Cross-Language Information Retrieval
Search for information is no longer exclusively limited within the native language of the user, but is more and more extended to other languages. This gives rise to the problem of cross-language information retrieval (CLIR), whose goal is to find relevant information written in a different language to a query. In addition to the problems of monolingual information retrieval (IR), translation is the key problem in CLIR: one should translate either the query or the documents from a language to another. However, this translation problem is not identical to full-text machine translation (MT): the goal is not to produce a human-readable translation, but a translation suitable for finding relevant documents. Specific translation methods are thus required. The goal of this book is to provide a comprehensive description of the specific problems arising in CLIR, the solutions proposed in this area, as well as the remaining problems. The book starts with a general description of the monolingualIR and CLIR problems. Different classes of approaches to translation are then presented: approaches using an MT system, dictionary-based translation and approaches based on parallel and comparable corpora. In addition, the typical retrieval effectiveness using different approaches is compared. It will be shown that translation approaches specifically designed for CLIR can rival and outperform high-quality MT systems. Finally, the book offers a look into the future that draws a strong parallel between query expansion in monolingual IR and query translation in CLIR, suggesting that many approaches developed in monolingual IR can be adapted to CLIR. The book can be used as an introduction to CLIR. Advanced readers can also find more technical details and discussions about the remaining research challenges in the future. It is suitable to new researchers who intend to carry out research on CLIR. Table of Contents: Preface / Introduction / Using Manually Constructed Translation Systems andResources for CLIR / Translation Based on Parallel and Comparable Corpora / Other Methods to Improve CLIR / A Look into the Future: Toward a Unified View of Monolingual IR and CLIR? / References / Author Biography
Digital Libraries Applications
Digital libraries (DLs) have evolved since their launch in 1991 into an important type of information system, with widespread application. This volume advances that trend further by describing new research and development in the DL field that builds upon the 5S (Societies, Scenarios, Spaces, Structures, Streams) framework, which is discussed in three other DL volumes in this series.While the 5S framework may be used to describe many types of information systems, and is likely to have even broader utility and appeal, we focus here on digital libraries. Drawing upon six (Akbar, Kozievitch, Leidig, Li, Murthy, Park) completed and two (Chen, Fouh) in-process dissertations, as well as the efforts of collaborating researchers, and scores of related publications, presentations, tutorials, and reports, this book demonstrates the applicability of 5S in five digital library application areas, that also have importance in the context of the WWW, Web 2.0, and innovative information systems. By integrating surveys of the state-of-the-art, newresearch, connections with formalization, case studies, and exercises/projects, this book can serve as a textbook for those interested in computing, information, and/or library science. Chapter 1 focuses on images, explaining how they connect with information retrieval, in the context of CBIR systems. Chapter 2 gives two case studies of DLs used in education, which is one of the most common applications of digital libraries. Chapter 3 covers social networks, which are at the heart of work onWeb 2.0, explaining the construction and use of deduced graphs, that can enhance retrieval and recommendation. Chapter 4 demonstrates the value of DLs in eScience, focusing, in particular, on cyber-infrastructure for simulation. Chapter 5 surveys geospatial information in DLs, with a case study on geocoding. Given this rich content, we trust that any interested in digital libraries, or in related systems, will find this volume to be motivating, intellectually satisfying, and useful. We hope it will help move digital libraries forward into a science as well as a practice. We hope it will help build community that will address the needs of the next generation of DLs.
Discourse Processing
Discourse Processing here is framed as marking up a text with structural descriptions on several levels, which can serve to support many language-processing or text-mining tasks. We first explore some ways of assigning structure on the document level: the logical document structure as determined by the layout of the text, its genre-specific content structure, and its breakdown into topical segments. Then the focus moves to phenomena of local coherence. We introduce the problem of coreference and look at methods for building chains of coreferring entities in the text. Next, the notion of coherence relation is introduced as the second important factor of local coherence. We study the role of connectives and other means of signaling such relations in text, and then return to the level of larger textual units, where tree or graph structures can be ascribed by recursively assigning coherence relations. Taken together, these descriptions can inform text summarization, information extraction, discourse-aware sentiment analysis, question answering, and the like. Table of Contents: Introduction / Large Discourse Units and Topics / Coreference Resolution / Small Discourse Units and Coherence Relations / Summary: Text Structure on Multiple Interacting Levels
Information Retrieval Models
Information Retrieval (IR) models are a core component of IR research and IR systems. The past decade brought a consolidation of the family of IR models, which by 2000 consisted of relatively isolated views on TF-IDF (Term-Frequency times Inverse-Document-Frequency) as the weighting scheme in the vector-space model (VSM), the probabilistic relevance framework (PRF), the binary independence retrieval (BIR) model, BM25 (Best-Match Version 25, the main instantiation of the PRF/BIR), and language modelling (LM). Also, the early 2000s saw the arrival of divergence from randomness (DFR). Regarding intuition and simplicity, though LM is clear from a probabilistic point of view, several people stated: "It is easy to understand TF-IDF and BM25. For LM, however, we understand the math, but we do not fully understand why it works." This book takes a horizontal approach gathering the foundations of TF-IDF, PRF, BIR, Poisson, BM25, LM, probabilistic inference networks (PIN's), and divergence-basedmodels. The aim is to create a consolidated and balanced view on the main models. A particular focus of this book is on the "relationships between models." This includes an overview over the main frameworks (PRF, logical IR, VSM, generalized VSM) and a pairing of TF-IDF with other models. It becomes evident that TF-IDF and LM measure the same, namely the dependence (overlap) between document and query. The Poisson probability helps to establish probabilistic, non-heuristic roots for TF-IDF, and the Poisson parameter, average term frequency, is a binding link between several retrieval models and model parameters. Table of Contents: List of Figures / Preface / Acknowledgments / Introduction / Foundations of IR Models / Relationships Between IR Models / Summary & Research Outlook / Bibliography / Author's Biography / Index
Introduction to Linguistic Annotation and Text Analytics
Linguistic annotation and text analytics are active areas of research and development, with academic conferences and industry events such as the Linguistic Annotation Workshops and the annual Text Analytics Summits. This book provides a basic introduction to both fields, and aims to show that good linguistic annotations are the essential foundation for good text analytics. After briefly reviewing the basics of XML, with practical exercises illustrating in-line and stand-off annotations, a chapter is devoted to explaining the different levels of linguistic annotations. The reader is encouraged to create example annotations using the WordFreak linguistic annotation tool. The next chapter shows how annotations can be created automatically using statistical NLP tools, and compares two sets of tools, the OpenNLP and Stanford NLP tools. The second half of the book describes different annotation formats and gives practical examples of how to interchange annotations between different formats using XSLT transformations. The two main text analytics architectures, GATE and UIMA, are then described and compared, with practical exercises showing how to configure and customize them. The final chapter is an introduction to text analytics, describing the main applications and functions including named entity recognition, coreference resolution and information extraction, with practical examples using both open source and commercial tools. Copies of the example files, scripts, and stylesheets used in the book are available from the companion website, located at the book website. Table of Contents: Working with XML / Linguistic Annotation / Using Statistical NLP Tools / Annotation Interchange / Annotation Architectures / Text Analytics
Introduction to Chinese Natural Language Processing
This book introduces Chinese language-processing issues and techniques to readers who already have a basic background in natural language processing (NLP). Since the major difference between Chinese and Western languages is at the word level, the book primarily focuses on Chinese morphological analysis and introduces the concept, structure, and interword semantics of Chinese words. The following topics are covered: a general introduction to Chinese NLP; Chinese characters, morphemes, and words and the characteristics of Chinese words that have to be considered in NLP applications; Chinese word segmentation; unknown word detection; word meaning and Chinese linguistic resources; interword semantics based on word collocation and NLP techniques for collocation extraction. Table of Contents: Introduction / Words in Chinese / Challenges in Chinese Morphological Processing / Chinese Word Segmentation / Unknown Word Identification / Word Meaning / Chinese Collocations / Automatic Chinese Collocation Extraction / Appendix / References / Author Biographies
The Notion of Relevance in Information Science
Everybody knows what relevance is. It is a "ya'know" notion, concept, idea-no need to explain whatsoever. Searching for relevant information using information technology (IT) became a ubiquitous activity in contemporary information society. Relevant information means information that pertains to the matter or problem at hand--it is directly connected with effective communication. The purpose of this book is to trace the evolution and with it the history of thinking and research on relevance in information science and related fields from the human point of view. The objective is to synthesize what we have learned about relevance in several decades of investigation about the notion in information science. This book deals with how people deal with relevance--it does not cover how systems deal with relevance; it does not deal with algorithms. Spurred by advances in information retrieval (IR) and information systems of various kinds in handling of relevance, a number of basic questionsare raised: But what is relevance to start with? What are some of its properties and manifestations? How do people treat relevance? What affects relevance assessments? What are the effects of inconsistent human relevance judgments on tests of relative performance of different IR algorithms or approaches? These general questions are discussed in detail.
RFID Security and Privacy
As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the physical and network level. At the physical level, RFID security means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFID devices should be identified without disclosure of any valuable information about the devices. At the network level, RFID security means that RFID information should be shared with authorized parties only, while RFID privacy further requires that RFID information should be shared without disclosure of valuable RFID information to any honest-but-curious server which coordinates information sharing. Not only does this book summarize the past, but it also provides new research results, especially at the network level. Several future directions are envisioned to be promising for advancing the research in this area.
Statistical Language Models for Information Retrieval
As online information grows dramatically, search engines such as Google are playing a more and more important role in our lives. Critical to all search engines is the problem of designing an effective retrieval model that can rank documents accurately for a given query. This has been a central research problem in information retrieval for several decades. In the past ten years, a new generation of retrieval models, often referred to as statistical language models, has been successfully applied to solve many different information retrieval problems. Compared with the traditional models such as the vector space model, these new models have a more sound statistical foundation and can leverage statistical estimation to optimize retrieval parameters. They can also be more easily adapted to model non-traditional and complex retrieval problems. Empirically, they tend to achieve comparable or better performance than a traditional model with less effort on parameter tuning. This book systematically reviews the large body of literature on applying statistical language models to information retrieval with an emphasis on the underlying principles, empirically effective language models, and language models developed for non-traditional retrieval tasks. All the relevant literature has been synthesized to make it easy for a reader to digest the research progress achieved so far and see the frontier of research in this area. The book also offers practitioners an informative introduction to a set of practically useful language models that can effectively solve a variety of retrieval problems. No prior knowledge about information retrieval is required, but some basic knowledge about probability and statistics would be useful for fully digesting all the details. Table of Contents: Introduction / Overview of Information Retrieval Models / Simple Query Likelihood Retrieval Model / Complex Query Likelihood Model / Probabilistic Distance Retrieval Model / Language Models for Special Retrieval Tasks / Language Models for Latent Topic Analysis / Conclusions
Scholarly Collaboration on the Academic Social Web
Collaboration among scholars has always been recognized as a fundamental feature of scientific discovery. The ever-increasing diversity among disciplines and complexity of research problems makes it even more compelling to collaborate in order to keep up with the fast pace of innovation and advance knowledge. Along with the rapidly developing Internet communication technologies and the increasing popularity of the social web, we have observed many important developments of scholarly collaboration on the academic social web. matioIn this book, we review the rapid transforn of scholarly collaboration on various academic social web platforms and examine how these platforms have facilitated academics throughout their research lifecycle--from forming ideas, collecting data, and authoring articles to disseminating findings. We refer to the term "academic social web platforms" in this book as a category of Web 2.0 tools or online platforms (such as CiteULike, Mendeley, Academia.edu, and ResearchGate) that enable and facilitate scholarly information exchange and participation. We will also examine scholarly collaboration behaviors including sharing academic resources, exchanging opinions, following each other's research, keeping up with current research trends, and, most importantly, building up their professional networks. Inspired by the model developed Olson et al. [2000] on factors for successful scientific collaboration, our examination of the status of scholarly collaboration on the academic social web has four emphases: technology readiness, coupling work, building common ground, and collaboration readiness. Finally, we talk about the insights and challenges of all these online scholarly collaboration activities imposed on the research communities who are engaging in supporting online scholarly collaboration. This book aims to help researchers and practitioners understand the development of scholarly collaboration on the academic social web, and to build up an activecommunity of scholars who are interested in this topic.
Grammatical Inference for Computational Linguistics
This book provides a thorough introduction to the subfield of theoretical computer science known as grammatical inference from a computational linguistic perspective. Grammatical inference provides principled methods for developing computationally sound algorithms that learn structure from strings of symbols. The relationship to computational linguistics is natural because many research problems in computational linguistics are learning problems on words, phrases, and sentences: What algorithm can take as input some finite amount of data (for instance a corpus, annotated or otherwise) and output a system that behaves "correctly" on specific tasks? Throughout the text, the key concepts of grammatical inference are interleaved with illustrative examples drawn from problems in computational linguistics. Special attention is paid to the notion of "learning bias." In the context of computational linguistics, such bias can be thought to reflect common (ideally universal) properties of natural languages. This bias can be incorporated either by identifying a learnable class of languages which contains the language to be learned or by using particular strategies for optimizing parameter values. Examples are drawn largely from two linguistic domains (phonology and syntax) which span major regions of the Chomsky Hierarchy (from regular to context-sensitive classes). The conclusion summarizes the major lessons and open questions that grammatical inference brings to computational linguistics. Table of Contents: List of Figures / List of Tables / Preface / Studying Learning / Formal Learning / Learning Regular Languages / Learning Non-Regular Languages / Lessons Learned and Open Problems / Bibliography / Author Biographies
Web Corpus Construction
The World Wide Web constitutes the largest existing source of texts written in a great variety of languages. A feasible and sound way of exploiting this data for linguistic research is to compile a static corpus for a given language. There are several adavantages of this approach: (i) Working with such corpora obviates the problems encountered when using Internet search engines in quantitative linguistic research (such as non-transparent ranking algorithms). (ii) Creating a corpus from web data is virtually free. (iii) The size of corpora compiled from the WWW may exceed by several orders of magnitudes the size of language resources offered elsewhere. (iv) The data is locally available to the user, and it can be linguistically post-processed and queried with the tools preferred by her/him. This book addresses the main practical tasks in the creation of web corpora up to giga-token size. Among these tasks are the sampling process (i.e., web crawling) and the usual cleanups including boilerplate removal and removal of duplicated content. Linguistic processing and problems with linguistic processing coming from the different kinds of noise in web corpora are also covered. Finally, the authors show how web corpora can be evaluated and compared to other corpora (such as traditionally compiled corpora). For additional material please visit the companion website: sites.morganclaypool.com/wcc Table of Contents: Preface / Acknowledgments / Web Corpora / Data Collection / Post-Processing / Linguistic Processing / Corpus Evaluation and Comparison / Bibliography / Authors' Biographies
Information Communication
This book introduces fundamentals of information communication. At first, concepts and characteristics of information and information communication are summarized. And then five classic models of information communication are introduced. The mechanisms and fundamental laws of the information transmission process are also discussed. In order to realize information communication, impediments in information communication process are identified and analyzed. For the purpose of investigating implications of Internet information communication, patterns and characteristics of information communication in the Internet and Web 2.0 environment are also analyzed. In the end, case studies are provided for readers to understand the theory.
The Taxobook
This is the first volume in a series about creating and maintaining taxonomies and their practical applications, especially in search functions. In Book 1 (The Taxobook: History, Theories, and Concepts of Knowledge Organization), the author introduces the very foundations of classification, starting with the ancient Greek philosophers Plato and Aristotle, as well as Theophrastus and the Roman Pliny the Elder. They were first in a line of distinguished thinkers and philosophers to ponder the organization of the world around them and attempt to apply a structure or framework to that world. The author continues by discussing the works and theories of several other philosophers from Medieval and Renaissance times, including Saints Aquinas and Augustine, William of Occam, Andrea Cesalpino, Carl Linnaeus, and Ren矇 Descartes. In the 17th, 18th, and 19th centuries, John Locke, Immanuel Kant, James Frederick Ferrier, Charles Ammi Cutter, and Melvil Dewey contributed greatly to the theories of classification systems and knowledge organization. Cutter and Dewey, especially, created systems that are still in use today. Chapter 8 covers the contributions of Shiyali Ramamrita Ranganathan, who is considered by many to be the "father of modern library science." He created the concept of faceted vocabularies, which are widely used--even if they are not well understood--on many e-commerce websites. Following the discussions and historical review, the author has included a glossary that covers all three books of this series so that it can be referenced as you work your way through the second and third volumes. The author believes that it is important to understand the history of knowledge organization and the differing viewpoints of various philosophers--even if that understanding is only that the differing viewpoints simply exist. Knowing the differing viewpoints will help answer the fundamental questions: Why do we want to build taxonomies? How do we build them to serve multiple pointsof view? Table of Contents: List of Figures / Preface / Acknowledgments / Origins of Knowledge Organization Theory: Early Philosophy of Knowledge / Saints and Traits: Realism and Nominalism / Arranging the glowers... and the Birds, and the Insects, and Everything Else: Early Naturalists and Taxonomies / The Age of Enlightenment Impacts Knowledge Theory / 18th-Century Developments: Knowledge Theory Coming to the Foreground / High Resolution: Classification Sharpens in the 19th and 20th Centuries / Outlining the World and Its Parts / Facets: An Indian Mathematician and Children's Toys at Selfridge's / Points of Knowledge / Glossary / End Notes / Author Biography
Scheduling and Congestion Control for Wireless and Processing Networks
In this book, we consider the problem of achieving the maximum throughput and utility in a class of networks with resource-sharing constraints. This is a classical problem of great importance. In the context of wireless networks, we first propose a fully distributed scheduling algorithm that achieves the maximum throughput. Inspired by CSMA (Carrier Sense Multiple Access), which is widely deployed in today's wireless networks, our algorithm is simple, asynchronous, and easy to implement. Second, using a novel maximal-entropy technique, we combine the CSMA scheduling algorithm with congestion control to approach the maximum utility. Also, we further show that CSMA scheduling is a modular MAC-layer algorithm that can work with other protocols in the transport layer and network layer. Third, for wireless networks where packet collisions are unavoidable, we establish a general analytical model and extend the above algorithms to that case. Stochastic Processing Networks (SPNs) model manufacturing, communication, and service systems. In manufacturing networks, for example, tasks require parts and resources to produce other parts. SPNs are more general than queueing networks and pose novel challenges to throughput-optimum scheduling. We proposes a "deficit maximum weight" (DMW) algorithm to achieve throughput optimality and maximize the net utility of the production in SPNs. Table of Contents: Introduction / Overview / Scheduling in Wireless Networks / Utility Maximization in Wireless Networks / Distributed CSMA Scheduling with Collisions / Stochastic Processing networks
Knowledge Management (Km) Processes in Organizations
Knowledge Management (KM) is an effort to increase useful knowledge in the organization. It is a natural outgrowth of late twentieth century movements to make organizational management and operations more effective, of higher quality, and more responsive to constituents in a rapidly changing global environment. This document traces the evolution of KM in organizations, summarizing the most influential research and literature in the field. It also presents an overview of selected common and current practices in knowledge management, including the relationship between knowledge management and decision making, with the intention of making a case for KM as a series of processes and not necessarily a manipulation of things. The final section highlights the use of social networking and commonly adopted Web applications to increase the value of social capital and to connect practitioners with clients and colleagues. Table of Contents: Introduction / Background Bibliographic Analysis / Theorizing Knowledge in Organizations / Conceptualizing Knowledge Emergence / Knowledge "Acts" / Knowledge Management in Practice / Knowledge Management Issues / Knowledge Management and Decision Making / Social Network Analysis and KM / Implications for the Future / Conclusion
Exploratory Search
As information becomes more ubiquitous and the demands that searchers have on search systems grow, there is a need to support search behaviors beyond simple lookup. Information seeking is the process or activity of attempting to obtain information in both human and technological contexts. Exploratory search describes an information-seeking problem context that is open-ended, persistent, and multifaceted, and information-seeking processes that are opportunistic, iterative, and multitactical. Exploratory searchers aim to solve complex problems and develop enhanced mental capacities. Exploratory search systems support this through symbiotic human-machine relationships that provide guidance in exploring unfamiliar information landscapes. Exploratory search has gained prominence in recent years. There is an increased interest from the information retrieval, information science, and human-computer interaction communities in moving beyond the traditional turn-taking interaction model supported by major Web search engines, and toward support for human intelligence amplification and information use. In this lecture, we introduce exploratory search, relate it to relevant extant research, outline the features of exploratory search systems, discuss the evaluation of these systems, and suggest some future directions for supporting exploratory search. Exploratory search is a new frontier in the search domain and is becoming increasingly important in shaping our future world. Table of Contents: Introduction / Defining Exploratory Search / Related Work / Features of Exploratory Search Systems / Evaluation of Exploratory Search Systems / Future Directions and concluding Remarks
Automated Software Diversity
Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often exploitable and can, in the worst case, give adversaries unfettered access to the compromised host system. This book provides an introduction to and overview of automatic software diversity techniques that, in one way or another, use randomization to greatly increase the difficulty of exploiting the vast amounts of low-level code in existence. Diversity-based defenses are motivated by the observation that a single attack will fail against multiple targets with unique attack surfaces. We introduce the many, often complementary, ways that one can diversify attack surfaces and provide an accessible guide to more than two decades worth of research on the topic. We also discuss techniques used in conjunction with diversity to prevent accidental disclosure of randomized program aspects and present an in-depth case study of one of our own diversification solutions.
Privacy for Location-based Services
Sharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of traffic and air pollution levels, etc. Disclosing exact user locations raises serious privacy concerns, as locations may give away sensitive information about individuals' health status, alternative lifestyles, political and religious affiliations, etc. Preserving location privacy is an essential requirement towards the successful deployment of location-based applications. These lecture notes provide an overview of the state-of-the-art in location privacy protection. A diverse body of solutions is reviewed, including methods that use location generalization, cryptographic techniques or differential privacy. The most prominent results are discussed, and promising directions for future work are identified.
Phrase Mining from Massive Text and Its Applications
A lot of digital ink has been spilled on "big data" over the past few years. Most of this surge owes its origin to the various types of unstructured data in the wild, among which the proliferation of text-heavy data is particularly overwhelming, attributed to the daily use of web documents, business reviews, news, social posts, etc., by so many people worldwide.A core challenge presents itself: How can one efficiently and effectively turn massive, unstructured text into structured representation so as to further lay the foundation for many other downstream text mining applications? In this book, we investigated one promising paradigm for representing unstructured text, that is, through automatically identifying high-quality phrases from innumerable documents. In contrast to a list of frequent n-grams without proper filtering, users are often more interested in results based on variable-length phrases with certain semantics such as scientific concepts, organizations, slogans, and so on. We propose new principles and powerful methodologies to achieve this goal, from the scenario where a user can provide meaningful guidance to a fully automated setting through distant learning. This book also introduces applications enabled by the mined phrases and points out some promising research directions.
Privacy in Social Networks
This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive information. Next, we describe some privacy definitions and privacy mechanisms for data publishing. Finally, we describe a set of recent techniques for modeling, evaluating, and managing individual users' privacy risk within the context of OSNs. Table of Contents: Introduction / A Model for Online Social Networks / Types of Privacy Disclosure / Statistical Methods for Inferring Information in Networks / Anonymity and Differential Privacy / Attacks and Privacy-preserving Mechanisms / Models of Information Sharing / Users' Privacy Risk / Management of Privacy Settings
A Social Media Survival Guide
The every person's guide to social media... how to use it and what never to do. Are you trying to figure out how to safely use social media but finding yourself struggling? Here's a book specifically designed to help regular people figure out social media platforms. It begins with a chapter about social media basics: how they normally work, why people use them, and general safety tips. It is easy to get confused by the large number of options that are out there so this book breaks down each major network into its own chapter. Chapters are included for: FacebookSnapchatPinterestLinkedInInstagramYouTubeTwitterReddit, and Tumblr. Because each social media platform has its their own rules, benefits, and challenges, each chapter gives a summary of the platform and tells the reader why people use it. Next, each chapter has a glossary of terms to explain language and slang that are used. This will help people who are new to social media learn about terminology like subreddits, retweets, and more. If readers decide to use the platform (or already use it and want to learn more), each chapter guides users through a "how-to" of using each platform. This includes the basic functionality, setting up profiles, settings, and odd features that even current users may not know about. Privacy and safety are also covered, with a platform-specific section devoted to these important issues in each chapter. Two final chapters cover other notable social media platforms that readers might want to know about and archiving tips for saving social media posts and information. This book can help people new to social media, people joining new social media, and people who are already on but want to learn how to better manage and protect their accounts.
React and React Native - Fourth Edition
PUBLISHER'S NOTE: An updated 2024 edition of this book, with new emphasis on TypeScript, is now available.Key Features: Discover React's latest features including automatic state update batching and prioritizing state updatesGet to grips with React architecture to write cross-platform apps using libraries such as NativeBaseUnderstand GraphQL and Apollo for building a scalable backend for your applicationsBook Description: Over the years, React and React Native has proven itself among JavaScript developers as a popular choice for a complete and practical guide to the React ecosystem. This fourth edition comes with the latest features, enhancements, and fixes to align with React 18, while also being compatible with React Native. It includes new chapters covering critical features and concepts in modern cross-platform app development with React.From the basics of React to popular components such as Hooks, GraphQL, and NativeBase, this definitive guide will help you become a professional React developer in a step-by-step manner.You'll begin by learning about the essential building blocks of React components. As you advance through the chapters, you'll work with higher-level functionalities in application development and then put your knowledge to work by developing user interface components for the web and native platforms. In the concluding chapters, you'll learn how to bring your application together with robust data architecture.By the end of this book, you'll be able to build React applications for the web and React Native applications for multiple mobile platforms.What You Will Learn: Explore React architecture, component properties, state, and contextWork with React Hooks for handling functions and componentsImplement code splitting using lazy components and SuspenseBuild robust user interfaces for mobile and desktop apps using Material-UIWrite shared components for Android and iOS apps using React NativeSimplify layout design for React Native apps using NativeBaseWrite GraphQL schemas to power web and mobile appsImplement Apollo-driven componentsWho this book is for: This book is for any JavaScript developer who wants to start learning how to use React and React Native for mobile and web application development. No prior knowledge of React is required, however working knowledge of JavaScript is necessary to be able to follow along the content covered.
Cyber Security, Cryptology, and Machine Learning
This book constitutes the refereed proceedings of the 6th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2022, held in Be'er Sheva, Israel, in June - July 2022. The 24 full and 11 short papers presented together with a keynote paper in this volume were carefully reviewed and selected from 53 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
Ethical Hacker's Penetration Testing Guide
Discover security posture, vulnerabilities, and blind spots ahead of the threat actorKey FeaturesIncludes illustrations and real-world examples of pentesting web applications, REST APIs, thick clients, mobile applications, and wireless networks.Covers numerous techniques such as Fuzzing (FFuF), Dynamic Scanning, Secure Code Review, and bypass testing.Practical application of Nmap, Metasploit, SQLmap, OWASP ZAP, Wireshark, and Kali Linux.DescriptionThe 'Ethical Hacker's Penetration Testing Guide' is a hands-on guide that will take you from the fundamentals of pen testing to advanced security testing techniques. This book extensively uses popular pen testing tools such as Nmap, Burp Suite, Metasploit, SQLmap, OWASP ZAP, and Kali Linux.A detailed analysis of pentesting strategies for discovering OWASP top 10 vulnerabilities, such as cross-site scripting (XSS), SQL Injection, XXE, file upload vulnerabilities, etc., are explained. It provides a hands-on demonstration of pentest approaches for thick client applications, mobile applications (Android), network services, and wireless networks. Other techniques such as Fuzzing, Dynamic Scanning (DAST), and so on are also demonstrated. Security logging, harmful activity monitoring, and pentesting for sensitive data are also included in the book. The book also covers web security automation with the help of writing effective python scripts.Through a series of live demonstrations and real-world use cases, you will learn how to break applications to expose security flaws, detect the vulnerability, and exploit it appropriately. Throughout the book, you will learn how to identify security risks, as well as a few modern cybersecurity approaches and popular pentesting tools.What you will learnExpose the OWASP top ten vulnerabilities, fuzzing, and dynamic scanning.Get well versed with various pentesting tools for web, mobile, and wireless pentesting.Investigate hidden vulnerabilities to safeguard critical data and application components.Implement security logging, application monitoring, and secure coding.Learn about various protocols, pentesting tools, and ethical hacking methods.Who this book is forThis book is intended for pen testers, ethical hackers, security analysts, cyber professionals, security consultants, and anybody interested in learning about penetration testing, tools, and methodologies. Knowing concepts of penetration testing is preferable but not required.Table of Contents1. Overview of Web and Related Technologies and Understanding the Application2. Web Penetration Testing- Through Code Review3. Web Penetration Testing-Injection Attacks4. Fuzzing, Dynamic scanning of REST API and Web Application5. Web Penetration Testing- Unvalidated Redirects/Forwards, SSRF6. Pentesting for Authentication, Authorization Bypass, and Business Logic Flaws7. Pentesting for Sensitive Data, Vulnerable Components, Security Monitoring8. Exploiting File Upload Functionality and XXE Attack9. Web Penetration Testing: Thick Client10. Introduction to Network Pentesting11. Introduction to Wireless Pentesting12. Penetration Testing-Mobile App13. Security Automation for Web Pentest14. Setting up Pentest LabRead more
TCP Congestion Control
TCP Congestion Control has been a research topic for over 30 years. Since the pioneering work of Jacobson and Karels in the 1980s, hundreds of researchers have sought to improve the avoidance and control of congestion in the Internet. Over time, new ideas such as using delay as well as packet loss to detect congestion have taken hold. This book walks through all the key approaches and gives the reader a framework to understand the big picture and ongoing challenges of congestion control.Features: Emphasizes underlying concepts, key principles and design choices.Covers developments in congestion control from its early days through to the latest innovations.Includes both host-based approaches and router-based techniques such as Random Early Detection.Describes methodologies used to evaluate new congestion control algorithms.
Mobile Offensive Security Pocket Guide
In order to protect and defend mobile application and device deployments, you need to be able to effectively evaluate the security of mobile devices, assess and identify flaws in mobile applications, and conduct a mobile device penetration test. And if you work with Android or iOS devices as part of your day-to-day work, this popular pocket guide is the perfect on-the-job reference for you. What You Will LearnFocusing on Android and iOS operating systems, the book contains a series of succinct chapters that highlight key information, approaches, and tooling used by mobile penetration testers and offensive security practitioners. The book covers topics such as: Fundamentals of reverse engineering as applied to mobile devicesDynamic instrumentation tool sets like FridaOperating system internalsFundamentals of modern baseband implementationsBy the end of Mobile Offensive Security Pocket Guide, you'll learn how to pen-test, reverse engineer, and review iOS and Android devices and applications; dive deep into evaluating mobile apps and operating systems, and better defend your organization against the onslaught of mobile device attacks.Who This Book Is ForOffensive security researchers, penetration testers, ethical hackers, mobile application developers, vulnerability researchers, embedded systems practitioners, operating system internals engineers, and students looking to enter the above fields.About The AuthorJames Stevenson has been working in the programming and computer security industry for over 5 years. Most of that has been working as an Android software engineer and vulnerability researcher. Before this, James graduated with a BSc in computer security in 2017. James has previously published the book Android Software Internals Quick Reference, with Apress publishing in 2021. At the time of writing, James is a full-time security researcher, part-time Ph.D. student, and occasional conference speaker. Outside of Android internals, James' research has also focused on offender profiling and cybercrime detection capabilities.
Transformers for Machine Learning
Transformers are becoming a core part of many neural network architectures, employed in a wide range of applications such as NLP, Speech Recognition, Time Series, and Computer Vision. Transformers have gone through many adaptations and alterations, resulting in newer techniques and methods. This is the first comprehensive book on transformers.
Fraud Investigation and Forensic Accounting in the Real World
This book will cover every aspect of forensic accounting, anti-fraud control systems and fraud investigation. The author uses his own case experience to guide those who are engaged in fraud investigation and forensic accounting step by step through each phase of a forensic accounting assignment and fraud investigation.
Step Into the Metaverse
An incisive glimpse into the future of the internet In Step into the Metaverse: How the Immersive Internet Will Unlock a Trillion-Dollar Social Economy, future tech strategist, entrepreneur, and thought leader Dr. Mark van Rijmenam delivers a startlingly insightful discussion about how the world as we know it will fundamentally change as the physical and the digital worlds merge into the metaverse, impacting the everyday experiences of people, companies, and societies. The author maps out the extraordinary opportunities and challenges facing business leaders, consumers, regulators, policymakers, and other metaverse stakeholders trying to navigate the future of the Internet. In the metaverse, you can be who you want to be, where you want to be, and companies and consumers are only restricted by their own creativity how they can benefit from the immersive internet. With engaging commentary on issues ranging from avatars, identity and digital fashion to non-fungible tokens (NFTs), blockchain and the economics of the metaverse, this book also offers: Discussions on the importance of an open and interoperable metaverse build on the web 3.0 paradigm if we want to reign in the control of Big Tech over our identity, data and lives. Explorations of the enormous--and largely untapped--potential for metaverse entertainment, including gaming, music, media, and sports and how brands can engage with their customers in novel ways and how digital twins will change how we work and innovate. Considerations related to the dangers of an always-on, immersive internet, including data breaches, avatar imposters, mental health issues, corporate and state surveillance, and the need for metaverse law. A fascinating read you won't be able to put down, Step into the Metaverse belongs in the hands of executives, managers, and other business leaders who play a role in digital transformation or execution. It's also an invaluable resource for anyone interested in the future of technology, the internet, and social interaction.
Greenedge: New Perspectives to Energy Management and Supply in Mobile Edge Computing
1 Introduction.- 2 Investigating Low-Battery Anxiety of Mobile Users.- 3 User Energy and LBA Aware Mobile Video Streaming.- 4 Optimal Backup Power Allocation for 5G Base Stations.- 5 Reusing Backup Batteries for Power Demand Reshaping in 5G.- 6 Software-Defined Power Supply to Geo-Distributed Edge DCs.- 7 Conclusions and Future Work.
Purple Team Strategies
Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, detection capabilities, and learn top adversarial simulation and emulation techniquesKey Features: Apply real-world strategies to strengthen the capabilities of your organization's security systemLearn to not only defend your system but also think from an attacker's perspectiveEnsure the ultimate effectiveness of an organization's red and blue teams with practical tipsBook Description: With small to large companies focusing on hardening their security systems, the term "purple team" has gained a lot of traction over the last couple of years. Purple teams represent a group of individuals responsible for securing an organization's environment using both red team and blue team testing and integration - if you're ready to join or advance their ranks, then this book is for you.Purple Team Strategies will get you up and running with the exact strategies and techniques used by purple teamers to implement and then maintain a robust environment. You'll start with planning and prioritizing adversary emulation, and explore concepts around building a purple team infrastructure as well as simulating and defending against the most trendy ATT&CK tactics. You'll also dive into performing assessments and continuous testing with breach and attack simulations.Once you've covered the fundamentals, you'll also learn tips and tricks to improve the overall maturity of your purple teaming capabilities along with measuring success with KPIs and reporting.With the help of real-world use cases and examples, by the end of this book, you'll be able to integrate the best of both sides: red team tactics and blue team security measures.What You Will Learn: Learn and implement the generic purple teaming processUse cloud environments for assessment and automationIntegrate cyber threat intelligence as a processConfigure traps inside the network to detect attackersImprove red and blue team collaboration with existing and new toolsPerform assessments of your existing security controlsWho this book is for: If you're a cybersecurity analyst, SOC engineer, security leader or strategist, or simply interested in learning about cyber attack and defense strategies, then this book is for you. Purple team members and chief information security officers (CISOs) looking at securing their organizations from adversaries will also benefit from this book. You'll need some basic knowledge of Windows and Linux operating systems along with a fair understanding of networking concepts before you can jump in, while ethical hacking and penetration testing know-how will help you get the most out of this book.
Cloud Computing
In the past decade, cloud computing and managed infrastructure services have rapidly become the leading model of web hosting. Cloud Computing, Second Edition accounts for the many changes to the then-emerging business model and technology paradigm since the release of the first edition. Readers will learn specifics about software as a service (Saas), platform as a service (Paas), infrastructure as a service (IaaS), server and desktop virtualization, and much more. Each chapter presents a cloud topic, examines the underlying business case, and then takes the reader on a test drive. The chapters are filled with real-world case studies. The content is ideal for users wanting to migrate to the cloud, IT professionals seeking knowledge on cloud fundamentals, developers who will build future cloud solutions, and CIOs wanting insights on the most recent cloud solutions. Each new print copy includes Navigate eBook Access enabling you to read your digital textbook online or offline from your computer, tablet, or mobile device. Key Features: Available with new Cloud Labs, which provide immersive mock IT infrastructures where students can learn and practice foundational cloud computing skills Updated with the latest trends and technologies in Cloud Computing, including virtualization and containerization Aligned with CompTIA Cloud Essentials+ Every print copy will include an access code for a full color Navigate eBook
A Network Architect’s Guide to 5g
THE NETWORK PROFESSIONAL'S GUIDE TO PLANNING, DESIGNING, AND DEPLOYING 5G TRANSPORT NETWORKS As 5G transforms mobile usage and services, network professionals will need to significantly evolve their transport network architectures towards greater sophistication and stronger integration with radio networks, and facilitate transition towards cloud-native 5G mobile core. Until now, however, most 5G guides have foregrounded RF/radio and mobile core innovations, not its implications for data networks. A Network Architect's Guide to 5G fills the gap, giving network architects, designers, and engineers essential knowledge for designing and planning their own 5G networks. Drawing on decades of experience with global service providers and enterprise networks, the authors illuminate new and evolving network technologies necessary for building 5G-capable networks, such as segment routing, network slicing, timing and synchronization, edge computing, distributed data centers, integration with public cloud, and more. They explain how 5G blurs boundaries between mobile core, radio access, and transport, as well as the changes in the composition of a traditional cell site with the adoption of Open and Virtualized RAN resulting in a transition to mobile xHaul. Every chapter builds on earlier coverage, culminating in a "big picture" presentation of a complete 5G network design. Understand the evolution of mobile technologies over the generation leading to 5G's foundational concepts and principles. Explore 5G changes to Radio Access Networks (RAN), the Mobile Core, Mobile Transport, and the need for tighter integration between them. Use Segment Routing to architect simplified, SDN-capable networks, and enable network slicing for 5G. Rethink transport design to incorporate Far-Edge, Edge, and public-cloud based data centers augmenting centralized DCs to support distributed peering and Multi-access Edge Compute. Provide guidance to meet the criteria and requirements for various aspects of Fronthaul, Midhaul, and Backhaul architecture, such as transport protocol evaluation, latency consideration, routing design, QoS modeling, network device selection, and more. Forge a cohesive 5G network architecture by combining mobile communications principles with advanced transport technologies.
Basics of Health Blogging
This book is intended to provide the knowledge of writing blogs to those who haven't been introduced to the world of blogging. Even the person who knows writing blogs, or can acquire the skill of specifically writing health blogs. Aimed to make you a specialised health blogger, this will teach you the skill of writing blogs and also to earn using the skill. You are going to learn everything to write a proper SEO optimized health blog. Even the book guides you to take an online exam for becoming a certified health blogger. It will help you to uplift and stamp your blogging skill and hence help you to become an established Health Blogger.
Dark Web
The dark web is the internet's evil twin, where anything can be bought and sold. Drugs, weapons, and hackers-for-hire are available at the touch of a button. Most who visit merely look around, happy to satisfy their curiosity before leaving, never to return.But some are sucked into the criminal underworld and find themselves doing things they would never have contemplated in the real world-ordering a hit on a love rival or bidding on an auction for a sex slave - like the people in this book. In the dark web dive, you'll unbury the facts about: he secret origin of tor and the tor projectThe uncensored history of the dark web, arpanet and its dark siblingsWho provides funding for the dark web? (you'll be surprised.)The stories behind the silk road, hansa, and other infamous dark web marketplaces.The truth about the surface web and why google is not to be trusted with your information, and what you can do about it?The technology you need to keep your internet identity safe on a daily basis.From underground dark web sites showcasing brutality the likes of which has never been seen, to manhattan boardrooms and basements concealing depravities of the foulest kind, neville and fiona find themselves in a battle for their very lives and souls.
OPNsense Beginner to Professional
Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to secure your network with easeKey Features: Learn end-to-end OPNsense firewall implementation and managementDefend against attacks by leveraging third-party plugins such as Nginx and SenseiGrasp hands-on examples and labs to become proficient with OPNsense firewallBook Description: OPNsense is one of the most powerful open source firewalls and routing platforms available. With OPNsense, you can now protect networks using features that were only previously available to closed source commercial firewalls.This book is a practical guide to building a comprehensive network defense strategy using OPNsense. You'll start with the basics, understanding how to install, configure, and protect network resources using native features and additional OPNsense plugins. Next, you'll explore real-world examples to gain in-depth knowledge of firewalls and network defense. You'll then focus on boosting your network defense, preventing cyber threats, and improving your knowledge of firewalling using this open source security platform.By the end of this OPNsense book, you'll be able to install, configure, and manage the OPNsense firewall by making the most of its features.What You Will Learn: Understand the evolution of OPNsenseGet up and running with installing and setting up OPNsenseBecome well-versed with firewalling concepts and learn their implementation and practicesDiscover how to apply web browsing controls and website protectionLeverage Sensei to implement next-generation firewall featuresExplore the command-line interface (CLI) and learn the most relevant FreeBSD commandsWho this book is for: This OPNsense firewall book is for system administrators, network administrators, network security professionals, and enthusiasts who wish to build and manage an enterprise-grade firewall using OPNsense. A basic understanding of how a firewall works will be helpful to make the most of this book.
Beyond Accessibility Compliance
Take a deep look at accessibility as it applies to mobile and wearables. This book covers topics within the accessibility domain that are rarely covered or understood, despite the fact that nearly half of the world's population uses smartphones. Moreover, by 2025, 72% of smartphone users are expected to only use smartphones to access the internet. And yet, accessibility is often an afterthought instead of a core principle of product development. This book changes that.You will begin by exploring the current landscape and policy frameworks, looking at the software product lifecycle and how to embed inclusion from the start. You'll learn the nuances of mobile accessibility as it applies to mobile devices, wearables, and IoT. From there you'll move onto automated testing, accessibility and inclusion, and the next frontiers of emerging technology including AR and VR. There will be notes at the end of programming examples to help those in orthogonal roles, such as project management, understand the basics and the language to better communicate with their engineering counterparts. Over 1 billion people in the world live with some form of disability so it's imperative you devise a comprehensive game plan to make your digital products accessible for all. Beyond Accessibility Compliance is your guide to understanding the current landscape of assistive technology and how emerging techniques are changing the way we think about personalization and accessibility.What You'll Learn See how people with the most common forms of disabilities use digital productsReview the basics of the product development lifecycle and how to embed accessibility Explore tangible answers as to how accessibility pertains to unique rolesUnderstand the difference between compliance and usabilityMake data visualizations accessible for blind usersImplement code-level changes to address gaps in accessibility Build a campus programs and course material inclusive for people with disabilities Who This Book Is For Current developers, designers, and others building technology products with basic knowledge of front-end development. This book is also suitable for students in computer science, engineering, HCI, and related fields. Sections that are not engineering-specific are applicable to design, user research, communication, and business students who are looking to pursue careers in technology.
101 UX Principles - Second Edition
Improve user experience by avoiding common frustrations and focusing on what mattersBook Description: Design is everywhere. Take a look around you right now and consider the products and services we use every day. You'll notice that our computer and phone operating systems, our web browsers, and the apps we use to work, order food, socialize and even date have been designed by UX specialists to offer you the best experiences when using their products and services.Of course, not all online experiences are designed with our best interests in mind. That's exactly why UX design is such an exciting and rewarding field-by learning the logic behind what people engage with and implementing it in your UX work, you can craft intuitive, accessible, and highly functional designs for your digital products.The 2nd edition of 101 UX Principles is the perfect companion when working on digital projects and making the right decisions for your users. From landing pages and checkout basket UIs to startup launch products and enterprise software solutions, a rich user experience design will maximize the success of your product.The book includes an exclusive invitation to join an online UX designers' community, where you can read the book alongside peers and other UX designers, and participate in various challenges and discussions with the author. See you there!Sneak a peek at some of the new and updated principles in this UX design book: Work with user expectations, not against themMake interactive elements obvious and discoverableOptimize your interface for mobileStreamline creating and entering passwordsRespect users' time and effort in your FormsUse animation with care in user interfacesHow to handle destructive user actionsChatbots are usually a bad ideaUse A/B testing to test your ideasLet users give feedback, but don't hassle themMake it clear to users if they're joining or signing-inOnly use modal views for blocking actionsComplexity can be good for some usersWho this book is for: This book is a distillation of Will's 20+ years of experience in the form of successful design principles to help early career UX designers learn the ropes, and provide experienced professionals with new ideas when building their products.UX/UI designers, product managers, entrepreneurs, aspiring strategists, and anyone creating a digital product, service or a campaign will find this book extremely useful.
Incident Response with Threat Intelligence
Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using threat intelligenceKey Features: Understand best practices for detecting, containing, and recovering from modern cyber threatsGet practical experience embracing incident response using intelligence-based threat hunting techniquesImplement and orchestrate different incident response, monitoring, intelligence, and investigation platformsBook Description: With constantly evolving cyber threats, developing a cybersecurity incident response capability to identify and contain threats is indispensable for any organization regardless of its size. This book covers theoretical concepts and a variety of real-life scenarios that will help you to apply these concepts within your organization.Starting with the basics of incident response, the book introduces you to professional practices and advanced concepts for integrating threat hunting and threat intelligence procedures in the identification, contention, and eradication stages of the incident response cycle. As you progress through the chapters, you'll cover the different aspects of developing an incident response program. You'll learn the implementation and use of platforms such as TheHive and ELK and tools for evidence collection such as Velociraptor and KAPE before getting to grips with the integration of frameworks such as Cyber Kill Chain and MITRE ATT&CK for analysis and investigation. You'll also explore methodologies and tools for cyber threat hunting with Sigma and YARA rules.By the end of this book, you'll have learned everything you need to respond to cybersecurity incidents using threat intelligence.What You Will Learn: Explore the fundamentals of incident response and incident managementFind out how to develop incident response capabilitiesUnderstand the development of incident response plans and playbooksAlign incident response procedures with business continuityIdentify incident response requirements and orchestrate people, processes, and technologiesDiscover methodologies and tools to integrate cyber threat intelligence and threat hunting into incident responseWho this book is for: If you are an information security professional or anyone who wants to learn the principles of incident management, first response, threat hunting, and threat intelligence using a variety of platforms and tools, this book is for you. Although not necessary, basic knowledge of Linux, Windows internals, and network protocols will be helpful.
Unshakeable & Unapologetic
If you know there's so much more to you & what you're here to share than what you're currently showing the world on social media, this is for you... Learn to Share Your Stories, Expertise & Authentic Truth on Social Media & Finally Be Seen As a Leader! Ever wondered what it'd feel like to be the kind of entrepreneur who says what they want, when they want, the WAY they want and STILL seal the deal? Close the transaction? Build your ideal organization? It's Time to Get Your Message On Point & Start Confidently Sharing Your Expertise, Viewpoints & Authentic Self on Social Media! When you purchase, you'll receive a workbook walking you step-by- step through how to feel confident expressing your own unique message & offers so you can sell more, more easily, to the perfect people for you. By the end, this can be your reality... ✓ You know without-a-sliver-of-a-doubt what your TRUE message is and the HEART of the work you're here to do ✓ You know what YOU are uniquely all about and what YOU truly want to say in your content (and no longer feel the need-or desire-to parrot what your mentor or blindly agree with every uber-popular person in your niche) ✓ You create heart-tugging content in half the time-content that cuts through the noise, abolishes the "algorithm's" vendetta against you AND eases the ache of crappy email open rates, low engagement and no or low sales. ✓ You're finally seen, known and recognized for your one-of-a-kind essence, expertise and style ✓ You feel proud of everything you post online and love everything about the way you're showing up & being seen-not to mention, love all the people reaching out to you who totally get you & want "whatever it is you're selling!" ✓ You know how to gracefully handle heat from potential haters & naysayers ✓ You're bold enough to share your true opinions no matter what-even if you know there might be backlash as result (read; this is THE sign of a true leader!) ✓ You can stand up and speak out during periods of social upheaval or unrest-you don't go radio silent (and people love you more for it-even if what you say isn't "perfect') Sound like what you want? Awesome, but there is one caveat: Finding your message-and cultivating true confidence around sharing it-requires digging deep into who you are and what you believe. Are you ready for this? Let's get moving!
JavaScript Absolute Beginners Guide
Make the most of today's JavaScript--even if you've never programmed anything before. JavaScript Absolute Beginner's Guide, Third Edition is the fastest way to learn JavaScript, starting with the basics and gradually going deeper and broader into all the techniques you need to begin building highly scalable, performant web apps and experiences. Do what you want, the way you want, one incredibly easy step at a time! Learn all this, and much more: Start fast with the basics: values, variables, functions, conditionals, loops, closures, and more Create well-organized, clear code that's easy to reuse and improve Learn proven best practices to build web apps that scale with outstanding performance Make the most of powerful object-oriented techniques to build complex, extensible apps Wrangle data like a pro by learning how to use the popular JSON standard, arrays, web storage, and more Translate your ideas into visually compelling and interactive content by learning how to work with the DOM Identify and fix issues quickly by learning how to use the in-browser development tools Understand the ins and outs of events and how you can use them to react to actions the user or the page will perform Learn how to ensure your code runs lightning-fast with extra coverage of performance optimizations and techniques you can use Learn the basics that set you up to more quickly use modern web frameworks like React, Vue, Next.js, and Nuxt Explore advanced features such as object destructuring, making web requests, the class syntax, accessing your webcam, variable hoisting, and more Get up-to-speed on the latest JavaScript enhancements proposed by the EcmaScript standard
Cissp
The book includes additional information on difficult topics as the beginners should have a proper foundation. Cissp is a challenging topic, and therefore, the foundation topics must be well-understood; hence the reader can learn the rest of the domains with confidence. It includes extensive information on risk management, security, and global frameworks. The objective is to provide practical guidance with more hands-on. With all the content, this will provide a good starting point at your cissp journey. The following areas are covered in this book.- Security and risk management- Asset security- Security architecture and engineering- Communication and network security- Identity and access management (iam)- Security assessment and testing- Security operations- Software development securityThe book includes additional information for difficult topics, including tables, and graphics. The topics also include references to resources, including the links to governing bodies, compliance requirements, issues and official websites and their references. Such information helps the reader to obtain more information and get him/herself organized as both a student, as well as a security practitioner.
What to Do When You Get Hacked
This book teaches you everything that you need to know about preparing your company for a potential data breach. It is meant for the everyday business owner and makes these concepts simple to understand and apply.
What to Do When You Get Hacked
This book teaches you everything that you need to know about preparing your company for a potential data breach. It is meant for the everyday business owner and makes these concepts simple to understand and apply.
Practical WebAssembly
Understand the basic building blocks of WebAssembly and learn, install, and use various tools from the Rust and WebAssembly ecosystemKey Features: Understand the Rust programming language and WebAssembly concepts for web developmentBuild web, mobile, and embedded apps using WebAssemblyEnhance the scalability and resilience of your web appsBook Description: Rust is an open source language tuned toward safety, concurrency, and performance. WebAssembly brings all the capabilities of the native world into the JavaScript world. Together, Rust and WebAssembly provide a way to create robust and performant web applications. They help make your web applications blazingly fast and have small binaries. Developers working with JavaScript will be able to put their knowledge to work with this practical guide to developing faster and maintainable code.Complete with step-by-step explanations of essential concepts, examples, and self-assessment questions, you'll begin by exploring WebAssembly, using the various tools provided by the ecosystem, and understanding how to use WebAssembly and JavaScript together to build a high-performing application. You'll then learn binary code to work with a variety of tools that help you to convert native code into WebAssembly. The book will introduce you to the world of Rust and the ecosystem that makes it easy to build/ship WebAssembly-based applications.By the end of this WebAssembly Rust book, you'll be able to create and ship your own WebAssembly applications using Rust and JavaScript, understand how to debug, and use the right tools to optimize and deliver high-performing applications.What You Will Learn: Explore WebAssembly and the different tools available in the WebAssembly ecosystemUnderstand the raw WebAssembly binary and the WebAssembly text formatUse the Web and JavaScript API with wasm-bindgenOptimize Rust and WebAssembly for high performanceRun and debug WebAssembly and Rust codeExplore various tools available in the RustWASM ecosystemWho this book is for: This book is for JavaScript developers who want to deliver better performance and ship type-safe code. Rust developers or backend engineers looking to build full-stack applications without worrying too much about JavaScript programming will also find the book useful.
A Dismantle Approach of Likes, Retweets and Forwards
A Dismantle Approach of Likes, Retweets, and Forwards by Bhavya Jain is a representation of the dark sides of social media platforms that are existing and are been avoided by the users. It throws light on the fact that today each and every decision is been influenced directly by these platforms. Also how things are been driven through the online space communications. This book gives in-depth insights into the strategies been used by the platform to access users' information and use it for minting money. While flipping the pages, you will realize how as a user even you are diving into the murky pool of digitization.
The Foundations of Threat Hunting
Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterpriseKey Features: Learn foundational concepts for effective threat hunting teams in pursuit of cyber adversariesRecognize processes and requirements for executing and conducting a huntCustomize a defensive cyber framework needed to grow and mature a hunt teamBook Description: Threat hunting is a concept that takes traditional cyber defense and spins it onto its head. It moves the bar for network defenses beyond looking at the known threats and allows a team to pursue adversaries that are attacking in novel ways that have not previously been seen. To successfully track down and remove these advanced attackers, a solid understanding of the foundational concepts and requirements of the threat hunting framework is needed. Moreover, to confidently employ threat hunting in a business landscape, the same team will need to be able to customize that framework to fit a customer's particular use case.This book breaks down the fundamental pieces of a threat hunting team, the stages of a hunt, and the process that needs to be followed through planning, execution, and recovery. It will take you through the process of threat hunting, starting from understanding cybersecurity basics through to the in-depth requirements of building a mature hunting capability. This is provided through written instructions as well as multiple story-driven scenarios that show the correct (and incorrect) way to effectively conduct a threat hunt.By the end of this cyber threat hunting book, you'll be able to identify the processes of handicapping an immature cyber threat hunt team and systematically progress the hunting capabilities to maturity.What You Will Learn: Understand what is required to conduct a threat huntKnow everything your team needs to concentrate on for a successful huntDiscover why intelligence must be included in a threat huntRecognize the phases of planning in order to prioritize effortsBalance the considerations concerning toolset selection and employmentAchieve a mature team without wasting your resourcesWho this book is for: This book is for anyone interested in learning how to organize and execute effective cyber threat hunts, establishing extra defense capabilities within their company, and wanting to mature an organization's cybersecurity posture. It will also be useful for anyone looking for a framework to help a hunt team grow and evolve.