0101~0102_天獄園2
1231~0102_金網寒假動漫節

英文書 > 全部商品

WLAN CSMA/CA Performance in a Bluetooth Interference Environment

2025/07/30 出版

IEEE 802.11 WLANs and Bluetooth piconets both operate in the 2.4 GHz Industrial Scientific and Medical (ISM) radio band. When operating in close proximity, these two technologies interfere with each other. Current literature suggests that IEEE 802.11 (employing direct sequence spread spectrum technology) is more susceptible to this interference than Bluetooth, which uses frequency hopping spread spectrum technology, resulting in reduced throughput. Current research tends to focus on the issue of packet collisions, and not the fact that IEEE 802.11 may also delay its transmissions while the radio channel is occupied by a Bluetooth signal.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Internet2

2025/07/30 出版

In 2005 Air Force leadership added cyberspace to the USAF mission statement. Shortly thereafter, 8th Air Force was named the provisional headquarters of Air Force Cyber Command (AFCYBER). The past two years have witnessed an enormous amount of USAF capital invested in recognizing cyberspace as a co-equal warfighting domain to air and space. That point is not contested in this research paper, nor is the argument that the electronic spectrum is a component of cyberspace. Instead this research focuses on cyberspace's man-made aspects that are shaped by military and commercial technology making it unique from air and space. Two main programs are shaping cyberspace today: the Global Information Grid (GIG) and Internet2. The Global Information Grid (GIG) program is the DoD's comprehensive cyberspace network shaping program. It is intended to merge the diverse network operations of the various services into a seamless, integrated framework. Unfortunately, the GIG is focused almost entirely on transforming US forces to expanding the network, not to shaping cyberspace operations. Meanwhile, Internet2 is the commercial and academic community's most advanced program for shaping the Internet. Internet2 fosters cooperation between the research and development community to create advanced networking technologies. This paper asserts that AFCYBER should directly participate in both of these programs for the purpose of shaping cyberspace into a more effective domain for integrated air, space and cyberspace operations. Shaping the domain involves identifying, analyzing, and investing in components of the military and commercial community's network development programs to proactively enhance future cyberspace operations. Failure to consider shaping the cyber-battlefield will result in continual reaction to the vagaries of the commercial industry to the potential detriment of future cyber operations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Emerging Roles of Combat Communication Squadrons in Cyber Warfare As Related to Computer Network Attack, Defense And Exploitation

2025/07/30 出版

The warfighter has become increasingly dependent of the cyber domain and the computer network that all the deployed forces use to plan and execute the Commander's intent and accomplish the objectives for mission success. The full spectrum of cyber dominance must include the need for computer network attack, defense and exploitation (CNA/D/E) at the tactical level. The combat communications squadrons (CCS) are the Air Force's deployable communication force structure for the joint and coalition war ghter during combat and Humanitarian Relief Operations. With the growing intensity to defend the warfighter's mission that is dependent on the network, instead of defending the entire Air Force GIG, the CCS's core competencies must continue to move from network assurance to mission assurance in a tactical communication environment. In order to provide this complete capability for the war ghter, the combat communication squadrons should reshape their mission to include the cyber operations focus of CNA/D/E. The CCS mission should strive to balance bare-base operations with the CNA/D/E capabilities and evolve combat communication squadrons into a total cyber force tactical unit. Therefore, it only makes sense that mission assurance at the lowest possible denominator must be achieved and maintained. This research intends to show how an Air Force CCS can provide those complete cyber capabilities needed for a deployed force commander to obtain full mission assurance in the cyber domain through a new CCS team structure and time-phased implementation plan.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Software and Critical Technology Protection Against Side-Channel Analysis Through Dynamic Hardware Obfuscation

2025/07/30 出版

Side Channel Analysis (SCA) is a method by which an adversary can gather information about a processor by examining the activity being done on a microchip though the environment surrounding the chip. Side Channel Analysis attacks use SCA to attack a microcontroller when it is processing cryptographic code, and can allow an attacker to gain secret information, like a crypto-algorithm's key. The purpose of this thesis is to test proposed dynamic hardware methods to increase the hardware security of a microprocessor such that the software code being run on the microprocessor can be made more secure without having to change the code. This thesis uses the Java Optimized Processor (JOP) to identify and _x SCA vulnerabilities to give a processor running RSA or AES code more protection against SCA attacks.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1352
立即代訂
下次再買

Megabyte Will Always get Through

2025/07/30 出版

The purpose of this monograph is to describe the future road ahead for the US Cyber community in light of the recent technical and strategic developments in the state of cyber warfare. The paper began with a realization that cyber attacks have now become weaponized, and have the ability to command computer-guided machines to destroy themselves. In effect, kinetic strikes are now possible through the means of cyber attacks. Cyber attacks have therefore become kinetic in nature. Moreover, a history of such attacks has indicated the offense is significantly more powerful than the defense, and that there have been numerous examples where attacks easily and decisively defeated defensive schemes. However, the American cyber community is not unified, has no common doctrine, budget, educational or recruiting infrastructure. The method used was to break the community down into its component parts, discuss what characteristics made cyber warfare unique, then seek like organizations. Once those organizations were identified, and analysis of what made those organizations successful was made. Conclusions were drawn and those conclusions became recommended future activities for the cyber community. An analysis of the US cyber community determined that it was a technical organization, dependent on a small number of highly skilled personnel. It had a future that could see it as a decisive role player in future conflicts, but had an insignificant past. It had to struggle for funding dollars, and theorists and doctrine writers had difficulty identifying a road ahead. This community had great resemblance to the current cyber community in China, and the US Army Air Corps in the WWI - WWII interwar period. An analysis of those organizations determined several historical facts. Domains where technology was growing at a rapid rate brought several challenges as to how to maximize the organized systematic growth of the organization. Budgets were always a contentious issue, especially whenThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Using Prospect Theory to Investigate Decision-Making Bias Within an Information Security Context

2025/07/30 出版

Information security is an issue that has increased greatly in importance to bothindustry executives as well as military leadership over the past decade. In this time bothpractitioner and academic circles have researched and developed practices and process tomore effectively handle information security. Even with growth in these areas there hasbeen almost no research conducted into how decision makers actually behave. This isproblematic because information security decision makers in the Department of Defensehave been observed exhibiting risk seeking behavior when making information securitydecisions that seemingly violate accepted norms. There are presently no models in theliterature that provide sufficient insight into this phenomenon.This study used Prospect Theory, developed by Kahneman and Tversky, as aframework to develop a survey in an effort to obtain insight into how decision makersactually behave while making information security decisions.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1310
立即代訂
下次再買

Netwars Based Study of a Joint STARS Link-16 Network

2025/07/30 出版

Both secure and anti-jam resistant, the Link-16 is the primary communications channel used by the Joint Surveillance Target Attack Radar System (Joint STARS) for the exchange of real-time tactical data among various ground, air, and sea platforms of the United States of America and North Atlantic Treaty Organization forces. This research explored the effect of increasing network traffic for imagery transfer to the mean delay when operating under different network topologies. Using Network Warfare Simulation (NETWARS), three different missions were simulated to run on five network topologies having a different number of participants, different assigned time slots, and stacked nets. As a result, this study determined that the Link-16 network is able to handle the increase in network traffic, from 30 kilobits per second to 50 kilobits per second, when using multiple stacked net configurations while assigning an adequate number of time slots. However, because each participant is limited to 128 time slots per second, the increased network traffic limits the communication ability of other participants.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

A Study of Rootkit Stealth Techniques and Associated Detection Methods

2025/07/30 出版

In today's world of advanced computing power at the fingertips of any user, we must constantly think of computer security. Information is power and this power is had within our computer systems. If we can not trust the information within our computer systems then we can not properly wield the power that comes from such information. Rootkits are software programs that are designed to develop and maintain an environment in which malware may hide on a computer system after successful compromise of that computer system. Rootkits cut at the very foundation of the trust that we put in our information and subsequent power. This thesis seeks to understand rootkit hiding techniques, rootkit finding techniques and develops attack trees and defense trees in order to help us identify deficiencies in detection to further increase the trust in our information systems.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Mitigating Distributed Denial of Service Attacks in an Anonymous Routing Environment

2025/07/30 出版

Network-centric intelligence collection operations use computers and the Internet to identify threats against Department of Defense (DoD) operations and personnel, to assess the strengths and weaknesses of enemy capabilities and to attribute network events to sponsoring organizations. The security of these operations are paramount and attention must be paid to countering enemy attribution efforts. One way for U.S. information operators to avoid being linked to the DoD is to use anonymous communication systems. One such anonymous communication system, Tor, provides a distributed overlay network that anonymizes interactive TCP services such as web browsing, secure shell, and chat. Tor uses the Transport Layer Security (TLS) protocol and is thus vulnerable to a distributed denial-of-service (DDoS) attack that can significantly delay data traversing the Tor network. This research is the first to explore DDoS mitigation in the anonymous routing environment. Defending against DDoS attacks in this environment is challenging as mitigation strategies must account for the distributed characteristics of anonymous communication systems and for anonymity vulnerabilities. In this research, the TLS DDoS attack is mitigated by forcing all clients (malicious or legitimate) to solve a puzzle before a connection is completed.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1310
立即代訂
下次再買

Defeating Adversary Network Intelligence Efforts With Active Cyber Defense Techniques

2025/07/30 出版

The purpose of this research was to assess the potential of dynamic network reconfiguration and decoys to defeat adversary network reconnaissance efforts, thereby improving network defense. Specifically, this study sought to determine if the strategy has merit, thus warranting more resource intensive research and engineering studies. The research objective was achieved through a comprehensive literature review and limited technology survey. The key topics examined in the literature review include the network attack process, network defense strategies, deception and continuous unpredictable change. Many candidate technologies were surveyed, but only three identified as high potential were examined in detail: address hopping, honeypots and network telescopes.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Ten Propositions Regarding Cyberpower

2025/07/30 出版

This thesis is an initial attempt to clarify and further conceptualize cyberspace as an Air Force warfighting domain. This thesis follows two previous Ten Propositions works regarding airpower and spacepower, respectively written by Col Phillip S. Meilinger (1995) and Maj Michael V. Smith (2001). As the United States military explores its future regarding cyberspace operations, the time has come to frame similar propositions regarding cyberpower. Specifically, this thesis seeks to answer the question: What is the nature of cyberpower? It also tests the notion that cyberpower is simply a continuation or extension of airpower. Two points come immediately to the forefront of this work. First, cyberpower is different from airpower in that it encompasses much more than the vertical dimension of warfare. Second, cyberspace operations are quickly maturing to a point wherein propositions regarding cyberpower are worth discussing. The ten propositions presented here do not represent a complete list.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Internet Protocol Over Link-16

2025/07/30 出版

The purpose of Link-16 is to exchange real-time tactical data among units of the United States and allied forces. Primary Link-16 functions include exchange of friendly unit position and status data, the dissemination of tactical surveillance track data, and the control/management of air, surface, and subsurface engagements. Because Link-16 will play an integral part in the network-centric Joint Battlespace Infosphere (JBI), the performance of Internet Protocol version six (IPv6) and IP Security (IPSec) over Link-16 needs to be determined. IP packets also afford additional security measures within the JBI. Using OPNET modeling software to simulate a Link-16 network, the investigation of this research revealed that the overhead from IPv6 and IPSec does not significantly affect end-to-end delay and effective throughput of the Link-16 network. As long as the encryption and authentication protocols are preprocessed, these protocols add minimal amounts of latency overhead to the Link-16 network. However, as the offered load is extended beyond the 90 % level, the overhead from the IPSec extensions begins to have more of a negative effect on the End-to-End delay and throughput.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Analysis of Routing Worm Infection Rates on an IPV4 Network

2025/07/30 出版

Malicious logic, specifically worms cost network users an enormous amount of time and money. Worms, like Slammer and Code Red, infect thousands of systems and denied whole networks access to the Internet. This research examines the ability of the original Slammer worm, a Slammer based routing worm, and a new Single Slash Eight (SSE) routing worm to infect vulnerable systems within a given address space. The ability of Slammer to generate a uniform random IP addresses in a given address space is established. Finally, a comparison of the speed increase from a worm on a computing system in 2003 to those available today is performed. Both the Slammer based routing worm and the SSE routing worm spread faster than the original Slammer. The random number generator of the original Slammer worm generates a statistically uniform distribution of addresses within the range under test. Furthermore, despite the previous research into the speed of worm propagation, there is still a need to test worms on the current systems. The speed of the computing systems that the worms operated on in the past were more than three times slower than today's systems. As the speed of computer systems continue to grow, the speed of worm propagation should increase with it as their scan rates directly relate to their infection rate. As such, any inherent immunity of an IPv6 network from scanning worms should be reexamined.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1310
立即代訂
下次再買

Air Force and the Cyberspace Mission

2025/07/30 出版

A little over year ago, in November 2005, the Secretary of the Air Force Michael W. Wynne and Air Force Chief of Staff General T. Michael Moseley wrote a joint letter to all airmen of the Air Force. The letter defined a new mission statement which also included the concept of cyberspace. The secretary and chief defined cyberspace as including network security, data transmission and the sharing of information. It would be useful to look at how United States adversaries plan to engage us in the cyber domain as the Air Force moves toward this new frontier. This paper begins by suggesting potential areas an adversary may infiltrate cyberspace. It also includes a scenario describing China's cyberspace strategy. A brief historical look at computers, followed by a visit to today's systems, and then more importantly, an examination of future vulnerability of computer systems used throughout the Air Force is also included. A snapshot of current computer vulnerabilities within the Air Force, to include the operating systems, software and network/internet connectivity is also discussed in this paper. Although the Air Force and the Department of Defense (DOD) in general, have numerous safeguards in effect to protect systems and their networks, the DOD relies on a system that is passive when encountering cyber threats. This paper offers recommendations to consider, in the future, as the Air Force increasingly becomes reliant on computers, software, and the networks they reside on. Additionally, the time needed to develop and deploy effective defenses in cyberspace is much longer than the time required for an adversary to mount an attack. This paper concludes with an assessment that there is a valid and urgent need to begin steps today to defend the Air Force computer systems as well as to proactively protect and dominate the cyberspace domain of the future.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Machine Learning Techniques for Characterizing IEEE 802.11b Encrypted Data Streams

2025/07/30 出版

As wireless networks become an increasingly common part of the infrastructure in industrialized nations, the vulnerabilities of this technology need to be evaluated. Even though there have been major advancements in encryption technology, security protocols and packet header obfuscation techniques, other distinguishing characteristics do exist in wireless network traffic. These characteristics include packet size, signal strength, channel utilization and others. Using these characteristics, windows of size 11, 31, and 51 packets are collected and machine learning (ML) techniques are trained to classify applications accessing the 802.11b wireless channel. The four applications used for this study included E-Mail, FTP, HTTP, and Print.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Automated Analysis of ARM Binaries Using the Low-Level Virtual Machine Compiler Framework

2025/07/30 出版

Binary program analysis is a critical capability for offensive and defensive operations in Cyberspace. However, many current techniques are ineffective or time-consuming and few tools can analyze code compiled for embedded processors such as those used in network interface cards, control systems and mobile phones. This research designs and implements a binary analysis system, called the Architecture-independent Binary Abstracting Code Analysis System (ABACAS), which reverses the normal program compilation process, lifting binary machine code to the Low-Level Virtual Machine (LLVM) compiler's intermediate representation, thereby enabling existing security-related analyses to be applied to binary programs. The prototype targets ARM binaries but can be extended to support other architectures. Several programs are translated from ARM binaries and analyzed with existing analysis tools. Programs lifted from ARM binaries are an average of 3.73 times larger than the same programs compiled from a high-level language (HLL).This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1310
立即代訂
下次再買

An Analysis of Botnet Vulnerabilities

2025/07/30 出版

Botnets are a significant threat to computer networks and data stored on networked computers. The ability to inhibit communication between servers controlling the botnet and individual hosts would be an effective countermeasure. The objective of this research was to find vulnerabilities in Unreal IRCd that could be used to shut down the server. Analysis revealed that Unreal IRCd is a very mature and stable IRC server and no significant vulnerabilities were found. While this research does not eliminate the possibility that a critical vulnerability is present in the Unreal IRCd software, none were identified during this effort.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Development of an Malicious Insider Composite Vulnerability Assessment Methodology

2025/07/30 出版

Trusted employees pose a major threat to information systems. Despite ad-vances in prevention, detection, and response techniques, the number of maliciousinsider incidents and their associated costs have yet to decline. There are very fewvulnerability and impact models capable of providing information owners with theability to comprehensively assess the effectiveness an organization's malicious insidermitigation strategies.This research uses a multi-dimensional approach: content analysis, attack treeframework, and an intent driven taxonomy model are used to develop a maliciousinsider Decision Support System (DSS) tool. The tool's output provides an assess-ment of a malicious insider's composite vulnerability levels based upon aggregatedvulnerability assessment and impact assessment levels.The DSS tool's utility and applicability is demonstrated using a notional ex-ample. This research gives information owners data to more appropriately allocatescarce security resources.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1310
立即代訂
下次再買

A Taxonomy for and Analysis of Anonymous Communications Networks

2025/07/30 出版

Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intended to gather intelligence and disrupt communications rapidly replacing the threat of conventional and nuclear attacks, a new age of warfare is at hand. In 2003, the United States acknowledged that the speed and anonymity of cyber attacks makes distinguishing among the actions of terrorists, criminals, and nation states difficult. Even President Obama's Cybersecurity Chief-elect feels challenged by the increasing sophistication of cyber attacks. Indeed, the rising quantity and ubiquity of new surveillance technologies in cyberspace enables instant, undetectable, and unsolicited information collection about entities. Hence, anonymity and privacy are becoming increasingly important issues.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1436
立即代訂
下次再買

An Analysis of Biometric Technology as an Enabler to Information Assurance

2025/07/30 出版

The use of and dependence on Information technology (IT) has grown tremendously in the lasttwo decades. Still, some believe we are only in the infancy of this growth. This explosive growthhas opened the door to capabilities that were only dreamed of in the past. As easily as it is to seehow advantageous technology is, it is also clear that with those advantages come distinctresponsibilities and new problems that must be addressed. For instance, the minute we beganusing information processing systems, the world of information assurance (IA) became far morecomplex as well. As a result, the push for better IA is necessary.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Flexible Options for Cyber Deterrence

2025/07/30 出版

The idea of deterrence has existed since the beginning of humanity. The concept of deterrence became synonymous with American Cold War strategic thinking and foreign policy through the idea of mutually assured destruction. However, deterrence through punishment requires attribution, the demonstration of offensive capabilities, and an assumption of rationality. These requirements demonstrate the fallacy of Cold War deterrence applied to the cyber domain. In order to address both asymmetric threats from terrorists and the intimidation associated with nation-state peer competitors in the cyber domain, what is required is a comprehension of the challenges associated with attribution and international law. Just as important is an understanding of how extremists and nation-states use the cyber domain to conduct operations. Only then can the United States consider flexible cyber deterrent options within cyberspace.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1140
立即代訂
下次再買

Speech Recognition Using the Mellin Transform

2025/07/30 出版

The purpose of this research was to improve performance in speech recognition. Specifically, a new approach was investigating by applying an integral transform known as the Mellin transform (MT) on the output of an auditory model to improve the recognition rate of phonemes through the scale-invariance property of the Mellin transform. Scale-invariance means that as a time-domain signal is subjected to dilations, the distribution of the signal in the MT domain remains unaffected. An auditory model was used to transform speech waveforms into images representing how the brain "sees" a sound. The MT was applied and features were extracted. The features were used in a speech recognizer based on Hidden Markov Models. The results from speech recognition experiments showed an increase in recognition rates for some phonemes compared to traditional methods.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Suspicion Modeling in Support of Cyber-Influence Operations/Tactics

2025/07/30 出版

Understanding the cognitive process of IT user suspicion may assist organizations in development of network protection plans, personnel training, and tools necessary to identify and mitigate nefarious intrusions IT systems. Exploration of a conceptual common ground between psycho-social and technology-related concepts of suspicion are the heart of this investigation. The complexities involvedd in merging these perspectivess led to the overall questrion: What is the nature of the suspicion towrds IT? The research problem/ phenomenon wasaddress via extensive liteaturereview, and use of the Interactvie Qualitative Analysis methodogly. A problem/phenomenon. Analysis of the system led tot he development of a model of IT suspicion as a progenitor for future experimental constructs that measure or assess behavior as a result of cyber attacks.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1310
立即代訂
下次再買

Evaluation of the Ad Hoc On-Demand Distance Vector Routing Protocol for Mobile Ad Hoc Networks

2025/07/30 出版

Routing protocols designed for wired networks cannot be used in mobile ad hoc networks (MANETs) due to the dynamic topology, limited throughput, and energy constraints. New routing protocols have been designed for use in MANETs, but have not been thoroughly tested under realistic conditions such as node movement, number of sources, the presence of obstacles, and node speed.This research evaluates the performance of ad hoc on-demand distance vector routing with respect to throughput, goodput ratio, end-to-end (ETE) delay, node pair packet delivery rate, and node pair end-to-end delay. It shows these performance metrics vary significantly according to the choice of mobility model, number of sources, and the presence or absence of obstacles. The mobility model explains 68% of the variation in node pair packet delivery rate. The mobility model explains between 8% and 53% of variation in the other performance metrics. Obstacles explain between 5% and 24% of variation, and have the greatest effect on ETE delay. Finally, the number of sources explains between 8% and 72% of variation in node pair ETE delay, throughput, goodput ratio, and node pair packet delivery rate. The number of sources does not have a significant affect on ETE delay.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Visually Managing IPsec

2025/07/30 出版

The United States Air Force relies heavily on computer networks to transmit vast amounts of information throughout its organizations and with agencies throughout the Department of Defense. The data take many forms, utilize different protocols, and originate from various platforms and applications. It is not practical to apply security measures specific to individual applications, platforms, and protocols. Internet Protocol Security (IPsec) is a set of protocols designed to secure data traveling over IP networks, including the Internet. By applying security at the network layer of communications, data packets can be secured regardless of what application generated the data or which protocol is used to transport it. However, the complexity of managing IPsec on a production network, particularly using the basic command-line tools available today, is the limiting factor to widespread deployment. This thesis explores several visualizations of IPsec data, evaluates the viability of using visualization to represent and manage IPsec, and proposes an interface for a visual IPsec management application to simplify IPsec management and make this powerful security option more accessible to the information warfighter.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1310
立即代訂
下次再買

Insider Threat Detection Using Microsoft Log Files

2025/07/30 出版

Many threats to a network are not detected in a timely manner. Some are found hours or even days after the threat occurs. This research enhances threat detection in networks by parsing log data from the Windows event viewer. The data is processed in real time, and the notification of a threat results in the immediate sending of an email alertto the administrator. This notification is an imperative first step which alerts administrators of a possible threat that needs to be fully investigated. It was found that timely auditing of all components of the Microsoft Event Log, along with a script running to monitor these events on all network systems, can alert an administrator immediately of a potential threat situation on the network via email, resulting in more efficient defense tactics.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1310
立即代訂
下次再買

Throughput Performance Evaluation and Analysis of Unmodified Bluetooth Devices

2025/07/30 出版

The Air Force relies on the application of new technologies to support and execute its mission. As new technologies develop, the integration of that technology is studied to determine the costs and benefits it may provide to the war fighter. One such emergent technology is the Bluetooth wireless protocol, used to connect a small number of devices over a short distance. The short distance is a feature that makes using the protocol desirable. However short, there is still a vulnerability to interception. This research identifies ranges at which several commercially available Bluetooth devices are usable. Various combinations of both distance and orientation are varied to determine a 360 degree map of the Bluetooth antenna. The map identifies distances at which certain throughput thresholds are available. This research shows that baseline 1 mW Bluetooth antennas are capable of throughput levels of 100 kbps at over 40 meters, which is four times the minimum distance specified in the protocol standard. The 3Com PC card was the best performing PC card, capable of throughputs at or near 100 kbps out to 40 meters. The other PC Cards tested had similar performance. The Hawking USB dongle was the best USB antenna tested, achieving throughputs of over 200 kbps in three of the four orientation, and over 150 kbps at the fourth. The 3Com dongle was a close second, the Belkin dongle a distant third, while the DLink antenna was not able to achieve 100 kbps at any distance tested.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

From Web1 to Web3

Ollie,Bell  著
CRC Press 出版
2025/07/30 出版

From Web1 to Web3 is your definitive roadmap through the current digital revolution. Authored by Ollie Bell, Nabil Hadi, and Daniel Strode, this book offers a clear, thoughtful exploration of the internet's evolution - from its humble, static beginnings to the dynamic, decentralized future that is emerging today.

9 特價6678
立即代訂
下次再買

Computer and Information Security

Chunguo,Li  著
Springer 出版
2025/07/30 出版

This book constitutes the proceedings of the first World Conference of Computer and Information Security, WCCIS 2024, which was held in Kuala Lumpur, Malaysia, during September 20-22, 2024. The 14 full papers and 5 short papers were presented in this volume were carefully reviewed and selected from 58 submissions. They focus on Computer Modeling and Intelligent Information Technology; Network Information Security and Anomaly Detection.

9 特價4769
立即代訂
下次再買

Federal It Security

2025/07/29 出版

The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1352
立即代訂
下次再買

Cyber Security

2025/07/29 出版

The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1352
立即代訂
下次再買

Advancements In Smart Card And Biometric Technology

2025/07/29 出版

The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價760
立即代訂
下次再買

AWS for Solutions Architects - Third Edition

Packt 出版
2025/07/29 出版

Master AWS architecture and design secure, scalable, production-ready cloud systems. This practical guide features real-world patterns, GenAI strategies, cost optimization techniques, and certification-aligned best practices.Endorsements"More than a manual, this is your blueprint for designing AWS systems with confidence and clarity."- Kamal Arora, Director, Solutions Architecture, AWS"From AWS building blocks to generative AI, this book is a strong foundation for becoming a true AWS architect."- Ebrahim Khiyami, Specialist Solutions Architect, AWS"Not just another tech manual - this is your roadmap to mastering modern AWS architecture with real-world patterns, GenAI strategies, and hands-on MLOps for today's cloud challenges."- Jignesh Desai, Principal Solutions Architect, AWS Migration and ModernizationBook DescriptionAWS for Solutions Architects, Third Edition is your essential guide to thriving in the fast-evolving AWS ecosystem. As a solutions architect, staying on top of the latest technologies and managing complex cloud migrations can be challenging, and this book addresses those pain points head-on. Seasoned AWS experts Saurabh Shrivastava, Neelanjali Srivastav, and Dhiraj Thakur bring deep industry insight and hands-on experience to every chapter.This third edition introduces cutting-edge topics, including Generative AI and MLOps, to keep pace with the evolving cloud landscape and guide you in building AI-driven applications. The book also reflects updates from the AWS Well-Architected Framework and aligns with the latest AWS certifications, making it a future-ready guide for cloud professionals. The chapters help you stay ahead of the competition with in-depth coverage of the latest AWS certifications, including AI Practitioner Foundation and Data Engineer Associate, helping you position yourself as a leader in cloud innovation.By the end of this book, you'll transform into a solutions architecture expert, equipped with the strategies, tools, and certifications needed to handle any cloud challenge.What you will learn- Gain expertise in GenAI, MLOps, AIOps, and mobile edge computing- Optimize performance and handle errors in cloud-native applications- Prepare for new AWS certifications, including those focused on AI and data engineering- Apply best practices for security, compliance, and AWS Learning Badges- Explore the updated Well-Architected Framework with six pillars- Get in-depth knowledge of new storage options and security group configurationsWho this book is forThis book is for application and enterprise architects, developers, operations engineers, and certification aspirants looking to master AWS architectural patterns, best practices, and advanced techniques for building scalable, secure, highly available, fault-tolerant, and cost-effective cloud solutions. Prior coding knowledge isn't required, but experience in software architecture design will be helpful.Table of Contents- Understanding AWS Cloud Principles and Key Characteristics- Understanding the AWS Well-Architected Framework and Getting Certified- Leveraging the Cloud for Enterprise Transformation- Networking in AWS- Storage in AWS: Choosing the Right Tool for the Job- Harnessing the Power of Cloud Computing- Selecting the Right Database Service- Best Practices for Application Security, Identity, and Compliance- Driving Efficiency with Cloud Operation Automation and DevOps in AWS(N.B. Please use the Look Inside option to see further chapters)

9 特價2327
立即代訂
下次再買

Modeling and Analyzing Security Protocols with Tamarin

David,Basin  著
Springer 出版
2025/07/29 出版

The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol, possible adversaries, and the desired security properties, Tamarin either verifies the protocol or provides counter examples witnessing attacks. Tamarin is a robust and powerful analysis tool: it has been under development for over a decade and has reached a state of maturity where it can be applied to model and analyze a wide range of real-world cryptographic protocols. It is now one of the leading tools in this domain, with a wide and active user community spanning both academia and industry. The objective of this book is to help both researchers and practitioners to gain a general understanding of how Formal Methods tools like Tamarin can be used to analyze and improve the quality of real-world protocols. Moreover, we specifically showcase the Tamarin prover and provide guidance on its usage. In this sense, this book provides a user's manual forTamarin. But it goes far beyond that, highlighting Tamarin's underlying theory and its use in modeling and applications.

9 特價2861
立即代訂
下次再買

Inclusive Design for Accessibility

Dale,Cruse  著
Packt 出版
2025/07/29 出版

Through insights from twelve industry voices, learn how to create truly accessible and inclusive digital experiences that work for everyone, regardless of ability and backgroundKey Features: - Understand inclusive design principles that will help you achieve universal usability- Gain insights into AI and emerging technologies shaping the future of accessibility- Drive organizational change with practical strategies to build an inclusive design culture- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Despite our growing reliance on digital technology, millions of users are still excluded from fully engaging with websites, apps, and digital services because nobody thought to design for them. Inclusive Design for Accessibility challenges you to rethink how you build digital experiences, offering the tools and guidance needed to move beyond compliance and create experiences that work for everyone.With contributions from twelve accessibility leaders-Dale Cruse, Denis Boudreau, Dr. Angela Young, Maya Sellon, Julianna Rowsell, Nandita Gupta, Jennifer Chadwick, Crystal Scott, Chris McMeeking, Dr. Keith Newton, Charlie Triplett, and Kai Wong-this book lays out the fundamentals of inclusive design and its application in advanced and emerging technologies. You'll discover practical strategies and real-world examples that show you how to embed accessibility into projects, from user research and testing to creating accessible websites and mobile apps. You'll also focus on how AI can enhance accessibility and learn to tackle the challenges posed by VR and AR.For designers, developers, product managers, and business leaders, this book will reshape how you approach inclusive design, helping you move beyond ticking boxes toward building digital products that don't leave anyone behind.What You Will Learn: - Master the core principles of inclusive design to create products that serve all- Conduct diverse user research to gain insights into accessible experiences- Implement accessibility best practices in your web and mobile deployments- Create fully accessible content in text, audio, and video formats- Explore the accessibility challenges and opportunities with AI, VR, and AR- Navigate the legal and ethical implications of accessibility to protect users and your brand- Establish accessibility-focused workflows and practices in your teamsWho this book is for: This book is for digital designers, developers, UX professionals, product managers, and business leaders committed to inclusive design. It offers practical skills for creating accessible digital products, while covering legal and ethical considerations, user research, and strategies for building an accessibility-focused culture within teams.You don't need to be an expert in UX design, web development, or accessibility to get value from this book. Each chapter delivers actionable insights that stand on their own, be it UX design, product management, development, or accessibility leadership.Table of Contents- Defining Inclusive Design in the Digital Age- Understanding Diverse User Needs: Types of Disabilities and Assistive Technologies- Legal and Ethical Considerations in Accessible Design- User Research and Testing for Inclusive Products- Designing Accessible User Interfaces: Visual and Interaction Design- Creating Accessible Content: Writing, Images, and Multimedia- Developing Accessible Websites: HTML, CSS, and ARIA Best Practices- Mobile Accessibility: Designing for Touch and Voice Interfaces- Accessibility in Emerging Technologies: VR, AR, and AI(N.B. Please use the Read Sample option to see further chapters)

9 特價1904
立即代訂
下次再買

Cyber Threat Hunters Handbook

2025/07/28 出版

Cyber threat hunting is the advanced practice that empowers security teams to actively unearth hidden intrusions and subtle attack behaviors that evade traditional tools. Cyber threats are evolving faster than ever. It is used by modern attackers as an advanced technique to infiltrate systems, evade detection, and exploit vulnerabilities at scale. This book offers a hands-on, practical approach to threat hunting and covers key topics such as network traffic analysis, operating system compromise detection, malware analysis, APTs, cyber threat intelligence, AI-driven detection techniques, and open-source tools. Each chapter builds the capabilities, from understanding the fundamentals to applying advanced techniques in real-world scenarios. It also covers integrating strategies for dealing with security incidents, outlining crucial methods for effective hunting in various settings, and emphasizing the power of sharing insights.By the end of this book, readers will possess the critical skills and confidence to effectively identify, analyze, and neutralize advanced cyber threats, significantly elevating their capabilities as cybersecurity professionals. WHAT YOU WILL LEARN● Analyze network traffic, logs, and suspicious system behavior.● Apply threat intelligence and IoCs for early detection.● Identify and understand malware, APTs, and threat actors.● Detect and investigate cyber threats using real-world techniques.● Use techniques and open-source tools for practical threat hunting.● Strengthen incident response with proactive hunting strategies.WHO THIS BOOK IS FORThis book is designed for cybersecurity analysts, incident responders, and Security Operations Center (SOC) professionals seeking to advance their proactive defense skills. Anyone looking to learn about threat hunting, irrespective of their experience, can learn different techniques, tools, and methods with this book.

9 特價1690
立即代訂
下次再買

Research and Innovation Forum 2024

Anna,Visvizi  著
Springer 出版
2025/07/28 出版

This book features research presented and discussed during the Research & Innovation Forum (Rii Forum) 2024. As such, this book offers a unique insight into emerging topics, issues and developments pertinent to the fields of technology, innovation and education and their social impact. Papers included in this book apply inter- and multi-disciplinary approaches to query such issues as technology-enhanced teaching and learning, smart cities, information systems, cognitive computing and social networking. What brings these threads of the discussion together is the question of how advances in computer science-which are otherwise largely incomprehensible to researchers from other fields-can be effectively translated and capitalized on so as to make them beneficial for society as a whole. In this context, Rii Forum and Rii Forum proceedings offer an essential venue where diverse stakeholders, including academics, the think tank sector and decision-makers, can engage in a meaningful dialogue with a view to improving the applicability of advances in computer science.

9 特價11924
立即代訂
下次再買

Internet of Things, Smart Spaces, and Next Generation Networks and Systems

Springer 出版
2025/07/28 出版

This two-volume set LNCS 15554 and LNCS 15555 constitutes the refereed proceedings of the 24th International Conference on Next Generation Wired/Wireless Networking, NEW2AN 2024, and the 17th Conference on Internet of Things and Smart Spaces, ruSMART 2024, held in Marrakesh, Morocco, during December 11-12, 2024.The 48 full papers included in the joint proceedings were carefully reviewed and selected from 354 submissions. They address various aspects of next-generation data networks, with special attention to advanced wireless networking and applications. In particular, novel and innovative approaches to performance and effciency analysis of 5G and beyond systems, advanced queuing theory, and machine learning are demonstrated. Additionally, the papers focus on the Internet of Things, optics, signal processing, as well as digital Economy and business aspects.

9 特價3577
立即代訂
下次再買

Innovative Security Solutions for Information Technology and Communications

Springer 出版
2025/07/28 出版

This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 17th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2024, which took place in Bucharest, Romania, in November 2024. The 16 full papers presented in these proceedings were carefully reviewed and selected from 49 submissions. The book also contains two invited talks. This conference is focusing on all theoretical and practical aspects related to information technology and communications security.

9 特價6785
貨到通知
下次再買

Advanced Intelligent Computing Technology and Applications

Springer 出版
2025/07/27 出版

The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, constitutes the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025. The 523 papers presented in these proceedings books were carefully reviewed and selected from 4032 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications".

9 特價4769
立即代訂
下次再買

Advanced Intelligent Computing Technology and Applications

Springer 出版
2025/07/27 出版

The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, constitutes the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025. The 523 papers presented in these proceedings books were carefully reviewed and selected from 4032 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications".

9 特價4769
立即代訂
下次再買

Advanced Intelligent Computing Technology and Applications

Springer 出版
2025/07/26 出版

The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, constitutes the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025. The 523 papers presented in these proceedings books were carefully reviewed and selected from 4032 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications".

9 特價4769
立即代訂
下次再買

Autonomous Revolution: Strategies, Threats and Challenges

Springer 出版
2025/07/26 出版
9 特價10439
貨到通知
下次再買

Moderator-topics

Anonymous  著
2025/07/26 出版

"Moderator-topics, Volume 16" delves into the crucial aspects of online community management and content moderation. This volume explores the challenges and strategies involved in maintaining constructive and safe online environments. From handling user disputes to implementing content policies, this book offers insights relevant to anyone involved in moderating online forums, social media platforms, or digital communities. An essential resource for moderators, community managers, and those interested in the dynamics of online interactions, "Moderator-topics" provides a comprehensive overview of the tools and techniques necessary for fostering healthy and productive online spaces. Explore real-world examples and practical advice on navigating the complexities of digital communication.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1267
立即代訂
下次再買

Information Security

2025/07/24 出版

The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1140
立即代訂
下次再買

Digital Degrowth

Neil,Selwyn  著
Polity Press 出版
2025/07/24 出版

We are fast approaching the point of "peak digital", with the continued mass production and excessive consumption of digital technologies set to become a key driver of climate crisis, ecological breakdown and ongoing societal instability. Digital Degrowth is a call to completely rethink our digital futures in these fast-changing times. It explores how degrowth thinking and alternate forms of "radically sustainable computing" might support ambitions of sustainable, scaled-down and equitable ways of living with digital technologies. Neil Selwyn proposes a rebalancing of digital technology use: digital degrowth is not a call for simply making reduced use of the digital technologies that we already have - rather it is an argument to reimagine digital practices that maximise societal benefits with minimal environmental and social impact. Drawing on illustrative examples from across computer science, hacker and environmental activist communities, this book examines how core degrowth principles of conviviality, autonomy and care are already being used to reimagine alternate forms of digital technology. Original and stimulating, this is essential reading for students and scholars of media and communication, sustainability studies, political ecology, computer/data sciences, and across the social sciences.

9 特價633
貨到通知
下次再買

The Cybernetic Society

Amir,Husain  著
Basic Books 出版
2025/07/24 出版

"An optimistic, shimmering image of a world where AI operates in service to humankind" (Kirkus) argues that both the major risk and opportunity of AI is that humans and computers have fused, giving AI the ability to shape the future of human affairs Artificial intelligence is inescapable: at home, at work, in politics, and on the battlefield. In The Cybernetic Society, technologist Amir Husain argues that AI hasn't simply encroached on everything we do. It has become part of us, and we, it. Humans and intelligent machines, he argues, are enmeshed in a symbiotic hybrid that he calls a "cybernetic society." Husain describes a present and future where AI isn't a tool of humans but our equal partner, one where they can realize their own visions of the world. There is great potential and danger: Saudi Arabia's Neom--a "cognitive city" being built in inhospitable desert--shows how this symbiosis can make life possible where otherwise, it is not. But the profusion of intelligent military drones is making mass destruction possible where otherwise, it is not. As engrossing as it is urgent, The Cybernetic Society offers a new understanding of this revolutionary fusion of machine and mankind, and its profound implications for all our futures. The path ahead is challenging. But Husain shows why we can live harmoniously with our creations.

9 特價945
立即代訂
下次再買
頁數5/103
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing