0403_卡芙涅
0401~0403_4月選書

英文書 > 全部商品

Imaginary Advice

Lulu.com 出版
2022/11/14 出版

Lined creative writing journal. Contains one-hundred writing prompts. From author Ross Sutherland, creator of the experimental fiction podcast, Imaginary Advice.

9 特價1440
立即代訂
下次再買

Network Design Cookbook

Lulu.com 出版
2022/11/12 出版

Version 10.2.8 (August 2016) The Network Design Cookbook is a guide that provides a structured process that you, as a network engineer or a consultant, can use to meet your critical technical objectives while keeping within the parameters of industry best practices. While it primarily deals with Cisco equipment, the Network Design Cookbook lays out a design process that allows for the incorporation of products from other vendors. In this book, you will find valuable resources and tools for constructing the topology and services you need, with step-by-step design assistance for many solutions such as LAN, WAN, Data Center, Internet Edge, Firewall, and Collaboration. The Network Design Cookbook explains not only the importance of designing an ideal network, but also the consequences if the design is not well thought out. This book will be a valuable tool in both learning how to design a network, as well as a reference as you advance in your career.

9 特價2250
立即代訂
下次再買

Trusted Computing Platforms

Sean W,Smith  著
Springer 出版
2022/11/09 出版

Trusted Computing Platforms: Design and Applications is written for security architects, application designers, and the general computer scientist interested in the evolution and uses of this emerging technology. Starting with early prototypes and proposed applications, this book surveys the longer history of amplifying small amounts of hardware security into broader system security, using real case studies on security architecture and applications on multiple types of platforms. The author examines the theory, design, implementation of the IBM 4758 secure coprocessor platform and discusses real case study applications that exploit its unique capabilities. The author discusses how these foundations grow into newer industrial designs, discusses alternate architectures and applications that this newer hardware can enable, and cutting-edge research

9 特價5689
立即代訂
下次再買

Advances in Cryptology - Asiacrypt 2022

Springer 出版
2022/11/08 出版

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

9 特價5741
立即代訂
下次再買

Advances in Cryptology - Asiacrypt 2022

Springer 出版
2022/11/08 出版

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

9 特價6263
立即代訂
下次再買

Advances in Cryptology - Asiacrypt 2022

Springer 出版
2022/11/08 出版

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

9 特價6785
立即代訂
下次再買

Progress in Cryptology - Indocrypt 2022

Springer 出版
2022/11/08 出版

The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYPT 2022, which was held during December 11-14, 2022. The conference took place in Kolkata, India.The 31 full papers included in this book were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows: symmetric key cryptology;protocols and implementation;cryptanalysis;boolean functions;quantum cryptography and cryptanalysis;post quantum cryptography

9 特價6263
立即代訂
下次再買

Advances in Cryptology - Asiacrypt 2022

Springer 出版
2022/11/08 出版

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

9 特價5741
立即代訂
下次再買

Cyber Operations

Wiley 出版
2022/11/08 出版

Cyber Operations A rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolutionary pace, creating with every passing year a more connected world with an ever-expanding digital footprint. Cyber technologies like voice-activated search, automated transport, and the Internet of Things are only broadening the interface between the personal and the online, which creates new challenges and new opportunities. Improving both user security and quality of life demands a rigorous, farsighted approach to cyber operations. Cyber Operations offers a groundbreaking contribution to this effort, departing from earlier works to offer a comprehensive, structured framework for analyzing cyber systems and their interactions. Drawing on operational examples and real-world case studies, it promises to provide both cyber security professionals and cyber technologies designers with the conceptual models and practical methodologies they need to succeed. Cyber Operations readers will also find: Detailed discussions of case studies including the 2016 United States Presidential Election, the Dragonfly Campaign, and more Coverage of cyber attack impacts ranging from the psychological to attacks on physical infrastructure Insight from an author with top-level experience in cyber security Cyber Operations is ideal for all technological professionals or policymakers looking to develop their understanding of cyber issues.

9 特價5967
立即代訂
下次再買

Full Stack Quarkus and React

Packt 出版
2022/11/07 出版

Create and deploy standalone, fully functional, web applications using Quarkus and ReactKey Features: Get up and running with web application development speedily using React and QuarkusGet an overview of how to make a Java backend work seamlessly with a JavaScript frontendLearn how to deploy your working application to Kubernetes and share it with the worldBook Description: React has established itself as one of the most popular and widely adopted frameworks thanks to its simple yet scalable app development abilities. Quarkus comes across as a fantastic alternative for backend development by boosting developer productivity with features such as pre-built integrations, application services, and more that bring a new, revolutionary developer experience to Java. To make the best use of both, this hands-on guide will help you get started with Quarkus and React to create and deploy an end-to-end web application.This book is divided into three parts. In the first part, you'll begin with an introduction to Quarkus and its features, learning how to bootstrap a Quarkus project from the ground up to create a tested and secure HTTP server for your backend. The second part focuses on the frontend, showing you how to create a React project from scratch to build the application's user interface and integrate it with the Quarkus backend. The last part guides you through creating cluster configuration manifests and deploying them to Kubernetes as well as other alternatives, such as Fly.io.By the end of this full stack development book, you'll be confident in your skills to combine the robustness of both frameworks to create and deploy standalone, fully functional web applications.What You Will Learn: Create a Quarkus project from scratch to gain a basic understanding of its advantagesCreate a persistence layer in a Quarkus applicationSecure your application by adding authentication and authorization featuresUse Quarkus Dev services to implement integration tests with real-world databasesStart creating a React project from scratchUse React Testing Library to test React componentsIdentify the most suitable alternatives for deploying your application to the cloudWho this book is for: This book is for backend web developers who have at least basic experience with Java and would like to learn React to build full stack apps by integrating it with a Quarkus-based backend. Frontend web developers with basic JavaScript experience will also find this book useful to learn how to implement a backend in Quarkus and integrate it with their frontend to create full stack web applications.Beginner-level knowledge of Java and JavaScript is recommended, but any developer experienced either with Java or JavaScript should be able to follow the backend and frontend parts easily.

9 特價1926
立即代訂
下次再買

Marketing Thee Podcast 101

Lulu.com 出版
2022/11/07 出版

You have a great podcast, purpose and concept good; that's what I like. Now, it's time to tell the world about your podcast on social media, at least 85% of the people today use some sort of social media. I chose to focus on my favorite social media platforms Instagram, Twitter, TikTok and YouTube. I even have podcast merch CAD pages to help with ideas. Just like before Chan has your back, there is room for all of us to be great podcasters.

9 特價734
立即代訂
下次再買

Java Memory Management

Packt 出版
2022/11/07 出版

Improve application performance by tuning, monitoring and profiling both the garbage collector and JVMKey Features: Understand the different parts of Java memory and the various garbage collectors so you can select your preferred oneExplore how memory management can help to effectively improve performanceLearn how to spot and avoid memory leaks to enhance application performanceBook Description: Understanding how Java organizes memory is important for every Java professional, but this particular topic is a common knowledge gap for many software professionals. Having in-depth knowledge of memory functioning and management is incredibly useful in writing and analyzing code, as well as debugging memory problems. In fact, it can be just the knowledge you need to level up your skills and career.In this book, you'll start by working through the basics of Java memory. After that, you'll dive into the different segments individually. You'll explore the stack, the heap, and the Metaspace. Next, you'll be ready to delve into JVM standard garbage collectors. The book will also show you how to tune, monitor and profile JVM memory management. Later chapters will guide you on how to avoid and spot memory leaks.By the end of this book, you'll have understood how Java manages memory and how to customize it for the benefit of your applications.What You Will Learn: Understand the schematics of debugging and how to design the application to perform wellDiscover how garbage collectors workDistinguish between various garbage collector implementationsIdentify the metrics required for analyzing application performanceConfigure and monitor JVM memory managementIdentify and solve memory leaksWho this book is for: This book is for all levels of Java professionals, regardless of whether you're a junior or senior developer, a DevOps engineer, a tester, or the system admin of a Java application. If you currently don't have in-depth knowledge of Java memory, garbage collection, and/or JVM tuning, then this book will help you to take your Java skills to the next level.

9 特價1697
立即代訂
下次再買

The Wires of War

Ingram 出版
2022/11/03 出版

From the former news policy lead at Google, an "informative and often harrowing wake-up call" (Publishers Weekly) that explains the high-stakes global cyberwar brewing between Western democracies and the authoritarian regimes of China and Russia that could potentially crush democracy. From 2016 to 2020, Jacob Helberg led Google's global internal product policy efforts to combat disinformation and foreign interference. During this time, he found himself in the midst of what can only be described as a quickly escalating two-front technology cold war between democracy and autocracy. On the front-end, we're fighting to control the software--applications, news information, social media platforms, and more--of what we see on the screens of our computers, tablets, and phones, a clash which started out primarily with Russia but now increasingly includes China and Iran. Even more ominously, we're also engaged in a hidden back-end battle--largely with China--to control the internet's hardware, which includes devices like cellular phones, satellites, fiber-optic cables, and 5G networks. This tech-fueled war will shape the world's balance of power for the coming century as autocracies exploit 21st-century methods to redivide the world into 20th-century-style spheres of influence. Without a firm partnership with the government, Silicon Valley is unable to protect democracy from the autocrats looking to sabotage it from Beijing to Moscow and Tehran. Helberg offers "unnervingly convincing evidence that time is running out in the 'gray war' with the enemies of freedom" (Kirkus Reviews) which could affect every meaningful aspect of our lives, including our economy, our infrastructure, our national security, and ultimately, our national sovereignty.

9 特價684
立即代訂
下次再買

Color Accessibility Workflows

Geri,Coady  著
Ingram 出版
2022/11/03 出版

Color is a powerful tool that affords seemingly endless design possibilities, but we often design with only one type of color vision in mind-our own. Make sure that accessibility and aesthetics go hand in hand with every design you create. Learn what color accessibility is (and why it matters); choose appropriate colors and implement testing; and snag a few key tips and tricks to get your color game plan together. You'll become a better, more empathetic designer by discovering how other people see the world.

9 特價1101
立即代訂
下次再買

Making Sense of Color Management

Hockenberry  著
Ingram 出版
2022/11/03 出版

Get clarity in the tricky endeavor of managing colors from initial design to final product. Learn why colors shift, the science behind the human eye and color profiles, and how to set up your image editor and development environment for consistent color. Craig Hockenberry takes you through every step of color management, with indispensable advice on readying your work and workflows for new technologies.

9 特價1101
立即代訂
下次再買

Aws

Ingram 出版
2022/11/02 出版

Are your customers looking for a complete guide on AWS?Do you want to make sure that by buying just one book they will come back to buy again and again?Then, You Need This Book in Your Library and... Your Customers Will Never Stop to Use and Gift It! ? - WHY THIS BOOK CAN HELP YOUR CUSTOMERS As you read this book, they will be introduced to cloud computing, a form of data storage and usage that allows for data to be stored and processed in what is known as the cloud, meaning it is stored digitally on servers that you can connect to via the internet at any point in time. Of course, this kind of data storage has become incredibly popular, thanks to it removing the need for massive servers on-site. Without the limitations of bulky rooms requiring massive amounts of power, as well as maintenance, businesses are able to cut costs.This book covers: Getting startComputeStorageAWS DatabaseMigrationNetworking and Content DeliveryManagement toolsMedia ServicesAWS Security, Identity & Complianceapplication integrationAWS Desktop & App StreamingDeveloper ToolsAnd many more. Thank you for choosing this particular book among the myriad of books out there on this subject. It is with the utmost hope that this book is as useful to them as it is intended to be. Now, without further ado, let us get down to business and enter the world of Amazon Web Service and everything it has to offer to them.Buy It Now and Let Your Customers Get Addicted To This Amazing Book

9 特價1197
立即代訂
下次再買

Information, Communication and Computing Technology

Springer 出版
2022/11/02 出版

This book constitutes proceedings of the 7th International Conference on Information, Communication and Computing Technology, ICICCT 2022, held in New Delhi, India, in July 2022.The 11 papers presented in this volume were carefully reviewed and selected from 65 submissions. The papers cover a great variety of topics, such as wireless networks, deep learning, machine learning, neural networks, natural language processing, sentiment analysis, network security, image processing, image augmentation and others. The contributions are divided into the following thematic blocks: Networking and Communication; Evolutionary Computing through Machine Learning.

9 特價3653
立即代訂
下次再買

Provable and Practical Security

Chunpeng,Ge  著
Springer 出版
2022/11/02 出版
9 特價3653
立即代訂
下次再買

Advanced Research in Technologies, Information, Innovation and Sustainability

Springer 出版
2022/11/02 出版
9 特價5219
立即代訂
下次再買

Network and Parallel Computing

Shaoshan,Liu  著
Springer 出版
2022/11/01 出版

This book constitutes the proceedings of the 19th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2022, which was held in Jinan, China, during September 24-25, 2022. The 23 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 89 submissions. They were organized in topical sections as follows: computer architecture; cloud computing; deep learning; emerging applications; and storage and IO.

9 特價5219
立即代訂
下次再買

Applications and Usability of Interactive TV

Springer 出版
2022/11/01 出版

This book constitutes thoroughly refereed and revised selected papers from the 10th Iberoamerican Conference on Applications and Usability of Interactive TV, jAUTI 2021, held in Sangolqui, Ecuador, during December 2-3, 2021.The 9 full papers included in this book were carefully reviewed and selected from 25 submissions. They were organized in topical sections as follows: ​Usability and UX; interaction techniques and accesibility; and technologies, services, and applications for interactive digital TV.

9 特價3653
立即代訂
下次再買

Information Security and Privacy

Khoa,Nguyen  著
Springer 出版
2022/11/01 出版

This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.

9 特價5219
立即代訂
下次再買

Secure It Systems

Springer 出版
2022/11/01 出版

This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy.

9 特價4436
立即代訂
下次再買

Information Security

Willy,Susilo  著
Springer 出版
2022/11/01 出版

This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.

9 特價4697
立即代訂
下次再買

Responsible Graph Neural Networks

Ingram 出版
2022/11/01 出版

More frequent and complex cyber threats require robust, automated, and rapid responses from cyber-security specialists. This book offers a complete study in the area of graph learning in cyber, emphasizing graph neural networks (GNNs) and their cyber-security applications.Three parts examine the basics, methods and practices, and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber-security applications. The second part explains three different categories of graph learning, including deterministic, generative, and reinforcement learning and how they can be used for developing cyber defense models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms, and technical details.Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.

9 特價3235
立即代訂
下次再買

Theory of Cryptography

Eike,Kiltz  著
Springer 出版
2022/11/01 出版

The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption; multi-party computation; protocols: key agreement and commitments; theory: sampling and friends; lattices; anonymity, verfiability and robustness; ORAM, OT and PIR; and theory.

9 特價6263
立即代訂
下次再買

Blockchain, Artificial Intelligence, and the Internet of Things

Pethuru,Raj  著
Springer 出版
2022/11/01 出版

This book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. This book aids readers in gaining insight and knowledge about providing security and solutions to different challenges in IoT using Blockchain technology. This book primarily focuses on challenges to addressing the integration of the IoT with Blockchain with respect to potential benefits for IoT. This book gives descriptive analysis of Blockchain integrated with IoT applications and platforms for the development of IoT solutions along with possible topologies to that integration. Several application examples are included in a variety of industries.

9 特價3131
立即代訂
下次再買

Theory of Cryptography

Eike,Kiltz  著
Springer 出版
2022/11/01 出版

The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption; multi-party computation; protocols: key agreement and commitments; theory: sampling and friends; lattices; anonymity, verfiability and robustness; ORAM, OT and PIR; and theory.

9 特價3653
立即代訂
下次再買

Advanced PHP Strings

Lulu.com 出版
2022/10/31 出版

Working with multibyte strings, Unicode, and UTF-8 can feel intimidating when writing PHP. Advanced PHP Strings: Text analysis, generation, and parsing via. Laravel offers a guided experience navigating the different techniques to properly work with and manage multibyte strings. The book also offers extensive discussions around the Laravel string helper methods to provide a familiar reference point while navigating the intricacies of string and text manipulation. Through hundreds of hand-crafted examples and in-depth discussions, you will learn how to: * Read and write multibyte strings using PHP * Safely loop through the characters of a multibyte string * Work with over sixty Laravel string helper methods and fluent strings * Manage documents with a variety of different line-ending styles * Convert string positions to line and column numbers (and back) Large, hands-on example projects include: * Writing a Gherkin language parser from the ground up * Planning and developing a system to validate Laravel Blade directives * Parsing HTML documents with embedded templating languages

9 特價4128
立即代訂
下次再買

How does AI impact the organizational identity in client-focused investment advisory?

Ingram 出版
2022/10/28 出版

Seminar paper from the year 2021 in the subject Computer Sciences - Artificial Intelligence, grade: 1,0, University of Passau, language: English, abstract: This paper answers the question, how Al does impact the organizational identity in client-focused investment advisory. It is evident that an employee's fundamental work may shift when working with a decision-making, self-learning and intelligent AI. It is also conceivable that the employee's own values or work identity may adjust to the AI in some way. But what about when you do not just analyze the individual consultant? If you look at the broader context and analyze the change in values and identity of the organization as a whole. To understand how the values and identity of the individual, but more importantly the identity of an organization, are affected by the introduction of AI, five asset managers from one of Germany's leading cooperative banks are interviewed, coded, and analyzed. Based on research, it is shown that while the introduction of AI has a major impact on the way advisors work, it has little to almost no impact on the identity of the organization. That this may have something to do with the scope of application of AI in the institution and the value stability of the bank will be discussed in more detail later in the paper. The study joins the existing research on the topic of AI changing organizational identity.

9 特價1671
立即代訂
下次再買

Computer Security - Esorics 2022

Springer 出版
2022/10/26 出版

The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode.The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels;Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications;Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.

9 特價2870
立即代訂
下次再買

Security Architecture - How & Why

Tom,Madsen  著
Ingram 出版
2022/10/26 出版

Security Architecture, or Enterprise Information security architecture, as it was originally coined by Gartner back in 2006, has been applied to many things and different areas, making a concrete definition of security architecture a difficult proposition. But having an architecture for the cyber security needs of an organization is important for many reasons, not least because having an architecture makes working with cyber security a much easier job, since we can now build on a, hopefully, solid foundation. Developing a security architecture is a daunting job for almost anyone, and in a company that has not had a cyber security program implemented before, the job becomes even harder. The benefits of having a concrete cyber security architecture in place cannot be overstated! The challenge here is that a security architecture is not something that can stand alone, it absolutely must be aligned with the business in which it is being implemented.This book emphasizes the importance, and the benefits, of having a security architecture in place. The book will be aligned with most of the sub-frameworks in the general framework called SABSA, or Sherwood Applied Business Security Architecture. SABSA is comprised of several individual frameworks and there are several certifications that you can take in SABSA. Aside from getting a validation of your skills, SABSA as a framework focuses on aligning the Security Architecture with the business and its strategy. Each of the chapters in this book will be aligned with one or more of the components in SABSA, the components will be described along with the introduction to each of the chapters.

9 特價6786
立即代訂
下次再買

Cryptography and Network Security

Ingram 出版
2022/10/25 出版

Starting with the historical facts behind the concept of information, which led to the creation of computer networks, Internet of things and cryptocurrencies, the book then arrives at the main definitions of cryptography and network security, the protocols that keep the systems running and the cybercrimes that could disrupt the systems. The basics of information theory, how to measure information, and the information associated with a source are discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. Appendices include a review of probability theory, a discussion of cryptoalgorithms and cryptosystems, and a glossary of information security terms. Illustrations and graphics help the reader understand the theory.

9 特價7830
立即代訂
下次再買

Securing the Nation’s Critical Infrastructures

Drew,Spaniel  著
Ingram 出版
2022/10/25 出版

Securing the Nation's Critical Infrastructures: A Guide for the 2021-2025 Administration is intended to help the United States Executive administration, legislators, and critical infrastructure decision-makers prioritize cybersecurity, combat emerging threats, craft meaningful policy, embrace modernization, and critically evaluate nascent technologies.The book is divided into 18 chapters that are focused on the critical infrastructure sectors identified in the 2013 National Infrastructure Protection Plan (NIPP), election security, and the security of local and state government. Each chapter features viewpoints from an assortment of former government leaders, C-level executives, academics, and other cybersecurity thought leaders. Major cybersecurity incidents involving public sector systems occur with jarringly frequency; however, instead of rising in vigilant alarm against the threats posed to our vital systems, the nation has become desensitized and demoralized. This publication was developed to deconstruct the normalization of cybersecurity inadequacies in our critical infrastructures and to make the challenge of improving our national security posture less daunting and more manageable. To capture a holistic and comprehensive outlook on each critical infrastructure, each chapter includes a foreword that introduces the sector and perspective essays from one or more reputable thought-leaders in that space, on topics such as: The State of the Sector (challenges, threats, etc.) Emerging Areas for Innovation Recommendations for the Future (2021-2025) Cybersecurity Landscape ABOUT ICITThe Institute for Critical Infrastructure Technology (ICIT) is the nation's leading 501(c)3 cybersecurity think tank providing objective, nonpartisan research, advisory, and education to legislative, commercial, and public-sector stakeholders. Its mission is to cultivate a cybersecurity renaissance that will improve the resiliency of our Nation's 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders. ICIT programs, research, and initiatives support cybersecurity leaders and practitioners across all 16 critical infrastructure sectors and can be leveraged by anyone seeking to better understand cyber risk including policymakers, academia, and businesses of all sizes that are impacted by digital threats.

9 特價7047
立即代訂
下次再買

Frontiers in Cyber Security

Springer 出版
2022/10/25 出版

This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13-15, 2022. The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.

9 特價5219
立即代訂
下次再買

Ccks 2022 - Evaluation Track

Ningyu,Zhang  著
Springer 出版
2022/10/25 出版

This book constitutes the refereed proceedings of the 7th China Conference on Knowledge Graph and Semantic Computing Evaluations, CCKS 2022, which took place in Qinhuangdao, China, in August 2022. The 25 full papers presented in this volume were carefully reviewed and selected from 42 submissions. CCKS technology evaluation track aims to provide researchers with platforms and resources for testing knowledge and semantic computing technologies, algorithms and systems, promote the technical development in the field of domestic knowledge, and the integration of academic achievements and industrial needs.

9 特價4436
立即代訂
下次再買

Cyber Security

Wei,Lu  著
Springer 出版
2022/10/25 出版

This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: ​​data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.

9 特價2609
立即代訂
下次再買

Technological and Business Fundamentals for Mobile App Development

Tamie,Salter  著
Springer 出版
2022/10/21 出版

This book is an essential introductory guide to the knowledge required to develop apps. Chapter by chapter it provides the core principles any person must understand in order to develop mobile applications. It outlines the fundamental skills and knowledge that business and computer science students need to either oversee the development of a mobile app or themselves undertake to develop a mobile app. This workbook will give a holistic overview of the initial stages that must be considered when endeavoring to develop a mobile app. This workbook breaks topics down into core, technical and non-technical. Looking at each topic from all three angles, the core knowledge required for UI, UI for the technical person and UI for the non-technical person. The workbook guides the student through the key components or core of mobile app development and shows all students both the technical requirements and the non-technical requirements of each topic. It will allow all students to pick andchoose how deep they wish to delve into the different topics.

9 特價2870
立即代訂
下次再買

YouTube

Jacob,Kirby  著
Ingram 出版
2022/10/21 出版
9 特價855
立即代訂
下次再買

YouTube

Jacob,Kirby  著
Ingram 出版
2022/10/21 出版

YOUTUBEMakeup tutorials, gaming channels, sitcom reviewers, language teachers, medical advisors, ASMR, musicians, social awareness experts, comedians, and much, much more - all this range of content can be easily found on YouTube, the most popular video platform of the past couple decades. With so much variety and diversity of topics, many people feel encouraged to produce their own video content and maybe even build their own subscriber base.Since you've picked up this book, you are probably one of these people (or at least you are curious enough to learn how the whole thing works!).But would this even be possible? Could you also become an influencer? What would it take? Where to start?This book answers these and other questions and helps you begin, improve, or monetize your channel in the best possible way.By the end of this book, you will have all the information you need to create authentic, informative, interesting, and ambitious content for YouTube. You will know exactly where to start and how to upgrade your resources as more people hit that subscribe button.This book intends to serve as a guide to be consulted as you reach new milestones in your YouTube journey and have to deal with different scenarios, taking you from complete beginner to YouTube superstar!So, what are you waiting for?Scroll up and hit "Buy Now' to seriously level up your YouTube game today!

9 特價513
立即代訂
下次再買

CompTIA Network] N10-008 Certification Guide - Second Edition

Glen D,Singh  著
Packt 出版
2022/10/21 出版

Become a network specialist by developing your skills in network implementation, operations and security while covering all the exam topics for CompTIA Network+ N10-008 certification in an easy-to-follow guide.Purchase of the print or Kindle book includes a free eBook in the PDF format.Key Features: A step-by-step guide to gaining a clear understanding of the Network+ certificationLearn about network architecture, protocols, security, and network troubleshootingConfidently ace the N10-008 exam with the help of 200+ practice test questions and answersBook Description: This book helps you to easily understand core networking concepts without the need of prior industry experience or knowledge within this fi eld of study. This updated second edition of the CompTIA Network+ N10-008 Certification Guide begins by introducing you to the core fundamentals of networking technologies and concepts, before progressing to intermediate and advanced topics using a student-centric approach.You'll explore best practices for designing and implementing a resilient and scalable network infrastructure to support modern applications and services. Additionally, you'll learn network security concepts and technologies to effectively secure organizations from cyber attacks and threats. The book also shows you how to efficiently discover and resolve networking issues using common troubleshooting techniques.By the end of this book, you'll have gained sufficient knowledge to efficiently design, implement, and maintain a network infrastructure as a successful network professional within the industry. You'll also have gained knowledge of all the official CompTIA Network+ N10-008 exam objectives, networking technologies, and how to apply your skills in the real world.What You Will Learn: Explore common networking concepts, services, and architectureIdentify common cloud architecture and virtualization conceptsDiscover routing and switching technologiesImplement wireless technologies and solutionsUnderstand network security concepts to mitigate cyber attacksExplore best practices to harden networks from threatsUse best practices to discover and resolve common networking issuesWho this book is for: This book is for students, network administrators, network engineers, NOC engineers, systems administrators, cybersecurity professionals, and enthusiasts. No prior knowledge in networking is required to get started with this book.

9 特價2707
立即代訂
下次再買

Drones in Iot-Enabled Spaces

Ingram 出版
2022/10/21 出版

This book addresses major issues and challenges in drone-based solutions proposed for IoT-enabled cellular/computer networks, routing/communication protocols, surveillances applications, secured data management, and positioning approaches. It focuses mainly on smart and context-aware implementations.

9 特價3496
立即代訂
下次再買

The Personal Cybersecurity Manual

Ingram 出版
2022/10/20 出版

Cybercriminals can ruin your life-this book teaches you to stop them before they can.Cybercrime is on the rise. Our information is more valuable and vulnerable than ever. It's important to learn to protect ourselves from those who wish to exploit the technology we rely on daily. Cybercriminals want to steal your money and identity and spy on you.You don't have to give up on the convenience of having an online life. You can fight back and protect yourself and your loved ones, all with the tools and information in this book.This book will teach you to protect yourself from: Identity theftRansomwareSpywarePhishingVirusesCredit card fraud...And so much more!Don't be a victim of cybercrime. Anyone can follow the information in this book and keep hackers and other cybercriminals at bay. You owe it to yourself to read this book and stay safe.So don't hesitate; scroll up and one-click buy your copy now!

9 特價649
立即代訂
下次再買

Firewalls Don't Stop Dragons

Carey,Parker  著
Apress 出版
2022/10/18 出版
9 特價1368
立即代訂
下次再買

Diving into Secure Access Service Edge

Packt 出版
2022/10/18 出版

Implement Secure Access Service Edge (SASE) for secure network and application communications, exploring SASE services including SD-WAN, ZTF, and more with expert Jeremiah Ginn who helps CxO leaders achieve SASE successKey Features: Merge networking and security services into a single architecture to simplify network infrastructureExplore how zero trust network access (ZTNA) restricts access to provide native application segmentationFocus on a native, multitenant cloud architecture that scales dynamically with demandBook Description: The SASE concept was coined by Gartner after seeing a pattern emerge in cloud and SD-WAN projects where full security integration was needed. The market behavior lately has sparked something like a "space race" for all technology manufacturers and cloud service providers to offer a "SASE" solution. The current training available in the market is minimal and manufacturer-oriented, with new services being released every few weeks. Professional architects and engineers trying to implement SASE need to take a manufacturer-neutral approach.This guide provides a foundation for understanding SASE, but it also has a lasting impact because it not only addresses the problems that existed at the time of publication, but also provides a continual learning approach to successfully lead in a market that evolves every few weeks. Technology teams need a tool that provides a model to keep up with new information as it becomes available and stay ahead of market hype.With this book, you'll learn about crucial models for SASE success in designing, building, deploying, and supporting operations to ensure the most positive user experience (UX). In addition to SASE, you'll gain insight into SD-WAN design, DevOps, zero trust, and next-generation technical education methods.What You Will Learn: Develop a comprehensive understanding of SASE from a market and technical perspectiveUnderstand SASE services and components included in SASE solutionsMove logically from prescriptive design to policy-based design and orchestrationUnderstand standard SASE use cases and how to integrate future componentsConvert from a legacy network design model to a secure DevOps model for future projectsUse a functional design overlay to eliminate inter-service competition for the control plane of the SASE serviceWho this book is for: This book is for technology and security leaders and specifically for any CTO, CSO, CISO, or CIO looking for an executive approach to SASE for their organization. Anyone implementing SD-WAN, SASE, and SASE services for cloud, network, and security infrastructure will also find this book helpful.

9 特價2064
立即代訂
下次再買

A Beginner’s Guide to Internet of Things Security

Ingram 出版
2022/10/18 出版

A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems.The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security.Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.

9 特價1669
立即代訂
下次再買

Task Intelligence for Search and Recommendation

Chirag,Shah  著
Springer 出版
2022/10/18 出版

While great strides have been made in the field of search and recommendation, there are still challenges and opportunities to address information access issues that involve solving tasks and accomplishing goals for a wide variety of users. Specifically, we lack intelligent systems that can detect not only the request an individual is making (what), but also understand and utilize the intention (why) and strategies (how) while providing information and enabling task completion. Many scholars in the fields of information retrieval, recommender systems, productivity (especially in task management and time management), and artificial intelligence have recognized the importance of extracting and understanding people's tasks and the intentions behind performing those tasks in order to serve them better. However, we are still struggling to support them in task completion, e.g., in search and assistance, and it has been challenging to move beyond single-query or single-turn interactions. The proliferation of intelligent agents has unlocked new modalities for interacting with information, but these agents will need to be able to work understanding current and future contexts and assist users at task level. This book will focus on task intelligence in the context of search and recommendation. Chapter 1 introduces readers to the issues of detecting, understanding, and using task and task-related information in an information episode (with or without active searching). This is followed by presenting several prominent ideas and frameworks about how tasks are conceptualized and represented in Chapter 2. In Chapter 3, the narrative moves to showing how task type relates to user behaviors and search intentions. A task can be explicitly expressed in some cases, such as in a to-do application, but often it is unexpressed. Chapter 4 covers these two scenarios with several related works and case studies. Chapter 5 shows how task knowledge and task models can contribute to addressing emerging retrieval and recommendation problems. Chapter 6 covers evaluation methodologies and metrics for task-based systems, with relevant case studies to demonstrate their uses. Finally, the book concludes in Chapter 7, with ideas for future directions in this important research area.

9 特價2870
立即代訂
下次再買

Statistical Methods for Annotation Analysis

Silviu,Paun  著
Springer 出版
2022/10/18 出版

Labelling data is one of the most fundamental activities in science, and has underpinned practice, particularly in medicine, for decades, as well as research in corpus linguistics since at least the development of the Brown corpus. With the shift towards Machine Learning in Artificial Intelligence (AI), the creation of datasets to be used for training and evaluating AI systems, also known in AI as corpora, has become a central activity in the field as well. Early AI datasets were created on an ad-hoc basis to tackle specific problems. As larger and more reusable datasets were created, requiring greater investment, the need for a more systematic approach to dataset creation arose to ensure increased quality. A range of statistical methods were adopted, often but not exclusively from the medical sciences, to ensure that the labels used were not subjective, or to choose among different labels provided by the coders. A wide variety of such methods is now in regular use. This book is meantto provide a survey of the most widely used among these statistical methods supporting annotation practice. As far as the authors know, this is the first book attempting to cover the two families of methods in wider use. The first family of methods is concerned with the development of labelling schemes and, in particular, ensuring that such schemes are such that sufficient agreement can be observed among the coders. The second family includes methods developed to analyze the output of coders once the scheme has been agreed upon, particularly although not exclusively to identify the most likely label for an item among those provided by the coders. The focus of this book is primarily on Natural Language Processing, the area of AI devoted to the development of models of language interpretation and production, but many if not most of the methods discussed here are also applicable to other areas of AI, or indeed, to other areas of Data Science.

9 特價3653
立即代訂
下次再買
頁數48/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing