0403_卡芙涅
0401~0403_4月選書

英文書 > 全部商品

Code-Based Cryptography

Springer 出版
2023/02/28 出版

This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway.The 8 papers presented in this volume were carefully reviewed and selected from 23 submissions. These contributions span all aspects of code-based cryptography, from design to software and hardware implementations, works about recent NIST PQC standardization candidates, side channel analysis, and improved decoding techniques.

9 特價3131
立即代訂
下次再買

Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II

Anand,Handa  著
Ingram 出版
2023/02/28 出版

This book has recipes and tool development expertise and describe projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.

9 特價7308
立即代訂
下次再買

What Is Cybersecurity For?

Tim,Stevens  著
Ingram 出版
2023/02/28 出版

How will protecting our digital infrastructure shape our future? Cybersecurity is one of the key practical and political challenges of our time. It is at the heart of how modern societies survive and thrive, yet public understanding is still rudimentary: media portrayals of hoodie-wearing hackers accessing the Pentagon don't convey its complexity or significance to contemporary life. This book addresses this gap, showing that the political dimension is as important as the technological one. It accessibly explains the complexities of global information systems, the challenges of providing security to users, societies, states and the international system, and the multitude of competing players and ambitions in this arena. Making the case for understanding it not only as a technical project, but as a crucial political one that links competing visions of what cybersecurity is for, it tackles the ultimate question: how can we do it better?

9 特價477
立即代訂
下次再買

Windows Ransomware Detection and Protection

Packt 出版
2023/02/27 出版

Protect your end users and IT infrastructure against common ransomware attack vectors and efficiently monitor future threatsPurchase of the print or Kindle book includes a free PDF eBookKey Features: Learn to build security monitoring solutions based on Microsoft 365 and SentinelUnderstand how Zero-Trust access and SASE services can help in mitigating risksBuild a secure foundation for Windows endpoints, email, infrastructure, and cloud servicesBook Description: If you're looking for an effective way to secure your environment against ransomware attacks, this is the book for you. From teaching you how to monitor security threats to establishing countermeasures to protect against ransomware attacks, Windows Ransomware Detection and Protection has it all covered.The book begins by helping you understand how ransomware attacks work, identifying different attack vectors, and showing you how to build a secure network foundation and Windows environment. You'll then explore ransomware countermeasures in different segments, such as Identity and Access Management, networking, Endpoint Manager, cloud, and infrastructure, and learn how to protect against attacks. As you move forward, you'll get to grips with the forensics involved in making important considerations when your system is attacked or compromised with ransomware, the steps you should follow, and how you can monitor the threat landscape for future threats by exploring different online data sources and building processes.By the end of this ransomware book, you'll have learned how configuration settings and scripts can be used to protect Windows from ransomware attacks with 50 tips on security settings to secure your Windows workload.What You Will Learn: Understand how ransomware has evolved into a larger threatSecure identity-based access using services like multifactor authenticationEnrich data with threat intelligence and other external data sourcesProtect devices with Microsoft Defender and Network ProtectionFind out how to secure users in Active Directory and Azure Active DirectorySecure your Windows endpoints using Endpoint ManagerDesign network architecture in Azure to reduce the risk of lateral movementWho this book is for: This book is for Windows administrators, cloud administrators, CISOs, and blue team members looking to understand the ransomware problem, how attackers execute intrusions, and how you can use the techniques to counteract attacks. Security administrators who want more insights into how they can secure their environment will also find this book useful. Basic Windows and cloud experience is needed to understand the concepts in this book.

9 特價1835
立即代訂
下次再買

CISSP Exam Study Guide For Security Professionals

Ingram 出版
2023/02/23 出版

If you want to become a Cybersecurity Professional, this book is for you! BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover: Baseline Configuration, Diagrams & IP ManagementData Sovereignty & Data Loss PreventionData Masking, Tokenization & Digital Rights ManagementGeographical Considerations & Cloud Access Security BrokerSecure Protocols, SSL Inspection & HashingAPI Gateways & Recovery SitesHoneypots, Fake Telemetry & DNS SinkholeCloud Storage and Cloud ComputingIaaS, PaaS & SaaSManaged Service Providers, Fog Computing & Edge ComputingVDI, Virtualization & ContainersMicroservices and APIsInfrastructure as Code (IAC) & Software Defined Networking (SDN)Service Integrations and Resource PoliciesEnvironments, Provisioning & DeprovisioningIntegrity Measurement & Code AnalysisSecurity Automation, Monitoring & ValidationSoftware Diversity, Elasticity & ScalabilityDirectory Services, Federation & AttestationTime-Based Passwords, Authentication & TokensProximity Cards, Biometric & Facial RecognitionVein and Gait Analysis & Efficacy RatesGeographically Disperse, RAID & MultipathLoad Balancer, Power Resiliency & ReplicationBackup Execution PoliciesHigh Availability, Redundancy & Fault ToleranceEmbedded Systems & SCADA SecuritySmart Devices / IoT & Special Purpose DevicesHVAC, Aircraft/UAV & MFDsReal Time Operating Systems & Surveillance SystemsBarricades, Mantraps & AlarmsCameras, Video Surveillance & GuardsCable Locks, USB Data Blockers, Safes & FencingMotion Detection / Infrared & Proximity ReadersDemilitarized Zone & Protected Distribution SystemShredding, Pulping & PulverizingDeguassing, Purging & WipingCryptographic Terminology and HistoryDigital Signatures, Key Stretching & HashingQuantum Communications & Elliptic Curve CryptographyQuantum Computing, Cipher Modes & XOR FunctionEncryptions & BlockchainsAsymmetric/Lightweight Encryption & SteganographyCipher Suites, Random & Quantum Random Number GeneratorsSecure Networking ProtocolsHost or Application Security SolutionsCoding, Fuzzing & Quality TestingHow to Implement Secure Network DesignsNetwork Access Control, Port Security & Loop ProtectionSpanning Tree, DHCP Snooping & MAC FilteringAccess Control Lists & Route SecurityIntrusion Detection and PreventionFirewalls & Unified Threat ManagementHow to Install and Configure Wireless SecurityHow to Implement Public Key InfrastructureData Sources to Support an IncidentHow to Assess Organizational SecurityDetection and AnalysisTest Scenarios & SimulationsThreat Intelligence LifecycleMobile Device ManagementDLP, Content Filters & URL FiltersKey Aspects of Digital ForensicsQualitative and Quantitative AnalysisBusiness Impact AnalysisIdentification of Critical SystemsOrder of RestorationContinuity of OperationsPrivacy and Sensitive Data ConceptsIncident Notification and EscalationData ClassificationPrivacy-enhancing TechnologiesData Owners & ResponsibilitiesInformation LifecycleBUY THIS BOOK NOW AND GET STARTED TODAY!

9 特價1835
立即代訂
下次再買

Privacy in the Digital Age

Nil,?okluk  著
Ingram 出版
2023/02/23 出版

With the transition to the information age, a large amount of personal data has begun to be collected through technology. Following the digital traces of users and recording their personal data through technology have made them vulnerable. Users whose every move is monitored through technology have lost their control over the data that everyone can access. This situation has revealed data security and privacy problems. This book, which is interdisciplinary, transdisciplinary and multidisciplinary, deals with data security and privacy issues regarding digital technologies. The book examines data security and privacy issues in computer science and communication. The articles in the book deal with issues such as the information age, digital communication, big data, digital literacy, digital capitalism, metaverse, in the axis of data security and privacy. Presenting the subject from different perspectives, the book will guide researchers and experts who will work on data security, privacy and digital communication.

9 特價649
立即代訂
下次再買

Tiktok Boom

Sourcebooks 出版
2023/02/23 出版

A fascinating look behind the scenes of today's hottest social media appTikTok is the fastest growing app in the world, and the first to challenge Silicon Valley's dominance of social media. Why is TikTok so appealing to today's social media audience? How has it taken over the world in just a few years, and what does its success mean for the future of technology?In TikTok Boom, journalist and author of YouTubers Chris Stokel-Walker has interviewed scores of people connected to the world's hottest app, including current and former employees, as well as some of TikTok's biggest names in front of and behind the lens, gleaning never-before-seen insights as to how the new influencer ecosystem works. And he goes behind the scenes at its ambitious Chinese owner, ByteDance, which wants to become Beijing's answer to Google, and finds out what has happened to its founder, Yiming Zhang. TikTok Boom presents a nuanced, informed and incisive read on the characters and strategies behind the world's new tech order.

9 特價649
立即代訂
下次再買

Cybersecurity Enforcement and Monitoring Solutions

Ingram 出版
2023/02/23 出版

If you want to become a Cybersecurity Professional, this book is for you! IT Security jobs are on the rise! Small, medium or large size companies are always on the look out to get on board bright individuals to provide their services for Business as Usual (BAU) tasks or deploying new as well as on-going company projects. Most of these jobs requiring you to be on site but since 2020, companies are willing to negotiate with you if you want to work from home (WFH). Yet, to pass the Job interview, you must have experience. Still, if you think about it, all current IT security professionals at some point had no experience whatsoever. The question is; how did they get the job with no experience? Well, the answer is simpler then you think. All you have to do is convince the Hiring Manager that you are keen to learn and adopt new technologies and you have willingness to continuously research on the latest upcoming methods and techniques revolving around IT security. Here is where this book comes into the picture. Why? Well, if you want to become an IT Security professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. Passing security exams isn't easy. In fact, due to the raising security beaches around the World, both above mentioned exams are becoming more and more difficult to pass. Whether you want to become an Infrastructure Engineer, IT Security Analyst or any other Cybersecurity Professional, this book (as well as the other books in this series) will certainly help you get there! BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover: - Secure Networking Protocols- Host or Application Security Solutions- Coding, Fuzzing & Quality Testing- How to Implement Secure Network Designs- Network Access Control, Port Security & Loop Protection- Spanning Tree, DHCP Snooping & MAC Filtering- Access Control Lists & Route Security- Intrusion Detection and Prevention- Firewalls & Unified Threat Management- How to Install and Configure Wireless Security- How to Implement Secure Mobile Solutions- Geo-tagging & Context-Aware Authentication- How to Apply Cybersecurity Solutions to the Cloud- How to Implement Identity and Account Management Controls- How to Implement Authentication and Authorization Solutions- How to Implement Public Key Infrastructure BUY THIS BOOK NOW AND GET STARTED TODAY!

9 特價825
立即代訂
下次再買

Cissp

Ingram 出版
2023/02/23 出版

If you want to become a Cybersecurity Professional, this book is for you! IT Security jobs are on the rise! Small, medium or large size companies are always on the look out to get on board bright individuals to provide their services for Business as Usual (BAU) tasks or deploying new as well as on-going company projects. Most of these jobs requiring you to be on site but since 2020, companies are willing to negotiate with you if you want to work from home (WFH). Yet, to pass the Job interview, you must have experience. Still, if you think about it, all current IT security professionals at some point had no experience whatsoever. The question is; how did they get the job with no experience? Well, the answer is simpler then you think. Well, if you want to become an IT Security professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. Passing security exams isn't easy. In fact, due to the raising security beaches around the World, both above mentioned exams are becoming more and more difficult to pass. Whether you want to become an Infrastructure Engineer, IT Security Analyst or any other Cybersecurity Professional, this book will certainly help you get there! BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover: - Data Sources to Support an Incident- How to Assess Organizational Security- File Manipulation & Packet Captures- Forensics & Exploitation Frameworks- Data Sanitization Tools- How to Apply Policies, Processes and Procedures for Incident Response- Detection and Analysis- Test Scenarios & Simulations- Threat Intelligence Lifecycle- Disaster Recovery & Business Continuity- How to Implement Data Sources to Support an Investigation- Retention Auditing, Compliance & Metadata- How to Implement Mitigation Techniques to Secure an Environment- Mobile Device Management- DLP, Content Filters & URL Filters- Key Aspects of Digital Forensics- Chain of Custody & Legal Hold- First Responder Best Practices- Network Traffic and Logs- Screenshots & Witnesses- Preservation of Evidence- Data Integrity- Jurisdictional Issues & Data Breach Notification Laws BUY THIS BOOK NOW AND GET STARTED TODAY!

9 特價825
立即代訂
下次再買

CISSP Exam Study Guide

Ingram 出版
2023/02/23 出版

If you want to become a Cybersecurity Professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. Whether you want to become an Infrastructure Engineer, IT Security Analyst or any other Cybersecurity Professional, this book will certainly help you get there! BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover: Secure Networking ProtocolsHost or Application Security SolutionsCoding, Fuzzing & Quality TestingHow to Implement Secure Network DesignsNetwork Access Control, Port Security & Loop ProtectionSpanning Tree, DHCP Snooping & MAC FilteringAccess Control Lists & Route SecurityIntrusion Detection and PreventionFirewalls & Unified Threat ManagementHow to Install and Configure Wireless SecurityHow to Implement Secure Mobile SolutionsGeo-tagging & Context-Aware AuthenticationHow to Apply Cybersecurity Solutions to the CloudHow to Implement Identity and Account Management ControlsHow to Implement Authentication and Authorization SolutionsHow to Implement Public Key InfrastructureFile Manipulation & Packet CapturesForensics & Exploitation FrameworksData Sanitization ToolsHow to Apply Policies, Processes and Procedures for Incident ResponseDetection and AnalysisTest Scenarios & SimulationsThreat Intelligence LifecycleDisaster Recovery & Business ContinuityHow to Implement Data Sources to Support an InvestigationRetention Auditing, Compliance & MetadataHow to Implement Mitigation Techniques to Secure an EnvironmentMobile Device ManagementDLP, Content Filters & URL FiltersKey Aspects of Digital ForensicsChain of Custody & Legal HoldFirst Responder Best PracticesNetwork Traffic and LogsScreenshots & WitnessesPreservation of EvidenceData IntegrityJurisdictional Issues & Data Breach Notification LawsThreat Types & Access ControlApplicable Regulations, Standards, & FrameworksBenchmarks & Secure Configuration GuidesHow to Implement Policies for Organizational SecurityMonitoring & BalancingAwareness & Skills TrainingTechnology & Vendor DiversityChange Management & Asset ManagementRisk Management Process and ConceptsRisk Register, Risk Matrix, and Heat MapRegulatory ExamplesQualitative and Quantitative AnalysisBusiness Impact AnalysisIdentification of Critical SystemsOrder of RestorationContinuity of OperationsPrivacy and Sensitive Data ConceptsIncident Notification and EscalationData ClassificationPrivacy-enhancing TechnologiesData Owners & ResponsibilitiesInformation Lifecycle BUY THIS BOOK NOW AND GET STARTED TODAY!

9 特價1440
立即代訂
下次再買

Cybersecurity Design Principles

Ingram 出版
2023/02/23 出版

If you want to become a Cybersecurity Professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover: Baseline Configuration, Diagrams & IP Management Data Sovereignty & Data Loss Prevention Data Masking, Tokenization & Digital Rights Management Geographical Considerations & Cloud Access Security Broker Secure Protocols, SSL Inspection & Hashing API Gateways & Recovery Sites Honeypots, Fake Telemetry & DNS Sinkhole Cloud Storage and Cloud Computing IaaS, PaaS & SaaS Managed Service Providers, Fog Computing & Edge Computing VDI, Virtualization & Containers Microservices and APIs Infrastructure as Code (IAC) & Software Defined Networking (SDN) Service Integrations and Resource Policies Environments, Provisioning & Deprovisioning Integrity Measurement & Code Analysis Security Automation, Monitoring & Validation Software Diversity, Elasticity & Scalability Directory Services, Federation & AttestationEmbedded Systems & SCADA SecuritySmart Devices / IoT & Special Purpose DevicesHVAC, Aircraft/UAV & MFDsReal Time Operating Systems & Surveillance SystemsBarricades, Mantraps & AlarmsCameras, Video Surveillance & GuardsCable Locks, USB Data Blockers, Safes & FencingMotion Detection / Infrared & Proximity ReadersDemilitarized Zone & Protected Distribution SystemShredding, Pulping & Pulverizing Deguassing, Purging & Wiping Cryptographic Terminology and History Digital Signatures, Key Stretching & HashingQuantum Communications & Elliptic Curve CryptographyQuantum Computing, Cipher Modes & XOR FunctionEncryptions & BlockchainsAsymmetric/Lightweight Encryption & SteganographyCipher Suites, Random & Quantum Random Number Generators BUY THIS BOOK NOW AND GET STARTED TODAY!

9 特價1164
立即代訂
下次再買

Frameworkless Front-End Development

Apress 出版
2023/02/21 出版

Explore an alternative method of front-end application development without using frameworks or third-party libraries. This updated book provides you with the required skills and freedom to consider a "no framework" approach when choosing a technology for creating a new project. New topics covered include a brief history of JavaScript frameworks and their key developments, how to protect domain code, and how to work with frameworkless in legacy applications.You'll work through the most important issues in a clear and sensible way, using practical methods and tools to gain an understanding of non-functional requirements. This book answers questions on important topics such as state management, making a routing system, creating a REST client using fetch, and reveals the trade-offs and risks associated with choosing the wrong framework or tool for your project, as well as provides sustainability, and functional alternatives.Frameworkless Front-End Development breaksdown the concept of technical debt and the ways in which a framework can impact the lifespan of a project. Along with gaining a comprehensive and clear guide on coding effectively from scratch without frameworks, you will also learn some principles of technical decision-making.What You'll LearnUnderstand DOM manipulation Manage the state of a fronted application with different patternsSafely migrate existent applications to a new framework or to frameworkless codeUnderstand the importance of non-functional requirementsSee how a Framework can affect the "health" of a codebaseWho This Book Is For Skilled JavaScript developers who want to understand how to effectively write code without using dependenciesCTOs who need to help teams to choose a technology stack for their next projectConsultants that need to refactor an existent JavaScript front-end codebase

9 特價1539
立即代訂
下次再買

Cisco Cloud Infrastructure

Cisco Press 出版
2023/02/21 出版

Manage, operate, and integrate existing infrastructure in hybrid and multicloud environments Hybrid cloud adoption is accelerating, as companies discover that hybrid cloud architectures can reduce hosting costs, improve agility, promote scalability, accelerate deployment, and enhance security. Cisco Cloud Infrastructure is the definitive reference for every IT professional, IT manager, and CIO who needs to understand, implement, or manage Cisco hybrid cloud solutions for networking, compute, storage, applications, or security. Bringing together crucial information, a team of leading Cisco architects present end-to-end insights for seamlessly integrating management and operation of public cloud resources and on-premises deployments. The authors describe each Cisco solution and offering in detail, from both technical and business viewpoints. They review each leading deployment option, reviewing key concepts, best practices, guidelines, tradeoffs, design do's and don'ts, case studies, and more. Cisco Cloud Infrastructure contains many configuration examples--including topologies, configuration, and verification--each based on actual Cisco Cloud deployments, and specifically designed to help you drive value faster. Use Cisco data center orchestration software to automate tasks and operations, and enable an agile DevOps approach to continual improvement Gain big-picture insights and actionable drill-down data from the Cisco API-driven monitoring and assurance solutions Optimize workloads across clouds, on-premises data centers, labs, and co-location facilities for scale, performance, agility, and value Use AppDynamics enterprise-grade performance cloud monitoring and analytics tools to identify issues and overcome growth challenges Efficiently manage modern workloads with Intersight Workload Optimization Manager, Cisco Container Platform, and Intersight Kubernetes Service (IKS) Manage interdependencies between networks, compute, storage, application, and security in hybrid cloud environments Take advantage of Cisco Cloud Webex to improve collaboration in hybrid/multicloud environments Integrate operational hardware with the Internet of Things (IoT) to gain deeper insight for greater efficiency Protect users, data, and applications everywhere with Cloudlock, Umbrella, Cloud Analytics, Duo, and API-based integrations

9 特價2753
立即代訂
下次再買

Pattern-Oriented Memory Forensics

Ingram 出版
2023/02/20 出版
9 特價1377
立即代訂
下次再買

Designing an Internet

Mit Press 出版
2023/02/18 出版

Why the Internet was designed to be the way it is, and how it could be different, now and in the future. How do you design an internet? The architecture of the current Internet is the product of basic design decisions made early in its history. What would an internet look like if it were designed, today, from the ground up? In this book, MIT computer scientist David Clark explains how the Internet is actually put together, what requirements it was designed to meet, and why different design decisions would create different internets. He does not take today's Internet as a given but tries to learn from it, and from alternative proposals for what an internet might be, in order to draw some general conclusions about network architecture. Clark discusses the history of the Internet, and how a range of potentially conflicting requirements--including longevity, security, availability, economic viability, management, and meeting the needs of society--shaped its character. He addresses both the technical aspects of the Internet and its broader social and economic contexts. He describes basic design approaches and explains, in terms accessible to nonspecialists, how networks are designed to carry out their functions. (An appendix offers a more technical discussion of network functions for readers who want the details.) He considers a range of alternative proposals for how to design an internet, examines in detail the key requirements a successful design must meet, and then imagines how to design a future internet from scratch. It's not that we should expect anyone to do this; but, perhaps, by conceiving a better future, we can push toward it.

9 特價2047
立即代訂
下次再買

Online Social Networks Security

Brij B,Gupta  著
Ingram 出版
2023/02/18 出版

This book elaborates on various attacks on Social Networks with classifications, countermeasures and consequences. It also highlights some key contributions related to current defensive approaches of various attacks on OSNs.

9 特價1512
立即代訂
下次再買

Secure Searchable Encryption and Data Management

Brij B,Gupta  著
Ingram 出版
2023/02/18 出版

This book provides every necessary detail required to develop the secure searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models which ensures the minimum security requirements for real-world application.

9 特價1512
立即代訂
下次再買

Cybersecurity in the Covid-19 Pandemic

Ingram 出版
2023/02/18 出版

This book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data.

9 特價1512
立即代訂
下次再買

Distributed Denial of Service (Ddos) Attacks

Brij B,Gupta  著
Ingram 出版
2023/02/18 出版

This book is designed for readers who have an interest in the cyber security domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals focusing on defensive schemes and applications for detecting or mitigating DDoS attacks.

9 特價1512
立即代訂
下次再買

Campus Network Architectures and Technologies

Ningguo,Shen  著
Ingram 出版
2023/02/18 出版

The book will provide readers with a comprehensive understanding of next-generation campus network solutions, technical implementation, planning, design, and additional know-how, leveraging Huawei's years of technical expertise and practices in the network field.

9 特價3496
立即代訂
下次再買

Frontend Development Projects with Vue.js 3 - Second Edition

Maya,Shavin  著
Packt 出版
2023/02/17 出版

Let industry experts guide you on your journey to becoming a Vue.js developer with the help of practical projects and fun exercisesPurchase of the print or Kindle book includes a free PDF eBookKey Features: Work through mini projects, exercises, and activities to learn Vue.js in a practical wayCreate dynamic components and user interfaces that are fast and intuitiveFind out how you can get the most out of the Vue.js 3 framework and build an end-to-end projectBook Description: Are you looking to use Vue.js 3 for building web apps but don't know where to begin?Frontend Development Projects with Vue.js 3 will help you get to grips with the core concepts of this JavaScript framework using practical examples that simulate real-world web projects. With this updated edition, you'll experience all aspects of the new and improved Vue.js 3 as you work on mini projects such as a chat interface, a shopping cart, a price calculator, a to-do app, and a profile card generator for storing contact details. These realistic projects are presented as bite-size exercises that you can enjoy even as you challenge yourself.Throughout the book, you'll discover how to manage data in Vue components, define communication interfaces between components, and handle static and dynamic routing to control application flow. You'll also work with Vite and Vue DevTools and learn how to handle transition and animation effects for an engaging user experience. Finally, you'll see how to test your app and deploy it to the web.By the end of this Vue.js book, you'll have the skills that enable you to work like an experienced Vue developer to build professional apps that can be used by others and have the confidence to tackle real-world frontend web development problems.What You Will Learn: Set up a development environment and start your first Vue.js 3 projectModularize a Vue application using component hierarchiesUse external JavaScript libraries to create animationsShare state between components and use Pinia for state managementWork with APIs using Pinia and Axios to fetch remote dataValidate functionality with unit testing and end-to-end testingGet to grips with web app deploymentWho this book is for: This book is designed for Vue.js beginners. Whether this is your first JavaScript framework, or if you're already familiar with React or Angular, this book will get you on the right track. To understand the concepts explained in this book, you must be familiar with HTML, CSS, JavaScript, and Node package management.

9 特價2294
立即代訂
下次再買

Aiot Technologies and Applications for Smart Environments

Ingram 出版
2023/02/15 出版

Although some IoT systems are built for simple event control where a sensor signal triggers a corresponding reaction, many events are far more complex, requiring applications to interpret the event using analytical techniques to initiate proper actions. Artificial intelligence of things (AIoT) applies intelligence to the edge and gives devices the ability to understand the data, observe the environment around them, and decide what to do best with minimum human intervention. With the power of AI, AIoT devices are not just messengers feeding information to control centers. They have evolved into intelligent machines capable of performing self-driven analytics and acting independently. A smart environment uses technologies such as wearable devices, IoT, and mobile internet to dynamically access information, connect people, materials and institutions, and then actively manages and responds to the ecosystem's needs in an intelligent manner. In this edited book, the contributors present challenges, technologies, applications and future trends of AIoT in realizing smart and intelligent environments, including frameworks and methodologies for applying AIoT in monitoring devices and environments, tools and practices most applicable to product or service development to solve innovation problems, advanced and innovative techniques, and practical implementations to enhance future smart environment systems. Chapters cover a broad range of applications including smart cities, smart transportation and smart agriculture. This book is a valuable resource for industry and academic researchers, scientists, engineers and advanced students in the fields of ICTs and networking, IoT, AI and machine and deep learning, data science, sensing, robotics, automation and smart technologies and smart environments.

9 特價6075
立即代訂
下次再買

Privacy in the Age of Big Data

Ingram 出版
2023/02/13 出版

Thoroughly updates the first edition by addressing the significant advances in data-driven technologies, their intrusion deeper in our lives, the limits on data collection newly required by governments in North America and Europe, and the new security challenges of a world rife with ransomware and hacking.

9 特價2106
立即代訂
下次再買

Zed Attack Proxy Cookbook

Ryan,Soper  著
Packt 出版
2023/02/13 出版

Dive into security testing and web app scanning with ZAP, a powerful OWASP security toolPurchase of the print or Kindle book includes a free PDF eBookKey Features: Master ZAP to protect your systems from different cyber attacksLearn cybersecurity best practices using this step-by-step guide packed with practical examplesImplement advanced testing techniques, such as XXE attacks and Java deserialization, on web applicationsBook Description: Maintaining your cybersecurity posture in the ever-changing, fast-paced security landscape requires constant attention and advancements. This book will help you safeguard your organization using the free and open source OWASP Zed Attack Proxy (ZAP) tool, which allows you to test for vulnerabilities and exploits with the same functionality as a licensed tool.Zed Attack Proxy Cookbook contains a vast array of practical recipes to help you set up, configure, and use ZAP to protect your vital systems from various adversaries. If you're interested in cybersecurity or working as a cybersecurity professional, this book will help you master ZAP.You'll start with an overview of ZAP and understand how to set up a basic lab environment for hands-on activities over the course of the book. As you progress, you'll go through a myriad of step-by-step recipes detailing various types of exploits and vulnerabilities in web applications, along with advanced techniques such as Java deserialization.By the end of this ZAP book, you'll be able to install and deploy ZAP, conduct basic to advanced web application penetration attacks, use the tool for API testing, deploy an integrated BOAST server, and build ZAP into a continuous integration and continuous delivery (CI/CD) pipeline.What You Will Learn: Install ZAP on different operating systems or environmentsExplore how to crawl, passively scan, and actively scan web appsDiscover authentication and authorization exploitsConduct client-side testing by examining business logic flawsUse the BOAST server to conduct out-of-band attacksUnderstand the integration of ZAP into the final stages of a CI/CD pipelineWho this book is for: This book is for cybersecurity professionals, ethical hackers, application security engineers, DevSecOps engineers, students interested in web security, cybersecurity enthusiasts, and anyone from the open source cybersecurity community looking to gain expertise in ZAP. Familiarity with basic cybersecurity concepts will be helpful to get the most out of this book.

9 特價2064
立即代訂
下次再買

Windows APT Warfare

Sheng-Hao,Ma  著
Packt 出版
2023/02/13 出版

Learn Windows system design from the PE binary structure to modern and practical attack techniques used by red teams to implement advanced preventionPurchase of the print or Kindle book includes a free PDF eBookKey Features: Understand how malware evades modern security productsLearn to reverse engineer standard PE format program filesBecome familiar with modern attack techniques used by multiple red teamsBook Description: An Advanced Persistent Threat (APT) is a severe form of cyberattack that lies low in the system for a prolonged time and locates and then exploits sensitive information. Preventing APTs requires a strong foundation of basic security techniques combined with effective security monitoring. This book will help you gain a red team perspective on exploiting system design and master techniques to prevent APT attacks. Once you've understood the internal design of operating systems, you'll be ready to get hands-on with red team attacks and, further, learn how to create and compile C source code into an EXE program file. Throughout this book, you'll explore the inner workings of how Windows systems run and how attackers abuse this knowledge to bypass antivirus products and protection.As you advance, you'll cover practical examples of malware and online game hacking, such as EXE infection, shellcode development, software packers, UAC bypass, path parser vulnerabilities, and digital signature forgery, gaining expertise in keeping your system safe from this kind of malware.By the end of this book, you'll be well equipped to implement the red team techniques that you've learned on a victim's computer environment, attempting to bypass security and antivirus products, to test its defense against Windows APT attacks.What You Will Learn: Explore various DLL injection techniques for setting API hooksUnderstand how to run an arbitrary program file in memoryBecome familiar with malware obfuscation techniques to evade antivirus detectionDiscover how malware circumvents current security measures and toolsUse Microsoft Authenticode to sign your code to avoid tamperingExplore various strategies to bypass UAC design for privilege escalationWho this book is for: This book is for cybersecurity professionals- especially for anyone working on Windows security, or malware researchers, network administrators, ethical hackers looking to explore Windows exploit, kernel practice, and reverse engineering. A basic understanding of reverse engineering and C/C++ will be helpful.

9 特價2064
立即代訂
下次再買

Optisystem Program for Various Fiber Optic Modeling

Ingram 出版
2023/02/11 出版

In this book, several challenges face researchers and communication, engineering students. Especially, when handling project for fiber optic network and picking the suitable software to be used. As they are looking for software to meet their needs and requirement to perform analysis for fiber optic communication and design a powerful model that could support the utilization of advanced modulation methods and have a proper analysis of the results. So, this book clarify the software of Optisystem in easy way and gives a lot of information that can help reader to get full knowledge about the software.

9 特價3029
立即代訂
下次再買

Gpt-3

Packt 出版
2023/02/10 出版

GPT-3: The Ultimate Guide To Building NLP Products With OpenAI API is a comprehensive book on the Generative Pre-trained Transformer 3 AI language model, covering its significance, capabilities, and application in creating innovative NLP Products. Key Features: Exploration of GPT-3: The book explores GPT-3, a powerful language model, and its capabilities Business applications: The book provides practical knowledge on using GPT-3 to create new business products Examination of AI trends: The book examines the impact of GPT-3 on emerging creator economy and trends like no-code & AGI Book Description: GPT-3 has made creating AI apps simpler than ever. This book provides a comprehensive guide on how to utilize the OpenAI API with ease. It explores imaginative methods of utilizing this tool for your specific needs and showcases successful businesses that have been established through its use. The book is divided into two sections, with the first focusing on the fundamentals of the OpenAI API. The second part examines the dynamic and thriving environment that has arisen around GPT-3. Chapter 1 sets the stage with background information and defining key terms. Chapter 2 goes in-depth into the API, breaking it down into its essential components, explaining their functions and offering best practices. Chapter 3, you will build your first app with GPT-3. Chapter 4 features interviews with the founders of successful GPT-3-based products, who share challenges and insights gained. Chapter 5 examines the perspective of enterprises on GPT-3 and its potential for adoption. The problematic consequences of widespread GPT-3 adoption, such as misapplication and bias, are addressed along with efforts to resolve these issues in Chapter 6. Finally, Chapter 7 delves into the future by exploring the most exciting trends and possibilities as GPT-3 becomes increasingly integrated into the commercial ecosystem. What You Will Learn: Learn the essential components of the OpenAI API along with the best practices Build and deploy your first GPT-3 powered application Learn from the journeys of industry leaders, startup founders who have built and deployed GPT-3 based products at scale Look at how enterprises view GPT-3 and its potential for adoption for scalable solutions Navigating the Consequences of GPT-3 adoption and efforts to resolve them Explore the exciting trends and possibilities of combining models with GPT-3 with No code Who this book is for: This book caters to individuals from diverse backgrounds, not just technical experts. It should be useful to you if you are: A data expert seeking to improve your AI expertise An entrepreneur looking to revolutionize the AI industry A business leader seeking to enhance your AI knowledge and apply it to informed decision making A content creator in the language domain looking to utilize GPT-3's language abilities for creative and imaginative projects Anyone with an AI idea that was previously deemed technically unfeasible or too costly to execute

9 特價1605
立即代訂
下次再買

Privacy in Practice

Alan,Tang  著
Ingram 出版
2023/02/09 出版

Privacy is not just the right to be left alone, but also the right to autonomy, control, and access to your personal data. This book aims at helping privacy leaders, professionals and organizations in establishing a unified, integrated, privacy program, both on a personal and enterprise-wide level.

9 特價3235
立即代訂
下次再買

Privacy in Practice

Alan,Tang  著
Ingram 出版
2023/02/08 出版

Privacy is not just the right to be left alone, but also the right to autonomy, control, and access to your personal data. The employment of new technologies over the last three decades drives personal data to play an increasingly important role in our economies, societies, and everyday lives. Personal information has become an increasingly valuable commodity in the digital age.At the same time, the abundance and persistence of personal data have elevated the risks to individuals' privacy. In the age of Big Data, the Internet of Things, Biometrics, and Artificial Intelligence, it is becoming increasingly difficult for individuals to fully comprehend, let alone control, how and for what purposes organizations collect, use, and disclose their personal information. Consumers are growing increasingly concerned about their privacy, making the need for strong privacy champions ever more acute.With a veritable explosion of data breaches highlighted almost daily across the globe, and the introduction of heavy-handed privacy laws and regulatory frameworks, privacy has taken center stage for businesses. Businesses today are faced with increasing demands for privacy protections, ever-more complex regulations, and ongoing cybersecurity challenges that place heavy demands on scarce resources. Senior management and executives now acknowledge privacy as some of the biggest risks to the business.Privacy, traditionally, has existed in a separate realm, resulting in an unintentional and problematic barrier drawn between the privacy team and the rest of the organization. With many regulatory frameworks to consider, building an all-encompassing data privacy program becomes increasingly challenging. Effective privacy protection is essential to maintaining consumer trust and enabling a robust and innovative digital economy in which individuals feel they may participate with confidence.This book aims at helping organizations in establishing a unified, integrated, enterprise-wide privacy program. This book is aiming to help privacy leaders and professionals to bridge the privacy program and business strategies, transform legal terms and dead text to live and easy-to-understand essential requirements which organizations can easily implement, identify and prioritize privacy program gap initiatives and promote awareness and embed privacy into the everyday work of the agency and its staff.

9 特價7308
立即代訂
下次再買

Decision and Game Theory for Security

Fei,Fang  著
Springer 出版
2023/02/08 出版

This book constitutes the refereed proceedings of the 13th International Conference on Decision and Game Theory for Security, GameSec 2022, held in October 2022 in Pittsburgh, PA, USA. The 15 full papers presented were carefully reviewed and selected from 39 submissions. The papers are grouped thematically on: deception in security; planning and learning in dynamic environments; security games; adversarial learning and optimization; novel applications and new game models.

9 特價4436
立即代訂
下次再買

The Shortcut

Ingram 出版
2023/02/08 出版

The Shortcut: Why Intelligent Machines Do Not Think Like Us provides an accessible yet probing exposure of AI in its prevalent form today, proposing a new narrative to connect and make sense of events that happened in the recent tumultuous past, and enabling us to think soberly about the road ahead.

9 特價1773
立即代訂
下次再買

Views from the Bike Shed

Ingram 出版
2023/02/08 出版

For Mark Charlton, blogging is 'a road of chance and discovery', one which has shaped the person he's become; a journey that is 'happenstance on acid.' In Views from the Bike Shed he not only shares a selection of engaging, articulate and deeply-felt posts from the eponymous blog, but also charts his praxis as a writer. Advocating for blogging as a process and form that deserves serious attention, Charlton shows how it changes our writing and opens up unexpected opportunities along the way. Interspersed between blog posts on life and landscape, objects and artistic process there are also 'Interludes'. And together these interludes not only give insight into how to blog, but dive into the depths of why blogging is such a rich resource in our writerly and human toolbox. Exploring how writing from our experience can become an inclusive and authentic means of connecting with readers, allowing them to make their own discoveries, Views from the Bike Shed is at once eminently practical as well as giving a vital meditation on the ways writers can push their own boundaries through this medium. Mark Charlton's Views from the Bike Shed blog has been an addiction of mine for years. Mark's views are wise, finely expressed, broad-ranging, acutely observed and scintillatingly intelligent. A published collection is cause for widespread rejoicing. I hope you enjoy it as much as I did the originals.- Jim Perrin

9 特價917
立即代訂
下次再買

Learn React with TypeScript - Second Edition

Carl,Rippon  著
Packt 出版
2023/02/06 出版

Take your first step in building modern-day component-based web apps using the latest features and capabilities of React and TypeScript with this easy-to-follow guideKey Features- Learn to use different React hooks with TypeScript- Explore different styling approaches while building React web apps- Gain experience in using React Dev Tools to debug components- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionReading, navigating, and debugging a large frontend codebase is a major issue faced by frontend developers. This book is designed to help web developers like you learn about ReactJS and TypeScript, both of which power large-scale apps for many organizations.This second edition of Learn React with TypeScript is updated, enhanced, and improved to cover new features of React 18 including hooks, state management libraries, and features of TypeScript 4. The book will enable you to create well-structured and reusable React components that are easy to read and maintain, leveraging modern design patterns.You'll be able to ensure that all your components are type-safe, making the most of TypeScript features, including some advanced types. You'll also learn how to manage complex states using Redux and how to interact with a GraphQL web API. Finally, you'll discover how to write robust unit tests for React components using Jest.By the end of the book, you'll be well-equipped to use both React and TypeScript.What you will learn- Gain first-hand experience of TypeScript and its productivity features- Understand how to transpile your TypeScript code into JavaScript for running in a browser- Build a React frontend codebase with hooks- Interact with REST and GraphQL web APIs- Design and develop strongly typed reusable components- Create automated component testsWho this book is forThis book is for experienced frontend developers looking to build large scale web applications using React and TypeScript. Intermediate knowledge of JavaScript, HTML and CSS is a prerequisite.Table of Contents- Introducing React- Introducing TypeScript- Setting Up React and TypeScript- Using React Hooks- Approaches to Styling React Frontends- Routing with React Router- Working with Forms- State Management- Interacting with RESTful APIs- Interacting with GraphQL APIs- Reusable Components- Unit Testing with Jest and React Testing Library

9 特價2523
立即代訂
下次再買

Cybersecurity - Data Protection and Strategies

Ingram 出版
2023/02/03 出版

The first edition of Cybersecurity Data Protection and Strategies offers a wide range of topics related to data protection strategies. Information Technology (IT) students, practitioners, scholars, management and readers who are seeking deeper insight into cybersecurity strategies will find this text most useful. The text provides in-depth knowledge on the safe use of technologies as it relates to network, hardware, software, WIFI, mobile, and computer application (Apps). Key Features - Cybersecurity Data Protection and Strategies presents key strategies against internet scams, network intrusions as well as lay the foundation for data protection. The text provides simple strategies that help internet users detect and defend their data while using the worldwide web. - The issue of privacy and security are key factors that impact internet users. Managing cookies programs may help users to make conscious decision about how their information are stored and disseminated; especially in these times when users' information is stored digitally on many organizational platforms. - Identity theft and internet threat to users in the cybersecurity environment are examined. Identity theft has increased rapidly as the usage of the internet expands. The increase in identity theft is due to the lack of cybersecurity protection strategies and users' identity theft education. - Social network platform is one of the mediums used by hackers to steal users' identities. Social media networking platforms like Instagram, Facebook, and Twitter a mass millions of users; thus, cybercriminals use this opportunity to prey on users who have vulnerable data protection systems. - Biometric technology concerns the use of the unique physiological and behavioral characteristics of individuals as identification as well as for cybersecurity data protection. Biometrics technology utilizes the unique features of individuals such as fingerprint, iris, palm print, retina, and voice tones to develop high quality users' authentication that secure users' data. - The global danger of computer and cyber viruses as well as their impact on individuals and businesses are reviewed. The framework strategies of this text have been designed for data protection. To learn more about Cybersecurity Data Protection and Strategies, visit the text website: www.phcdcybersecurity.com

9 特價7426
立即代訂
下次再買

Cybersecurity - Data Protection and Strategies

Ingram 出版
2023/02/03 出版

The first edition of Cybersecurity Data Protection and Strategies offers a wide range of topics related to data protection strategies. Information Technology (IT) students, practitioners, scholars, management and readers who are seeking deeper insight into cybersecurity strategies will find this text most useful. The text provides in-depth knowledge on the safe use of technologies as it relates to network, hardware, software, WIFI, mobile, and computer application (Apps). Key Features - Cybersecurity Data Protection and Strategies presents key strategies against internet scams, network intrusions as well as lay the foundation for data protection. The text provides simple strategies that help internet users detect and defend their data while using the worldwide web. - The issue of privacy and security are key factors that impact internet users. Managing cookies programs may help users to make conscious decision about how their information are stored and disseminated; especially in these times when users' information is stored digitally on many organizational platforms. - Identity theft and internet threat to users in the cybersecurity environment are examined. Identity theft has increased rapidly as the usage of the internet expands. The increase in identity theft is due to the lack of cybersecurity protection strategies and users' identity theft education. - Social network platform is one of the mediums used by hackers to steal users' identities. Social media networking platforms like Instagram, Facebook, and Twitter a mass millions of users; thus, cybercriminals use this opportunity to prey on users who have vulnerable data protection systems. - Biometric technology concerns the use of the unique physiological and behavioral characteristics of individuals as identification as well as for cybersecurity data protection. Biometrics technology utilizes the unique features of individuals such as fingerprint, iris, palm print, retina, and voice tones to develop high quality users' authentication that secure users' data. - The global danger of computer and cyber viruses as well as their impact on individuals and businesses are reviewed. The framework strategies of this text have been designed for data protection. To learn more about Cybersecurity Data Protection and Strategies, visit the text website: www.phcdcybersecurity.com

9 特價6081
立即代訂
下次再買

Microsoft Defender for Endpoint in Depth

Packt 出版
2023/02/03 出版

Gain an in-depth understanding of Microsoft Defender 365, explore its features, and learn successful implementation strategies with this expert-led practitioner's guide.Key FeaturesUnderstand the history of MDE, its capabilities, and how you can keep your organization secureLearn to implement, operationalize, and troubleshoot MDE from both IT and SecOps perspectivesLeverage useful commands, tips, tricks, and real-world insights shared by industry expertsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionWith all organizational data and trade secrets being digitized, the threat of data compromise, unauthorized access, and cyberattacks has increased exponentially. Microsoft Defender for Endpoint (MDE) is a market-leading cross-platform endpoint security solution that enables you to prevent, detect, investigate, and respond to threats. MDE helps strengthen the security posture of your organization.This book starts with a history of the product and a primer on its various features. From prevention to attack surface reduction, detection, and response, you'll learn about the features, their applicability, common misconceptions, and caveats. After planning, preparation, deployment, and configuration toward successful implementation, you'll be taken through a day in the life of a security analyst working with the product. You'll uncover common issues, techniques, and tools used for troubleshooting along with answers to some of the most common challenges cybersecurity professionals face. Finally, the book will wrap up with a reference guide with tips and tricks to maintain a strong cybersecurity posture.By the end of the book, you'll have a deep understanding of Microsoft Defender for Endpoint and be well equipped to keep your organization safe from different forms of cyber threats.What you will learnUnderstand the backstory of Microsoft Defender for EndpointDiscover different features, their applicability, and caveatsPrepare and plan a rollout within an organizationExplore tools and methods to successfully operationalize the productImplement continuous operations and improvement to your security postureGet to grips with the day-to-day of SecOps teams operating the productDeal with common issues using various techniques and toolsUncover commonly used commands, tips, and tricksWho this book is forThis book is for cybersecurity professionals and incident responders looking to increase their knowledge of MDE and its underlying components while learning to prepare, deploy, and operationalize the product. A basic understanding of general systems management, administration, endpoint security, security baselines, and basic networking is required.Table of ContentsA Brief History of Microsoft Defender for EndpointExploring Next-Generation ProtectionIntroduction to Attack Surface ReductionUnderstanding Endpoint Detection and ResponsePlanning and Preparing for DeploymentConsiderations for Deployment and ConfigurationManaging and Maintaining the Security PostureEstablishing Security OperationsTroubleshooting Common IssuesReference Guide, Tips, and Tricks

9 特價2294
立即代訂
下次再買

Trustworthy Autonomic Computing

Thaddeus,Eze  著
Ingram 出版
2023/02/02 出版

The autonomic computing concept seeks to reduce the complexity of pervasively ubiquitous system management and maintenance by shifting the responsibility for low-level tasks from humans to the system while allowing humans to concentrate on high-level tasks. This is achieved by building self-managing systems that are generally capable of self-configuring, self-healing, self-optimising, and self-protecting. Trustworthy autonomic computing technologies are being applied in data-centre and cloud management, smart cities and autonomous systems including driverless cars. But there are still significant challenges to achieve trustworthiness. This book covers challenges and solution of autonomic computing trustworthiness from methods and techniques to achieve consistent and reliable system self-management.

9 特價5872
立即代訂
下次再買

Medical Information Processing and Security

Ingram 出版
2023/02/02 出版

Medical information refers to any data related to a patient's medical history, mental or physical condition, diagnoses or treatment. Processing refers to the way the information is obtained, stored and analysed. Security of information refers to the information being kept in a secure format so the patient's information is not compromised. With the widespread increase in the sheer volume of medical data being collected and created all the time, it has never been more important to ensure that such information is collected, stored and processed in a reliable and secure manner.

9 特價6075
立即代訂
下次再買

Executive's Cybersecurity Program Handbook

Jason,Brown  著
Packt 出版
2023/01/30 出版

Develop strategic plans for building cybersecurity programs and prepare your organization for compliance investigations and auditsKey Features: Get started as a cybersecurity executive and design an infallible security programPerform assessments and build a strong risk management frameworkPromote the importance of security within the organization through awareness and training sessionsBook Description: Ransomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks.This Executive's Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). You'll explore the different types of cybersecurity frameworks, how they differ from one another, and how to pick the right framework to minimize cyber risk. As you advance, you'll perform an assessment against the NIST Cybersecurity Framework, which will help you evaluate threats to your organization by identifying both internal and external vulnerabilities. Toward the end, you'll learn the importance of standard cybersecurity policies, along with concepts of governance, risk, and compliance, and become well-equipped to build an effective incident response team.By the end of this book, you'll have gained a thorough understanding of how to build your security program from scratch as well as the importance of implementing administrative and technical security controls.What You Will Learn: Explore various cybersecurity frameworks such as NIST and ISOImplement industry-standard cybersecurity policies and procedures effectively to minimize the risk of cyberattacksFind out how to hire the right talent for building a sound cybersecurity team structureUnderstand the difference between security awareness and trainingExplore the zero-trust concept and various firewalls to secure your environmentHarden your operating system and server to enhance the securityPerform scans to detect vulnerabilities in softwareWho this book is for: This book is for you if you are a newly appointed security team manager, director, or C-suite executive who is in the transition stage or new to the information security field and willing to empower yourself with the required knowledge. As a Cybersecurity professional, you can use this book to deepen your knowledge and understand your organization's overall security posture. Basic knowledge of information security or governance, risk, and compliance is required.

9 特價2064
立即代訂
下次再買

Drupal 10 Development Cookbook - Third Edition

Matt,Glaman  著
Packt 出版
2023/01/30 出版

Build your expertise in developing dynamic web experiences by leveraging all-new capabilities of Drupal 10Purchase of the print or Kindle book includes a free PDF eBookKey FeaturesDesign your digital experience platform with robust content management and editorial workflowsWrite custom modules to extend Drupal to meet your requirements by creating customized plugins, entity types, and pagesEnhance your Drupal site using modern frontend development build toolsBook DescriptionThis new and improved third edition cookbook is packed with the latest Drupal 10 features such as a new, flexible default frontend theme - Olivero, and improved administrative experience with a new theme - Claro. This comprehensive recipe book provides updated content on the WYSIWYG (What You See Is What You Get) editing experience, improved core code performance, and code cleanup.Drupal 10 Development Cookbook begins by helping you create and manage a Drupal site. Next, you'll get acquainted with configuring the content structure and editing content. You'll also get to grips with all new updates of this edition, such as creating custom pages, accessing and working with entities, running and writing tests with Drupal, migrating external data into Drupal, and turning Drupal into an API platform. As you advance, you'll learn how to customize Drupal's features with out-of-the-box modules, contribute extensions, and write custom code to extend Drupal.By the end of this book, you'll be able to create and manage Drupal sites, customize them to your requirements, and build custom code to deliver your projects.What you will learnCreate and manage a Drupal site's codebaseDesign tailored content creator experiencesLeverage Drupal by creating customized pages and pluginsTurn Drupal into an API platform for exposing content to consumersImport data into Drupal using the data migration APIsAdvance your Drupal site with modern frontend tools using Laravel MixWho this book is forIf you are a beginner or an intermediate Drupal developer, looking to jumpstart your journey in application building, then this book is for you. Basic knowledge of web development is required.Table of ContentsUp and Running with DrupalContent Building ExperienceDisplaying Content through ViewsExtending Drupal with Custom CodeCreating Custom PagesAccessing and working with entitiesCreating Forms with the Form APIPlug and Play with PluginsCreating Custom Entity TypeTheming and Frontend DevelopmentMultilingual and InternationalizationBuilding APIs with DrupalWriting Automated Tests in DrupalMigrating External Data into Drupal

9 特價2294
立即代訂
下次再買

Instagram Marketing

Jacob,Kirby  著
Ingram 出版
2023/01/29 出版

INSTAGRAM MARKETINGIntroducing the ultimate guide to Instagram marketing!Are you struggling to grow your Instagram following for your personal brand, business, or just for fun? Look no further! This book, "Instagram Marketing: A Guide to Growing Your Brand with Instagram" is here to teach you the ins and outs of promoting your brand on the world's largest photo-sharing platform.In this comprehensive guide, you'll learn how to: Run effective Instagram ads to reach your target audienceCreate visually stunning, engaging content that will keep your followers coming back for moreUnderstand and analyze your Instagram analytics to track your growth and successWe've compiled years of experience and expertise into this easy-to-follow guide, making it the perfect resource for anyone looking to take their Instagram marketing to the next level. Whether you're a small business owner, a social media influencer, or just looking to boost your personal brand, this book has something for everyone.Don't let your Instagram presence fall behind the competition. Purchase this book today, available in both print and digital formats, and start seeing real results on your account!

9 特價855
立即代訂
下次再買

Instagram Marketing

Jacob,Kirby  著
Ingram 出版
2023/01/29 出版

INSTAGRAM MARKETINGIntroducing the ultimate guide to Instagram marketing!Are you struggling to grow your Instagram following for your personal brand, business, or just for fun? Look no further! This book, "Instagram Marketing: A Guide to Growing Your Brand with Instagram" is here to teach you the ins and outs of promoting your brand on the world's largest photo-sharing platform.In this comprehensive guide, you'll learn how to: Run effective Instagram ads to reach your target audienceCreate visually stunning, engaging content that will keep your followers coming back for moreUnderstand and analyze your Instagram analytics to track your growth and successWe've compiled years of experience and expertise into this easy-to-follow guide, making it the perfect resource for anyone looking to take their Instagram marketing to the next level. Whether you're a small business owner, a social media influencer, or just looking to boost your personal brand, this book has something for everyone.Don't let your Instagram presence fall behind the competition. Purchase this book today, available in both print and digital formats, and start seeing real results on your account!

9 特價513
立即代訂
下次再買

I, AI

Lulu.com 出版
2023/01/26 出版

In this exciting new edition of "I, AI," readers are invited to join a simulated chat show created with the innovative TwinChatAI.com technology. Through this simulated chat show, readers are taken on a journey with a journalist and an AI engineer to explore the latest developments in the field of Artificial Intelligence. Throughout the book, readers will engage in simulated dialogs with AI experts, covering a wide range of topics related to ChatGPT and AI. The book provides a solid engineering foundation and showcases the model's ability to generalize through poetry, lyrics, software, descriptions of images, philosophies, and various perspectives. In addition, readers can access a free link to creation prompts, which enables them to learn and create their own books. This feature allows readers to fully immerse themselves in the world of AI and explore their own creativity. "I, AI" is a must-read for anyone interested in the current state of AI and its potential impact on society. It is a valuable resource for researchers, engineers, and policymakers who want to stay up-to-date with the latest developments in the field. Through the simulated chat show and the creation prompts, readers will gain a deep understanding of the current state of AI and the potential for self-awareness and reflection.

9 特價2105
立即代訂
下次再買

The Vulnerability Researcher's Handbook

Packt 出版
2023/01/25 出版

Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receiving credit for your workKey Features: Build successful strategies for planning and executing zero-day vulnerability researchFind the best ways to disclose vulnerabilities while avoiding vendor conflictLearn to navigate the complicated CVE publishing process to receive credit for your researchBook Description: Vulnerability researchers are in increasingly high demand as the number of security incidents related to crime continues to rise with the adoption and use of technology. To begin your journey of becoming a security researcher, you need more than just the technical skills to find vulnerabilities; you'll need to learn how to adopt research strategies and navigate the complex and frustrating process of sharing your findings. This book provides an easy-to-follow approach that will help you understand the process of discovering, disclosing, and publishing your first zero-day vulnerability through a collection of examples and an in-depth review of the process.You'll begin by learning the fundamentals of vulnerabilities, exploits, and what makes something a zero-day vulnerability. Then, you'll take a deep dive into the details of planning winning research strategies, navigating the complexities of vulnerability disclosure, and publishing your research with sometimes-less-than-receptive vendors.By the end of the book, you'll be well versed in how researchers discover, disclose, and publish vulnerabilities, navigate complex vendor relationships, receive credit for their work, and ultimately protect users from exploitation. With this knowledge, you'll be prepared to conduct your own research and publish vulnerabilities.What You Will Learn: Find out what zero-day vulnerabilities are and why it's so important to disclose and publish themLearn how vulnerabilities get discovered and published to vulnerability scanning toolsExplore successful strategies for starting and executing vulnerability researchDiscover ways to disclose zero-day vulnerabilities responsiblyPopulate zero-day security findings into the CVE databasesNavigate and resolve conflicts with hostile vendorsPublish findings and receive professional credit for your workWho this book is for: This book is for security analysts, researchers, penetration testers, software developers, IT engineers, and anyone who wants to learn how vulnerabilities are found and then disclosed to the public. You'll need intermediate knowledge of operating systems, software, and interconnected systems before you get started. No prior experience with zero-day vulnerabilities is needed, but some exposure to vulnerability scanners and penetration testing tools will help accelerate your journey to publishing your first vulnerability.

9 特價1697
立即代訂
下次再買

Cryptography

Ingram 出版
2023/01/25 出版

Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students. It offers a comprehensive primer for the subject's fundamentals and features the most current advances. The fourth edition provides in-depth treatment of the methods and protocols that safeguard the informat

9 特價3496
立即代訂
下次再買

Cryptology

Ingram 出版
2023/01/25 出版

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Playfair, ADFGVX, Alberti, Vigene re, and Hill ciphers.

9 特價3496
立即代訂
下次再買

Introduction to Coding Theory

Ingram 出版
2023/01/25 出版

This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second edition has three parts: an elementary introduction to coding, theory and applications of codes,

9 特價3496
立即代訂
下次再買

Cognitive Systems and Information Processing

Fuchun,Sun  著
Springer 出版
2023/01/24 出版

This book constitutes the refereed proceedings of the 7th International Conference on Cognitive Systems and Information Processing, ICCSIP 2022, held in Fuzhou, China, during November 18-20, 2022.The 47 papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in the following topical sections as follows: Award; Algorithm; Application; Manipulation & Control; Hardware and Vision.

9 特價6263
立即代訂
下次再買
頁數45/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing