0401~0402_哆啦A夢知識大探索17:地下空間探險車
0401~0403_4月選書

英文書 > 全部商品

From Web1 to Web3

Ollie,Bell  著
CRC Press 出版
2025/07/30 出版

From Web1 to Web3 is your definitive roadmap through the current digital revolution. Authored by Ollie Bell, Nabil Hadi, and Daniel Strode, this book offers a clear, thoughtful exploration of the internet's evolution - from its humble, static beginnings to the dynamic, decentralized future that is emerging today.

9 特價8352
立即代訂
下次再買

Modeling and Analyzing Security Protocols with Tamarin

David,Basin  著
Springer 出版
2025/07/29 出版

The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol, possible adversaries, and the desired security properties, Tamarin either verifies the protocol or provides counter examples witnessing attacks. Tamarin is a robust and powerful analysis tool: it has been under development for over a decade and has reached a state of maturity where it can be applied to model and analyze a wide range of real-world cryptographic protocols. It is now one of the leading tools in this domain, with a wide and active user community spanning both academia and industry. The objective of this book is to help both researchers and practitioners to gain a general understanding of how Formal Methods tools like Tamarin can be used to analyze and improve the quality of real-world protocols. Moreover, we specifically showcase the Tamarin prover and provide guidance on its usage. In this sense, this book provides a user's manual forTamarin. But it goes far beyond that, highlighting Tamarin's underlying theory and its use in modeling and applications.

9 特價3131
立即代訂
下次再買

Cyber Security

2025/07/29 出版

The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1466
立即代訂
下次再買

Federal It Security

2025/07/29 出版

The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1466
立即代訂
下次再買

Inclusive Design for Accessibility

Dale,Cruse  著
Packt 出版
2025/07/29 出版

Through insights from twelve industry voices, learn how to create truly accessible and inclusive digital experiences that work for everyone, regardless of ability and backgroundKey Features: - Understand inclusive design principles that will help you achieve universal usability- Gain insights into AI and emerging technologies shaping the future of accessibility- Drive organizational change with practical strategies to build an inclusive design culture- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Despite our growing reliance on digital technology, millions of users are still excluded from fully engaging with websites, apps, and digital services because nobody thought to design for them. Inclusive Design for Accessibility challenges you to rethink how you build digital experiences, offering the tools and guidance needed to move beyond compliance and create experiences that work for everyone.With contributions from twelve accessibility leaders-Dale Cruse, Denis Boudreau, Dr. Angela Young, Maya Sellon, Julianna Rowsell, Nandita Gupta, Jennifer Chadwick, Crystal Scott, Chris McMeeking, Dr. Keith Newton, Charlie Triplett, and Kai Wong-this book lays out the fundamentals of inclusive design and its application in advanced and emerging technologies. You'll discover practical strategies and real-world examples that show you how to embed accessibility into projects, from user research and testing to creating accessible websites and mobile apps. You'll also focus on how AI can enhance accessibility and learn to tackle the challenges posed by VR and AR.For designers, developers, product managers, and business leaders, this book will reshape how you approach inclusive design, helping you move beyond ticking boxes toward building digital products that don't leave anyone behind.What You Will Learn: - Master the core principles of inclusive design to create products that serve all- Conduct diverse user research to gain insights into accessible experiences- Implement accessibility best practices in your web and mobile deployments- Create fully accessible content in text, audio, and video formats- Explore the accessibility challenges and opportunities with AI, VR, and AR- Navigate the legal and ethical implications of accessibility to protect users and your brand- Establish accessibility-focused workflows and practices in your teamsWho this book is for: This book is for digital designers, developers, UX professionals, product managers, and business leaders committed to inclusive design. It offers practical skills for creating accessible digital products, while covering legal and ethical considerations, user research, and strategies for building an accessibility-focused culture within teams.You don't need to be an expert in UX design, web development, or accessibility to get value from this book. Each chapter delivers actionable insights that stand on their own, be it UX design, product management, development, or accessibility leadership.Table of Contents- Defining Inclusive Design in the Digital Age- Understanding Diverse User Needs: Types of Disabilities and Assistive Technologies- Legal and Ethical Considerations in Accessible Design- User Research and Testing for Inclusive Products- Designing Accessible User Interfaces: Visual and Interaction Design- Creating Accessible Content: Writing, Images, and Multimedia- Developing Accessible Websites: HTML, CSS, and ARIA Best Practices- Mobile Accessibility: Designing for Touch and Voice Interfaces- Accessibility in Emerging Technologies: VR, AR, and AI(N.B. Please use the Read Sample option to see further chapters)

9 特價2064
立即代訂
下次再買

AWS for Solutions Architects - Third Edition

Packt 出版
2025/07/29 出版

Master AWS architecture and design secure, scalable, production-ready cloud systems. This practical guide features real-world patterns, GenAI strategies, cost optimization techniques, and certification-aligned best practices.Key Features: - Stay current with hands-on coverage of MLOps, AIOps, and the latest AWS service updates- Implement migration strategies with real-world examples and enterprise case studies- Advance your AWS career with certification-aligned insights and exam-ready strategiesBook Description: AWS for Solutions Architects, Third Edition is your essential guide to thriving in the fast-evolving AWS ecosystem. As a solutions architect, staying on top of the latest technologies and managing complex cloud migrations can be challenging, and this book addresses those pain points head-on. Seasoned AWS experts Saurabh Shrivastava, Neelanjali Srivastav, and Dhiraj Thakur bring deep industry insight and hands-on experience to every chapter.This third edition introduces cutting-edge topics, including Generative AI and MLOps, to keep pace with the evolving cloud landscape and guide you in building AI-driven applications. The book also reflects updates from the AWS Well-Architected Framework and aligns with the latest AWS certifications, making it a future-ready guide for cloud professionals. The chapters help you stay ahead of the competition with in-depth coverage of the latest AWS certifications, including AI Practitioner Foundation and Data Engineer Associate, helping you position yourself as a leader in cloud innovation.By the end of this book, you'll transform into a solutions architecture expert, equipped with the strategies, tools, and certifications needed to handle any cloud challenge.What You Will Learn: - Gain expertise in GenAI, MLOps, AIOps, and mobile edge computing- Optimize performance and handle errors in cloud-native applications- Prepare for new AWS certifications, including those focused on AI and data engineering- Apply best practices for security, compliance, and AWS Learning Badges- Explore the updated Well-Architected Framework with six pillars- Get in-depth knowledge of new storage options and security group configurationsWho this book is for: This book is for application and enterprise architects, developers, operations engineers, and certification aspirants looking to master AWS architectural patterns, best practices, and advanced techniques for building scalable, secure, highly available, fault-tolerant, and cost-effective cloud solutions. Prior coding knowledge isn't required, but experience in software architecture design will be helpful.Table of Contents- Understanding AWS Cloud Principles and Key Characteristics- Understanding the AWS Well-Architected Framework and Getting Certified- Leveraging the Cloud for Enterprise Transformation- Networking in AWS- Storage in AWS: Choosing the Right Tool for the Job- Harnessing the Power of Cloud Computing- Selecting the Right Database Service- Best Practices for Application Security, Identity, and Compliance- Driving Efficiency with Cloud Operation Automation and DevOps in AWS- Data Engineering and Big Data Analytics in AWS- Machine Learning and Generative AI in AWS- Data Lake Patterns: Integrating Your Data Across the Enterprise- Building Microservices and Event-Driven Architecture in AWS- Hands-On Guide to Building an App in AWS

9 特價2523
立即代訂
下次再買

Advancements In Smart Card And Biometric Technology

2025/07/29 出版

The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價823
立即代訂
下次再買

Cyber Threat Hunters Handbook

2025/07/28 出版

Cyber threat hunting is the advanced practice that empowers security teams to actively unearth hidden intrusions and subtle attack behaviors that evade traditional tools. Cyber threats are evolving faster than ever. It is used by modern attackers as an advanced technique to infiltrate systems, evade detection, and exploit vulnerabilities at scale. This book offers a hands-on, practical approach to threat hunting and covers key topics such as network traffic analysis, operating system compromise detection, malware analysis, APTs, cyber threat intelligence, AI-driven detection techniques, and open-source tools. Each chapter builds the capabilities, from understanding the fundamentals to applying advanced techniques in real-world scenarios. It also covers integrating strategies for dealing with security incidents, outlining crucial methods for effective hunting in various settings, and emphasizing the power of sharing insights.By the end of this book, readers will possess the critical skills and confidence to effectively identify, analyze, and neutralize advanced cyber threats, significantly elevating their capabilities as cybersecurity professionals. WHAT YOU WILL LEARN● Analyze network traffic, logs, and suspicious system behavior.● Apply threat intelligence and IoCs for early detection.● Identify and understand malware, APTs, and threat actors.● Detect and investigate cyber threats using real-world techniques.● Use techniques and open-source tools for practical threat hunting.● Strengthen incident response with proactive hunting strategies.WHO THIS BOOK IS FORThis book is designed for cybersecurity analysts, incident responders, and Security Operations Center (SOC) professionals seeking to advance their proactive defense skills. Anyone looking to learn about threat hunting, irrespective of their experience, can learn different techniques, tools, and methods with this book.

9 特價1833
立即代訂
下次再買

Research and Innovation Forum 2024

Anna,Visvizi  著
Springer 出版
2025/07/28 出版

This book features research presented and discussed during the Research & Innovation Forum (Rii Forum) 2024. As such, this book offers a unique insight into emerging topics, issues and developments pertinent to the fields of technology, innovation and education and their social impact. Papers included in this book apply inter- and multi-disciplinary approaches to query such issues as technology-enhanced teaching and learning, smart cities, information systems, cognitive computing and social networking. What brings these threads of the discussion together is the question of how advances in computer science-which are otherwise largely incomprehensible to researchers from other fields-can be effectively translated and capitalized on so as to make them beneficial for society as a whole. In this context, Rii Forum and Rii Forum proceedings offer an essential venue where diverse stakeholders, including academics, the think tank sector and decision-makers, can engage in a meaningful dialogue with a view to improving the applicability of advances in computer science.

9 特價13049
立即代訂
下次再買

Internet of Things, Smart Spaces, and Next Generation Networks and Systems

Springer 出版
2025/07/28 出版

This two-volume set LNCS 15554 and LNCS 15555 constitutes the refereed proceedings of the 24th International Conference on Next Generation Wired/Wireless Networking, NEW2AN 2024, and the 17th Conference on Internet of Things and Smart Spaces, ruSMART 2024, held in Marrakesh, Morocco, during December 11-12, 2024.The 48 full papers included in the joint proceedings were carefully reviewed and selected from 354 submissions. They address various aspects of next-generation data networks, with special attention to advanced wireless networking and applications. In particular, novel and innovative approaches to performance and effciency analysis of 5G and beyond systems, advanced queuing theory, and machine learning are demonstrated. Additionally, the papers focus on the Internet of Things, optics, signal processing, as well as digital Economy and business aspects.

9 特價3914
立即代訂
下次再買

Innovative Security Solutions for Information Technology and Communications

Springer 出版
2025/07/28 出版

This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 17th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2024, which took place in Bucharest, Romania, in November 2024. The 16 full papers presented in these proceedings were carefully reviewed and selected from 49 submissions. The book also contains two invited talks. This conference is focusing on all theoretical and practical aspects related to information technology and communications security.

9 特價6785
貨到通知
下次再買

Advanced Intelligent Computing Technology and Applications

Springer 出版
2025/07/27 出版

The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, constitutes the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025. The 523 papers presented in these proceedings books were carefully reviewed and selected from 4032 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications".

9 特價5219
立即代訂
下次再買

Advanced Intelligent Computing Technology and Applications

Springer 出版
2025/07/27 出版

The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, constitutes the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025. The 523 papers presented in these proceedings books were carefully reviewed and selected from 4032 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications".

9 特價5219
立即代訂
下次再買

Autonomous Revolution: Strategies, Threats and Challenges

Springer 出版
2025/07/26 出版
9 特價10439
貨到通知
下次再買

Advanced Intelligent Computing Technology and Applications

Springer 出版
2025/07/26 出版

The 12-volume set CCIS 2564-2575, together with the 28-volume set LNCS/LNAI/LNBI 15842-15869, constitutes the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025. The 523 papers presented in these proceedings books were carefully reviewed and selected from 4032 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications".

9 特價5219
立即代訂
下次再買

Moderator-topics

Anonymous  著
2025/07/26 出版

"Moderator-topics, Volume 16" delves into the crucial aspects of online community management and content moderation. This volume explores the challenges and strategies involved in maintaining constructive and safe online environments. From handling user disputes to implementing content policies, this book offers insights relevant to anyone involved in moderating online forums, social media platforms, or digital communities. An essential resource for moderators, community managers, and those interested in the dynamics of online interactions, "Moderator-topics" provides a comprehensive overview of the tools and techniques necessary for fostering healthy and productive online spaces. Explore real-world examples and practical advice on navigating the complexities of digital communication.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1374
立即代訂
下次再買

The Cybernetic Society

Amir,Husain  著
Basic Books 出版
2025/07/24 出版

"An optimistic, shimmering image of a world where AI operates in service to humankind" (Kirkus) argues that both the major risk and opportunity of AI is that humans and computers have fused, giving AI the ability to shape the future of human affairs Artificial intelligence is inescapable: at home, at work, in politics, and on the battlefield. In The Cybernetic Society, technologist Amir Husain argues that AI hasn't simply encroached on everything we do. It has become part of us, and we, it. Humans and intelligent machines, he argues, are enmeshed in a symbiotic hybrid that he calls a "cybernetic society." Husain describes a present and future where AI isn't a tool of humans but our equal partner, one where they can realize their own visions of the world. There is great potential and danger: Saudi Arabia's Neom--a "cognitive city" being built in inhospitable desert--shows how this symbiosis can make life possible where otherwise, it is not. But the profusion of intelligent military drones is making mass destruction possible where otherwise, it is not. As engrossing as it is urgent, The Cybernetic Society offers a new understanding of this revolutionary fusion of machine and mankind, and its profound implications for all our futures. The path ahead is challenging. But Husain shows why we can live harmoniously with our creations.

9 特價1026
立即代訂
下次再買

Information Security

2025/07/24 出版

The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1236
立即代訂
下次再買

Digital Degrowth

Neil,Selwyn  著
Polity Press 出版
2025/07/24 出版

We are fast approaching the point of "peak digital", with the continued mass production and excessive consumption of digital technologies set to become a key driver of climate crisis, ecological breakdown and ongoing societal instability. Digital Degrowth is a call to completely rethink our digital futures in these fast-changing times. It explores how degrowth thinking and alternate forms of "radically sustainable computing" might support ambitions of sustainable, scaled-down and equitable ways of living with digital technologies. Neil Selwyn proposes a rebalancing of digital technology use: digital degrowth is not a call for simply making reduced use of the digital technologies that we already have - rather it is an argument to reimagine digital practices that maximise societal benefits with minimal environmental and social impact. Drawing on illustrative examples from across computer science, hacker and environmental activist communities, this book examines how core degrowth principles of conviviality, autonomy and care are already being used to reimagine alternate forms of digital technology. Original and stimulating, this is essential reading for students and scholars of media and communication, sustainability studies, political ecology, computer/data sciences, and across the social sciences.

9 特價632
立即代訂
下次再買

CompTIA(R) SecurityX(R) CAS-005 Certification Guide - Second Edition

Mark,Birch  著
Packt 出版
2025/07/24 出版

Become a cybersecurity expert with comprehensive CAS-005 preparation using this detailed guide packed with practical insights, mock exams, diagrams, and actionable strategies that align with modern enterprise security demandsKey Features: - Strengthen your grasp of key concepts and real-world security practices across updated exam objectives.- Gauge your preparedness with over 300 practice questions, flashcards, and mock exams- Visualize complex topics with diagrams of AI-driven threats, Zero Trust, cloud security, cryptography, and incident responseBook Description: As cyber threats evolve at unprecedented speed and enterprises demand resilient, scalable security architectures, the CompTIA SecurityX CAS-005 Certification Guide stands as the definitive preparation resource for today's security leaders. This expert-led study guide enables senior security professionals to master the full breadth and depth of the new CAS-005 exam objectives.Written by veteran instructor Mark Birch, this guide draws from over 30 years of experience in teaching, consulting, and implementing cybersecurity controls to deliver clear, actionable content across the four core domains: governance, risk, and compliance; security architecture; security engineering; and security operations. It addresses the most pressing security challenges, from AI-driven threats and Zero Trust design to hybrid cloud environments, post-quantum cryptography, and automation. While exploring cutting-edge developments, it reinforces essential practices such as threat modeling, secure SDLC, advanced incident response, and risk management.Beyond comprehensive content coverage, this guide ensures you are fully prepared to pass the exam through exam tips, review questions, and detailed mock exams, helping you build the confidence and situational readiness needed to succeed in the CAS-005 exam and real-world cybersecurity leadership.What You Will Learn: - Build skills in compliance, governance, and risk management- Understand key standards such as CSA, ISO27000, GDPR, PCI DSS, CCPA, and COPPA- Hunt advanced persistent threats (APTs) with AI, threat detection, and cyber kill frameworks- Apply Kill Chain, MITRE ATT&CK, and Diamond threat models for proactive defense- Design secure hybrid cloud environments with Zero Trust architecture- Secure IoT, ICS, and SCADA systems across enterprise environments- Modernize SecOps workflows with IAC, GenAI, and automation- Use PQC, AEAD, FIPS, and advanced cryptographic toolsWho this book is for: This CompTIA book is for candidates preparing for the SecurityX certification exam who want to advance their career in cybersecurity. It's especially valuable for security architects, senior security engineers, SOC managers, security analysts, IT cybersecurity specialists/INFOSEC specialists, and cyber risk analysts. A background in a technical IT role or a CompTIA Security+ certification or equivalent experience is recommended.Table of Contents- Given a Set of Organizational Security Requirements, Implement the Appropriate Governance Components- Given a Set of Organizational Security Requirements, Perform Risk Management Activities- Explain how compliance affects information security strategies- Given a Scenario, Performing Threat Modeling Activities- Summarize the Information Security Challenges Associated with AI Adoption- Given a Scenario, Analyze Requirements to Design Resilient Systems- Given a Scenario, Implement Security in the Early Stages of the Systems Life Cycle and Throughout Subsequent Stages(N.B. Please use the Read Sample option to see further chapters)

9 特價2064
立即代訂
下次再買

Hacking Voice-Controllable Devices

Springer 出版
2025/07/24 出版

Voice-controllable devices allow hands-free interactions, offering a modern user experience and helping impaired users. However, the voice channel that enables this interaction is also one of their main weaknesses. Higher usability often comes with higher security and privacy risks. As Voice-Controllable Devices are no exception to this, a plethora of new attacks have been carried out against them in recent years. In this book, several attacks are analysed against the voice channel available in the literature; it then devises a bespoke kill chain to facilitate the classification of attack steps and future research. Additionally, the work analyses the design of the notorious Alexa vs Alexa attack, which turned Echo Dot devices against themselves in 2022. Finally, the present volume explores measures against all these attacks and raise important questions about their suitability for user needs. Topics and features: Discusses timely security and privacy challenges in IoT devices, with an emphasis on voice-controllable devices Provides a framework for assessing and studying attacks against the voice channel Addresses practical attacks successfully carried out against real devices, showing that an impactful attack need not be complex Explores advanced safeguards from a new perspective, questioning whether research is proceeding in the right direction This powerful volume--containing tips, tricks, and techniques used by ethical hackers to breach the voice channel--serves as the perfect guide for researchers conducting security and privacy research on IoT. It also provides food for thought for graduate students and enthusiasts of these subjects who do not shy away from the mathematics behind the world of machine learning.

9 特價9395
立即代訂
下次再買

Cloud Computing

Xiaohua,Feng  著
Springer 出版
2025/07/24 出版

This book LNICST 617 constitutes the refereed proceedings of the 12th EAI International Conference on Cloud Computing, CloudComp 2024, held in Luton, UK, during September 9-10, 2024. The 16 full papers were carefully reviewed and selected from 42 submissions. The proceedings focus on topics such as The Cloud-Edging Computing Wireless Networks; Network Security Emerging Applications /The Cloud-Edging Integration Applications

9 特價4175
立即代訂
下次再買

Empowering Iot: Reliability, Network Management, Sensing, and Probabilistic Charging in Wireless Sensor Networks

Springer 出版
2025/07/24 出版

This book provides a comprehensive exploration of both fundamental principles and practical engineering techniques. It places a strong emphasis on several key areas, including load balancing for IoT sensor devices through effective network management to ensure robust communication reliability among these sensor devices. It also delves into the intricacies of efficient charging scheduling for sensor devices, using probabilistic approaches and integrated sensing and communication technologies to enhance network optimization. Central to the book's goals is its comprehensive and systematic treatment of practical challenges in IoT network optimization. This focus makes it particularly suitable for readers seeking practical solutions in this area. The book's target audience includes researchers, engineers, graduate students, and IoT industry professionals interested in areas such as reliability improvement, load balancing, charging scheduling, and network management. By providing both theoretical foundations and practical insights, this book serves as a valuable resource for those seeking to navigate the complexities of IoT network optimization.

9 特價8873
立即代訂
下次再買

Information Systems Security and Privacy

Springer 出版
2025/07/23 出版

This book constitutes the refereed post-proceedings of the 9th and 10th International Conference on Information Systems Security and Privacy, ICISSP 2023 and 2024, held in Lisbon, Portugal, and in Rome, Italy during February 22-24, 2023 and February 26-28, 2024, respectively. The 15 full papers included in this book were carefully reviewed and selected from 285 submissions. These papers have been organized under the following topical sections: Management and operations; Applications and services; and Technologies and foundations.

9 特價6263
立即代訂
下次再買

Perturbation Based Privacy in Crowdsensing

Zhirun,Zheng  著
Springer 出版
2025/07/23 出版
9 特價10439
貨到通知
下次再買

Cognitive Computation and Systems

Bin,Xu  著
Springer 出版
2025/07/23 出版

This book constitutes the refereed proceedings of the Third International Conference on Cognitive Computation and Systems, ICCCS 2024, held in Linyi, China, December 20-22, 2024. The 54 revised full papers presented in these proceedings were carefully reviewed and selected from 155 submissions. The papers are organized in the following topical sections: Part I: Cognitive computing and information processing; Intelligent cooperative control; and Learning and systems. Part II: Cognitive computing and information processing; Intelligent cooperative control; and Learning and systems.

9 特價4175
立即代訂
下次再買

Emerging Technologies for Developing Countries

Springer 出版
2025/07/23 出版
9 特價4175
貨到通知
下次再買

Cognitive Computation and Systems

Bin,Xu  著
Springer 出版
2025/07/23 出版

This book constitutes the refereed proceedings of the Third International Conference on Cognitive Computation and Systems, ICCCS 2024, held in Linyi, China, December 20-22, 2024. The 54 revised full papers presented in these proceedings were carefully reviewed and selected from 155 submissions. The papers are organized in the following topical sections: Part I: Cognitive computing and information processing; Intelligent cooperative control; and Learning and systems. Part II: Cognitive computing and information processing; Intelligent cooperative control; and Learning and systems.

9 特價4436
立即代訂
下次再買

Spectral Domain RF Fingerprinting for 802.11 Wireless Devices

2025/07/23 出版

The increase in availability and reduction in cost of commercial communication devices (IEEE compliant such as 802.11, 802.16, etc) has increased wireless user exposure and the need for techniques to properly identify/classify signals for increased security measures. A communication device's emission includes intentional modulation that enables correct device operation. Hardware and environmental factors alter the ideal response and induce unintentional modulation e ects. If these e ects (features) are su ciently unique it becomes possible to identify a device using its ngerprint, with potential discrimination of not only manufacturers but possibly serial numbers for a given manufacturer.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

Stastistical Machine Translation of Japanese

2025/07/23 出版

Statistical machine translation (SMT) uses large amounts of language training data to statistically build a knowledge base for translating from one language to another. Before introducing this language data, usually in the form of a parallel set of sentences from both languages, the SMT system has no other linguistic information available to it. With supervised SMT, however, additional linguistic knowledge is allowed in addition to the training data. When translating between languages with little or no common linguistic backgrounds, like English and Japanese, using supervised SMT is extremely useful. By giving the system linguistic rules before training on the parallel corpus, the SMT system can build better alignments between words in both languages.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

Supplementing an Ad Hoc Wireless Network Routing Protocol With Radio Frequency Identification Tags

2025/07/23 出版

Wireless sensor networks (WSNs) have a broad and varied range of applications, yet all of these are limited by the resources available to the sensor nodes that make up the WSN. The most significant resource is energy; a WSN may be deployed to an inhospitable or unreachable area leaving it with a non-replenishable power source. This research examines a technique of reducing energy consumption by augmenting the nodes with radio frequency identification (RFID) tags that contain routing information. It was expected that RFID tags would reduce the network throughput, AODV routing traffic sent, and the amount of energy consumed. However, RFID tags have little effect on the network throughput or the AODV routing traffic sent. They also increase ETE delays in sparse networks as well as the amount of energy consumed in both sparse and dense networks. Furthermore, there was no statistical difference in the amount of user data throughput received. The density of the network is shown to have an effect on the variation of the data but the trends are the same for both sparse and dense networks. This counter-intuitive result is explained and conditions for such a scheme to be effective are discussed.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

Virtualization Technology Applied to Rootkit Defense

2025/07/23 出版

This research effort examines the idea of applying virtualization hardware to enhance operating system security against rootkits. Rootkits are sets of tools used to hide code and/or functionality from the user and operating system. Rootkits can accomplish this feat through using access to one part of an operating system to change another part that resides at the same privilege level. Hardware assisted virtualization (HAV) provides an opportunity to defeat this tactic through the introduction of a new operating mode. Created to aid operating system virtualization, HAV provides hardware support for managing and saving multiple states of the processor. This hardware support overcomes a problem in pure software virtualization, which is the need to modify guest software to run at a less privileged level. Using HAV, guest software can operate at the pre-HAV most privileged level. This thesis provides a plan to protect data structures targeted by rootkits through unconventional use of HAV technology to secure system resources such as memory. This method of protection will provide true real-time security through OS attack prevention, rather than reaction.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

Policy Changes for Acquisition of Offensive Cyberspace Weapon Systems

2025/07/23 出版

Because the cyberspace environment is changing so quickly, the slow, methodical Department of Defense (DoD) acquisition process may not suffice. By following the evolutionary acquisition method and incorporating five policy caveats, the DoD acquisition process can acquire effective systems quickly. The purpose of this research is to provide recommended policy changes in the acquisition of offensive cyberspace weapon systems for the Air Force and DoD in general. This paper describes the current DoD acquisition process, explains how cyberspace is different from the other domains, discusses a few innovative acquisition and development approaches, and concludes with the recommended policy changes. A literature search on the cyberspace community along with DoD and Air Force doctrine provided the bulk of the research. The recommended acquisition policy changes fall into the following categories: expanding the network of development activities, building payloads for specific target sets, security classification, sustainment of cyberspace capabilities and testing throughout the acquisition process.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1236
立即代訂
下次再買

Mitigating Distributed Denial of Service Attacks in an Anonymous Routing Environment

2025/07/23 出版

Network-centric intelligence collection operations use computers and the Internet to identify threats against Department of Defense (DoD) operations and personnel, to assess the strengths and weaknesses of enemy capabilities and to attribute network events to sponsoring organizations. The security of these operations are paramount and attention must be paid to countering enemy attribution efforts. One way for U.S. information operators to avoid being linked to the DoD is to use anonymous communication systems. One such anonymous communication system, Tor, provides a distributed overlay network that anonymizes interactive TCP services such as web browsing, secure shell, and chat. Tor uses the Transport Layer Security (TLS) protocol and is thus vulnerable to a distributed denial-of-service (DDoS) attack that can significantly delay data traversing the Tor network. This research is the first to explore DDoS mitigation in the anonymous routing environment. Defending against DDoS attacks in this environment is challenging as mitigation strategies must account for the distributed characteristics of anonymous communication systems and for anonymity vulnerabilities. In this research, the TLS DDoS attack is mitigated by forcing all clients (malicious or legitimate) to solve a puzzle before a connection is completed.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價823
立即代訂
下次再買

An Analysis of Information Asset Valuation Quantification Methodology for Application With Cyber Information Mission Impact Assessment

2025/07/23 出版

The purpose of this research is to develop a standardized Information Asset Valuation (IAV) methodology. The IAV methodology proposes that accurate valuation for an Information Asset (InfoA) is the convergence of information tangible, intangible, and flow attributes to form a functional entity that enhances mission capability. The IAV model attempts to quantify an InfoA to a single value through the summation of weighted criteria. Standardizing the InfoA value criteria will enable decision makers to comparatively analyze dissimilar InfoAs across the tactical, operational, and strategic domains. This research develops the IAV methodology through a review of existing military and non-military valuation methodologies. IAV provides the Air Force (AF) and Department of Defense (DoD) with a standardized methodology that may be utilized enterprise wide when conducting risk and damage assessment and risk management. The IAV methodology is one of the key functions necessary for the Cyber Incident Mission Impact Assessment (CIMIA) program to operationalize a scalable, semi-automated Decision Support System (DSS) tool. The CIMIA DSS intends to provide decision makers with near real-time cyber awareness prior to, during, and post cyber incident situations through documentation of relationships, interdependencies, and criticalities among information assets, the communications infrastructure, and the operations mission impact.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1420
立即代訂
下次再買

Toward Cyber Omniscience

2025/07/23 出版

It is widely accepted that cyberspace is a vulnerable and highly contested environment. The United Sates has and will face threats to its national security in the realm. As a result, the Office of the Secretary of Defense (OSD) has decided to consider new and evolving theories of deterrence to address the cyber domain. This OSD-sponsored paper examines a new cyberspace deterrence option know as cyber omniscience. Set in the year 2035, this paper will begin the process of developing the theory of cyber omniscience as a DoD deterrent. At the heart of cyber deterrence lays this question: "As technology rapidly advances in the contested cyber domain, can hostile individuals be deterred from employing highly advanced technologies through cyberspace that threaten national survival?" To answer this question, this paper will investigate a number of issues with regard to cyberspace deterrence: anticipated life (societal norms) and technology in 2035, hostile individual threats, what cyber omniscience entails, privacy issues, and policy recommendations. This multi-pronged approach will serve as the catalyst to a better understanding of the future of cyberspace, the threats, and deterrence.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1236
立即代訂
下次再買

Cryptanalysis of Pseudorandom Number Generators in Wireless Sensor Networks

2025/07/22 出版

This work presents a brute-force attack on an elliptic curve cryptosystemimplemented on UC Berkley's TinyOS operating system for wireless sensor networks.The attack exploits the short period of the pseudorandom number generator (PRNG) usedby the cryptosystem to generate private keys. The attack assumes a laptop is listeningpromiscuously to network traffic for key messages and requires only the sensor node'spublic key and network address to discover the private key. Experimental results showthat roughly 50% of the address space leads to a private key compromise in 25 minuteson average.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1420
立即代訂
下次再買

Simple Public Key Infrastructure Analysis Protocol Analysis and Design

2025/07/22 出版

Secure electronic communication is based on secrecy, authentication and authorization. One means of assuring a communication has these properties is to use Public Key Cryptography (PKC). The framework consisting of standards, protocols and instructions that make PKC usable in communication applications is called a Public Key Infrastructure (PKI). This thesis aims at proving the applicability of the Simple Public Key Infrastructure (SPKI) as a means of PKC. The strand space approach of Guttman and Thayer is used to provide an appropriate model for analysis. A Diffie-Hellman strand space model is combined with mixed strand space proof methods for proving the correctness of multiple protocols operating in the same context. The result is the public key mixed strand space model. This model is ideal for the analysis of SPKI applications operating as sub-protocols of an implementing application. This thesis then models the popular Internet Transport Layer Security (TLS) protocol as a public key mixed strand space model. The model includes the integration of SPKI certificates. To accommodate the functionality of SPKI, a new protocol is designed for certificate validation, the Certificate Chain Validation Protocol (CCV). The CCV protocol operates as a sub-protocol to TLS and provides online certificate validation. The security of the TLS protocol integrated with SPKI certificates and sub-protocols is then analyzed to prove its security properties. The results show that the modified TLS protocol exhibits the same security guarantees in isolation as it does when executing its own sub-protocols and the SPKI Certificate Chain Validation protocol.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1374
立即代訂
下次再買

Cyber Capabilities for Global Strike in 2035

2025/07/22 出版

This paper examines global strike, a core Air Force capacity to quickly and precisely attack any target anywhere, anytime, from a cyber perspective. Properly used, cyberspace capabilities can significantly enhance Air Force (AF) capabilities to provide the nation the capacity to influence the strategic behavior of existing and potential adversaries. This paper argues that the AF must improve both the quantity and quality of its cyberspace operations force, by treating cyber warfare capabilities in the same manner as it treats its other weapon systems. It argues that despite preconceptions of future automation capabilities, that cyberspace will be a highly dynamic and fluid environment characterized by interactions with a thinking adversary. As such, while automation is required, cyber warfare will be much more manpower intensive than is currently understood, and will require a force that is very highly trained. The rapid evolution of this man-made domain will also demand a robust developmental science and research investment in constantly keeping cyber warfare capabilities in pace with the technologies of the environment. This paper reaches these conclusions by first providing a glimpse into the world of cyberspace in 2035. The paper then assesses how cyber warfare mechanisms could disrupt, disable, or destroy potential adversary targets. It describes how these capabilities might work in two alternate scenarios, and then describes the steps the AF needs to take in the future to be confident in its ability to fly, fight, and win in cyberspace.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1236
立即代訂
下次再買

To Click or Not to Click

2025/07/22 出版

Today's Air Force networks are under frequent attack. One of the most pernicious threats is a sophisticated phishing attack that can lead to complete network penetration. Once an adversary has gained network entry, they are in a position to exfiltrate sensitive data or pursue even more active forms of sabotage. However, there are promising technical advances proposed in current research can help mitigate the threat. Also, user education will continue to play an important role to increase effectiveness in AF defenses. This paper reviews and recommends the most promising suggestions for adaptation and application in today's AF networks.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1236
立即代訂
下次再買

Performance Analysis and Comparison of Multiple Routing Protocols in a Large-Area, High-Speed Mobile Node Ad Hoc Network

2025/07/22 出版

The U.S. Air Force is interested in developing a standard ad hoc framework using "heavy" aircraft to route data across large regions. The Zone Routing Protocol (ZRP) has the potential to provide seamless large-scale routing for DoD under the Joint Tactical Radio System (JTRS) program. The goal of this study is to determine if there is a difference between routing protocol performance when operating in a large-area MANET with high-speed mobile nodes. This study analyzes MANET performance when using reactive, proactive, and hybrid routing protocols, specifically AODV, DYMO, Fisheye, and ZRP. This analysis compares the performance of the four routing protocols under the same MANET conditions. Average end-to-end delay, number of packets received, and throughput are the performance metrics used. Results indicate that routing protocol selection impacts MANET performance. Reactive protocol performance is better than hybrid and proactive protocol performance in each metric. Average ETE delays are lower using AODV (1.17 secs) and DYMO (2.14 secs) than ZRP (201.9 secs) or Fisheye (169.7 secs). Number of packets received is higher using AODV (531.6) and DYMO (670.2) than ZRP (267.3) or Fisheye (186.3). Throughput is higher using AODV (66,500 bps) and DYMO (87,577 bps) than ZRP (33,659) or Fisheye (23,630). The benefits of ZRP and Fisheye are not able to be taken advantage of in the MANET configurations modeled in this research using a "heavy" aircraft ad hoc framework.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1420
立即代訂
下次再買

A Distributed Agent Architecture for a Computer Virus Immune System

2025/07/22 出版

Information superiority is identified as an Air Force core competency and is recognized as a key enabler for the success of future missions. Information protection and information assurance are vital components required for achieving superiority in the Infosphere, but these goals are threatened by the exponential birth rate of new computer viruses. The increased global interconnectivity that is empowering advanced information systems is also increasing the spread of malicious code and current anti-virus solutions are quickly becoming overwhelmed by the burden of capturing and classifying new viral stains. To overcome this problem, a distributed computer virus immune system (CVIS) based on biological strategies is developed. The biological immune system (BIS) offers a highly parallel defense-in-depth solution for detecting and eliminating foreign invaders. Each component of the BIS can be viewed as an autonomous agent. Only through the collective actions of this multi-agent system can non-self entities be detected and removed from the body. This research develops a model of the BIS and utilizes software agents to implement a CVIS. The system design validates that agents are an effective methodology for the construction of an artificial immune system largely because the biological basis for the architecture can be described as a system of collaborating agents. The distributed agent architecture provides support for detection and management capabilities that are unavailable in current anti-virus solutions. However, the slow performance of the Java and the Java Shared Data Toolkit implementation indicate the need for a compiled language solution and the importance of understanding the performance issues in agent system design. The detector agents are able to distinguish self from non-self within a probabilistic error rate that is tunable through the proper selection of system parameters. This research also shows that by fighting viruses using an immune system model, tThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價961
立即代訂
下次再買

Patching the Wetware

2025/07/22 出版

In the practice of information security, it is increasingly observed that the weakest link in the security chain is the human operator. A reason often cited for this observation is that the human factor is simpler and cheaper to manipulate than the complex technological protections of digital information systems. Current anecdotes where the human was targeted to undermine military information protection systems include the 2008 breach of USCENTCOM computer systems with a USB device, and the more recent 2010 compromise of classified documents published on the WikiLeaks website. These infamous cases, among others, highlight the need for more robust human-centric information security measures to mitigate the risks of social engineering. To address this need, this research effort reviewed seminal works on social engineering and from the social psychology literature in order to conduct a qualitative analysis that establishes a link between the psychological principles underlying social engineering techniques and recognized principles of persuasion and influence. After this connection is established, several theories from the social psychology domain on how to develop resistance to persuasion are discussed as they could be applied to protecting personnel from social engineering attempts. Specifically, the theories of inoculation, forewarning, metacognition, and dispelling the illusion of invulnerability are presented as potential defenses.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1374
立即代訂
下次再買

Geolocation of a Node on a Local Area Network

2025/07/22 出版

Geolocation is the process of identifying a node using only its Internet Protocol (IP) address. Locating a node on a LAN poses particular challenges due to the small scale of the problem and the increased significance of queuing delay. This study builds upon existing research in the area of geolocation and develops a heuristic tailored to the difficulties inherent in LANs called the LAN Time to Location Heuristic (LTTLH).LTTLH uses several polling nodes to measure latencies to end nodes, known locations within the LAN. The Euclidean distance algorithm is used to compare the results wit`h the latency of a target in order to determine the target's approximate location.Using only these latency measurements, LTTLH is able to determine which switch a target is connected to 95% of the time. Within certain constraints, this method is able to identify the target location 78% of the time. However, LANs are not always configured within the constraints necessary to geolocate a node. In order for LTTLH to be effective, a network must be configured consistently, with similar length cable runs available to nodes located in the same area. For best results, the network should also be partitioned, grouping nodes of similar proximity behind one switch.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1374
立即代訂
下次再買

A Dynamically Configurable Log-Based Distributed Security Event Detection Methodology Using Simple Event Correlator

Justin,Myers  著
2025/07/22 出版

This research effort identifies attributes of distributed event correlation which make it desirable for security event detection, and evaluates those attributes in a comparison with a centralized alternative. Event correlation is an effective means of detecting complex situations encountered in information technology environments. Centralized, database-driven log event correlation is more commonly implemented, but suffers from flaws such as high network bandwidth utilization, significant requirements for system resources, and difficulty in detecting certain suspicious behaviors. This analysis measures the value in distributed event correlation by considering network bandwidth utilization, detection capability and database query efficiency, as well as through the implementation of remote configuration scripts and correlation of multiple log sources. These capabilities produce a configuration which allows a 99% reduction of network syslog traffic in the low-accountability case, and a significant decrease in database execution time through context-addition in the high-accountability case.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價961
立即代訂
下次再買

Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions

John L,Bebo  著
2025/07/22 出版

Given the increasingly prominent cyber-based threat, there are substantial research and development efforts underway in network and host-based intrusion detection using single-packet traffic analysis. However, there is a noticeable lack of research and development in the intrusion detection realm with regard to attacks that span multiple packets. This leaves a conspicuous gap in intrusion detection capability because not all attacks can be found by examining single packets alone. Some attacks may only be detected by examining multiple network packets collectively, considering how they relate to the "big picture," not how they are represented as individual packets. This research demonstrates a multiple-packet relational sensor in the context of a Computer Immune System (CIS) model to search for attacks that might otherwise go unnoticed via single-packet detection methods. Using relational schemata, multiple-packet CIS sensors define "self" based on equal, less than, and greater than relationships between fields of routine network packet headers. Attacks are then detected by examining how the relationships among attack packets may lay outside of the previously defined "self." Furthermore, this research presents a graphical, user-interactive means of network packet inspection to assist in traffic analysis of suspected intrusions. The visualization techniques demonstrated here provide a valuable tool to assist the network analyst in discriminating between true network attacks and false positives, often a time-intensive, and laborious process.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1420
立即代訂
下次再買

Digital Warfare

2025/07/22 出版

Digital Data Warfare (DDW) is an emerging field that has great potential as a means to meet military, political, economic, and personal objectives. Distinguished from the "hacker" variety of malicious computer code, by its predictable nature and the ability to target specific systems, DDW provides the hacker with the means to deny, degrade, decieve, and/or exploit a targeted system. The five phases of DDW attack--penetration, propogation, dormancy, execution, and termination, are presented for the first time by the author in this paper. The nature allows it to be used in the stategic, operational, and tactical warfare roles. Three questions should be considered when developing a strategy for employing DDW: (1) Who should control the employment of DDW? (2) What types of systems should be targeted, and (3) Under what circumstances should DDW be used? Finally, a brief overview of possible countermeasures against DDW is provided as well as an outline of an effective information system security program that would provide a defense against DDW.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1236
立即代訂
下次再買

Geographic Location of a Computer Node Examining a Time-to-Location Algorithm and Multiple Autonomous System Networks

2025/07/22 出版

To determine the location of a computer on the Internet without resorting to outside information or databases would greatly increase the security abilities of the US Air Force and the Department of Defense. The geographic location of a computer node has been demonstrated on an autonomous system (AS) network, or a network with one system administration focal point. The work shows that a similar technique will work on networks comprised of a multiple AS network. A time-to-location algorithm can successfully resolve a geographic location of a computer node using only latency information from known sites and mathematically calculating the Euclidean distance to those sites from an unknown location on a single AS network. The time-to-location algorithm on a multiple AS network successfully resolves a geographic location 71.4% of the time. Packets are subject to arbitrary delays in the network; and inconsistencies in latency measurements are discovered when attempting to use a time-to location algorithm on a multiple AS network. To improve accuracy in a multiple AS network, a time-to-location algorithm needs to calculate the link bandwidth when attempting to geographically locate a computer node on a multiple AS network.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1420
立即代訂
下次再買
頁數6/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing