -- are we learning from mistakes?" The topics covered are securing the human endpoint and proving humans correct.

9 特價3653
立即代訂
下次再買

Effective Threat Investigation for SOC Analysts

Packt 出版
2023/08/01 出版

Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated from different sourcesPurchase of the print or Kindle book includes a free PDF eBookKey Features- Understand and analyze various modern cyber threats and attackers' techniques- Gain in-depth knowledge of email security, Windows, firewall, proxy, WAF, and security solution logs- Explore popular cyber threat intelligence platforms to investigate suspicious artifactsBook DescriptionEffective threat investigation requires strong technical expertise, analytical skills, and a deep understanding of cyber threats and attacker techniques. It's a crucial skill for SOC analysts, enabling them to analyze different threats and identify security incident origins. This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills.The book begins by explaining phishing and email attack types and how to detect and investigate them, along with Microsoft log types such as Security, System, PowerShell, and their events. Next, you'll learn how to detect and investigate attackers' techniques and malicious activities within Windows environments. As you make progress, you'll find out how to analyze the firewalls, flows, and proxy logs, as well as detect and investigate cyber threats using various security solution alerts, including EDR, IPS, and IDS. You'll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis.By the end of this book, you'll have learned how to analyze popular systems and security appliance logs that exist in any environment and explore various attackers' techniques to detect and investigate them with ease.What you will learn- Get familiarized with and investigate various threat types and attacker techniques- Analyze email security solution logs and understand email flow and headers- Find out how to analyze Microsoft event logs- Practical investigation of the various Windows threats and attacks- Analyze web proxy logs to investigate C&C communication attributes- Understand web application firewall (WAF) logs and examine various external attacks- Analyze FW logs and security alerts to investigate cyber threats- Understand the role of CTI in investigation and identify potential threatsWho this book is forThis book is for Security Operation Center (SOC) analysts, security professionals, cybersecurity incident investigators, incident handlers, incident responders, or anyone looking to explore attacker techniques and delve deeper into detecting and investigating attacks. If you want to efficiently detect and investigate cyberattacks by analyzing logs generated from different log sources, then this is the book for you. Basic knowledge of cybersecurity and networking domains and entry-level security concepts are necessary to get the most out of this book.Table of Contents- Investigating Email Threats- Email Flow and Header Analysis- Introduction to Windows Event Logs- Tracking Accounts Login and Management- Investigating Suspicious Process Execution Using Windows Event Logs- Investigating PowerShell Event Logs- Investigating Persistence and Lateral Movement Using Windows Event Logs- Network Firewall Logs Analysis- Investigating Cyber Threats by Using the Firewall Logs- Web Proxy Logs Analysis(N.B. Please use the Look Inside option to see further chapters)

9 特價3018
立即代訂
下次再買

Information Security Planning

Susan,Lincke  著
Springer 出版
2023/08/01 出版

This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the technology that can best protect organizational security. It provides step-by-step guidance on how to analyze business processes from a security perspective, while also introducing security concepts and techniques to develop the requirements and design for security technologies. This interdisciplinary book is intended for business and technology audiences, at student or experienced levels.Organizations must first understand the particular threats that an organization may be prone to, including different types of security attacks, social engineering, and fraud incidents, as well as addressing applicable regulation and security standards. This international edition covers Payment Card Industry Data Security Standard (PCI DSS), American security regulation, and European GDPR. Developing a risk profile helps to estimate the potential costs that an organization may be prone to, including how much should be spent on security controls.Security planning then includes designing information security, as well as network and physical security, incident response and metrics. Business continuity considers how a business may respond to the loss of IT service. Optional areas that may be applicable include data privacy, cloud security, zero trust, secure software requirements and lifecycle, governance, introductory forensics, and ethics.This book targets professionals in business, IT, security, software development or risk. This text enables computer science, information technology, or business students to implement a case study for an industry of their choosing..

