Advances in Cryptology - CRYPTO 2022
This book constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the 4-volume proceedings LNCS 13507, 13508, 13509, 13510, was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures.
Innovative Security Solutions for Information Technology and Communications
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 14th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2021, which was held virtually in November 2021.The 22 full papers included in this book were carefully reviewed and selected from 40 submissions. They deal with emergent topics in security and privacy from different communities.
Artificial Intelligence and Anthropomorphism. Does Alan Turings Imitation Game Enhance Anthropomorphism in AI Research?
Essay from the year 2020 in the subject Computer Sciences - Artificial Intelligence, grade: 1,3, Leuphana Universit瓣t L羹neburg, language: English, abstract: In this essay the question will be discussed whether or not Alan Turing's concept of the "imitation game" enhanced and enhances the tendency for anthropomorphism in the field of AI - and if so, to what extent. Artificial intelligence (AI) is one of the newest scientific fields, starting in the middle of the 20th century with the goal of creating intelligent entities. Nonetheless the scientific roots of the field reach far behind since the history of humankind - of homo sapiens - has always been coined by the goal of understanding what intelligence is. Therefore, AI is a highly interdisciplinary field of science including engineering, philosophy, mathematics and logics, psychology and other natural sciences. The high potential for controversies in such an interdisciplinary field of study becomes already obvious by the fact that there is no common definition of what intelligence is. Is intelligence something that goes beyond the natural materialistic world and is "human-exclusive"? Or can it be reached by technical reproduction of the human brain and its cognition?
Cryptography for Payment Professionals
Although cryptography plays an essential part in most modern solutions, especially in payments, cryptographic algorithms remain a black box for most users of these tools. Just as a sane backend developer does not drill down into low-level disk access details of a server filesystem, payments professionals have enough things to worry about before they ever need to bother themselves with debugging an encrypted value or a message digest. However, at a certain point, an engineer faces the need to identify a problem with a particular algorithm or, perhaps, to create a testing tool that would simulate a counterpart in a protocol that involves encryption.The world of cryptography has moved on with giant leaps. Available technical standards mention acronyms and link to more standards, some of which are very large while others are not available for free. After finding the standards for the algorithm, the specific mode of operation must also be identified. Most implementations use several cryptographic primitives--for example, key derivation with a block cipher, which produces a secret that is used together with a hash function and a double padding scheme to produce a digital signature of a base64-encoded value. Understanding this requires more sifting through online sources, more reading of platform and library documents, and finally, when some code can be written, there are very few test cases to validate it.Cryptography for Payment Professionals is intended for technical people, preferably with some background in software engineering, who may need to deal with a cryptographic algorithm in the payments realm. It does not cover the payment technology in-depth, nor does it provide more than a brief overview of some regulations and security standards. Instead, it focuses on the cryptographic aspects of each field it mentions. Highlights include: Major cryptographic algorithms and the principles of their operation Cryptographic aspects of card-present (e.g., magnetic stripe, EMV) and online (e.g., e-Commerce and 3DS 2.0) transactions A detailed description of TDES DUKPT and AES DUKPT protocols, as well as an example implementation and test cases for both It is best if the reader understands programming, number and string representations in machine memory, and bit operations. Knowledge of C, Python, or Java may make the examples easier to read but this is not mandatory. Code related to the book is available at the author's GitHub site: https: //github.com/ilya-dubinsky/cfpp
Advances in Cryptology - CRYPTO 2022
The 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the proceedings was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures.
Advances in Cryptology - CRYPTO 2022
The 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the proceedings was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures.
Cyber-Security Threats and Response Models in Nuclear Power Plants
This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well.A dynamic Bayesiannetworks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well.This SpringerBrief is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide.
Advances in Cryptology - CRYPTO 2022
The 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the proceedings was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures.
Network Protocols for Security Professionals
Get to grips with network-based attacks and learn to defend your organization's network and network devicesKey Features: Exploit vulnerabilities and use custom modules and scripts to crack authentication protocolsSafeguard against web, mail, database, DNS, voice, video, and collaboration server attacksMonitor and protect against brute-force attacks by implementing defense mechanismsBook Description: With the increased demand for computer systems and the ever-evolving internet, network security now plays an even bigger role in securing IT infrastructures against attacks. Equipped with the knowledge of how to find vulnerabilities and infiltrate organizations through their networks, you'll be able to think like a hacker and safeguard your organization's network and networking devices. Network Protocols for Security Professionals will show you how.This comprehensive guide gradually increases in complexity, taking you from the basics to advanced concepts. Starting with the structure of data network protocols, devices, and breaches, you'll become familiar with attacking tools and scripts that take advantage of these breaches. Once you've covered the basics, you'll learn about attacks that target networks and network devices. Your learning journey will get more exciting as you perform eavesdropping, learn data analysis, and use behavior analysis for network forensics. As you progress, you'll develop a thorough understanding of network protocols and how to use methods and tools you learned in the previous parts to attack and protect these protocols.By the end of this network security book, you'll be well versed in network protocol security and security countermeasures to protect network protocols.What You Will Learn: Understand security breaches, weaknesses, and protection techniquesAttack and defend wired as well as wireless networksDiscover how to attack and defend LAN-, IP-, and TCP/UDP-based vulnerabilitiesFocus on encryption, authorization, and authentication principlesGain insights into implementing security protocols the right wayUse tools and scripts to perform attacks on network devicesWield Python, PyShark, and other scripting tools for packet analysisIdentify attacks on web servers to secure web and email servicesWho this book is for: This book is for red team and blue team pentesters, security professionals, or bug hunters. Anyone involved in network protocol management and security will also benefit from this book. Basic experience in network security will be an added advantage.
Cryptology and Network Security
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates.The 18 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 54 submissions. They were organized in topical sections as follows: zero-knowledge and MPC; public-key infrastructure; attacks and countermeasures; cryptanalysis and provable security; cryptographic protocols; blockchain and payment systems; and codes and post-quantum cryptography.
Bioinspired Optimization Methods and Their Applications
This book constitutes the refereed proceedings of the 10th International Conference on Bioinspired Optimization Methods and Their Applications, BIOMA 2022, held in Maribor, Slovenia, in November 2022.The 19 full papers presented in this book were carefully reviewed and selected from 23 submissions.The papers in this BIOMA proceedings specialized in bioinspired algorithms as a means for solving the optimization problems and came in two categories: theoretical studies and methodology advancements on the one hand, and algorithm adjustments and their applications on the other.
Blockchain and Trustworthy Systems
This book constitutes the thoroughly refereed post conference papers of the 4th International Conference on Blockchain and Trustworthy Systems, Blocksys 2022, held in Chengdu, China, in August 2022.The 26 full papers were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections: Trustworthy Systems; Blockchain; Private Computing.
A European Perspective on Crisis Informatics
Mobilising helpers in the event of a flood or letting friends know that you are okay in the event of a terrorist attack - more and more people are using social media in emergency, crisis or disaster situations. Storms, floods, attacks or pandemics (esp. COVID-19) show that citizens use social media to inform themselves or to coordinate. This book presents qualitative and quantitative studies on the attitudes of emergency services and citizens in Europe towards social media in emergencies. Across the individual sub-studies, almost 10,000 people are surveyed including representative studies in the Netherlands, Germany, the UK and Italy. The work empirically shows that social media is increasingly important for emergency services, both for prevention and during crises; that private use of social media is a driving force in shaping opinions for organisational use; and that citizens have high expectations towards authorities, especially monitoring social media is expected, and sometimes responses within one hour. Depending on the risk culture, the data show further differences, e.g. whether the state (Germany) or the individual (Netherlands) is seen as primarily responsible for coping with the situation.
Information Security Practice and Experience
This book constitutes the refereed proceedings of the 17th International Conference on Information Security Practice and Experience, ISPEC 2022, held in Taipei, Taiwan, in November 2022. The 33 full papers together with 2 invited papers included in this volume were carefully reviewed and selected from 87 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
Demystifying Cryptography with OpenSSL 3.0
Use OpenSSL to add security features to your application, including cryptographically strong symmetric and asymmetric encryption, digital signatures, SSL/TLS connectivity, and PKI handlingKey Features: Secure your applications against common network security threats using OpenSSLGet to grips with the latest version of OpenSSL, its new features, and advantagesLearn about PKI, cryptography, certificate authorities, and more using real-world examplesBook Description: Security and networking are essential features of software today. The modern internet is full of worms, Trojan horses, men-in-the-middle, and other threats. This is why maintaining security is more important than ever.OpenSSL is one of the most widely used and essential open source projects on the internet for this purpose. If you are a software developer, system administrator, network security engineer, or DevOps specialist, you've probably stumbled upon this toolset in the past - but how do you make the most out of it? With the help of this book, you will learn the most important features of OpenSSL, and gain insight into its full potential.This book contains step-by-step explanations of essential cryptography and network security concepts, as well as practical examples illustrating the usage of those concepts. You'll start by learning the basics, such as how to perform symmetric encryption and calculate message digests. Next, you will discover more about cryptography: MAC and HMAC, public and private keys, and digital signatures. As you progress, you will explore best practices for using X.509 certificates, public key infrastructure, and TLS connections.By the end of this book, you'll be able to use the most popular features of OpenSSL, allowing you to implement cryptography and TLS in your applications and network infrastructure.What You Will Learn: Understand how to use symmetric cryptographyGet to grips with message digests, MAC, and HMACDiscover asymmetric cryptography and digital signaturesFocus on how to apply and use X.509 certificatesDive into TLS and its proper usageManage advanced and special usages of TLSFind out how to run a mini certificate authority for your organizationWho this book is for: This book is for software developers, system administrators, DevOps specialists, network security engineers, and analysts, or anyone who wants to keep their applications and infrastructure secure. Software developers will learn how to use the OpenSSL library to empower their software with cryptography and TLS. DevOps professionals and sysadmins will learn how to work with cryptographic keys and certificates on the command line, and how to set up a mini-CA for their organization. A basic understanding of security and networking is required.
Progress in Cryptology - Africacrypt 2022
This book constitutes the refereed proceedings of the 13th International Conference on Progress in Cryptology in Africa, AFRICACRYPT 2022, held in Fes, Morocco, from July 18th - 20th, 2022. The 25 papers presented in this book were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on symmetric cryptography; attribute and identity based encryption; symmetric cryptanalysis; post-quantum cryptography; post-quantum (crypt)analysis; side-channel attacks; protocols and foundations; public key (crypt) analysis.
Security and Privacy in Social Networks and Big Data
This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022.The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field's foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy protection; Data detection; Blockchain and its applications.
Hands-On Machine Learning with Scikit-Learn, Keras, and Tensorflow
Through a recent series of breakthroughs, deep learning has boosted the entire field of machine learning. Now, even programmers who know close to nothing about this technology can use simple, efficient tools to implement programs capable of learning from data. This bestselling book uses concrete examples, minimal theory, and production-ready Python frameworks (Scikit-Learn, Keras, and TensorFlow) to help you gain an intuitive understanding of the concepts and tools for building intelligent systems. With this updated third edition, author Aur矇lien G矇ron explores a range of techniques, starting with simple linear regression and progressing to deep neural networks. Numerous code examples and exercises throughout the book help you apply what you've learned. Programming experience is all you need to get started. Use Scikit-learn to track an example ML project end to end Explore several models, including support vector machines, decision trees, random forests, and ensemble methods Exploit unsupervised learning techniques such as dimensionality reduction, clustering, and anomaly detection Dive into neural net architectures, including convolutional nets, recurrent nets, generative adversarial networks, autoencoders, diffusion models, and transformers Use TensorFlow and Keras to build and train neural nets for computer vision, natural language processing, generative models, and deep reinforcement learning
Shit to Remember
Never forget a f*cking password again with this password keeper and internet address book!Sh*t to Remember is the absolute BEST password book to keep your internet passwords both organized and secure. With tips for formulating passwords and space to organize all of your accounts, this is the perfect f*cking package to ensure you always have access to your web accounts. Ditch all the f*cking scraps of paper of password info cluttering your workspace and home and prevent moments where you have no idea WTF your login and password are! Keep track of all your usernames, passwords, and web addresses in one curse-filled location.Includes: Internet password safety and naming tipsDedicated pages to record your network settings, including your modem and router infoDedicated pages to capture your passwords and account information, alphabeticallyLined pages for notes and other computer info
Partially Homomorphic Encryption
Introduction.- Mathematical Background.- Rivest-Shamir-Adleman Algorithm.- Goldwasser-Micali Algorithm.- ElGamal Algorithm.- Benaloh Algorithm.- Naccache-Stern Algorithm.- Okamoto-Uchiyama Algorithm.- Paillier Algorithm.- Damg疇rd-Jurik Algorithm.- Boneh-Goh-Nissim Algorithm.- Sander-Young-Yung Algorithm.- Bibliography.- Index.
Wavelets in Soft Computing (Second Edition)
The comprehensive compendium furnishes a quick and efficient entry point to many multiresolution techniques and facilitates the transition from an idea into a real project. It focuses on methods combining several soft computing techniques (fuzzy logic, neural networks, genetic algorithms) in a multiresolution framework.Illustrated with numerous vivid examples, this useful volume gives the reader the necessary theoretical background to decide which methods suit his/her needs.New materials and applications for multiresolution analysis are added, including notable research topics such as deep learning, graphs, and network analysis.
Deep Learning with TensorFlow and Keras - Third Edition
Build cutting edge machine and deep learning systems for the lab, production, and mobile devices.Purchase of the print or Kindle book includes a free eBook in PDF format.Key Features: Understand the fundamentals of deep learning and machine learning through clear explanations and extensive code samplesImplement graph neural networks, transformers using Hugging Face and TensorFlow Hub, and joint and contrastive learningLearn cutting-edge machine and deep learning techniquesBook Description: Deep Learning with TensorFlow and Keras teaches you neural networks and deep learning techniques using TensorFlow (TF) and Keras. You'll learn how to write deep learning applications in the most powerful, popular, and scalable machine learning stack available.TensorFlow 2.x focuses on simplicity and ease of use, with updates like eager execution, intuitive higher-level APIs based on Keras, and flexible model building on any platform. This book uses the latest TF 2.0 features and libraries to present an overview of supervised and unsupervised machine learning models and provides a comprehensive analysis of deep learning and reinforcement learning models using practical examples for the cloud, mobile, and large production environments.This book also shows you how to create neural networks with TensorFlow, runs through popular algorithms (regression, convolutional neural networks (CNNs), transformers, GANs, recurrent neural networks (RNNs), natural language processing (NLP), and Graph Neural Networks (GNNs)), covers working example apps, and then dives into TF in production, TF mobile, and TensorFlow with AutoML.What You Will Learn: Learn how to use the popular GNNs with TensorFlow to carry out graph mining tasksDiscover the world of transformers, from pretraining to fine-tuning to evaluating themApply self-supervised learning to natural language processing, computer vision, and audio signal processingCombine probabilistic and deep learning models using TensorFlow ProbabilityTrain your models on the cloud and put TF to work in real environmentsBuild machine learning and deep learning systems with TensorFlow 2.x and the Keras APIWho this book is for: This hands-on machine learning book is for Python developers and data scientists who want to build machine learning and deep learning systems with TensorFlow. This book gives you the theory and practice required to use Keras, TensorFlow, and AutoML to build machine learning systems.Some machine learning knowledge would be useful. We don't assume TF knowledge.
VLSI-SoC
This book contains extended and revised versions of the best papers presented at the 29th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2021, held in Singapore, in October 2021*.The 12 full papers included in this volume were carefully reviewed and selected from the 44 papers (out of 75 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like low-power design of RF, analog and mixed-signal circuits, EDA tools for the synthesis and verification of heterogenous SoCs, accelerators for cryptography and deep learning and on-chip Interconnection system, reliability and testing, and integration of 3D-ICs.*The conference was held virtually.
Taking Flutter to the Web
A web developer's guide to using Flutter for building responsive and adaptive web UIs using mobile solutionsKey Features: Build a native, mobile-like experience for your web apps using FlutterExplore a systematic and synchronized learning path for web developers to learn FlutterDesign an MVVM structure for scalability and performance with this practical guideBook Description: Using a shared codebase in addition to an extensive range of tools in the Flutter ecosystem optimized for browsers, the Flutter framework has expanded to enable you to bring your mobile apps to the web. You'll find out how web developers can leverage the Flutter framework for web apps with this hands-on guide.Taking Flutter to the Web will help you learn all about the Flutter ecosystem by covering the tools and project structure that allows you to easily integrate Flutter into your web stack. You'll understand the concepts of cross-platform UI development and how they can be applied to web platforms. As you explore Flutter on the web, you'll become well-versed with using Flutter as an alternative UI platform for building adaptive and responsive designs for web apps.By the end of this Flutter book, you'll have built and deployed a complete Flutter app for the web and have a roadmap ready to target the web for your existing Flutter mobile apps.What You Will Learn: Understand the concepts necessary for designing, building, and deploying a Flutter web appGet the hang of Flutter internals to make the most of the frameworkBuild complete web applications with Flutter from architecture to deploymentAutomate UI design for your web apps using FlutterExplore Flutter's integration with Appwrite for backend developmentDiscover advanced concepts in frontend web development, such as state management and PWAWho this book is for: This book is for Flutter mobile developers and Dart programmers who want to consolidate their Flutter knowledge and use it to build responsive web applications.
The Accidental Community Manager
New to the world of managing online communities? Worried that you have no community experience or don't know where to start? You're not alone. Most people never intend to be in the community industry-it just kind of happens. This book provides you the tips, tools and frameworks to make sure you are successful!
Computer Security - Esorics 2022
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode.The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels;Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications;Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.
Network Connectivity
Networks naturally appear in many high-impact domains, ranging from social network analysis to disease dissemination studies to infrastructure system design. Within network studies, network connectivity plays an important role in a myriad of applications. The diversity of application areas has spurred numerous connectivity measures, each designed for some specific tasks. Depending on the complexity of connectivity measures, the computational cost of calculating the connectivity score can vary significantly. Moreover, the complexity of the connectivity would predominantly affect the hardness of connectivity optimization, which is a fundamental problem for network connectivity studies. This book presents a thorough study in network connectivity, including its concepts, computation, and optimization. Specifically, a unified connectivity measure model will be introduced to unveil the commonality among existing connectivity measures. For the connectivity computation aspect, the authors introduce the connectivity tracking problems and present several effective connectivity inference frameworks under different network settings. Taking the connectivity optimization perspective, the book analyzes the problem theoretically and introduces an approximation framework to effectively optimize the network connectivity. Lastly, the book discusses the new research frontiers and directions to explore for network connectivity studies. This book is an accessible introduction to the study of connectivity in complex networks. It is essential reading for advanced undergraduates, Ph.D. students, as well as researchers and practitioners who are interested in graph mining, data mining, and machine learning.
Cybersecurity - Attack and Defense Strategies - Third Edition
Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscapeKey Features: Updated for ransomware prevention, security posture management in multi-cloud, Microsoft Defender for Cloud, MITRE ATT&CK Framework, and moreExplore the latest tools for ethical hacking, pentesting, and Red/Blue teamingIncludes recent real-world examples to illustrate the best practices to improve security postureBook Description: Cybersecurity - Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture.In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques.By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process.What You Will Learn: Learn to mitigate, recover from, and prevent future cybersecurity eventsUnderstand security hygiene and value of prioritizing protection of your workloadsExplore physical and virtual network segmentation, cloud network visibility, and Zero Trust considerationsAdopt new methods to gather cyber intelligence, identify risk, and demonstrate impact with Red/Blue Team strategiesExplore legendary tools such as Nmap and Metasploit to supercharge your Red TeamDiscover identity security and how to perform policy enforcementIntegrate threat detection systems into your SIEM solutionsDiscover the MITRE ATT&CK Framework and open-source tools to gather intelligenceWho this book is for: If you are an IT security professional who wants to venture deeper into cybersecurity domains, this book is for you. Cloud security administrators, IT pentesters, security consultants, and ethical hackers will also find this book useful. Basic understanding of operating systems, computer networking, and web applications will be helpful.
Edge Computing Systems with Kubernetes
Understand how to use K3s and k3OS for different use cases and discover best practices for building an edge computing systemKey Features: A guide to implementing an edge computing environmentReduce latency and costs for real-time applications running at the edgeFind stable and relevant cloud native open-source software to complement your edge environmentsBook Description: Edge computing is a way of processing information near the source of data instead of processing it on data centers in the cloud. In this way, edge computing can reduce latency when data is processed, improving the user experience on real-time data visualization for your applications. Using K3s, a light-weight Kubernetes and k3OS, a K3s-based Linux distribution along with other open-source cloud native technologies, you can build reliable edge computing systems without spending a lot of money.In this book, you will learn how to design edge computing systems with containers and edge devices using sensors, GPS modules, WiFi, LoRa communication and so on. You will also get to grips with different use cases and examples covered in this book, how to solve common use cases for edge computing such as updating your applications using GitOps, reading data from sensors and storing it on SQL and NoSQL databases. Later chapters will show you how to connect hardware to your edge clusters, predict using machine learning, and analyze images with computer vision. All the examples and use cases in this book are designed to run on devices using 64-bit ARM processors, using Raspberry Pi devices as an example.By the end of this book, you will be able to build your own edge computing systems using the content of the chapters as Lego pieces to fit your needs.What You Will Learn: Configure k3OS and K3s for development and production scenariosPackage applications into K3s for shipped-node scenariosDeploy in occasionally connected scenarios, from one node to one million nodesManage GitOps for applications across different locationsUse open-source cloud native software to complement your edge computing systemsImplement observability event-driven and serverless edge applicationsCollect and process data from sensors at the edge and visualize it into the cloudWho this book is for: This book is for engineers (developers and/or operators) seeking to bring the cloud native benefits of GitOps and Kubernetes to the edge. Anyone with basic knowledge of Linux and containers looking to learn Kubernetes using examples applied to edge computing and hardware systems will benefit from this book.
Secure Web Application Development
Cyberattacks are becoming more commonplace and the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in their access control alone. Attacks evolve to work around new defenses, and defenses must evolve to remain effective. Developers need to understand the fundamentals of attacks and defenses in order to comprehend new techniques as they become available. This book teaches you how to write secure web applications.The focus is highlighting how hackers attack applications along with a broad arsenal of defenses. This will enable you to pick appropriate techniques to close vulnerabilities while still providing users with their needed functionality.Topics covered include: A framework for deciding what needs to be protected and how stronglyConfiguring services such as databases and web serversSafe use of HTTP methods such as GET, POST, etc, cookies and use of HTTPSSafe REST APIsServer-side attacks and defenses such as injection and cross-site scriptingClient-side attacks and defenses such as cross-site request forgerySecurity techniques such as CORS, CSPPassword management, authentication and authorization, including OAuth2Best practices for dangerous operations such as password change and resetUse of third-party components and supply chain security (Git, CI/CD etc)What You'll LearnReview the defenses that can used to prevent attacksModel risks to better understand what to defend and howChoose appropriate techniques to defend against attacksImplement defenses in Python/Django applicationsWho This Book Is ForDevelopers who already know how to build web applications but need to know more about securityNon-professional software engineers, such as scientists, who must develop web tools and want to make their algorithms available to a wider audience.Engineers and managers who are responsible for their product/company technical security policy
Science of Cyber Security - Scisec 2022 Workshops
This volume constitutes the papers of several workshops which were held in conjunction with the 4th International Conference on Science of Cyber Security Workshops, SciSec 2022, held in Matsue, Japan, in August 10-12, 2022. The 15 revised full papers and 3 posters were presented in this book were carefully reviewed and selected from 30 submissions.They were organized in topical sections as follows: AI Crypto and Security Workshop (AI-CryptoSec); Theory and Application of Blockchain and NFT Workshop (TA-BC-NFT); and Mathematical Science of Quantum Safety and its Application Workshop (MathSci-Qsafe).
Blockchain for Real World Applications
Blockchain for Real World Applications A comprehensive examination of blockchain architecture and its key characteristics Blockchain architecture is a way of recording data such that it cannot be altered or falsified. Data is recorded in a kind of digital ledger called a blockchain, copies of which are distributed and stored across a network of participating computer systems. With the advent of cryptocurrencies and NFTs, which are entirely predicated on blockchain technology, and the integration of blockchain architecture into online and high-security networked spaces more broadly, there has never been a greater need for software, network, and financial professionals to be familiar with this technology. Blockchain for Real World Applications provides a practical discussion of this subject and the key characteristics of blockchain architecture. It describes how blockchain technology gains its essential irreversibility and persistency and discusses how this technology can be applied to the information and security needs of different kinds of businesses. It offers a comprehensive overview of the ever-growing blockchain ecosystem and its burgeoning role in a connected world. Blockchain for Real World Applications readers will also find: Treatment of real-world applications such as ID management, encryption, network security, and more Discussion of the UID (Unique Identifier) and its benefits and drawbacks Detailed analysis of privacy issues such as unauthorized access and their possible blockchain-based solutions Blockchain for Real World Applications is a must for professionals in high-security industries, as well as for researchers in blockchain technologies and related areas.
Advanced Research in Technologies, Information, Innovation and Sustainability
The two-volume Proceedings set CCIS 1675 and 1676 constitutes the refereed proceedings of the Second International Conference, ARTIIS 2022, held in Santiago de Compostela, Spain, during September 12-15, 2022. The 72 papers included in these proceedings were carefully reviewed and selected from 191 submissions. These papers were categorized into 2 technical tracks, i.e., Computing Solutions and Data Intelligence.
Mastering Minimal APIs in ASP.NET Core
Get a practical understanding of how to build lightweight ASP.NET Core applications and write cleaner, testable, and secure APIs with .NET 6 and Minimal APIsKey Features: Explore clear and detailed guidelines to design and develop APIs for ASP.NET Core appsDiscover expert tips, tricks, and best practices to build performant APIsImplement proven web API development methodologies using .NET 6 features and toolsBook Description: The Minimal APIs feature, introduced in .NET 6, is the answer to code complexity and rising dependencies in creating even the simplest of APIs. Minimal APIs facilitate API development using compact code syntax and help you develop web APIs quickly.This practical guide explores Minimal APIs end-to-end and helps you take advantage of its features and benefits for your ASP.NET Core projects. The chapters in this book will help you speed up your development process by writing less code and maintaining fewer files using Minimal APIs. You'll also learn how to enable Swagger for API documentation along with CORS and handle application errors. The book even promotes ideas to structure your code in a better way using the dependency injection library in .NET. Finally, you'll learn about performance and benchmarking improvements for your apps.By the end of this book, you'll be able to fully leverage new features in .NET 6 for API development and explore how Minimal APIs are an evolution over classical web API development in ASP.NET Core.What You Will Learn: Adopt new features in .NET 6 for building lightweight APIsUnderstand how to optimize API development with Minimal APIs in .NET 6Discover best practices for accessing and using data in Minimal APIsUnderstand how to validate incoming data to an API and return error messagesGet familiar with dependency injection and logging for identifying errorsLeverage the translation system in Minimal APIs to provide messages and errors in regional languagesWho this book is for: If you are an existing .NET developer who wants to develop lightweight APIs quickly without much complexity, this book is for you. If you are a developer who is just getting started with the ASP.NET Core framework, this book will help you learn web API development using the latest .NET features. The book assumes intermediate-level knowledge of C# programming, Visual Studio, and REST API concepts.
Software Architecture for Web Developers
Discover an accessible pathway to advancing your career and becoming a web architect by building a solid technical ground in software architectureKey Features: Follow your desired career path that leads to a lucrative job as a web architectDevelop a solid technical background in software architecture using real-world practices and patternsLearn proven techniques and design considerations from an industry expertBook Description: Large-scale web applications require you to write code efficiently following business and architectural considerations. They require web developers to understand the impact of their work on the system and how they can evolve the product.With this handbook, every developer will find something to take away. This book will help web developers looking to change projects or work on a new project in understanding the context of the application, along with how some design decisions or patterns fit better in their application's architecture. It acts as a guide, taking you through different levels of professional growth with a focus on best practices, coding guidelines, business considerations, and soft skills that will help you gain the knowledge to craft a career in web development. Finally, you'll work with examples and ways of applying the discussed concepts in practical situations.By the end of this book, you'll have gained valuable insights into what it means to be a web architect, as well as the impact architecture has on a web application.What You Will Learn: Understand the context of software architecture, from shaping the product to delivery and beyondBecome well versed in what a web architect's role meansExplore go-to key concepts for every time you try your hand at app developmentAnalyze the importance of relationships with stakeholdersGet acquainted with the benefits of well-designed architectureDig into and solve myths web developers have come across or created along the wayWho this book is for: This book is for web developers who want to become web architects. Beginner-level web developers will be able to develop a strong technical background, and experienced web developers will learn techniques to become better professionals by understanding the web architect's role and the impact of efficient architecture on their projects.
Computer and Communication Engineering
This book constitutes refereed proceedings of the 2nd International Conference on Computer and Communication Engineering, CCCE 2022, held in Rome, Italy, March 11-13, 2022.The 9 full papers and 8 short papers presented in this volume were carefully reviewed and selected from a total of 36 submissions. The papers in the volume are organised according to the following topical headings: information science and mobile communication; computer and electronic engineering.
Advances in Production Management Systems. Smart Manufacturing and Logistics Systems
This two-volume set, IFIP AICT 663 and 664, constitutes the thoroughly refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2022, held in Gyeongju, South Korea in September 2022.The 139 full papers presented in these volumes were carefully reviewed and selected from a total of 153 submissions. The papers of APMS 2022 are organized into two parts. The topics of special interest in the first part included: AI & Data-driven Production Management; Smart Manufacturing & Industry 4.0; Simulation & Model-driven Production Management; Service Systems Design, Engineering & Management; Industrial Digital Transformation; Sustainable Production Management; and Digital Supply Networks. The second part included the following subjects: Development of Circular Business Solutions and Product-Service Systems through Digital Twins; "Farm-to-Fork" Production Management in Food Supply Chains; Urban Mobility and City Logistics; Digital Transformation Approaches in Production Management; Smart Supply Chain and Production in Society 5.0 Era; Service and Operations Management in the Context of Digitally-enabled Product-Service Systems; Sustainable and Digital Servitization; Manufacturing Models and Practices for Eco-Efficient, Circular and Regenerative Industrial Systems; Cognitive and Autonomous AI in Manufacturing and Supply Chains; Operators 4.0 and Human-Technology Integration in Smart Manufacturing and Logistics Environments; Cyber-Physical Systems for Smart Assembly and Logistics in Automotive Industry; and Trends, Challenges and Applications of Digital Lean Paradigm.
Practical Ansible
Get ready to go from the basics of using Ansible to becoming proficient at implementing configuration management in your projects. This book begins with the basics of Ansible, providing you with details on how to install and configure your environment while working with different Ansible modules from the command line. Next, it introduces you to working with Ansible tasks and organizing configuration code into playbooks. You'll then learn how to extend playbooks further, using roles and templates within the configuration code. Author Vincent Sesto then extends your knowledge further by covering custom Ansible modules using Python and Linux shell scripts and demonstrating how you can start to keep your secret values encrypted and secure using Ansible Vault. You'll also develop Ansible roles with the use of Ansible Galaxy to reuse existing roles that others have created.This updated edition reflects changes added in the latest version of Ansible (2.9). It also includes an expanded chapter on testing Ansible using Molecule and managing large server environments using applications like Ansible Tower.What Will You LearnUnderstand what Ansible is and how to install and run your first basic command line commandsExpand your configuration management using Ansible playbooks, roles and templatesCustomize your code further using Ansible Vault and third-party roles in Ansible Galaxy.Work with Ansible in managing cloud infrastructure, specifically in Amazon Web ServicesTroubleshoot your Ansible code and use frameworks like Molecule and Testinfra to help test your code changesManage large server environments using real-world examples and extend your configurations using an application like Ansible TowerWho This Book Is For Systems Engineers, Developers, DevOps Engineers and Software Administrators.
Ransomware and Cyber Extortion
Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after an attack may determine whether you'll ever recover. You must be ready. With this book, you will be. Ransomware and Cyber Extortion is the ultimate practical guide to surviving ransomware, exposure extortion, denial-of-service, and other forms of cyber extortion. Drawing heavily on their own unpublished case library, cyber security experts Sherri Davidoff, Matt Durrin, and Karen Sprenger guide you through responding faster, minimizing damage, investigating more effectively, expediting recovery, and preventing it from happening in the first place. Proven checklists help your security teams act swiftly and effectively together, throughout the entire lifecycle--whatever the attack and whatever the source. Understand different forms of cyber extortion and how they evolved Quickly recognize indicators of compromise Minimize losses with faster triage and containment Identify threats, scope attacks, and locate "patient zero" Initiate and manage a ransom negotiation--and avoid costly mistakes Decide whether to pay, how to perform due diligence, and understand risks Know how to pay a ransom demand while avoiding common pitfalls Reduce risks of data loss and reinfection Build a stronger, holistic cybersecurity program that reduces your risk of getting hacked This guide offers immediate value to everyone involved in prevention, response, planning, or policy: CIOs, CISOs, incident responders, investigators, negotiators, executives, legislators, regulators, law enforcement professionals, and others. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
Online Predators, an Internet Insurgency
In Online Predators, An Internet Insurgency: A Field Manual for Teaching and Parenting in the Digital Arena Jeffrey A. Lee brings his ten plus years' experience in the fight against online child exploitation to bear in an easy to follow guide for all with a stake in the life of a child. This book equips parents, guardians, extended family, and educational professionals with practical strategies to help keep kids safe in a technology connected world. Instead of focusing on ever changing technology, Lee proposes a key fundamental change in the fight against online predation--to develop an insatiable curiosity about their child's online life, then get in the front lines and stay there.
Digital Distress
Digital Distress is the first book of its kind to focus specifically on Gen Z, highlighting how children, who have grown up with technology as ubiquitous as air, are impacted by the challenges of growing up in a digital world. Drs. Strohman and Westendorf utilize their extensive clinical and forensic experience to offer the latest evidence-based insights and offer detailed recommendations for parents and others working with youth today. It is no longer reasonable for us to remain uninformed about the potential dangers of the digital landscape given the risks involved. Digital Distress delivers information from proven experts about how to create a healthier approach to the challenges of the online world.
Enterprise-Grade It Security for Small and Medium Businesses
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon-or should be employing-in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization's biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the "why" of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. You Will LearnThe importance of multi-factor authenticationThe limits of what multi-factor authentication can protectHow firewalls are used to protect your company from attackersWhat zero-trust environments are and what they meanWhether zero-trust networks are what is needed to secure your own environmentThe security benefits from implementing a network segmentation policyThe best ways to access files and resources from remote locations outside the officeWho This Book Is ForManagers and executives at small to medium-size businesses who want to understand the core aspects of IT security on which their businessrelies, business leaders who want to be able to follow along with and engage in discussions with IT professionals about security features, and leaders who are tasked with making decisions on which IT security features to implement
Advances in Digital Forensics XVII
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems.Advances in Digital Forensics XVII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the seventeenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of thirteen edited papers from the Seventeenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held virtually in the winter of 2021. Advances in Digital Forensics XVII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.
Knowledge Graph and Semantic Computing: Knowledge Graph Empowers the Digital Economy
This book constitutes the refereed proceedings of the 7th China Conference on Knowledge Graph and Semantic Computing: Knowledge Graph Empowers the Digital Economy, CCKS 2022, in Qinhuangdao, China, August 24-27, 2022.The 15 full papers and 2 short papers included in this book were carefully reviewed and selected from 100 submissions. They were organized in topical sections as follows: knowledge representation and reasoning; knowledge acquisition and knowledge base construction; linked data, knowledge integration, and knowledge graph storage managements; natural language understanding and semantic computing; knowledge graph applications; and knowledge graph open resources.
Advances in Production Management Systems. Smart Manufacturing and Logistics Systems
This two-volume set, IFIP AICT 663 and 664, constitutes the thoroughly refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2022, held in Gyeongju, South Korea in September 2022.The 139 full papers presented in these volumes were carefully reviewed and selected from a total of 153 submissions. The papers of APMS 2022 are organized into two parts. The topics of special interest in the first part included: AI & Data-driven Production Management; Smart Manufacturing & Industry 4.0; Simulation & Model-driven Production Management; Service Systems Design, Engineering & Management; Industrial Digital Transformation; Sustainable Production Management; and Digital Supply Networks. The second part included the following subjects: Development of Circular Business Solutions and Product-Service Systems through Digital Twins; "Farm-to-Fork" Production Management in Food Supply Chains; Urban Mobility and City Logistics; Digital Transformation Approaches in Production Management; Smart Supply Chain and Production in Society 5.0 Era; Service and Operations Management in the Context of Digitally-enabled Product-Service Systems; Sustainable and Digital Servitization; Manufacturing Models and Practices for Eco-Efficient, Circular and Regenerative Industrial Systems; Cognitive and Autonomous AI in Manufacturing and Supply Chains; Operators 4.0 and Human-Technology Integration in Smart Manufacturing and Logistics Environments; Cyber-Physical Systems for Smart Assembly and Logistics in Automotive Industry; and Trends, Challenges and Applications of Digital Lean Paradigm.
Learning Digital Identity
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and includes suggestions for where and when you can apply them. By linking current social login solutions to emerging self-sovereign identity issues, this book explains how digital identity works and gives you a firm grasp on what's coming and how you can take advantage of it to solve your most pressing identity problems. VPs and directors will learn how to more effectively leverage identity across their businesses. This book helps you: Learn why functional online identity is still a difficult problem for most companies Understand the purpose of digital identity and why it's fundamental to your business strategy Learn why "rolling your own" digital identity infrastructure is a bad idea Differentiate between core ideas such as authentication and authorization Explore the properties of centralized, federated, and decentralized identity systems Determine the right authorization methods for your specific application Understand core concepts such as trust, risk, security, and privacy Learn how digital identity and self-sovereign identity can make a difference for you and your organization
The Accidental Community Manager
New to the world of managing online communities? Worried that you have no community experience or don't know where to start? You're not alone. Most people never intend to be in the community industry-it just kind of happens. This book provides you the tips, tools and frameworks to make sure you are successful!