The Foundations of Threat Hunting
Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterpriseKey Features: Learn foundational concepts for effective threat hunting teams in pursuit of cyber adversariesRecognize processes and requirements for executing and conducting a huntCustomize a defensive cyber framework needed to grow and mature a hunt teamBook Description: Threat hunting is a concept that takes traditional cyber defense and spins it onto its head. It moves the bar for network defenses beyond looking at the known threats and allows a team to pursue adversaries that are attacking in novel ways that have not previously been seen. To successfully track down and remove these advanced attackers, a solid understanding of the foundational concepts and requirements of the threat hunting framework is needed. Moreover, to confidently employ threat hunting in a business landscape, the same team will need to be able to customize that framework to fit a customer's particular use case.This book breaks down the fundamental pieces of a threat hunting team, the stages of a hunt, and the process that needs to be followed through planning, execution, and recovery. It will take you through the process of threat hunting, starting from understanding cybersecurity basics through to the in-depth requirements of building a mature hunting capability. This is provided through written instructions as well as multiple story-driven scenarios that show the correct (and incorrect) way to effectively conduct a threat hunt.By the end of this cyber threat hunting book, you'll be able to identify the processes of handicapping an immature cyber threat hunt team and systematically progress the hunting capabilities to maturity.What You Will Learn: Understand what is required to conduct a threat huntKnow everything your team needs to concentrate on for a successful huntDiscover why intelligence must be included in a threat huntRecognize the phases of planning in order to prioritize effortsBalance the considerations concerning toolset selection and employmentAchieve a mature team without wasting your resourcesWho this book is for: This book is for anyone interested in learning how to organize and execute effective cyber threat hunts, establishing extra defense capabilities within their company, and wanting to mature an organization's cybersecurity posture. It will also be useful for anyone looking for a framework to help a hunt team grow and evolve.
Operationalizing Threat Intelligence
Learn cyber threat intelligence fundamentals to implement and operationalize an organizational intelligence programKey Features: Develop and implement a threat intelligence program from scratchDiscover techniques to perform cyber threat intelligence, collection, and analysis using open-source toolsLeverage a combination of theory and practice that will help you prepare a solid foundation for operationalizing threat intelligence programsBook Description: We're living in an era where cyber threat intelligence is becoming more important. Cyber threat intelligence routinely informs tactical and strategic decision-making throughout organizational operations. However, finding the right resources on the fundamentals of operationalizing a threat intelligence function can be challenging, and that's where this book helps.In Operationalizing Threat Intelligence, you'll explore cyber threat intelligence in five fundamental areas - defining threat intelligence, developing threat intelligence, collecting threat intelligence, enrichment and analysis, and finally production of threat intelligence. You'll start by finding out what threat intelligence is and where it can be applied. Next, you'll discover techniques for performing cyber threat intelligence collection and analysis using open-source tools. The book also examines commonly used frameworks and policies as well as fundamental operational security concepts. Later, you'll focus on enriching and analyzing threat intelligence through pivoting and threat hunting. Finally, you'll examine detailed mechanisms for the production of intelligence.By the end of this book, you'll be equipped with the right tools and have understood what it takes to operationalize your own threat intelligence function, from collection to production.What You Will Learn: Discover types of threat actors and their common tactics and techniquesUnderstand the core tenets of cyber threat intelligenceDiscover cyber threat intelligence policies, procedures, and frameworksExplore the fundamentals relating to collecting cyber threat intelligenceUnderstand fundamentals about threat intelligence enrichment and analysisUnderstand what threat hunting and pivoting are, along with examplesFocus on putting threat intelligence into productionExplore techniques for performing threat analysis, pivoting, and huntingWho this book is for: This book is for cybersecurity professionals, security analysts, security enthusiasts, and anyone who is just getting started and looking to explore threat intelligence in more detail. Those working in different security roles will also be able to explore threat intelligence with the help of this security book.
China and Middle East Conflicts
How do aspiring and established rising global powers respond to conflict? Using China, the book studies its response to wars and rivalries in the Middle East from the Cold War to the present.
Computer Security
Teaching computer security principles via hands-on activitiesUnique among computer security texts, this book, in its third edition, builds on the author's long tradition of teaching complex subjects through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle. Readers can touch, play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes worldwide. The author has also published online courses on Udemy based on this book.Topics covered in the book- Software vulnerabilities, attacks, and countermeasures- Attacks on web applications, countermeasures- Attacks on hardware: Meltdown and Spectre attacks- Cryptography and attacks on algorithms and protocols- Public Key Infrastructure (PKI)- Common hacking and defense techniques
Computer & Internet Security
Teaching computer and network security principles via hands-on activitiesUnique among computer security texts, this book, in its third edition, builds on the author's long tradition of teaching complex subjects through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle. Readers can touch, play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes worldwide. The author has also published online courses on Udemy based on this book.Topics covered in the book- Software security: attacks and countermeasures- Web security: attacks and countermeasures- Hardware security: Meltdown and Spectre attacks- Network security: attacks on TCP/IP and DNS- Firewall and Virtual Private Network (VPN)- Cryptography and attacks on algorithms and protocols- Public Key Infrastructure- Common hacking and defense techniques
Internet Security
Teaching Internet security principles via hands-on activitiesUnique among computer security texts, this book, in its third edition, buildson the author's long tradition of teaching complex subjects through a hands-onapproach. For each security principle, the book uses a series of hands-onactivities to help explain the principle. Readers can "touch", play with, andexperiment with the principle, instead of just reading about it. The hands-onactivities are based on the author's widely adopted SEED Labs, which have beenused by over 1000 institutes worldwide. The author has also published onlinecourses on Udemy based on this book.Topics covered in the book- Attacks on TCP/IP and DNS protocols- Packet sniffing and spoofing- Firewall and Virtual Private Network (VPN) - Border Gateway Protocol (BGP) and attacks - Attacks on web applications, countermeasures- Cryptography and attacks on algorithms and protocols- Public Key Infrastructure and Transport Layer Security- Bitcoin and Blockchain- Common hacking and defense mechanisms
An Interdisciplinary Approach to Modern Network Security
An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats.
5G Multimedia Communication
The book aims to present current work and direction on the challenging subject of multimedia communications, with theoretical and practical roots. The book is divided into three major parts with each part containing 4-7 chapters: critical enabling technology; multiservices network and deployment scenarios.
Wireless Hacking With Kali Linux
Do you like working using a wireless network since you can carry your computer and work with you everywhere you go?Do you want to keep your precious information and any other critical data on your system safe from a hacker who intends to exploit it maliciously?Do you want to be able to safeguard your system and learn more about the many techniques hackers might use to get access to your computer over your wireless network? Wireless networks have altered how we engage with our systems and technology. We used to rely on a wired service that held us in one spot or moved us from one machine to the next. Today, most electronics, including phones, tablets, and laptops, are mobile and can be used anywhere owing to the ubiquitous wireless network. While this is fantastic news for most people, we must be mindful that there may be certain issues that develop and any weaknesses that a hacker may choose to exploit. This guide will look at some methods we may learn about wireless penetration and how a hacker can get into your system and exploit it frequently without your knowledge. Learning how this kind of intrusion occurs and how we can prevent it as much as possible will simplify us to keep our data secure on our system. Inside this guide, we will cover the following subjects to manage our wireless network and ensure the security of our data: A look at wireless networking and some of the fundamentals to get us started.How to set up our wireless hacking methods and organize all of the gear we'll need.Getting ourselves through all of the many methods of internet encryption.How to make use of a wireless network.What to do in the event of a wireless denial of service attack.Ensure that you have VPNs and firewalls in place to protect your network.A look at some of the fundamentals of cybersecurity and how you may utilize them to keep hackers at bay.How various forms of cyberattacks and malware work.The effects of a cyber-attack and why we must avoid them before they occur.The fundamental actions you must take to scan your network and keep hackers out. And Much More!... While our wireless networks make things simpler and enable us to be more mobile with our own job, they also expose some major weaknesses that hackers love to exploit. When you're ready to learn more about wireless hacking and how to keep your network secure, check out our manual to get started.
Network Science
Network Science Network Science offers comprehensive insight on network analysis and network optimization algorithms, with simple step-by-step guides and examples throughout, and a thorough introduction and history of network science, explaining the key concepts and the type of data needed for network analysis, ensuring a smooth learning experience for readers. It also includes a detailed introduction to multiple network optimization algorithms, including linear assignment, network flow and routing problems. The text is comprised of five chapters, focusing on subgraphs, network analysis, network optimization, and includes a list of case studies, those of which include influence factors in telecommunications, fraud detection in taxpayers, identifying the viral effect in purchasing, finding optimal routes considering public transportation systems, among many others. This insightful book shows how to apply algorithms to solve complex problems in real-life scenarios and shows the math behind these algorithms, enabling readers to learn how to develop them and scrutinize the results. Written by a highly qualified author with significant experience in the field, Network Science also includes information on: Sub-networks, covering connected components, bi-connected components, community detection, k-core decomposition, reach network, projection, nodes similarity and pattern matching Network centrality measures, covering degree, influence, clustering coefficient, closeness, betweenness, eigenvector, PageRank, hub and authority Network optimization, covering clique, cycle, linear assignment, minimum-cost network flow, maximum network flow problem, minimum cut, minimum spanning tree, path, shortest path, transitive closure, traveling salesman problem, vehicle routing problem and topological sort With in-depth and authoritative coverage of the subject and many case studies to convey concepts clearly, Network Science is a helpful training resource for professional and industry workers in, telecommunications, insurance, retail, banking, healthcare, public sector, among others, plus as a supplementary reading for an introductory Network Science course for undergraduate students.
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900
Understand the fundamentals of security, compliance, and identity solutions across Microsoft Azure, Microsoft 365, and related cloud-based Microsoft servicesKey Features: Grasp Azure AD services and identity principles, secure authentication, and access managementUnderstand threat protection with Microsoft 365 Defender and Microsoft Defender for Cloud security managementLearn about security capabilities in Microsoft Sentinel, Microsoft 365 Defender, and Microsoft IntuneBook Description: Cloud technologies have made building a defense-in-depth security strategy of paramount importance. Without proper planning and discipline in deploying the security posture across Microsoft 365 and Azure, you are compromising your infrastructure and data. Microsoft Security, Compliance, and Identity Fundamentals is a comprehensive guide that covers all of the exam objectives for the SC-900 exam while walking you through the core security services available for Microsoft 365 and Azure.This book starts by simplifying the concepts of security, compliance, and identity before helping you get to grips with Azure Active Directory, covering the capabilities of Microsoft's identity and access management (IAM) solutions. You'll then advance to compliance center, information protection, and governance in Microsoft 365. You'll find out all you need to know about the services available within Azure and Microsoft 365 for building a defense-in-depth security posture, and finally become familiar with Microsoft's compliance monitoring capabilities.By the end of the book, you'll have gained the knowledge you need to take the SC-900 certification exam and implement solutions in real-life scenarios.What You Will Learn: Become well-versed with security, compliance, and identity principlesExplore the authentication, access control, and identity management capabilities of Azure Active DirectoryUnderstand the identity protection and governance aspects of Azure and Microsoft 365Get to grips with the basic security capabilities for networks, VMs, and dataDiscover security management through Microsoft Defender for CloudWork with Microsoft Sentinel and Microsoft 365 DefenderDeal with compliance, governance, and risk in Microsoft 365 and AzureWho this book is for: This book is for cloud security engineers, Microsoft 365 administrators, Azure administrators, and anyone in between who wants to get up to speed with the security, compliance, and identity fundamentals to achieve the SC-900 certification. A basic understanding of the fundamental services within Microsoft 365 and Azure will be helpful but not essential.
Cybersecurity Myths and Misconceptions
175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them Elected into the Cybersecurity Canon Hall of Fame! Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isn't the user the weakest link? In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth. Whatever your cybersecurity role or experience, Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra will help you surface hidden dangers, prevent avoidable errors, eliminate faulty assumptions, and resist deeply human cognitive biases that compromise prevention, investigation, and research. Throughout the book, you'll find examples drawn from actual cybersecurity events, detailed techniques for recognizing and overcoming security fallacies, and recommended mitigations for building more secure products and businesses. Read over 175 common misconceptions held by users, leaders, and cybersecurity professionals, along with tips for how to avoid them. Learn the pros and cons of analogies, misconceptions about security tools, and pitfalls of faulty assumptions. What really is the weakest link? When aren't "best practices" best? Discover how others understand cybersecurity and improve the effectiveness of cybersecurity decisions as a user, a developer, a researcher, or a leader. Get a high-level exposure to why statistics and figures may mislead as well as enlighten. Develop skills to identify new myths as they emerge, strategies to avoid future pitfalls, and techniques to help mitigate them. "You are made to feel as if you would never fall for this and somehow this makes each case all the more memorable. . . . Read the book, laugh at the right places, and put your learning to work. You won't regret it."--From the Foreword by Vint Cerf, Internet Hall of Fame Pioneer Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
Cyberdefense
There is a threat lurking behind every online interaction that was first recognized nearly three decades ago, but very little has been done to fix it. It's only a matter of time before the unimaginable becomes reality -- life without the Internet. The race is on to get ahead of the danger and protect the Domain Name System (DNS) infrastructure of the Internet before the worst-case scenario ends the Internet as we know it.Based on decades of experience acquired by author Craig MacKinder as an information technology and cybersecurity expert, Cyberdefense: Domain Name Systems as the Next Public Utility is a multi-layered, comprehensive, extensively researched solution to the DNS threat. The way out of this imminent peril begins with securing online data by localizing queries to secure municipal DNS servers nationwide.The DNS is a fundamental and critical part of our global infrastructure, yet most users have no idea what it is, how it works, or how the DNS contributes to the overall stability of the Internet. This book explains the DNS in ways the average reader will easily digest and understand. The menace to Internet security is laid out and then confronted as the pros and cons of the existing partial solutions are explored. Finally, this book delivers an explanation of how local governments will provide universal Internet access to the public as the best mitigation for insecure DNS infrastructure.
React Projects - Second Edition
Learn how to develop real-world applications of varying complexity for the web, mobile, and VR devices using React, React Native, React 360, and moreKey Features: Build React applications at scale using React patterns and best practicesExplore React features such as Hooks, the Context API, and the Suspense APIExtend React's integration with React Native for building cross-platform mobile apps and gamesBook Description: Developed by Facebook, React is a popular library for building impressive user interfaces. React extends its capabilities to mobile platforms using the React Native framework and integrates with popular web and mobile tools to build scalable applications.React Projects is your guide to learning React development by using modern development patterns and integrating React with powerful web tools, such as GraphQL, Expo, and React 360. You'll start building a real-world project right from the first chapter and get hands-on with developing scalable applications as you advance to building more complex projects. Throughout the book, you'll use the latest versions of React and React Native to explore features such as routing, Context, and Hooks on multiple platforms, which will help you build full-stack web and mobile applications efficiently. Finally, you'll get to grips with unit testing with Jest and end-to-end testing with Cypress to build test-driven apps.By the end of this React book, you'll have developed the skills necessary to start building scalable React apps across web and mobile platforms.What You Will Learn: Create a wide range of applications using various modern React tools and frameworksDiscover how React Hooks modernize state management for React appsDevelop web applications using styled and reusable React componentsBuild test-driven React applications using Jest, React Testing Library, and CypressUnderstand full-stack development using GraphQL, Apollo, and ReactPerform server-side rendering using React and Next.jsCreate animated games using React Native and ExpoDesign gestures and animations for a cross-platform game using React NativeWho this book is for: The book is for JavaScript developers who want to explore React tooling and frameworks for building cross-platform applications. Basic knowledge of web development, ECMAScript, and React will assist with understanding key concepts covered in this book.
Privacy Preservation in Iot: Machine Learning Approaches
This book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain. In big data era, an increasingly massive volume of data is generated and transmitted in Internet of Things (IoTs), which poses great threats to privacy protection. Motivated by this, an emerging research topic, machine learning-driven privacy preservation, is fast booming to address various and diverse demands of IoTs. However, there is no existing literature discussion on this topic in a systematically manner. The issues of existing privacy protection methods (differential privacy, clustering, anonymity, etc.) for IoTs, such as low data utility, high communication overload, and unbalanced trade-off, are identified to the necessity of machine learning-driven privacy preservation. Besides, the leading and emerging attacks pose further threats to privacy protection in this scenario. To mitigate the negative impact, machine learning-driven privacy preservation methods for IoTs are discussed in detail on both the advantages and flaws, which is followed by potentially promising research directions. Readers may trace timely contributions on machine learning-driven privacy preservation in IoTs. The advances cover different applications, such as cyber-physical systems, fog computing, and location-based services. This book will be of interest to forthcoming scientists, policymakers, researchers, and postgraduates.
Cybersecurity
Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber architecture, beginning with the identification of security risks. It then builds solutions to mitigate risks by considering the technological justification of the solutions as well as their efficiency. The process follows an engineering process model. Each module builds on a subset of the risks, discussing the knowledge necessary to approach a solution, followed by the security control architecture design and the implementation. The modular approach allows students to focus on more manageable problems, making the learning process simpler and more attractive.
Working with the Web Audio API
Working with the Web Audio API is the definitive and instructive guide to understanding and using the Web Audio API. The Web Audio API provides a powerful and versatile system for controlling audio on the Web. It allows developers to generate sounds, select sources, add effects, create visualizations and render audio scenes in an immersive environment.This book covers all essential features, with easy to implement code examples for every aspect. All the theory behind it is explained, so that one can understand the design choices as well as the core audio processing concepts. Advanced concepts are also covered, so that the reader will gain the skills to build complex audio applications running in the browser.Aimed at a wide audience of potential students, researchers and coders, this is a comprehensive guide to the functionality of this industry-standard tool for creating audio applications for the web.
Enterprise React Development with UmiJS
Get to grips with UmiJS and build professional web applications with the help of step-by-step explanations and hands-on examplesKey Features: Explore tips, tricks, and best practices for creating web applications with UmiJSLearn how to apply Ant Design System in UmiJS to build modern user interfacesManage errors in designing web applications while using UmiJS and its main pluginsBook Description: UmiJS is the Ant Group's underlying frontend development framework, an open source project for developing enterprise-class frontend applications. In this book, you'll get hands-on with single-page application development using UmiJS. By following practical step-by-step examples, you'll develop essential skills to build and publish your apps and create a modern user experience with responsive interfaces.This book will help you learn the essential features of UmiJS and how to set up and build a project from scratch using React, Less, and TypeScript. You'll study Ant Design, a framework based on solid design concepts that provides a series of React components to accelerate interface development. Along the way, you'll see how to make requests and develop the frontend using simulated data while ensuring that your app has a high level of security and feedback. You'll also discover ways to improve your code quality and readability using formatting tools.By the end of the book, you'll have learned how to use UmiJS to design user interfaces, as well as compile, test, and package your app locally, and deliver your app by deploying it to online services.What You Will Learn: Understand how to improve code quality with formatting toolsSecure your application and handle errors in HTTP requests using UmiJSConfigure and use UmiJS for rapid single-page application developmentApply what you've learned when building your portfolio and stand out in the marketUse the visual option Umi UI to build and add components to the projectAdvance as a frontend developer by learning UmiJS best practices and techniques for web application developmentIdentify errors in advance by writing unit tests using Jest and PuppeteerWho this book is for: This book is for React developers who want to develop enterprise-class frontend applications using UmiJS and its main plugins. Basic knowledge of React and JavaScript is assumed but no knowledge of UmiJS is needed.
Python for ArcGIS Pro
Extend your ArcGIS expertise by unlocking the world of Python programming. A fully hands-on guide that takes you through exercise after exercise using real data and real problems. NOTE: This book is compatible with ArcGIS Pro 2.9.Key Features: Learn the core components of the two Python modules for ArcGIS: ArcPy and ArcGIS API for PythonUse ArcPy, pandas, NumPy, and ArcGIS in ArcGIS Pro Notebooks to manage and analyze geospatial data at scaleIntegrate with ArcGIS Online using Python to publish and manage dataBook Description: Integrating Python into your day-to-day ArcGIS work is highly recommended when dealing with large amounts of geospatial data. Python for ArcGIS Pro aims to help you get your work done faster, with greater repeatability and higher confidence in your results.Starting from programming basics and building in complexity, two experienced ArcGIS professionals-turned-Python programmers teach you how to incorporate scripting at each step: automating the production of maps for print, managing data between ArcGIS Pro and ArcGIS Online, creating custom script tools for sharing, and then running data analysis and visualization on top of the ArcGIS geospatial library, all using Python.You'll use ArcGIS Pro Notebooks to explore and analyze geospatial data, and write data engineering scripts to manage ongoing data processing and data transfers. This exercise-based book also includes three rich real-world case studies, giving you an opportunity to apply and extend the concepts you studied earlier.Irrespective of your expertise level with Esri software or the Python language, you'll benefit from this book's hands-on approach, which takes you through the major uses of Python for ArcGIS Pro to boost your ArcGIS productivity.What You Will Learn: Automate map production to make and edit maps at scale, cutting down on repetitive tasksPublish map layer data to ArcGIS OnlineAutomate data updates using the ArcPy Data Access module and cursorsTurn your scripts into script tools for ArcGIS ProLearn how to manage data on ArcGIS OnlineQuery, edit, and append to feature layers and create symbology with renderers and colorizersApply pandas and NumPy to raster and vector analysisLearn new tricks to manage data for entire cities or large companiesWho this book is for: This book is ideal for anyone looking to add Python to their ArcGIS Pro workflows, even if you have no prior experience with programming. This includes ArcGIS professionals, intermediate ArcGIS Pro users, ArcGIS Pro power users, students, and people who want to move from being a GIS Technician to GIS Analyst; GIS Analyst to GIS Programmer; or GIS Developer/Programmer to a GIS Architect. Basic familiarity with geospatial/GIS syntax, ArcGIS, and data science (pandas) is helpful, though not necessary.
Zeroing Neural Networks
Zeroing Neural Networks Describes the theoretical and practical aspects of finite-time ZNN methods for solving an array of computational problems Zeroing Neural Networks (ZNN) have become essential tools for solving discretized sensor-driven time-varying matrix problems in engineering, control theory, and on-chip applications for robots. Building on the original ZNN model, finite-time zeroing neural networks (FTZNN) enable efficient, accurate, and predictive real-time computations. Setting up discretized FTZNN algorithms for different time-varying matrix problems requires distinct steps. Zeroing Neural Networks provides in-depth information on the finite-time convergence of ZNN models in solving computational problems. Divided into eight parts, this comprehensive resource covers modeling methods, theoretical analysis, computer simulations, nonlinear activation functions, and more. Each part focuses on a specific type of time-varying computational problem, such as the application of FTZNN to the Lyapunov equation, linear matrix equation, and matrix inversion. Throughout the book, tables explain the performance of different models, while numerous illustrative examples clarify the advantages of each FTZNN method. In addition, the book: Describes how to design, analyze, and apply FTZNN models for solving computational problems Presents multiple FTZNN models for solving time-varying computational problems Details the noise-tolerance of FTZNN models to maximize the adaptability of FTZNN models to complex environments Includes an introduction, problem description, design scheme, theoretical analysis, illustrative verification, application, and summary in every chapter Zeroing Neural Networks: Finite-time Convergence Design, Analysis and Applications is an essential resource for scientists, researchers, academic lecturers, and postgraduates in the field, as well as a valuable reference for engineers and other practitioners working in neurocomputing and intelligent control.
Microsoft Azure Ai: A Beginner's Guide
Explore Azure AI Platform.Key FeaturesEasy-to-follow tutorial for getting started with the Azure AI platform.Integrated platform for developing, deploying, and managing AI apps.Includes real-world scenarios and use-cases to fully explore Azure AI Platform.DescriptionMicrosoft Azure AI A Beginner's Guide explains the fundamentals of Azure AI and some more advanced topics. The sole objective of the book is to provide hands-on experience working with the various services, APIs, and tools available in the Azure AI Platform. This book begins by discussing the fundamentals of the Azure AI platform and the essential principles behind the Azure AI ecosystem and services. Readers will become familiar with the essential services, use cases, and examples provided by Azure AI Platform and Services, including Azure Cognitive Services, Azure Computer Vision, Azure Applied AI Services, and Azure Machine Learning. The author focuses on teaching how to utilize Azure Cognitive services to construct intelligent apps, including Image Processing, Object Detection, Text Recognition, OCR, Spatial Analysis, and Face Recognition using Computer Vision. Readers can investigate Azure Applied AI Services, including Form Recognizer, Metrics Advisor, Cognitive Search, Immersive Reader, Video Analyzer, and Azure Bot Service. Bot Framework and the Bot Framework Emulator will be explored in further detail, and how they can be used in AI applications to improve their conversational user interfaces. With Azure Machine Learning Studio, you will also learn to incorporate machine learning into your enterprise-level applications.What you will learnGet familiar with Azure AI Platform and the cognitive capabilities of Azure.Learn to create apps that can process photos, detect faces, and detect objects.Utilize OCR, handwriting recognition, and spatial analysis in your development.Learn about Azure AI services like Form Recognizer, Metrics Advisor, Cognitive Search, Azure Immersive Reader, and Video Analyzer.Try out several NLP applications with the Azure BOT framework.Who this book is forThis book teaches AI developers, machine learning engineers, .NET developers, and architects how to swiftly develop intelligent applications utilizing the Azure AI Platform. Knowledge of.NET or.NET Core is strongly advised to get the most out of the book.Table of Contents1.Azure AI Platform and Services2. Azure Computer Vision - Image Analysis, Processing, Content Moderation, Object and Face Detection3. Computer Vision - Text Recognition, Optical Character Recognition, Spatial Analysis4. Azure Cognitive Services - Custom Applications leveraging Decision, Language, Speech, Web Search5. Azure Applied AI Services6. Azure Applied AI Services -BOTs A Brief Introduction7. Machine Learning-Infusing ML in Custom Applications using ML.NET8. Machine Learning - Using Azure ML StudioRead more
CYBERSECURITY and HACKING for Beginners
Have you ever wondered why your computer or smartphone was attacked by a virus?Do you want to learn the fundamentals of ethical hacking and understand how to improve the security of your network, even if you are a beginner? If you answered yes to any of these questions, then this is the book for you. It is almost impossible to imagine our daily lives without a smartphone or a computer.Inside these devices, we store all our personal data (such as photos, documents, videos, etc...) and professional data (such as passwords, accounts, various documents). How to defend all this from possible unauthorized intrusions? The term hacking means the set of methods, techniques and operations implemented by a person (hacker) with the aim of knowing, entering and modifying a computer system hardware or software. If you know the operations that hackers perform to enter a computer network, then you can understand how to prevent them. This book walks you through an easy-to-understand, step-by-step procedure that is ideal for a beginner who is intent on acquiring basic hacking and network security skills.Within this book you will find: How to prevent the risks of infected emailsHow to protect yourself from external devicesHow to install Kali Linux and other open-source tools to become a hacker;How to understand the processes behind a successful penetration test. Want to learn more? ★★Click on Buy Now to Get Started! ★★
Holistic Approach to Quantum Cryptography in Cyber Security
The text covers concepts of cyber security through quantum computing and quantum cryptography in a single volume. It will be a useful text for graduate students, academic researchers, and professionals in areas including electrical and electronics engineering, computer science, and information technology.
Dreamweaver MX Design Projects
We gave four web professionals a design brief: we asked them each to plan, design, and implement a specific type of web site, then write up all their design and development considerations - how to be visually appealing while usable and accessible, how to wireframe the sites, and how to develop them with usability and accessibility in mind. The web sites are: A corporate site (designed using CSS and templates on a Mac) A news portal (made using PHP on a PC) An entertainment site (a visually appealing fan site for the band U2, made using a Mac) A company intranet site (made using ASP on a PC) The authors also take you through the complete code for each site (including server-side functionality, CSS, and Dreamweaver templates), which is available for download from glasshaus. Using this book, you can learn from their work, and multiply your own Dreamweaver knowledge.
Fireworks MX 2004 Zero to Hero
Macromedia's Fireworks MX 2004 enables you to design, optimize, and add basic interactivity to your graphics and is mainly used for designing and optimizing web graphics, then exporting them to website creation programs like Dreamweaver or Flash. With extensive tools for editing bitmap and vector graphics, Fireworks makes collaborative site design much quicker with improved integration of the Studio products. Graphics in Flash or Dreamweaver libraries can be quickly edited in Fireworks and instantly updated throughout your website. Extra photo-editing tools, Auto Shapes, Live Effects animation, and additional anti-aliasing options provide more creative scope and developers can extend Fireworks image-editing capabilities into Dreamweaver
Contribute
Macromedia's Contribute allows Web Professionals to save the time spent performing content updates, by devolving the responsibility and know-how back to the content owners. You identify which areas of which pages users are allowed to update, and they can do this with no technical know-how and with no risk of breaking the site. The net result? They get content updated when they need it - and you get time to spend on Web Design. After all, isn't that why you got into the Web in the first place? This book teaches you all you need to know on setting up the system ... and, uniquely, you're entitled to unlimited free downloads of the glasshaus Contribute End-User Training Guide. By distributing it to the content owners, you empower them and liberate yourself. What this book covers: Site Definitions and Connections Links, Images, and Non-HTML Documents Customizing Contribute Best Practices Selling Contribute to your users and management Training users Supporting Contribute Using Templates in Contribute Editing dynamic web sites with server-side includes From the Publisher This book is for web professionals and site owners who will administer Contribute, and those responsible for training end-users in an organization.
XML Programming
XML Web services are the fundamental building blocks in the move to distributed computing on the Internet. Open standards and the focus on communication and collaboration among people and applications have created an environment where XML Web services are becoming the platform for application integration. This book is a fast-moving, concise introduction to XML technologies for all programmers, no matter what their programming language (Java, VB, VBScript, C, C++, Python, and JavaScript), with exercises and solutions in every chapter.
Business Recovery and Continuity in a Mega Disaster
The COVID-19 Pandemic has changed the entire world to levels that were not even thought of before. This publication is intended to be a how-to book to fully prepare CIOs and CISOs for the next disaster to happen, whether natural or manmade, with the various lessons that have been learned thus far from COVID-19.
Business Recovery and Continuity in a Mega Disaster
The COVID-19 Pandemic has changed the entire world to levels that were not even thought of before. This publication is intended to be a how-to book to fully prepare CIOs and CISOs for the next disaster to happen, whether natural or manmade, with the various lessons that have been learned thus far from COVID-19.
Preventing Harmful Behaviour in Online Communities
Preventing Harmful Behaviour in Online Communities explores the ethics and logistics of censoring problematic communications online that might encourage a person to engage in harmful behaviour.
Mobile App Reverse Engineering
Delve into the world of mobile application reverse engineering, learn the fundamentals of how mobile apps are created and their internals, and analyze application binaries to find security issuesKey Features: Learn the skills required to reverse engineer mobile applicationsUnderstand the internals of iOS and Android application binariesExplore modern reverse engineering tools such as Ghidra, Radare2, Hopper, and moreBook Description: Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world's evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to keep up by discovering security issues through reverse engineering of mobile apps.This book starts with the basics of reverse engineering and teaches you how to set up an isolated virtual machine environment to perform reverse engineering. You'll then learn about modern tools such as Ghidra and Radare2 to perform reverse engineering on mobile apps as well as understand how Android and iOS apps are developed. Next, you'll explore different ways to reverse engineer some sample mobile apps developed for this book. As you advance, you'll learn how reverse engineering can help in penetration testing of Android and iOS apps with the help of case studies. The concluding chapters will show you how to automate the process of reverse engineering and analyzing binaries to find low-hanging security issues.By the end of this reverse engineering book, you'll have developed the skills you need to be able to reverse engineer Android and iOS apps and streamline the reverse engineering process with confidence.What You Will Learn: Understand how to set up an environment to perform reverse engineeringDiscover how Android and iOS application packages are builtReverse engineer Android applications and understand their internalsReverse engineer iOS applications built using Objective C and Swift programmingUnderstand real-world case studies of reverse engineeringAutomate reverse engineering to discover low-hanging vulnerabilitiesUnderstand reverse engineering and how its defense techniques are used in mobile applicationsWho this book is for: This book is for cybersecurity professionals, security analysts, mobile application security enthusiasts, and penetration testers interested in understanding the internals of iOS and Android apps through reverse engineering. Basic knowledge of reverse engineering as well as an understanding of mobile operating systems like iOS and Android and how mobile applications work on them are required.
Ptfm
Red teams can show flaws that exist in your network before they are compromised by malicious actors and blue teams traditionally assess current security measures and identify security flaws. The teams can provide valuable feedback to each other, but this is often overlooked, enter the purple team.Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationPurple Team Field Manual is a must have for every cyber security professional. The purple team field manual integrates red and blue team methodologies, and aligns TTP's to the MITRE ATT&CK Matrix. It also contains useful reference command reference guides for networking. Don't wait get your copy now.
Security Issues for Wireless Sensor Networks
Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wireless and mobile computing research community. Applications of WSNs are numerous and growing, including indoor deployment scenarios in the home and office to outdoor deployment in an adversary's territory in a tactical background. However, due to their distributed nature and deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their performance.This problem is more critical if the network is deployed for some mission-critical applications, such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, a traditional security mechanism with high overhead of computation and communication is not feasible in WSNs. Design and implementation of secure WSNs is, therefore, a particularly challenging task.This book covers a comprehensive discussion on state-of-the-art security technologies for WSNs. It identifies various possible attacks at different layers of the communication protocol stack in a typical WSN and presents their possible countermeasures. A brief discussion on the future direction of research in WSN security is also included.
Future Network Architectures and Core Technologies
This book introduces the background, basic concepts and evolution of computer network development; by comparing and contrasting with the typical network architectures in the market. The book focuses on the architecture and underpinning technologies towards the future in network designs. It also provides a reconfigurable evolutionary network function innovation platform for researches to run experiments on the networks they designed. The contents of this book are novel, informative, and practical - a reflection of the state-of-art development in network architecture.This book is written for engineers and researchers specializing in communications or computer networks. It could also be adopted as a textbook for graduate students majoring in communications, computing, and computer network related disciplines in colleges and universities.
The Internet
Want to learn about the Internet but not sure where to start? This accessible guide offers a crash course on every topic you need to know to get up to speed with the modern Internet, balancing theory and application. Following a brief history of the Internet, you'll learn the basics of computer networking before diving into major topics like security, blockchain, and the Internet of Things. Particular focus is given to contemporary technologies like 5G, Wi-Fi 6, and decentralized computing. A perfect first book for beginners and a succinct reference for professionals, this is a no-nonsense, "nothing you don't need" guide to the world's biggest computer network.
Don't Force It, Solve It!
"Knowing various frameworks and methodologies is crucial.... This book takes you one step further by transforming individuals or teams into adaptable problem-solving powerhouses."George Ketsiakidis, Design Researcher, Shanghai Jiao Tong University"George is a master of design process thinking, and it comes out in every word of his writing."Ryan Gerber, Founder, Quest LabsIt's not how much time we spend on design that impacts product and service success: it's whether that time has been spent on solving the right problems. The field of design, with a greater focus on user-centered design, steadily acquires a central position on the work of product design teams. From large corporate environments to startups, multidisciplinary teams of developers, designers, project managers, and product managers need to find ways to understand each other's needs, overcome obstacles, communicate efficiently, and perform, creating products that satisfy their users' needs.In an era when the main differentiating factor between products are the teams that created them, George Kalmpourtzis' Don't Force It, Solve It!: How To Design Meaningful and Efficient Design Processes is the perfect roadmap for navigating the twisting paths of project management and user-centered design.KEY FEATURES: - This book aims at helping software teams work more efficiently by setting up their own design processes. - For organizations, this book helps decode the design processes, allowing them to deliver experiences that address the real problems of their audiences.- This book offers a combination of theory and practice that will help its readers understand how to design efficient processes and apply this knowledge in their own work.- This book includes many insights in the form of colorful doodles. George Kalmpourtzis is an award-winning User Experience & Learning Experience Consultant and Game Designer. Finding himself between the fields of educational technology, design, and game studies, he has been founder, C-level stakeholder, director, and board member of several design studios, startups, and consulting agencies.
Security and Artificial Intelligence
AI has become an emerging technology to assess security and privacy, with many challenges and potential solutions at the algorithm, architecture, and implementation levels. So far, research on AI and security has looked at subproblems in isolation but future solutions will require sharing of experience and best practice in these domains.The editors of this State-of-the-Art Survey invited a cross-disciplinary team of researchers to a Lorentz workshop in 2019 to improve collaboration in these areas. Some contributions were initiated at the event, others were developed since through further invitations, editing, and cross-reviewing. This contributed book contains 14 invited chapters that address side-channel attacks and fault injection, cryptographic primitives, adversarial machine learning, and intrusion detection. The chapters were evaluated based on their significance, technical quality, and relevance to the topics of security and AI, and each submission was reviewed in single-blind mode and revised.
Risks and Security of Internet and Systems
This book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2021, which took place during November 11-13, 2021. The conference was originally planned to take place in Ames, IA, USA, but had to change to an online format due to the COVID-19 pandemic.The 9 full and 3 short papers included in this volume were carefully reviewed and selected from 23 submissions. The papers were organized in topical sections named: CPS and hardware security; attacks, responses, and security management; network and data security.
Cyber Security primer for managers
This book provides a general overview of cyber security in, mostly, a non-technical format for those managers who need to get up to speed quickly on protecting their information using best practices
Electronic Governance and Open Society: Challenges in Eurasia
This book constitutes the refereed proceedings of the 8th Conference on Electronic Governance and Open Society: Challenges in Eurasia, EGOSE 2021, held in St. Petersburg, Russia, in November 2021.The 21 full papers were carefully reviewed and selected from 69 submissions, additionally one invited paper has been included in this volume. The papers are organized in topical sections on ​digital technology and design; digital Society; digital government and economy.
Computer Networking for Beginners
Are you curious about how the Internet works? Does Computer Networks spark an interest in you?Well, look no further. You're in the right place! The Internet is formed of many, many interconnected computer networks. This Computer Networking book is designed for everyone willing to learn about all of the Internet's great stuff to offer.You'll learn everything you need to know about computer networking from this book. You'll become highly familiar with UTP, Ethernet, MAC, IPv4, IPv6, TCP & UDP, etc. It doesn't matter if you are in charge of a small or extensive network, at home or in an office. You will learn how to set everything up and keep it working.It's the guide to computer networking for every beginner. This book contains 12 chapters that will teach you, step by step, how to be successful at Computer Networking.Here's what you will learn from this book: - What networks are and how they function- What you need to set up a network- What is Ethernet, and how a MAC address works- How to configure an IP address on Windows 7 to 10- Everything about IP addresses and ports (TCP or UDP)- Different network applications- Cisco IOS and CLI- How does the Routing and Switching process work- Why do we need static routes or routing protocols (RIP, OSFP, EIGRP)- What's the purpose of a VLAN in a network and how to configure themGrab your copy of this book today!Topics covered in this book: Computer Networking, Networking, Computer Networking for Beginners, Computer Networks, Cisco Networking, OSI Model, Computer Networks, Introduction to Computer Networking
Ethical Hacking for Beginners
Ever wondered how a Hacker thinks? Or how you could become a Hacker?This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need to do to protect yourself from cyber threats and the most common hacking techniques used today.Structured in 10 chapters, all about cyber-security and ethical hacking, this is in short what the book covers in itspages: The type of hackersHow the process of Hacking works and how attackers cover their tracesHow to install and use Kali LinuxThe basics of CyberSecurityAll the information on malware and cyber attacksHow to scan the servers and the networkWordPress Security & HackingHow to do Google HackingWhat's the role of a firewall and what are your firewall optionsWhat you need to know about cryptography and digital signaturesWhat is a VPN and how to use it for your security Hacking is real, and many people know how to do it. You can protect yourself from cyber attacks by being informed and learning how to secure your computer and other devices.Grab your copy of this CyberSecurity & Hacking book today!
Hacking Artificial Intelligence
Sheds light on the ability to hack AI and the technology industry's lack of effort to secure vulnerabilities. We are accelerating towards the automated future. But this new future brings new risks. It is no surprise that after years of development and recent breakthroughs, artificial intelligence is rapidly transforming businesses, consumer electronics, and the national security landscape. But like all digital technologies, AI can fail and be left vulnerable to hacking. The ability to hack AI and the technology industry's lack of effort to secure it is thought by experts to be the biggest unaddressed technology issue of our time. Hacking Artificial Intelligence sheds light on these hacking risks, explaining them to those who can make a difference. Today, very few people--including those in influential business and government positions--are aware of the new risks that accompany automated systems. While society hurdles ahead with AI, we are also rushing towards a security and safety nightmare. This book is the first-ever layman's guide to the new world of hacking AI and introduces the field to thousands of readers who should be aware of these risks. From a security perspective, AI is today where the internet was 30 years ago. It is wide open and can be exploited. Readers from leaders to AI enthusiasts and practitioners alike are shown how AI hacking is a real risk to organizations and are provided with a framework to assess such risks, before problems arise.
High Performance Computing
This book constitutes revised selected papers of the 8th Latin American High Performance Computing Conference, CARLA 2021, held in Guadalajara, Mexico, in October 2021. Due to the COVID-19 pandemic the conference was held in a virtual mode. The 16 revised full papers and 2 short papers presented were carefully reviewed and selected out of 45 submissions. The papers included in this book are organized according to the topics on ​high performance computing; high performance computing and artificial intelligence; high performance computing applications.
Multimedia Networking
Internet growth has pushed the development of multimedia applications and technologies like voice, data and video, in all aspects of life. This guide addresses the dynamic and efficient use of resources - a fundamental aspect of multimedia networks.
Multi-Criteria Decision-Making Models for Website Evaluation
With almost every business application process being linked with a web portal, the website has become an integral part of any organization. Satisfying the end user's needs is one of the key principles of designing an effective website. Because there are different users for any given website, there are different criteria that users want. Thus, evaluating a website is a multi-criteria decision-making problem in which the decision maker's opinion should be considered for ranking the website. Multi-Criteria Decision-Making Models for Website Evaluation is a critical scholarly resource that covers the strategies needed to evaluate the navigability and efficacy of websites as promotional platforms for their companies. Featuring a wide range of topics including linguistic modelling, e-services, and site quality, this book is ideal for managers, executives, website designers, graphic artists, specialists, consultants, educationalists, researchers, and students.