9 特價2870
立即代訂
下次再買

Advances in Digital Forensics XIX

Springer 出版
2023/08/01 出版

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security - investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. This book, Advances in Digital Forensics XIX, is the nineteenth volume in the annual series produced by the IFIP Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book presents original research results and innovative applications in digital forensics. Also, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. This volume contains fourteen revised and edited chapters based on papers presented at the Nineteenth IFIP WG 11.9 International Conference on Digital Forensics held at SRI International in Arlington, Virginia, USA on January 30-31, 2023. A total of 24 full-length papers were submitted for presentation at the conference.

9 特價4697
立即代訂
下次再買

The Schrems rulings and the new model contract clauses.

Ingram 出版
2023/08/01 出版

The Schrems rulings, named after Austrian activist Maximilian Schrems who filed a complaint against hi-tech giant Facebook in 2013, are two measures adopted by the Court of Justice of the European Union in relation to the overseas transfer of European citizens' personal data.The first 2015 ruling determines the invalidation of the Safe Harbor international agreement in force since 2000 between Europe and the United States of America. The second ruling in 2020 has a similar outcome with the invalidation of the new international Privacy Shield agreement signed in 2016.The two Schrems rulings, in addition to their obvious impact on the transfer of personal data overseas, also have political significance and should become an occasion for reflection: the rapid pace of technological evolution and globalization have demonstrated the importance of ensuring the European Union's technological and digital sovereignty; the storage and processing of data within European borders can become a lever for choosing European providers over U.S. operators for whom the necessary requirements would make overseas transfer disadvantageous.

9 特價2065
立即代訂
下次再買

Layered Design for Ruby on Rails Applications

Packt 出版
2023/08/01 出版

Transition from the traditional Rails MVC trio to an abstraction model and evolve your application codebase with synchronized components, boosting flexibility and maintainabilityKey Features: - Understand Rails' architectural patterns along with its advantages and disadvantages- Organize business logic in Rails apps when the default approach is insufficient- Introduce new abstractions to address design problems- Purchase of the print or Kindle book includes a free PDF eBookBook Description: The Ruby on Rails framework boosts productivity by leveraging the convention-over-configuration principle and model-view-controller (MVC) pattern, enabling developers to build features efficiently. This initial simplicity often leads to complexity, making a well-structured codebase difficult to maintain. Written by a seasoned software engineer and award-winning contributor to many other open-source projects, including Ruby on Rails and Ruby, this book will help you keep your code maintainable while working on a Rails app.You'll get to grips with the framework's capabilities and principles to harness the full potential of Rails, and tackle many common design problems by discovering useful patterns and abstraction layers. By implementing abstraction and dividing the application into manageable modules, you'll be able to concentrate on specific parts of the app development without getting overwhelmed by the entire codebase. This also encourages code reuse, simplifying the process of adding new features and enhancing the application's capabilities. Additionally, you'll explore further steps in scaling Rails codebase, such as service extractions.By the end of this book, you'll become a code design specialist with a deep understanding of the Rails framework principles.What You Will Learn: - Get to grips with Rails' core components and its request/response cycle- See how Rails' convention-over-configuration principle affects development- Explore patterns for software flexibility, extensibility, and testability in Rails- Identify and address Rails' anti-patterns for cleaner code- Implement design patterns for handling bloated models and messy views- Expand from mailers to multi-channel notification deliveries- Introduce different authorization models and layers to your codebase- Take a class-based approach to configuration in RailsWho this book is for: This book is for Rails application developers looking to efficiently manage the growing complexity of their projects. Whether you've recently launched your first Rails minimum viable product or are struggling to progress with a sizable monolithic application, this book is here to help. A deep understanding of core Rails principles is a must. Prior experience in building web apps using the Rails framework will help you understand and apply the concepts in the book in a better way.Table of Contents- Rails as a Web Application Framework- Active Models and Records- More Adapters, Less Implementations- Rails Anti-Patterns?- When Rails Abstractions Are Not Enough- Data Layer Abstractions- Handling User Input outside of Models- Pulling Out the Representation Layer- Authorization Models and Layers- Crafting the Notifications Layer- Better Abstractions for HTML Views- Configuration as a First-Class Application Citizen- Cross-Layers and Off-Layers

9 特價2294
立即代訂
下次再買

Attacking and Exploiting Modern Web Applications

Packt 出版
2023/07/31 出版

Master the art of web exploitation with real-world techniques on SAML, WordPress, IoT, ElectronJS, and Ethereum smart contractsPurchase of the print or Kindle book includes a free PDF eBookKey Features- Learn how to detect vulnerabilities using source code, dynamic analysis, and decompiling binaries- Find and exploit vulnerabilities such as SQL Injection, XSS, Command Injection, RCE, and Reentrancy- Analyze real-world security incidents based on MITRE ATT&CK to understand the risk at the CISO levelBook DescriptionWeb attacks and exploits pose an ongoing threat to the interconnected world. This comprehensive book explores the latest challenges in web application security, providing you with an in-depth understanding of hackers' methods and the practical knowledge and skills needed to effectively understand web attacks.The book starts by emphasizing the importance of mindset and toolset in conducting successful web attacks. You'll then explore the methodologies and frameworks used in these attacks, and learn how to configure the environment using interception proxies, automate tasks with Bash and Python, and set up a research lab. As you advance through the book, you'll discover how to attack the SAML authentication layer; attack front-facing web applications by learning WordPress and SQL injection, and exploit vulnerabilities in IoT devices, such as command injection, by going through three CTFs and learning about the discovery of seven CVEs. Each chapter analyzes confirmed cases of exploitation mapped with MITRE ATT&CK. You'll also analyze attacks on Electron JavaScript-based applications, such as XSS and RCE, and the security challenges of auditing and exploiting Ethereum smart contracts written in Solidity. Finally, you'll find out how to disclose vulnerabilities.By the end of this book, you'll have enhanced your ability to find and exploit web vulnerabilities.What you will learn- Understand the mindset, methodologies, and toolset needed to carry out web attacks- Discover how SAML and SSO work and study their vulnerabilities- Get to grips with WordPress and learn how to exploit SQL injection- Find out how IoT devices work and exploit command injection- Familiarize yourself with ElectronJS applications and transform an XSS to an RCE- Discover how to audit Solidity's Ethereum smart contracts- Get the hang of decompiling, debugging, and instrumenting web applicationsWho this book is forThis book is for anyone whose job role involves ensuring their organization's security - penetration testers and red teamers who want to deepen their knowledge of the current security challenges for web applications, developers and DevOps professionals who want to get into the mindset of an attacker; and security managers and CISOs looking to truly understand the impact and risk of web, IoT, and smart contracts. Basic knowledge of web technologies, as well as related protocols is a must.Table of Contents- Mindset and Methodologies- Toolset for Web Attacks and Exploitation- Attacking the Authentication Layer - a SAML Use Case- Attacking Internet-Facing Web Applications - SQL Injection and Cross-Site Scripting (XSS) on WordPress- Attacking IoT Devices - Command Injection and Path Traversal- Attacking Electron JavaScript Applications - from Cross-Site Scripting (XSS) to Remote Command Execution (RCE)- Attacking Ethereum Smart Contracts - Reentrancy, Weak Sources of Randomness, and Business Logic- Continuing the Journey of Vulnerability Discovery

9 特價1835
立即代訂
下次再買

The Right to Privacy 1914-1948

Springer 出版
2023/07/30 出版

The book offers a provocative review of thinking about privacy and identity in the years encompassing and disrupted by the two world wars of the first half of the twentieth century - focusing (in particular) on the socio-technological transformations associated with modernism. It argues that, with many of the most interesting modern thinkers of the period dead or marginalised (or both) by 1948, their ideas about how rights such as privacy should develop to accommodate the exigencies of modern life failed to find much of a voice in the drafting of the Universal Declaration of Human Rights. Yet they anticipated in surprising ways some of our 'new' ways of thinking in more recent times. After a brief introduction, the chapters are framed in terms of case studies on the right to privacy, the right to data protection and the right to be forgotten, each finishing with a consideration of how these rights require further rethinking in the digital century.

9 特價2609
立即代訂
下次再買

Advances in Cryptology - Crypto 2023

Springer 出版
2023/07/29 出版

The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.

9 特價6785
立即代訂
下次再買

Advances in Cryptology - Crypto 2023

Springer 出版
2023/07/29 出版

The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.

9 特價7307
立即代訂
下次再買

Demystifying Intelligent Multimode Security Systems

Jody,Booth  著
Apress 出版
2023/07/29 出版

This open access book. Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution.There are nearly half a million active IMSS cameras globally, with over 100 million added annually. These cameras are used across enterprises (companies, traffic monitoring, driver enforcement, etc.), in peoples' homes, on mobile devices (drones, on-vehicle, etc.), and are worn on the body.IMSS systems with a camera and network video recorder for storage are becoming the normal infrastructure for capturing, storing, and transmitting video content (sometimes up to 100 streams) in a secure manner and while protecting privacy.Military, aerospace, and government entities are also embracing digital security and surveillance. IMSS content serves as evidence in courts of law.Security within all of these types of IMSS systems needs to be bolstered by leveraging Intel hardware and software as the last line of defense, and this book provides you with best practices and solutions for maximizing security in your system implementation.What You Will LearnReview the relevant technologies in a surveillance systemDefine and dissect the data pipeline with a focus on key criteria and understand the mapping of this pipeline to Intel hardware blocksOptimize the partition and future-proof it with security and manageabilityUnderstand threat modeling terminology, the assets pertinent to DSS, and emerging threats, and learn how to mitigate these threats using Intel hardware and softwareUnderstand the unique risks and threats to the intelligence in IMSS (machine learning training and inferencing, regulations, and standards) and explore the solution space for mitigations to these threatsSample applications illustrate how to design in security for several types of IMSS.--Explore ways to keep both yourself and your systems up to date in a rapidly changing technology and threat environmentWho This Book Is For Surveillance system designers, integrators, and consultants; professional systems, hardware, and software designers who design, recommend, or integrate surveillance systems; security system integrators; video analytics engineers; agencies that write RFPs and/or RFIs; government, police, and security agencies; and corporate security divisionsThis is an open access book.

9 特價2052
立即代訂
下次再買

Understanding Cities

Ingram 出版
2023/07/28 出版

"Generative AI is the key to unlocking the potential of artificial intelligence. It will allow us to solve some of the world's biggest problems." - Demis Hassabis, CEO of DeepMindImagine living in a world where the boundary between the virtual and the real is increasingly blurred. A world seamlessly intertwining with advanced technology and where Generative AI becomes a vital player. This new and dynamic technology may appear complex and elusive, but don't worry. It's like a maze, and you're about to get the key. With this key, you can unlock a world of endless opportunities.About the AuthorMy name is Jacob Emerson. As an AI researcher, seasoned data scientist, passionate technology educator, and AI enthusiast, I have devoted years to delve into the intricate mechanisms of artificial intelligence. After extensive research and practical applications, I've garnered an in-depth understanding of the potential and profound societal impact of Generative AI. In this book, I encapsulate this wisdom, breaking down complex concepts into simple, digestible ideas that anyone can understand.What you can expect from this book: This book "Ripples of Generative AI - How Generative AI Impacts, Informs, and Transforms Our Lives" steers you through the evolution, significance, and ramifications of Generative AI in modern society.By exploring the pages of this book, you will: Uncover the rich history and groundbreaking advancements in Generative AIGrasp its wide-ranging applications, spanning from creative arts and design to groundbreaking healthcare solutionsDelve into concrete examples and case studies, illustrating how Generative AI is reshaping our worldAscertain the ethical implications and regulatory considerations in implementing Generative AIGlossary section includes Key AI terms, Popular generative AI models and AI websitesBut that's just the tip of the iceberg. Armed with this knowledge, you're better equipped to understand, comprehend and steer through the AI-driven future, be it in your personal pursuits, professional path, or broader societal engagements. Embark on this enlightening journey to understand the powerful ripples of Generative AI that are shaping our world.

9 特價342
立即代訂
下次再買

UX

Eric,Schmidt  著
Ingram 出版
2023/07/28 出版

Several complex issues arise when planning and analyzing data in UX projects. A lack of understanding or misapprehension of the process can lead to incorrect conclusions, wasted effort, and unclear priorities. This book is designed as a primer for those new to the field and an introduction for those with some experience who want to expand beyond the basics. This book introduces a practical, problem-based approach to data analysis that UX designers and other team members can use. It includes guidelines, tips, and tricks for how to get started with planning and analyzing data effectively. Whether you're just getting started with analytics or are looking for a refresher on what tools to use, this book is packed with practical tips and tricks for planning and analyzing your data. You have an excellent opportunity to get acquainted with the art of data analysis and design, which is an essential skill for any UX designer. This book will help you understand the basics of data analysis, from data types to basic statistics and visualization methods.

9 特價684
立即代訂
下次再買

Zero Trust Architecture

Cisco Press 出版
2023/07/27 出版

Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation. A team of Cisco's leading experts and implementers offer the most comprehensive and substantive guide to Zero Trust, bringing clarity, vision, practical definitions, and real-world expertise to a space that's been overwhelmed with hype. The authors explain why Zero Trust identity-based models can enable greater flexibility, simpler operations, intuitive context in the implementation and management of least privilege security. Then, building on Cisco's own model, they systematically illuminate methodologies, supporting technologies, and integrations required on the journey to any Zero Trust identity-based model. Through real world experiences and case study examples, you'll learn what questions to ask, how to start planning, what exists today, what solution components still must emerge and evolve, and how to drive value in the short-term as you execute on your journey towards Zero Trust.

9 特價2753
立即代訂
下次再買

Multidimensional Signals and Systems

Springer 出版
2023/07/26 出版

This book covers the theory of multidimensional signals and systems and related practical aspects. It extends the properties and mathematical tools of one-dimensional signals and systems to multiple dimensions and covers relevant timeless topics including multidimensional transformations, multidimensional sampling as well as discrete multidimensional systems. A special emphasis is placed on physical systems described by partial differential equations, the construction of suitable integral transformations and the implementation of the corresponding discrete-time algorithms. To this end, signal spaces and functional transformations are introduced at a mathematical level provided by undergraduate programs in engineering and science.The presentation takes a comprehensive, illustrative and educational approach without reference to a particular application field. Instead, the book builds a solid theoretical concept of multidimensional signals and systems and shows the application to various problems relevant for practical scenarios.

9 特價4436
立即代訂
下次再買

Mirrors

Ray,Tinston  著
Ingram 出版
2023/07/26 出版

Doctoral Thesis / Dissertation from the year 2023 in the subject Computer Sciences - Artificial Intelligence, language: English, abstract: This thesis examines the integration of behavioural science terminology and artificial intelligence (AI) in tourism marketing. The primary objective of this study is to identify and analyse the potential synergies between these interdisciplinary disciplines and investigate novel strategies for enhancing marketing campaigns and promoting sustainable tourism. The study employs a multi-method approach, including a comprehensive literature review, in-depth interviews with industry experts, and case studies of effective marketing campaigns that engage AI and behavioural science principles. Tourism is a critical contributor to the global economy, accounting for an estimated 1-in-10 jobs worldwide. In the post-Covid era, the sector has experienced significant growth, leading to intense competition among tourism organizations and marketers seeking innovative and sophisticated marketing strategies to attract and retain customers. A promising approach to enhance customer experiences and maximize marketing efforts is integrating behavioural science and artificial intelligence (AI) in tourism marketing, optimizing marketing activities' effectiveness. Behavioural science involves systematically studying and researching decision-making processes, cognitive biases, and social influences to understand consumer behaviour better, promote environmentally friendly options, and influence purchasing decision. Similarly, AI technologies, such as machine learning and natural language processing, hold the potential to revolutionize business operations and customer engagement. When applied to tourism marketing, combining behavioural science and AI can improve personalization, targeting, and customer interactions, resulting in higher satisfaction and loyalty.

9 特價5113
立即代訂
下次再買

Deep Learning for Multimedia Processing Applications

Ingram 出版
2023/07/26 出版

Deep Learning for Multimedia Processing Applications is a comprehensive guide that explores the revolutionary impact of deep learning techniques in the field of multimedia processing. Written for a wide range of readers, from students to professionals, this book offers a concise and accessible overview of the application of deep learning in various multimedia domains, including image processing, video analysis, audio recognition, and natural language processing.Divided into two volumes, Volume One begins by introducing the fundamental concepts of deep learning, providing readers with a solid foundation to understand its relevance in multimedia processing. Readers will discover how deep learning techniques enable accurate and efficient image recognition, object detection, semantic segmentation, and image synthesis. The book also covers video analysis techniques, including action recognition, video captioning, and video generation, highlighting the role of deep learning in extracting meaningful information from videos.Furthermore, the book explores audio processing tasks such as speech recognition, music classification, and sound event detection using deep learning models. It demonstrates how deep learning algorithms can effectively process audio data, opening up new possibilities in multimedia applications. Lastly, the book explores the integration of deep learning with natural language processing techniques, enabling systems to understand, generate, and interpret textual information in multimedia contexts.Throughout the book, practical examples, code snippets, and real-world case studies are provided to help readers gain hands-on experience in implementing deep learning solutions for multimedia processing. Deep Learning for Multimedia Processing Applications is an essential resource for anyone interested in harnessing the power of deep learning to unlock the vast potential of multimedia data.

9 特價7308
立即代訂
下次再買

5G, Cybersecurity and Privacy in Developing Countries

Ingram 出版
2023/07/26 出版

This book discusses the challenges associated with the increased accessibility to 5G and broader usage with associated vulnerability in developing countries.

9 特價7308
立即代訂
下次再買

Deep Learning for Multimedia Processing Applications

Ingram 出版
2023/07/26 出版

Deep Learning for Multimedia Processing Applications is a comprehensive guide that explores the revolutionary impact of deep learning techniques in the field of multimedia processing. Written for a wide range of readers, from students to professionals, this book offers a concise and accessible overview of the application of deep learning in various multimedia domains, including image processing, video analysis, audio recognition, and natural language processing.Divided into two volumes, Volume Two delves into advanced topics such as convolutional neural networks (CNNs), recurrent neural networks (RNNs), and generative adversarial networks (GANs), explaining their unique capabilities in multimedia tasks. Readers will discover how deep learning techniques enable accurate and efficient image recognition, object detection, semantic segmentation, and image synthesis. The book also covers video analysis techniques, including action recognition, video captioning, and video generation, highlighting the role of deep learning in extracting meaningful information from videos.Furthermore, the book explores audio processing tasks such as speech recognition, music classification, and sound event detection using deep learning models. It demonstrates how deep learning algorithms can effectively process audio data, opening up new possibilities in multimedia applications. Lastly, the book explores the integration of deep learning with natural language processing techniques, enabling systems to understand, generate, and interpret textual information in multimedia contexts.Throughout the book, practical examples, code snippets, and real-world case studies are provided to help readers gain hands-on experience in implementing deep learning solutions for multimedia processing. Deep Learning for Multimedia Processing Applications is an essential resource for anyone interested in harnessing the power of deep learning to unlock the vast potential of multimedia data.

9 特價7308
立即代訂
下次再買

ChatGPT for Content Marketing Success

Danni,White  著
Ingram 出版
2023/07/26 出版

The essential guide to navigating the fascinating intersection of artificial intelligence and content creation.In an ever-evolving digital world, keeping your content fresh, engaging, and relevant is a massive challenge. This book aims to equip you with the knowledge and tools to overcome this hurdle by effectively utilizing ChatGPT and other AI-based tools.As you dive into the pages, you'll uncover the fundamentals of ChatGPT, gain deep insights into its operations, and learn how to harness its potential to create dynamic and compelling prompts, ideas, and complete content. The book provides a step-by-step guide to implementing ChatGPT in your content strategy, enriched with real-life case studies, expert advice, and practical tips and tricks.Whether you're a seasoned marketer looking for innovative ways to engage your audience, a content creator striving for efficiency and excellence, or a business owner interested in the future of AI in marketing, this book is an indispensable resource. Prepare to revolutionize your content, accelerate your marketing success, and lead the way in the digital era.

9 特價513
立即代訂
下次再買
頁數39/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing