0403_卡芙涅
0401~0403_4月選書

英文書 > 全部商品

Information Security and Cryptology - Icisc 2022

Springer 出版
2023/03/31 出版

This book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30-December 2, 2022. The 24 full papers included in this book were carefully reviewed and selected from 69 submissions. They were organized in topical sections as follows: ​Public Key Encryption with Hierarchical Authorized Keyword Search, Implicit Key-stretching Security of Encryption Schemes.

9 特價5219
立即代訂
下次再買

Web and Big Data. Apweb-Waim 2022 International Workshops

Shiyu,Yang  著
Springer 出版
2023/03/31 出版

This book constitutes revised selected papers from the workshops of the 6th Asia-Pacific Web and Web-Age Information Management International Joint Conference on Web and Big Data, APWeb-WAIM 2022: The Fifth International Workshop on Knowledge Graph Management and Applications, KGMA 2022, The Fourth International Workshop on Semi-structured Big Data Management and Applications, SemiBDMA 2022, and The Third International Workshop on Deep Learning in Large-scale Unstructured Data Analytics, DeepLUDA 2022, held in Nanjing, China, in August 2022. The 23 papers were thoroughly reviewed and selected from the 39 submissions and present recent research on the theory, design, and implementation of data management systems.

9 特價4436
立即代訂
下次再買

Privacy and Identity Management. Between Data Protection and Security

Springer 出版
2023/03/31 出版

This book contains selected papers presented at the 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August 2021.The 9 full papers included in this volume were carefully reviewed and selected from 23 submissions. Also included are 2 invited keynote papers and 3 tutorial/workshop summary papers. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.

9 特價5219
立即代訂
下次再買

Foundations and Practice of Security

Springer 出版
2023/03/31 出版

This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12-14, 2022.The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.

9 特價4697
立即代訂
下次再買

The Metaweb

Bridgit,Dao  著
Ingram 出版
2023/03/30 出版

The book posits a symbiotic relationship between AI and the Metaweb, where AI assists in generating, organizing, and curating content, while the Metaweb provides the necessary data and context for AI to function effectively, transparently, and in alignment with humanity.

9 特價2400
立即代訂
下次再買

Security Chaos Engineering

Ingram 出版
2023/03/30 出版

Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What can we do to improve our systems' resilience? In this comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of sustaining resilience in complex software systems by using the principles and practices of security chaos engineering. By preparing for adverse events, you can ensure they don't disrupt your ability to innovate, move quickly, and achieve your engineering and business goals. Learn how to design a modern security program Make informed decisions at each phase of software delivery to nurture resilience and adaptive capacity Understand the complex systems dynamics upon which resilience outcomes depend Navigate technical and organizational trade-offs that distort decision making in systems Explore chaos experimentation to verify critical assumptions about software quality and security Learn how major enterprises leverage security chaos engineering

9 特價2257
立即代訂
下次再買

Mastering Blockchain - Fourth Edition

Imran,Bashir  著
Packt 出版
2023/03/29 出版

Demystify one of the most disruptive modern technologies and gain an understanding of distributed ledger technology, consensus protocols, smart contracts, DApps, blockchain scalability, privacy, security, and more.Purchase of the print or Kindle book includes a free eBook in PDF format.Key Features: Study new blockchains, including Polkadot, Solana, and Ethereum execution layer and consensus layer.Explore distributed ledger technologies such as Ethereum, Bitcoin, Hyperledger Fabric, and Quorum.Get to grips with Solidity, Web3, NFTs, DeFi, and smart contract development.Book Description: Blockchain is the backbone of cryptocurrencies, with applications in finance, government, media, among other industries. With a legacy of providing technologists with executable insights, this new edition of Mastering Blockchain is thoroughly revised and updated according to the latest blockchain research. With new chapters on Decentralized Finance, Decentralized Identity and blockchain privacy, scalability, and security, as well as bonus online content exploring alternative blockchains, this is an unmissable read for everyone who wants to gain a deep understanding of blockchain.Although this book covers the basics, including blockchain's technical underpinnings, cryptography, and consensus protocols, it doesn't shy away from advanced topics and practical expertise, such as decentralized application (DApp) development using smart contracts. Throughout the book, you'll explore blockchain solutions beyond cryptocurrencies, such as the Internet of Things (IoT) with blockchain, enterprise blockchains, and tokenization, and gain insight into the future scope of this fascinating and disruptive technology.By the end of this blockchain book, you will have gained a thorough comprehension of the various facets of blockchain and understand the potential of this technology in diverse real-world scenarios.What You Will Learn: Grasp the mechanisms behind Bitcoin, Ethereum, and other blockchain protocolsUnderstand cryptography and its usage in blockchain.Become familiar with the theoretical foundations of smart contracts and blockchain consensus algorithms.Develop smart contracts and DApps using Solidity, Remix, Truffle, and GanacheSolve issues relating to scalability, privacy, and security in blockchainExplore enterprise blockchainsDive into the architecture of Ethereum's execution and consensus layerDelve into emerging trends like decentralized and self-sovereign identity, DeFi, NFTs, and MetaverseExplore various applications, research topics, and future directions of blockchainWho this book is for: This book is for blockchain enthusiasts from all backgrounds, including software developers and programmers who want to learn how to build DApps, business executives and managers who want to explore the benefits and challenges of leveraging blockchain in different industries, and system architects and solution designers who want insight into blockchain architecture, consensus mechanisms, and security considerations. It is also a useful reference guide for blockchain development professionals who want to build fast and highly secure transactional applications. Basic knowledge in any programming language will come in handy.

9 特價2294
立即代訂
下次再買

An Introduction to Secret Sharing

Springer 出版
2023/03/29 出版

This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols. This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for further reading and research. This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists.

9 特價2609
立即代訂
下次再買

Design, Learning, and Innovation

Eva,Brooks  著
Springer 出版
2023/03/28 出版

This book constitutes the refereed post-conference proceedings the 7th International Conference on Design, Leaning and Innovation, DLI 2022, which took place in Faro, Portugal, in November 21-22, 2022. The 4 revised full papers and 2 short papers presented were carefully selected from 32 submissions on. They were organized in topical sections as follows: Digital Environments and Design Processes Fostering Learning and Interaction, Designs for Innovative Learning with Digital Technology, Digital Approaches Shaping Educational Practices.

9 特價3653
立即代訂
下次再買

Applications and Techniques in Information Security

Springer 出版
2023/03/28 出版

​This book constitutes the refereed proceedings of the 13th International Conference, on Applications and Techniques in Information Security, ATIS 2022, held in Manipal, India, December 30-31, 2022.The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies.

9 特價4436
立即代訂
下次再買

Advances in Quantitative Ethnography

Crina,Damşa  著
Springer 出版
2023/03/28 出版

This book constitutes the refereed proceedings of the 4th International Conference on Advances in Quantitative Ethnography, ICQE 2022, held in Copenhagen, Denmark, during October 15-19, 2022.The 29 full papers included in this book were carefully reviewed and selected from 71 submissions. They were organized in topical sections as follows: QE Theory and Methodology Research; Applications in Education Contexts; and Applications in Interdisciplinary Contexts.

9 特價5219
立即代訂
下次再買

Wordpress

Ingram 出版
2023/03/27 出版

This wordpress tutorial is illustrated with helpful screenshots to facilitate learning and decrease implementation time.You can easily learn how to build a beautiful wordpress website that displays your company's name and logo and lets the world know that your company is influential and hip by adding an online presence with the functionality to process orders from anywhere in the world! And, you can build this website in 1-3 days, with some diligence. Here is a preview of what you'll learn...Introduction to content management systemsStarting from scratch - technicalities in installation iStarting from scratch - technicalities in installation iiThe easier version of installing wordpressThe wordpress dashboardMuch, much more!Building a beautiful, professional-looking wordpress website (or a blog) is no longer the computer geeks' domain. Wordpress makes it possible for anyone to create and run a website that looks great on any device - pc, mac, tablet, and phone. Whether you want to build a business site, an affiliate site, a hobby site, or a blog, wordpress is a great choice, and this book shows you how.

9 特價682
立即代訂
下次再買

A11y Unraveled

Apress 出版
2023/03/25 出版

Make designing and developing accessible websites fun and straightforward by deciphering information that is often confusing. This book examines how web professionals can ensure a website is as accessible as it can be, meeting the needs of its audience. The main focus is on web accessibility and, WCAG 2.1 and 2.2 guidelines: what they are, who they are for, and what can be done from a design point of view to make the lives of the users easier. In reviewing the fundamentals, emphasis will be given on what disabilities could potentially prevent users from getting the information they need and what can be done to help them. This is achieved by breaking down web design and development terms and practices, such as web accessibility, color contrast, typography, how to design specific components like carousels, forms, and so on. Each chapter features design examples presented in a clear and concise manner. Each design element is divided into different components, highlighting exactly what helps with what, showing how a website needs to be designed for the benefit of its people. A11Y Unraveled also reviews the current laws and legislations that govern web accessibility in different parts of the world.What You'll LearnDiscover how people perceive information on the web, and how that might create barriers in communication.Review different disabilities or limitations that prevent users from accessing web information and how to address them.Design an accessible website for specific disabilities through practical examples.Understand how different web design components affect the user.Study current web accessibility legislation, avoiding difficult to understand lingo.Who This Book Is ForMain audience would be digital and web professionals (mainly designers but developers can benefit as well). It can also help business owners who want to ensure their websites are adhere to accessibility standards.

9 特價2052
立即代訂
下次再買

Intelligent Computing and Networking

Springer 出版
2023/03/23 出版
9 特價7307
立即代訂
下次再買

Big Data Analytics in Fog-Enabled Iot Networks

Ingram 出版
2023/03/23 出版

This book emphasizes and facilitate a greater understanding of various security and privacy approaches using the advance AI and Big data technologies like machine/deep learning, federated learning, blockchain, edge computing and the countermeasures to overcome the vulnerabilities of the Fog-enabled IoT system.

9 特價8352
立即代訂
下次再買

Cybertax

Ingram 出版
2023/03/22 出版

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax--Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leaderships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.

9 特價7308
立即代訂
下次再買

Intelligence-Driven Incident Response

Ingram 出版
2023/03/22 出版

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. In this updated second edition, you'll learn the fundamentals of intelligence analysis as well as the best ways to incorporate these techniques into your incident response process. Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This practical guide helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship. In three parts, this in-depth book includes: The fundamentals: Get an introduction to cyberthreat intelligence, the intelligence process, the incident response process, and how they all work together Practical application: Walk through the intelligence-driven incident response (IDIR) process using the F3EAD process: Find, Fix, Finish, Exploit, Analyze, and Disseminate The way forward: Explore big-picture aspects of IDIR that go beyond individual incident response investigations, including intelligence team building

9 特價2257
立即代訂
下次再買

Introduction to Natural Language Processing - A Practical Guide for Beginners

Sakil,Ansari  著
Ingram 出版
2023/03/22 出版

"Introduction to Natural Language Processing: A practical guide for beginners" is a book that provides an overview of the field of natural language processing (NLP) and its applications. It is intended for individuals with little to no experience in the area. It aims to provide a comprehensive introduction to the concepts and techniques used in NLP. The book is aimed at beginners and offers a practical guide for understanding and working with NLP techniques. It covers NLP fundamental concepts and methods, such as tokenization, stemming, lemmatization, and part-of-speech tagging. It also discusses more advanced topics such as sentiment analysis, text generation, and machine translation. The book uses Python programming language and provides examples to help readers practice and apply the concepts they learn. The book also includes real-world case studies using NLP to solve real-world problems.The book is written clearly and concisely, making it easy for beginners to understand. It provides a good foundation for those interested in pursuing a career in NLP or related fields such as machine learning, artificial intelligence, or data science. It is also helpful for professionals who want to understand NLP and its applications in their areas.Overall, "Introduction to Natural Language Processing: A practical guide for beginners" is an excellent resource for anyone interested in learning about NLP. Whether you are a student, researcher, or professional, this book provides a comprehensive introduction to the field of NLP. It will help you understand and apply the concepts and techniques of this exciting field.

9 特價918
立即代訂
下次再買

Cybertax

Ingram 出版
2023/03/22 出版

The book examines cybersecurity as a tax on the organization and charts the best ways leadership can manage it efficiently. It provides actionable advice on how to adopt an effective cybersecurity posture and recommends treating cybersecurity as a critical business risks

9 特價1251
立即代訂
下次再買

Blogging All-In-One for Dummies

For Dummies 出版
2023/03/21 出版

Blog with the best of 'em! If you're looking for a complete guide to creating and solidifying your place in the blogosphere, you've come to the right place! With 8 books in one, Blogging All-in-One For Dummies is the only resource you'll need to get started or to improve your existing blog. Learn about the most popular blogging platforms, creating content worth reading, and methods for driving traffic to your blog. Cut through the confusion and find the facts about monetizing your blog, using the best blogging tools for you, and increasing reader engagement to become an active, successful member of the blogging community. You're ready to start blogging, so let Dummies show you the way! Perfect your blog idea and choose the best platform for you Get people to read your blog through search engine optimization and social media promotion Learn about the latest trends in the blogosphere Make money from your blog with creative monetization ideasBloggers of all skill and experience levels will find valuable information in Blogging All-in-One For Dummies.

9 特價1368
立即代訂
下次再買

Advances in Cryptology - Eurocrypt 2023

Carmit,Hazay  著
Springer 出版
2023/03/21 出版

This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023.The total of 109 full papers presented were carefully selected from 415 submissions. They are organized in topical sections as follows: Theoretical Foundations; Public Key Primitives with Advanced Functionalities; Classic Public Key Cryptography; Secure and Efficient Implementation, Cryptographic Engineering, and Real-World Cryptography; Symmetric Cryptology; and finally Multi-Party Computation and Zero-Knowledge.

9 特價6263
立即代訂
下次再買

5g Cyber Risks and Mitigation

Ingram 出版
2023/03/21 出版

5G technology is the next step in the evolution of wireless communication. However, it also introduces new cyber risks. 5G networks are expected to be much more complex, making them harder to secure. Fortunately, artificial intelligence can play a key role in mitigating these risks.

9 特價8352
立即代訂
下次再買

Risks and Security of Internet and Systems

Slim,Kallel  著
Springer 出版
2023/03/21 出版

This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2022, which took place in Sousse, Tunesia, during December 7-9, 2022. The 14full papers and 4 short papers included in this volume were carefully reviewed and selected from 39 submissions. The papers detail security issues in internet-related applications, networks and systems.

9 特價6785
立即代訂
下次再買

Euro-Par 2022: Parallel Processing Workshops

Springer 出版
2023/03/21 出版

This book constitutes revised selected papers from the workshops held at the 28th International European Conference on Parallel and Distributed Computing, Euro-Par 2022, which took place in Glasgow, UK, in August 22-26, 2022Out of a total of 35 submissions 24 papers have been accepted, 19 of these are included in this book.They stem from the following workshops: - Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Platforms (HeteroPar)- Workshop on Asynchronous Many-Task systems for Exascale (AMTE) - Workshop on Domain Specific Languages for High-Performance Computing (DSL-HPC)- Workshop on Distributed and Heterogeneous Programming in C and C++ (DHPCC++)- Workshop on Resiliency in High Performance Computing in Clouds, Grids, and Clusters (Resilience)In addition, the proceedings alsocontains 6 extended abstracts from the PhD Symposium.

9 特價3653
立即代訂
下次再買

Digital Forensics with Kali Linux - Third Edition

Packt 出版
2023/03/20 出版

Explore various digital forensics methodologies and frameworks and manage your cyber incidents effectivelyPurchase of the print or Kindle book includes a free PDF eBookKey Features: Gain red, blue, and purple team tool insights and understand their link with digital forensicsPerform DFIR investigation and get familiarized with Autopsy 4Explore network discovery and forensics tools such as Nmap, Wireshark, Xplico, and ShodanBook Description: Kali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. This third edition is updated with real-world examples and detailed labs to help you take your investigation skills to the next level using powerful tools.This new edition will help you explore modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, Hex Editor, and Axiom. You'll cover the basics and advanced areas of digital forensics within the world of modern forensics while delving into the domain of operating systems. As you advance through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. You'll also discover how to install Windows Emulator, Autopsy 4 in Kali, and how to use Nmap and NetDiscover to find device types and hosts on a network, along with creating forensic images of data and maintaining integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, memory, and operating systems.By the end of this digital forensics book, you'll have gained hands-on experience in implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation - all using Kali Linux's cutting-edge tools.What You Will Learn: Install Kali Linux on Raspberry Pi 4 and various other platformsRun Windows applications in Kali Linux using Windows Emulator as WineRecognize the importance of RAM, file systems, data, and cache in DFIRPerform file recovery, data carving, and extraction using Magic RescueGet to grips with the latest Volatility 3 framework and analyze the memory dumpExplore the various ransomware types and discover artifacts for DFIR investigationPerform full DFIR automated analysis with Autopsy 4Become familiar with network forensic analysis tools (NFATs)Who this book is for: This book is for students, forensic analysts, digital forensics investigators and incident responders, security analysts and administrators, penetration testers, or anyone interested in enhancing their forensics abilities using the latest version of Kali Linux along with powerful automated analysis tools. Basic knowledge of operating systems, computer components, and installation processes will help you gain a better understanding of the concepts covered.

9 特價2064
立即代訂
下次再買

Architecting Vue.js 3 Enterprise-Ready Web Applications

Packt 出版
2023/03/20 出版

A comprehensive, best-practices guide to building Vue.js apps that can scale along with your businessPurchase of the print or Kindle book includes a free PDF eBookKey Features: Implement Vue.js 3 to create Vue.js application with improved performanceExplore the Vue.js 3 composition API in-depth while building your enterprise applicationEnsure the scalability and maintainability of your apps with different types of testingBook Description: Building enterprise-ready Vue.js apps entails following best practices for creating high-performance and scalable applications. Complete with step-by-step explanations and best practices outlined, this Vue.js book is a must-read for any developer who works with a large Vue.js codebase where performance and scalability are indispensable.Throughout this book, you'll learn how to configure and set up Vue.js 3 and the composition API and use it to build real-world applications. You'll develop the skills to create reusable components and scale performance in Vue.js 3 applications. As you progress, the book guides you in scaling performance with asynchronous lazy loading, image compression, code splitting, and tree shaking. Furthermore, you'll see how to use the Restful API, Docker, GraphQL, and different types of testing to ensure that your Vue.js 3 application is scalable and maintainable.By the end of this book, you'll be well-versed in best practices for implementing Restful API, Docker, GraphQL, and testing methods to build and deploy an enterprise-ready Vue.js 3 application of any scale.What You Will Learn: Scale your app's performance in Vue.js 3 using best practicesImplement testing strategies for large-scale Vue.js codebaseManage large file structures using the micro frontend architectureDiscover the industry standard to Dockerize and deploy an enterprise Vue.js 3 web applicationUse GraphQL to deliver scalable and high-performing applicationsExplore various testing libraries and how to integrate them with Vue.js 3Who this book is for: The Vue.js 3 book is for Vue.js developers and professional frontend developers who want to build high-performance, production-grade, and highly scalable enterprise Vue.js apps from design to deployment. The book assumes working knowledge of Vue.js and JavaScript programming.

9 特價1835
立即代訂
下次再買

Managing Risks in Digital Transformation

Ashish,Kumar  著
Packt 出版
2023/03/20 出版

Secure your business in a post-pandemic world: Master digital risk identification and defensePurchase of the print or Kindle book includes a free PDF eBookKey Features: Become well-versed with sophisticated system-level security risks and the zero-trust frameworkLearn about remote working risks, modern collaboration, and securing the digital data estateKeep up with rapidly evolving compliances and regulations and their impact on cyber risksBook Description: With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet.This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof.In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed.What You Will Learn: Become aware of and adopt the right approach to modern digital transformationExplore digital risks across companies of all sizesStudy real-world cases that focus on post-pandemic digital transformationUnderstand insider threats and how to mitigate vulnerability exploitationGet to know how cyberwarfare targets infrastructure and disrupts critical systemsDiscover how implementing a regulatory framework can safeguard you in the current and future data landscapesWho this book is for: This book is for three categories of readers-those who own a business and are planning to scale it; those who are leading business and technology charters in large companies or institutions; and those who are academically or disciplinarily targeting cybersecurity and risk management as a practice-area.Essentially, this book is for board members, and professionals working in IT, GRC, and legal domains. It will also help technology leaders, including chief digital officers, chief privacy officers, chief risk officers, CISOs, CIOs, as well as students and cybersecurity enthusiasts with basic awareness of risks to navigate the digital threat landscape.

9 特價1605
立即代訂
下次再買

Linux Essentials for Hackers & Pentesters

Gitforgits 出版
2023/03/16 出版

Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Command"Linux Essentials for Hackers & Pentesters" is a hands-on tutorial-style book that teaches you the fundamentals of Linux, emphasising ethical hacking and penetration testing. This book employs the Kali Linux distribution to teach readers how to use Linux commands and packages to perform security testing on systems and networks. Text manipulation, network administration, ownership and permissions, BASH scripting, proxy servers, VPNs, and wireless networks are covered. The book prepares you to perform web application hacking and build your own hacking Linux toolkit by teaching you how to use Linux commands and begin to think like a hacker. Hands-on exercises and practical examples are included in each chapter to reinforce the concepts covered. This book is a must-have for anyone interested in a career in ethical hacking and penetration testing. Emphasizing ethical hacking practices, you'll learn not only how to hack but also how to do so responsibly and legally. This book will provide you with the skills and knowledge you need to make a positive impact in the field of cybersecurity while also acting ethically and professionally. This book will help you hone your skills and become a skilled and ethical Linux hacker, whether you're a beginner or an experienced hacker.Key LearningsLearning linux binaries, complex text patterns, and combining commandsModifying and cloning IP addresses, phishing MAC ID, accessing and troubleshooting DNSManipulating ownership and permissions, exploring sensitive files and writing BASH scriptsWorking around disk partitioning, filesystem errors and logical volume managementAccessing proxy server policies, intercepting server performance and manipulating proxy serversSetting up APs, firewalls, VLAN, managing access, WPA encryption, and network analysis using WiresharkTable of ContentsUp and Running with Linux BasicsHow to Manipulate Text?Administering NetworksAdd and Delete ApplicationsAdministering Ownership and PermissionsExploring Shells: BASH, ZSH and FISHStorage ManagementWorking around Proxy ServersAdministering VPNsWorking on Wireless Networks [Please don't forget to check out 'Look Inside' option on thumbnail to get more details on topics and subtopics under every chapter that is covered.]

9 特價2052
立即代訂
下次再買

Security Standardisation Research

Springer 出版
2023/03/14 出版

This book constitutes the refereed proceedings of the 8th International Conference on Security Standardisation Research, SSR 2023, held in Lyon, France, on April 22-23, 2023.The papers broadly cover cryptographic techniques, network security, identity management, security processes, standardization procedures, and more in the area of existing and newly developed security standards..

9 特價3131
立即代訂
下次再買

Security and Privacy in New Computing Environments

Qi,Jiang  著
Springer 出版
2023/03/14 出版

This book constitutes the refereed proceedings of the 5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xi'an, china, in December 30-31, 2022. The 12 full papers were selected from 38 submissions and are grouped in thematical parts as: authentication and key agreement; data security; network security.

9 特價3653
立即代訂
下次再買

Advances in Cryptology - Eurocrypt 2023

Carmit,Hazay  著
Springer 出版
2023/03/14 出版

This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023.The total of 109 full papers presented were carefully selected from 415 submissions. They are organized in topical sections as follows: Theoretical Foundations; Public Key Primitives with Advanced Functionalities; Classic Public Key Cryptography; Secure and Efficient Implementation, Cryptographic Engineering, and Real-World Cryptography; Symmetric Cryptology; and finally Multi-Party Computation and Zero-Knowledge.

9 特價6785
立即代訂
下次再買

Advances in Cryptology - Eurocrypt 2023

Carmit,Hazay  著
Springer 出版
2023/03/14 出版

This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023.The total of 109 full papers presented were carefully selected from 415 submissions. They are organized in topical sections as follows: Theoretical Foundations; Public Key Primitives with Advanced Functionalities; Classic Public Key Cryptography; Secure and Efficient Implementation, Cryptographic Engineering, and Real-World Cryptography; Symmetric Cryptology; and finally Multi-Party Computation and Zero-Knowledge.

9 特價6263
立即代訂
下次再買

Topics in Cryptology - Ct-Rsa 2023

Mike,Rosulek  著
Springer 出版
2023/03/14 出版

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2023, CT-RSA 2023, held in San Francisco, CA, USA, in April 2023. The 26 full papers presented in this volume were carefully reviewed and selected from 76 submissions. The conference presents papers on subjects such as Cryptographic Implementations, Quantum Cryptanalysis, Advanced Public-Key Encryption, Tools for Privacy-Enhancing Technologies, Symmetric Cryptanalysis, Multiparty Protocols, Digital Signatures, Fault Attacks and Side Channels, Heuristic Approaches, Symmetric-Key Constructions, and Key Agreement.

9 特價5741
立即代訂
下次再買

Advances in Cryptology - Eurocrypt 2023

Carmit,Hazay  著
Springer 出版
2023/03/14 出版

This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023.The total of 109 full papers presented were carefully selected from 415 submissions. They are organized in topical sections as follows: Theoretical Foundations; Public Key Primitives with Advanced Functionalities; Classic Public Key Cryptography; Secure and Efficient Implementation, Cryptographic Engineering, and Real-World Cryptography; Symmetric Cryptology; and finally Multi-Party Computation and Zero-Knowledge.

9 特價6263
立即代訂
下次再買

Advances in Cryptology - Eurocrypt 2023

Carmit,Hazay  著
Springer 出版
2023/03/14 出版

This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023.The total of 109 full papers presented were carefully selected from 415 submissions. They are organized in topical sections as follows: Theoretical Foundations; Public Key Primitives with Advanced Functionalities; Classic Public Key Cryptography; Secure and Efficient Implementation, Cryptographic Engineering, and Real-World Cryptography; Symmetric Cryptology; and finally Multi-Party Computation and Zero-Knowledge.

9 特價6263
立即代訂
下次再買

Security, Privacy and Data Analytics

Springer 出版
2023/03/14 出版

This book constitutes refereed proceedings of the International Conference on Security, Privacy and Data Analytics, ISPDA 2021. The volume covers a wide range of topics, including big data and analytics, cloud security and privacy, data intelligence, hardware security, network security, blockchain technology and distributed ledger, machine learning for security, and many others. The volume includes novel contributions and the latest developments from researchers across industry and academia working in security, privacy, and data analytics from technological and social perspectives. The book will serve as a valuable reference resource for academics and researchers across the globe.

9 特價7307
立即代訂
下次再買

Secure Data Management for Online Learning Applications

Ingram 出版
2023/03/13 出版

This book talks about the theoretical frameworks, technical methodologies, Information security, and empirical research findings in the field to protect your computers and information from adversaries. Solution to secure data management issues for online learning applications will keep you interested and involved throughout.

9 特價8352
立即代訂
下次再買

Grand Research Challenges in Games and Entertainment Computing in Brazil - Grandgamesbr 2020-2030

Springer 出版
2023/03/11 出版

This book constitutes selected papers presented during the two events: the First Forum, GranDGamesBR 2020, held in Recife, Brazil, in November 2020, and the Second Forum, GranDGamesBR 2021, held in Gramado, Brazi, in October 2021.The 12 papers presented were thoroughly reviewed and selected from 24 submissions. The topics included in this volume cover the following fields connected to games and entertainment computing: game design, educational games, games evaluation, game-based learning, player experience, human-computer interaction, games industry, business models, game software ecosystems, ethics, serious games, cyberdemocracy, emotional design, computer graphics, cognitive simulation, immersive entertainment, virtual/augmented/extended reality, gamification, and creative process.

9 特價4436
立即代訂
下次再買

Secure Software Systems

2023/03/10 出版

Secure Software Systems presents an approach to secure software systems design and development that tightly integrates security and systems design and development (or software engineering) together. It addresses the software development process from the perspective of a security practitioner. The text focuses on the processes, concepts, and concerns of ensuring that secure practices are followed throughout the secure software systems development life cycle, including the practice of following the life cycle rather than just doing ad hoc development.

9 特價5478
立即代訂
下次再買

Getting Started with Angular

Apress 出版
2023/03/10 出版

Immerse yourself in the architecture of an Angular application, starting with an introduction to TypeScript and ES6, and progressing to modules and components used to build complex applications. This book presents a hands-on approach to becoming a proficient Angular developer by building three complete applications.You'll start with an overview of the Angular framework where TypeScript and ES6 are introduced. Next you'll see how to build an application (RestApp) using the in-memory module to mock an API that communicates with a rest API performing crud operations. This is followed by an application (AuthApp) that uses a third party service to provide authentication and authorization capabilities to handle registrations. You'll then build an application (BlogApp) that communicates with a MongoDB database in six parts.Part 1 covers MongoDB, how to install bootstrap, login service, and adding the logic of the form. Part 2 covers how to start the project on the server, create the database and AuthService, and save the user in the session. In Parts 3 and 4 you will learn to create the post collection, post component, and sharpen details. In Parts 5 and 6 you will study adding, editing, and deleting posts with testing. By the end of the book you'll have the necessary knowledge to write and execute automated tests on your applications, and deploy them to a server. What You'll Learn Divide the logic of an application into componentsCommunicate with an APIRelease the power of the observables to solve asynchronous programming problems Include Bootstrap so that your application looks great on different devices Who This Book Is For Web developers with basic knowledge of JavaScript, HTML, and CSS.

9 特價2223
立即代訂
下次再買

What Is ChatGPT Doing ... and Why Does It Work?

Ingram 出版
2023/03/09 出版

Nobody expected this--not even its creators: ChatGPT has burst onto the scene as an AI capable of writing at a convincingly human level. But how does it really work? What's going on inside its "AI mind"? In this short book, prominent scientist and computation pioneer Stephen Wolfram provides a readable and engaging explanation that draws on his decades-long unique experience at the frontiers of science and technology. Find out how the success of ChatGPT brings together the latest neural net technology with foundational questions about language and human thought posed by Aristotle more than two thousand years ago.

9 特價511
立即代訂
下次再買

The Iot Architect’s Guide to Attainable Security and Privacy

Ingram 出版
2023/03/09 出版

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining."Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."-- Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."-- Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."-- Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express"If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."-- Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems

9 特價3131
立即代訂
下次再買

Password Logbook (Hip Floral)

Rock Point  著
Ingram 出版
2023/03/08 出版

Keep track of your online passwords in this gorgeous, alphabetically tabbed notebook featuring a modern floral design. In this 4 ? 5.75-inch, 128-page hardcover notebook with removable cover band, record the necessarily complex passwords and user login names required to thwart hackers. You'll find: Internet password safety and naming tips A to Z tabbed pages with space to list website, username, and five passwords for each Dedicated pages to record software license information, with spaces for license number, purchase date, renewal date, and monthly fee Dedicated pages to record network settings and passwords, including for modem, router, WAN, LAN, and wireless A notes section with blank lined pages Just say "no" to piles of sticky notes and scraps of paper with your passwords and logins! This internet password logbook provides an easy way to keep track of website addresses, usernames, and passwords in one discreet and convenient location.

9 特價376
立即代訂
下次再買

Ansible for Vmware by Examples

Luca,Berton  著
Apress 出版
2023/03/08 出版

Learn to use the Ansible open source IT automation tool to automate your VMware infrastructure. This book contains all of the obvious and not-so-obvious best practices of Ansible automation. Each lesson summarizes a specific use case for the modern VMware infrastructure and is focused on a single module from the most important parameter, including live demo of code and real-life usage.You'll configure the Ansible Controller to interact with VMware infrastructure using the "community.VMware" Ansible documentation collection and the appropriate Python libraries. Next, learn how to automate the creation of a virtual machine manually and from a template, start and stop using the shutdown and forced-power off a Virtual Machine, take and delete and snapshot, add a new hard disk and expand a currently attached hard disk, as well as gather information for data centers, clusters, host systems, and virtual machines.By the end of this book, you'll be well-versed in efficiently maintaining a VMware infrastructure with Ansible Automation. You'll also be able to save time and reduce manual errors using simple human-readable automation technology.What You'll LearnAutomate your VMware infrastructure using Ansible codeInstall Ansible in operating systems such as RedHat, Ubuntu, Fedora, etc.Write and execute your first Ansible Playbook code Troubleshoot the most common error messagesWho This Book Is For IT professionals of every industry who would like a jargon-free understanding of Ansible technology, including VMware, Linux, and Windows Systems Administrators, DevOps professionals, thought leaders, and infrastructure-as-code enthusiasts.

9 特價2223
立即代訂
下次再買

The Social Media Guidebook and Calendar for Real Estate by OnJaLee LaShay

Lulu.com 出版
2023/03/04 出版

Harness Social Media Power: Take control of your online presence and become an authoritative figure in the real estate industry with this guidebook. Learn how to create and manage effective campaigns across a variety of platforms including Facebook, Twitter, LinkedIn, Instagram, and more to reach the right audiences and have conversations with them.

9 特價1147
立即代訂
下次再買

Strategic Content Design

Ingram 出版
2023/03/04 出版

Good content isn't magical--it's thoughtful, creative, and well researched words put together with finesse. In Strategic Content Design, you'll learn how to create effective content, using hard-won research methods, best practices, and proven tips for conducting quantitative and qualitative content-focused research and testing."This is me, shouting from the rooftops: Strategic Content Design belongs in the hands of absolutely anyone who cares about content in UX--by which I mean EVERYONE."--Kristina Halvorson, CEO and Founder, Brain TrafficWho Should Read This Book?Content professionals of all types--copywriters, strategists, designers, managers, operations managers, and leaders of content people. It's also useful if you're part of a user experience or product team, including UX writers, researchers, and software developers.TakeawaysRealistically assess the current state of your content.Learn how to write content research questions. Create a content research study and evaluate your content&apos: s effectiveness. Identify which specific words or content elements to test. Analyze your research results. Identify which specific words or content elements to test.Determine which research methods and tools are ideal for your team's content research needs.Elevate the role of content design in your company, proving that content is key to creating an outstanding customer experience--and improving your bottom line.Create a content research roadmap.Learn from professional content people in case studies that highlight practical examples.

9 特價2870
立即代訂
下次再買

Security and Trust Management

Springer 出版
2023/02/28 出版

This book constitutes the post proceedings of the 18th International Workshop on Security and Trust Management, STM 2022, co-located with the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in Copenhagen, Denmark, in September 2022.The 7 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 18 submissions. The workshop presents papers with topics such as security and trust access control, cryptographic protocols, identity management, security metrics, and privacy.

9 特價3131
立即代訂
下次再買

Constructive Side-Channel Analysis and Secure Design

Springer 出版
2023/02/28 出版

This book constitutes the refereed proceedings of the 14th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2023, held in Munich, Germany, during April 3-4, 2023. The 12 full papers included in this book were carefully reviewed and selected from 28 submissions. They were organized in topical sections as follows: fault-injection analyses and countermeasures; side-channel analyses and countermeasures; attacks on PQC and countermeasure; and analyses and tools.

9 特價3653
立即代訂
下次再買
頁數44/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing