0404~0405_CUPPY滿額贈
0404~0405_mamayo迷你磁力片

英文書 > 全部商品

Cybersecurity Risk Management

Wiley 出版
2021/11/23 出版

Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. The book also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack. With incisive insights into the Framework for Improving Cybersecurity of Critical Infrastructure produced by the United States National Institute of Standards and Technology (NIST), Cybersecurity Risk Management presents the gold standard in practical guidance for the implementation of risk management best practices. Filled with clear and easy-to-follow advice, this book also offers readers: A concise introduction to the principles of cybersecurity risk management and the steps necessary to manage digital risk to systems, assets, data, and capabilities A valuable exploration of modern tools that can improve an organization's network infrastructure protection A practical discussion of the challenges involved in detecting and responding to a cyberattack and the importance of continuous security monitoring A helpful examination of the recovery from cybersecurity incidents Perfect for undergraduate and graduate students studying cybersecurity, Cybersecurity Risk Management is also an ideal resource for IT professionals working in private sector and government organizations worldwide who are considering implementing, or who may be required to implement, the NIST Framework at their organization.

9 特價5184
立即代訂
下次再買

Google Cloud Certified Professional Cloud Network Engineer Guide

Packt 出版
2021/11/22 出版

Gain practical skills to design, deploy, and manage networks on Google Cloud and prepare to gain Professional Cloud Network Engineer certificationKey Features: Gain hands-on experience in implementing VPCs, hybrid connectivity, network services, and securityEstablish a secure network architecture by learning security best practicesLeverage this comprehensive guide to gain Professional Cloud Network Engineer certification Book Description: Google Cloud, the public cloud platform from Google, has a variety of networking options, which are instrumental in managing a networking architecture. This book will give you hands-on experience of implementing and securing networks in Google Cloud Platform (GCP).You will understand the basics of Google Cloud infrastructure and learn to design, plan, and prototype a network on GCP. After implementing a Virtual Private Cloud (VPC), you will configure network services and implement hybrid connectivity. Later, the book focuses on security, which forms an important aspect of a network. You will also get to grips with network security and learn to manage and monitor network operations in GCP. Finally, you will learn to optimize network resources and delve into advanced networking. The book also helps you to reinforce your knowledge with the help of mock tests featuring exam-like questions.By the end of this book, you will have gained a complete understanding of networking in Google Cloud and learned everything you need to pass the certification exam.What You Will Learn: Understand the fundamentals of Google Cloud architectureImplement and manage network architectures in Google Cloud PlatformGet up to speed with VPCs and configure VPC networks, subnets, and routersUnderstand the command line interface and GCP console for networkingGet to grips with logging and monitoring to troubleshoot network and securityUse the knowledge you gain to implement advanced networks on GCPWho this book is for: This Google Cloud certification book is for cloud network engineers, cloud architects, cloud engineers, administrators, and anyone who is looking to design, implement, and manage network architectures in Google Cloud Platform. You can use this book as a guide for passing the Professional Cloud Network Engineer certification exam. You need to have at least a year of experience in Google Cloud, basic enterprise-level network design experience, and a fundamental understanding of Cloud Shell to get started with this book.

9 特價2248
立即代訂
下次再買

The Beginner's Guide to Youtube Advertising

Ingram 出版
2021/11/22 出版

Are you currently seeking for ways to grow your business faster and bigger than you ever thought possible using a comprehensive guide on how to use social media marketing? Then this book is ideal for you!Perhaps you are having a difficult time understanding social media and growing the presence of your brand as the professionals do. Do not worry, this ultimate guide on SOCIAL MEDIA MARKETING, expecially on You Tube will help you do all that and more.Inside this book, you are going to learn how you can obtain exposure through advertising, earned media, and a lot of excellent strategies, which will make your business grow this year!The question for anybody who likes to acquire mass or connect with audiences across the world is no longer IF they must utilize social media, but HOW to take advantage of the various platforms while learning the proper strategy at the same time.Don't forget that marketing games keep evolving and transforming. Your business must remain on top of its game. Allow this book to give you the necessary tools to stay on top of modern social media marketing.Here's what you'll learn: - Marketing Strategies For Small Businesses- How To Build Your Personal Brand? - Benefits Of Creating A Personal Brand - Prioritizing The Top Platform For Your Brand - Different Types Of Marketing on YouTube- Why Do People Fail At Social Media Marketing? - Measuring Your Marketing SuccessAre you simply starting? Perhaps you are now ready for larger campaigns. Whatever the case, make sure you get this book today

9 特價820
立即代訂
下次再買

Human Mental Workload

Luca,Longo  著
Springer 出版
2021/11/22 出版

This book constitutes the refereed proceedings of the 5th International Symposium on Human Mental Workload: Models and Applications, H-WORKLOAD 2021, held virtually in November 2021.The volume presents 9 revised full papers, which were carefully reviewed and selected from 16 submissions. The papers are organized in two topical sections on models and applications.

9 特價3653
立即代訂
下次再買

Security and Privacy in Social Networks and Big Data

Limei,Lin  著
Springer 出版
2021/11/21 出版

This book constitutes revised and selected papers from the 7th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2021, held in Fuzhou, China, in November 2021.The 16 full papers presented in this volume were carefully reviewed and selected from a total of 41 submissions. Such themes as privacy protection, security of AI, mobile social networks, Big Data system, applied cryptography, and others are covered in the volume.The papers are organized in the following topical sections: ​Applied Cryptography for Big Data; Big Data System Security; Forensics in Social Networks and Big Data; Privacy Protection in Social Networks; Security and Privacy in Big Database; Security of AI; Trust and Reputations in Social Networks.

9 特價3653
立即代訂
下次再買

Protocols, Strands, and Logic

Springer 出版
2021/11/19 出版

This Festschrift was published in honor of Joshua Guttman on the occasion of his 66.66 birthday. The impact of his work is reflected in the 23 contributions enclosed in this volume. Joshua's most influential and enduring contribution to the field has been the development of the strand space formalism for analyzing cryptographic protocols. It is one of several "symbolic approaches" to security protocol analysis in which the underlying details of cryptographic primitives are abstracted away, allowing a focus on potential flaws in the communication patterns between participants. His attention to the underlying logic of strand spaces has also allowed him to merge domain-specific reasoning about protocols with general purpose, first-order logical theories. The identification of clear principles in a domain paves the way to automated reasoning, and Joshua has been a leader in the development and distribution of several tools for security analysis.

9 特價4175
立即代訂
下次再買

WebAssembly for Cloud

Apress 出版
2021/11/16 出版

Journey into the amazing world of WebAssembly (Wasm) and learn about how it can be applied on the cloud. This book is an introduction to Wasm aimed at professionals accustomed to working with cloud-related technologies such as Kubernetes and Istio service mesh. Author Shashank Jain begins with an introduction to Wasm and its related tooling such as wasm-bindgen and wapc. He then walks you through code examples using Rust, Golang, and JavaScript to demonstrate how they can be compiled to Wasm and consumed from Wasm runtimes deployed standalone, as well as on the cloud. You will see how a wasm module can be run through an http interface, and how Wasm fits into CNCF projects such as Kubernetes and Istio service mesh. After that, you'll learn how the polyglot nature of WebAssembly can be leveraged through examples written in languages like Rust and consumed via Golang and JavaScript, with a focus on how WebAssembly allows interoperability between them. You'll gain an understanding of how Wasm-based modules can be deployed inside Linux containers and orchestrated via Kubernetes, and how Wasm can be used within the Istio proxy to apply rules and filters. After reading this book, you'll have the knowledge necessary to apply WebAssembly to create multi tenanted workloads which can be polyglot in nature and can be deployed on cloud environments like Kubernetes. What You Will Learn Understand how Wasm can be used for server-side applicationsLearn about Wasm memory model and Wasm module layoutHow communication between host and Wasm module is facilitatedThe basics of Wasm sandboxing and securityThe fundamentals of tooling around Wasm, such as WAT and Wasm-packCreate a Wasm module in Rust and consume it from JavaScript, Rust and Golang.Grasp how Kubernetes can be used to orchestrate Wasm-based workloadsHow Wasm fits into service mesh Who Is This Book For Software developers/architects who are looking to hone their skills in virtualization and explore alternatives to Docker and container-based technologies for their workload deployments. Readers should have a basic programming background in languages such as Rust and Golang to get the most out of this book.

9 特價1881
立即代訂
下次再買

Search Analytics for Your Site

Ingram 出版
2021/11/16 出版

Any organization that has a searchable web site or intranet is sitting on top of hugely valuable and usually under-exploited data: logs that capture what users are searching for, how often each query was searched, and how many results each query retrieved. Search queries are gold: they are real data that show us exactly what users are searching for in their own words. This book shows you how to use search analytics to carry on a conversation with your customers: listen to and understand their needs, and improve your content, navigation and search performance to meet those needs.

9 特價2870
立即代訂
下次再買

Secure IT Systems

Springer 出版
2021/11/15 出版

This book constitutes the refereed proceedings of the 26th Nordic Conference on Secure IT Systems, NordSec 2021, which was held online during November 2021.The 11 full papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections named: Applied Cryptography, Security in Internet of Things, Machine Learning and Security, Network Security, and Trust.

9 特價3653
立即代訂
下次再買

High Performance Computing

Heike,Jagode  著
Springer 出版
2021/11/15 出版

This book constitutes the refereed post-conference proceedings of 9 workshops held at the 35th International ISC High Performance 2021 Conference, in Frankfurt, Germany, in June-July 2021: Second International Workshop on the Application of Machine Learning Techniques to Computational Fluid Dynamics and Solid Mechanics Simulations and Analysis; HPC-IODC: HPC I/O in the Data Center Workshop; Compiler-assisted Correctness Checking and Performance Optimization for HPC; Machine Learning on HPC Systems;4th International Workshop on Interoperability of Supercomputing and Cloud Technologies;2nd International Workshop on Monitoring and Operational Data Analytics;16th Workshop on Virtualization in High--Performance Cloud Computing; Deep Learning on Supercomputers; 5th International Workshop on In Situ Visualization. The 35 papers included in this volume were carefully reviewed and selected. They cover all aspects of research, development, and application of large-scale, high performance experimental and commercial systems. Topics include high-performance computing (HPC), computer architecture and hardware, programming models, system software, performance analysis and modeling, compiler analysis and optimization techniques, software sustainability, scientific applications, deep learning.Chapter "Machine-Learning-Based Control of Perturbed and Heated Channel Flows" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

9 特價5741
立即代訂
下次再買

The Next Generation Vehicular Networks, Modeling, Algorithm and Applications

Zhou,Su  著
Springer 出版
2021/11/15 出版

This book proposes the novel network envisions and framework design principles, in order to systematically expound the next generation vehicular networks, including the modelling, algorithms and practical applications. It focuses on the key enabling technologies to design the next generation vehicular networks with various vehicular services to realize the safe, convenient and comfortable driving. The next generation vehicular networks has emerged to provide services with a high quality of experience (QoE) to vehicles, where both better network maintainability and sustainability can be obtained than before.The framework design principles and related network architecture are also covered in this book. Then, the series of research topics are discussed including the reputation based content centric delivery, the contract based mobile edge caching, the Stackelberg game model based computation offloading, the auction game based secure computationoffloading, the bargain game based security protection and the deep learning based autonomous driving. Finally, the investigation, development and future works are also introduced for designing the next generation vehicular networks. The primary audience for this book are researchers, who work in computer science and electronic engineering. Professionals working in the field of mobile networks and communications, as well as engineers and technical staff who work on the development or the standard of computer networks will also find this book useful as a reference.

9 特價7307
立即代訂
下次再買

Dinosaurs On-Line

R L,Jones  著
Ingram 出版
2021/11/11 出版

Here is a book containing information about more than 500 Web sites about dinosaurs. Sites are rated for quality and cross-referenced by type, level of complexity, and availability of special features.

9 特價374
立即代訂
下次再買

Dinosaurs On-Line

R L,Jones  著
Ingram 出版
2021/11/11 出版

Here is a book containing information about more than 500 Web sites about dinosaurs. Sites are rated for quality and cross-referenced by type, level of complexity, and availability of special features.

9 特價921
立即代訂
下次再買

Artificial Intelligence in order to facilitate Diagnoses and Treatment. The Opportunity Smart Cities give Subjects

Sina,Kiene  著
Ingram 出版
2021/11/10 出版

Bachelor Thesis from the year 2020 in the subject Computer Sciences - Artificial Intelligence, grade: 1,3, University of Applied Sciences Hamburg, language: English, abstract: This bachelor thesis is based on the approach of providing nowadays society with solutions through the advancement of Artificial Intelligence in order to improve their quality of life. For the reason that the obstacles within the health sector are evolving in a negative sense a special focus within this concept is laid on Artificial Intelligence systems impact within the health sector of mental illnesses. Thus being said the structure of the thesis focuses on four key theories in the beginning which arise over and over within the thesis. These four key theories included: The Wave Approach by Toeffler, the definition of three identities, Neuroscience and Mental Illnesses (burn-out, depression and anxiety). Nevertheless, the thesis was examined in several other parts such as Artificial Intelligence and the technology behind it, the implementation of AI in smart cities, pattern recognition and monitoring in the health sector. By focusing on such areas, analysing and connecting them with past approaches the impact of the data was described and analysed. Thus being said the thesis approach was coming to the conclusion that through the implementation of Artificial Intelligence systems such as voice recognition systems and facial recognition systems the area of diagnosing mental illnesses and improving treatment as well as reaching for quicker response rate - in regards to emergencies - can be reached.

9 特價3067
立即代訂
下次再買

Spring Boot with React and Aws

Apress 出版
2021/11/10 出版

Create and deploy full-stack Spring Boot applications with React and AWS. This practical and authoritative guide teaches you the fundamentals of Amazon Web Services with no prior experience.You will start by learning the fundamentals of AWS, including EC2, S3, IAM, and load balancer. Next, you will learn to deploy a Spring Boot REST API to AWS with Elastic Beanstalk, which will give you the ability to build and deploy a Spring Boot application. You will explore the RDS relational database and create an instance of a MySQL database in AWS with RDS. You will then deploy a Spring Boot application to MySQL in AWS and deploy a full-stack Spring Boot React application to AWS using Elastic Beanstalk and S3. Lastly, you will be introduced to ELB, CloudWatch, and Route 53. By the end of this book you will understand full-stack Spring Boot React applications and their deployment. If you prefer "learning by coding" then Spring Boot with React and AWS is the bookfor you.What You'll LearnReview the fundamentals of Amazon Web ServicesInstall a Spring Boot REST API with CRUD operation to AWS using AWS Elastic BeanstalkDeploy a full-stack Spring Boot React application to AWS using AWS Elastic Beanstalk and S3Work with MySQL as a database in AWS using RDSUse Spring Boot with React and AWSWho This Book Is For Ideal for readers who have some programming experience with Java, Spring Boot, and React, and who now want to deploy a full-stack Spring Boot React application to AWS using AWS Elastic Beanstalk and S3.

9 特價1881
立即代訂
下次再買

Theory of Cryptography

Kobbi,Nissim  著
Springer 出版
2021/11/08 出版

The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.

9 特價6263
立即代訂
下次再買

Security and Privacy in Communication Networks

Springer 出版
2021/11/07 出版

This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

9 特價6263
立即代訂
下次再買

Theory of Cryptography

Kobbi,Nissim  著
Springer 出版
2021/11/05 出版

The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.

9 特價6263
立即代訂
下次再買

Theory of Cryptography

Kobbi,Nissim  著
Springer 出版
2021/11/05 出版

The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.

9 特價5741
立即代訂
下次再買

Information Security and Privacy

Springer 出版
2021/11/05 出版

This book constitutes the refereed proceedings of the 26th Australasian Conference on Information Security and Privacy, ACISP 2021, held in Perth, WA, Australia, in November 2021.The 35 full papers presented were carefully revised and selected from 157 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.

9 特價5741
立即代訂
下次再買

The Eradication of Humanity by Social Media

Lena,Ma  著
Ingram 出版
2021/11/02 出版

Everyone wants to be Internet famous, an influencer, a celebrity. But the means by which most people seek it these days are toxic.The Internet has afforded society many, many perks. The ability to reach out to someone across the globe in an instant is miraculous in some regards. Having access to a wealth of information, entertainment, sporting events, and the news is a way of life for millions of people. But there is a down side: social media.Social media sites and apps like TikTok, Instagram, Facebook, YouTube, and Twitch provide entertainment. That's how they're touted. But behind the scenes, when you take a deep dive into how and why they're utilized, you'll find the dumbing down of generations of people who crave the perceived fame and fortune without realizing what it is they're inviting into their lives.The Eradication of Humanity by Social Media examines the toxic culture of social media. It exposes the harsh realities of life for those who portray themselves as something they're not for likes, reposts, comments, brand partnerships, and the hard-earned money of those who can't stop scrolling and hope to, one day, be like them.Discover the hidden side of social media. See how it can destroy lives, invite problems, change the way we feel about ourselves, our lives, those around us, and so much more.If you've ever wondered if social media was dangerous or fake, this book provides those answers with detailed facts, examples, stories, and shows you how they link to many of the problems we see in the world today.

9 特價376
立即代訂
下次再買

Coaching Online

Kate,Anthony  著
Routledge 出版
2021/11/02 出版

Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilizes technological means of communication with clients, mentors, and everyone else associated with their practice.

9 特價2139
立即代訂
下次再買

Cyber Resilience A Global Challenge

Ingram 出版
2021/11/02 出版

The omnipresent threat of a cyber-attack is foremost in the minds of every cyber professional and owner of critical infrastructure. Moreover, the tools used by these cyber thieves and disruptors are becoming more sophisticated making our offensive and defensive tactics evermore challenging to keep current. Companies and public institutions must face the issue of recovering from these attacks but do not always know how. In compelling terms, Cyber Resilience: A Global Challenge provides an in-depth perspective on post-attack recovery, adaptation, and transformation, essential to anyone developing a strategic plan for cyber resilience. The book presents an international perspective on many of our world's most recent mega cyber-attacks and proposes a multi-criteria cyber resilience framework. The book is written for a wide audience including policy makers, executives, cyber security and information system professionals, defense, technology, health and financial sector managers, cyber researchers. It is also an academic resource for the training and development of all those concerned with the well-being and resilience of their organizational networks and infrastructure.

9 特價1696
立即代訂
下次再買

Security and Privacy

Springer 出版
2021/11/02 出版

This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: ​Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.

9 特價3653
立即代訂
下次再買

Decision and Game Theory for Security

Springer 出版
2021/11/02 出版

This book constitutes the refereed proceedings of the 12th International Conference on Decision and Game Theory for Security, GameSec 2021, held in October 2021. Due to COVID-19 pandemic the conference was held virtually. The 20 full papers presented were carefully reviewed and selected from 37 submissions. The papers focus on Theoretical Foundations in Equilibrium Computation; Machine Learning and Game Theory; Ransomware; Cyber-Physical Systems Security; Innovations in Attacks and Defenses.

9 特價4436
立即代訂
下次再買

Discrete Mathematics with Cryptographic Applications

Ingram 出版
2021/11/02 出版

No detailed description available for "Discrete Mathematics With Cryptographic Applications".

9 特價3043
立即代訂
下次再買

Jquery Recipes

Apress 出版
2021/10/31 出版

Quickly discover solutions to common problems, best practices you can follow, and everything jQuery has to offer. Using a problem-solution approach, this book begins with small initial problems that developers typically face while working with jQuery, and gradually goes deeper to explore more complex problems. The solutions include illustrations and clear, concise explanations of the code.You will learn to traverse and manipulate the DOM effectively, understand how to use arrays, iteration, the event model, and implement animation and visual effects. You'll explore how to use plugins and CSS. Using this book and jQuery, your web sites will be more dynamic and lively. This fully updated second edition teaches you modern jQuery techniques including how to traverse and manipulate the DOM, understand the event model, implement animation, and use sliding effects. jQuery Recipes, Second Edition shows you how to avoid wasting development time and solve problems you may face. It is an invaluable reference to keep by your side as you progress in your jQuery development. Start becoming a jQuery pro with jQuery Recipes today.What You'll LearnUnderstand the basics of jQuery and how this library worksLearn how to traverse and manipulate the DOM to your own requirementsExplore jQuery UI techniques including accordion, dialog, slider, date picker and autocompleteWork with popular plugins and CSS to customize and tailor your developmentWho This Book Is ForIdeal for novice or intermediate developers wishing to learn jQuery and have a handy jQuery reference by their side during their development.

9 特價2223
立即代訂
下次再買

Video Chatting for Seniors in Easy Steps

Nick,Vandome  著
Ingram 出版
2021/10/31 出版

In the digital world there is sometimes one event that can propel a technology to the forefront of the public's awareness. In the case of video chatting this has been the Covid-19 pandemic. Video chatting has been used, in one form or another, for many years, but it was not until the pandemic that it became an invaluable tool for millions of people around the world, for keeping in touch with family and friends. As with most forms of popular technology, there are a number of elements to consider to successfully engage with the video chatting revolution. These include: The different devices that can be used for video chatting. Getting connected for video chatting, both at home using Wi-Fi, and mobile connections for when you are out and about. Video-chatting apps that provide the means to communicate with family and friends. Video Chatting for Seniors in easy steps is the ideal companion to help you navigate the expanding world of video communication, covering the following areas: Finding the right equipment for successful video chatting. Following good etiquette so that your video chats go as smoothly as possible. Getting set up with your video-chatting apps. Undertaking video chats with individuals and groups. Using text chat to enhance the video-chatting experience. Making audio calls using video-chatting apps. A detailed look at the most popular video chatting apps: FaceTime; Facebook Messenger; Facebook Portal; Skype; and Zoom. Video chatting on a range of digital devices is very much here to stay and, with Video Chatting for Seniors in easy steps by your side, you will be able to fully embrace it and be communicating like an expert with sound and vision.

9 特價581
立即代訂
下次再買

PHP 8 Solutions

David,Powers  著
Apress 出版
2021/10/29 出版

Make your websites more dynamic by adding a feedback form, creating a private area where members can upload images that are automatically resized, or storing all your content in a database. David Powers has updated his definitive book to incorporate the latest techniques and changes to PHP with the arrival of PHP 8. New features include named attributes, constructor property promotion, the stricter and more concise match expression, union types, and more.​ The problem is, you're not a programmer and the thought of writing code sends a chill up your spine. Or maybe you've dabbled a bit in PHP and MySQL, but you can't get past baby steps. If this describes you, then you've just found the right book. PHP powers four out of every five websites that use a server-side language. In combination with the MySQL database it's ideal for creating dynamic websites. PHP and MySQL are free, easy to use, and provided by many web hosting companies in their standard packages. Thisbook also covers MariaDB, a seamless replacement for MySQL that has been adopted on many web servers. Unfortunately, most PHP books either expect you to be an expert already or force you to go through endless exercises of little practical value. In contrast, this book gives you real value right away through a series of practical examples that you can incorporate directly into your sites, optimizing performance and adding functionality such as file uploading, email feedback forms, image galleries, content management systems, and much more. Each solution is created with not only functionality in mind, but also visual design. But this book doesn't just provide a collection of ready-made scripts: each PHP solution builds on what's gone before, teaching you the basics of PHP and database design quickly and painlessly. You'll learn how to optimize your code using object-oriented programming (OOP) techniques. By the end of the book, you'll have the confidence to start writingyour own scripts or--if you prefer to leave that task to others--to adapt existing scripts to your own requirements. Right from the start, you're shown how easy it is to protect your sites by adopting secure coding practices. What You Will Learn Design and build dynamic PHP-based web sites and applications Get started right away through practical examples that you can reuseIncorporate PHP 8 elements including named attributes, constructor property promotion, and union typesUnderstand the subtle, but important differences between switch and matchWork with the latest PHP 8 techniques, innovations, and best practices Who This Book Is For Readers should ideally have some prior exposure to web development using PHP.

9 特價2394
立即代訂
下次再買

Natural Language Processing with AWS AI Services

Mona,M  著
Packt 出版
2021/10/29 出版

Work through interesting real-life business use cases to uncover valuable insights from unstructured text using AWS AI servicesKey Features: Get to grips with AWS AI services for NLP and find out how to use them to gain strategic insightsRun Python code to use Amazon Textract and Amazon Comprehend to accelerate business outcomesUnderstand how you can integrate human-in-the-loop for custom NLP use cases with Amazon A2I Book Description: Natural language processing (NLP) uses machine learning to extract information from unstructured data. This book will help you to move quickly from business questions to high-performance models in production.To start with, you'll understand the importance of NLP in today's business applications and learn the features of Amazon Comprehend and Amazon Textract to build NLP models using Python and Jupyter Notebooks. The book then shows you how to integrate AI in applications for accelerating business outcomes with just a few lines of code. Throughout the book, you'll cover use cases such as smart text search, setting up compliance and controls when processing confidential documents, real-time text analytics, and much more to understand various NLP scenarios. You'll deploy and monitor scalable NLP models in production for real-time and batch requirements. As you advance, you'll explore strategies for including humans in the loop for different purposes in a document processing workflow. Moreover, you'll learn best practices for auto-scaling your NLP inference for enterprise traffic.Whether you're new to ML or an experienced practitioner, by the end of this NLP book, you'll have the confidence to use AWS AI services to build powerful NLP applications.What You Will Learn: Automate various NLP workflows on AWS to accelerate business outcomesUse Amazon Textract for text, tables, and handwriting recognition from images and PDF filesGain insights from unstructured text in the form of sentiment analysis, topic modeling, and more using Amazon ComprehendSet up end-to-end document processing pipelines to understand the role of humans in the loopDevelop NLP-based intelligent search solutions with just a few lines of codeCreate both real-time and batch document processing pipelines using PythonWho this book is for: If you're an NLP developer or data scientist looking to get started with AWS AI services to implement various NLP scenarios quickly, this book is for you. It will show you how easy it is to integrate AI in applications with just a few lines of code. A basic understanding of machine learning (ML) concepts is necessary to understand the concepts covered. Experience with Jupyter notebooks and Python will be helpful.

9 特價2523
立即代訂
下次再買

Datafied Childhoods; Data Practices and Imaginaries in Children’s Lives

Steve,Jones  著
Ingram 出版
2021/10/29 出版

Datafied Childhoods examines the multiple ways in which datafication, algorithms, and artificial intelligence (AI) transform the contexts for children: at home, school, and in peer and parent-child relationships. The COVID-19 pandemic provides an important moment for reimagining how data are repurposed for the social good and best interests of children.

9 特價2468
立即代訂
下次再買

Information and Communication Technologies

Springer 出版
2021/10/29 出版

This book constitutes refereed proceedings of the 9th Conference on Information and Communication Technologies of Ecuador, TICEC 2021, held at the Universidad Polit矇cnica Salesiana (UPS) campus in November 2021. The conference was organized in hybrid mode.The 24 full papers were carefully reviewed and selected from 126 qualified submissions. The papers cover a great variety of topics, such as data mining, neural networks, cyberphysical systems, telemedicine, traffic simulation, geospatial information, human-machine interaction, cloud computing, and others. The contributions are divided into the following thematic blocks: ​Data Science, ICT織s Applications, Industry 4.0, Technology and Environment, Biomedical Sensors and Wearables Systems.

9 特價4697
立即代訂
下次再買

Datafied Childhoods; Data Practices and Imaginaries in Children’s Lives

Steve,Jones  著
Ingram 出版
2021/10/29 出版

Datafied Childhoods examines the multiple ways in which datafication, algorithms, and artificial intelligence (AI) transform the contexts for children: at home, school, and in peer and parent-child relationships. The COVID-19 pandemic provides an important moment for reimagining how data are repurposed for the social good and best interests of children.

9 特價6926
立即代訂
下次再買

Mastering Ansible - Fourth Edition

Packt 出版
2021/10/28 出版

Design, develop, and solve real-world automation and orchestration problems by unlocking Ansible's automation capabilitiesKey Features: Completely revised and updated for Ansible 4.0 and beyondTackle complex automation challenges with the newly added features in AnsibleLearn about the rapidly expanding field of network automation using Ansible, with the help of practical examples for configuring network devices Book Description: Ansible is a modern, YAML-based automation tool (built on top of Python, one of the world's most popular programming languages) with a massive and ever-growing user base. Its popularity and Python underpinnings make it essential learning for all in the DevOps space.This fourth edition of Mastering Ansible provides complete coverage of Ansible automation, from the design and architecture of the tool and basic automation with playbooks to writing and debugging your own Python-based extensions.You'll learn how to build automation workflows with Ansible's extensive built-in library of collections, modules, and plugins. You'll then look at extending the modules and plugins with Python-based code and even build your own collections - ultimately learning how to give back to the Ansible community.By the end of this Ansible book, you'll be confident in all aspects of Ansible automation, from the fundamentals of playbook design to getting under the hood and extending and adapting Ansible to solve new automation challenges.What You Will Learn: Gain an in-depth understanding of how Ansible works under the hoodGet to grips with Ansible collections and how they are changing and shaping the future of AnsibleFully automate the Ansible playbook executions with encrypted dataUse blocks to construct failure recovery or cleanupExplore the playbook debugger and Ansible consoleTroubleshoot unexpected behavior effectivelyWork with cloud infrastructure providers and container systemsWho this book is for: If you are an Ansible developer or operator who has a detailed understanding of its core elements and applications but are now looking to enhance your skills in applying automation using Ansible, this book is for you. Prior experience working with core system administration tasks on Linux and basic familiarity with concepts such as cloud computing, containers, network devices, and fundamentals of a high-level programming language will help you make the most of this book.

9 特價2018
立即代訂
下次再買

Winning The Game with UX Design and CRO

Ingram 出版
2021/10/28 出版

"If I had 1 hour to solve a problem [...] I would spend the first 55 minutes determining the proper question to ask, for once I know the proper question, I could solve the problem in less than 5 minutes." - Albert EinsteinIn Winning the Game with UX Design & CRO, Author and website design authority Alexander R疇dahl draws on years of experience in high-end website development to offer you time-tested methods that any website developer can use to optimize your website's user experience, in order to significantly improve conversion rate, click-through percentages and customer engagement metrics.In this invaluable user experience and CRO guide, you will learn 'real-world' tested methods that can be effectively applied around the globe by website designers, with any level of prior experience: How to build websites that convert at optimum levels using CRO and UI UX Design, in a perfect marriage of web design, target audience identification and engagementHow to use the 5 main principles that will maximize your website conversion rate: clarity, simplicity, credibility, urgency and social proof.Insider secrets about how CRO is used by tech giants like Uber, Airbnb, and Shopify... and how you can use the same approaches to exponentially expand your engagement.The Top 3 CRO strategies that top website designers use to stimulate sales and visibility - UX research and optimization, sales funnel analysis and A/B testing.The CRO tools that tech professionals use and how even beginning e-commerce business owners can use them to increase sales - Google Analytics, Google Search, Heap Analytics, Hotjar and more.Whether you want to start experimenting with an upgraded website design, or need some inspiration for your next project, Winning the Game with UX Design & CRO has something for everyone. Get ready to take your web designs to another level by implementing these simple changes!

9 特價1710
立即代訂
下次再買

Information Security Applications

Springer 出版
2021/10/28 出版

This book constitutes the revised selected papers from the 22nd International Conference on Information Security Applications, WISA 2021, which took place on Jeju Island, South Korea, during August 2021. The 23 papers included in this book were carefully reviewed and selected from 66 submissions. They were organized in topical sections as follows: machine learning security; cryptography; hardware security; and application security.

9 特價3653
立即代訂
下次再買

Provable and Practical Security

Qiong,Huang  著
Springer 出版
2021/10/28 出版

This book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in November 2021. The 21 full papers presented were carefully reviewed and selected from 67 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Searchable Encryption, Key Exchange & Zero Knowledge Proof, Post Quantum Cryptography, Functional Encryption, Digital Signature, and Practical Security Protocols.

9 特價4436
立即代訂
下次再買

Financial Cryptography and Data Security

Springer 出版
2021/10/26 出版

This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021.The 47 revised full papers and 4 short papers together with 3 as Systematization of Knowledge (SoK) papers were carefully selected and reviewed from 223 submissions. The accepted papers were organized according to their topics in 12 sessions: Smart Contracts, Anonymity and Privacy in Cryptocurrencies, Secure Multi-Party Computation, System and Application Security, Zero-Knowledge Proofs, Blockchain Protocols, Payment Channels, Mining, Scaling Blockchains, Authentication and Usability, Measurement, and Cryptography.

9 特價5219
立即代訂
下次再買

Financial Cryptography and Data Security

Springer 出版
2021/10/26 出版

This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021.The 47 revised full papers and 4 short papers together with 3 as Systematization of Knowledge (SoK) papers were carefully selected and reviewed from 223 submissions. The accepted papers were organized according to their topics in 12 sessions: Smart Contracts, Anonymity and Privacy in Cryptocurrencies, Secure Multi-Party Computation, System and Application Security, Zero-Knowledge Proofs, Blockchain Protocols, Payment Channels, Mining, Scaling Blockchains, Authentication and Usability, Measurement, and Cryptography.

9 特價6785
立即代訂
下次再買

The EU Data Protection Code of Conduct for Cloud Service Providers

Alan,Calder  著
Ingram 出版
2021/10/25 出版

The EU Data Protection Code of Conduct for Cloud Service Providers - A guide to complianceFormally founded in 2017, the EU Data Protection Code of Conduct for Cloud Service Providers (otherwise known as the EU Cloud Code of Conduct; the Code) is a voluntary code of conduct created specifically to support GDPR compliance within the B2B (business-to-business) Cloud industry. The EU Commission, the Article 29 Working Party (now the European Data Protection Board (EDPB)), the EU Directorate-General for Justice and Consumers, and Cloud-industry leaders have all contributed to its development, resulting in a robust framework that recognises the unique requirements of the Cloud industry.Cloud providers must ensure that their services - which by design involve accessing and transferring data across the Internet, exposing it to far greater risk than data stored and processed within an organisation's internal network - meet or exceed the GDPR's requirements in order to provide the security and privacy that the market expects. Organisations can achieve this via compliance to the EU Cloud Code of Conduct. The EU Cloud Code of Conduct has already been adopted by major Cloud service organisations, including: Microsoft;Oracle; Salesforce;IBM;Google Cloud;Dropbox; and Alibaba Cloud.Public and business focus on information security and data protection continues to increase in the face of a constantly changing threat landscape and ever-more stringent regulation, and compliance to initiatives such as the EU Cloud Code of Conduct demonstrates to current and potential customers that your organisation is taking data privacy seriously, as well as strengthens your organisation's overall approach to information security management, and defences against data breaches. The EU Data Protection Code of Conduct for Cloud Service Providers provides guidance on how to implement the Code within your organisation. It explores the objectives of the Code, and how compliance can be achieved with or without a pre-existing ISMS (information security management system) within the organisation. Begin your journey to EU Cloud Code of Conduct implementation with our guide to compliance - Buy this book today!

9 特價803
立即代訂
下次再買

Blockchain and IoT Integration

Kavita,Saini  著
Ingram 出版
2021/10/25 出版

The merger of Internet of Things (IoT) and blockchain technology is a step towards creating a verifiable, secure and permanent method of recording data processed by "smart" machines. This book explores the platforms and applications of blockchain-enabled IoT.

9 特價7308
立即代訂
下次再買

Networks and Communications Engineering

Ingram 出版
2021/10/22 出版

Communications engineering is the study of electrical and computer systems that improve telecommunications systems. This book on telecommunications engineering discusses topics related to the engineering and design of technology that optimizes and enhances networks and allows for data transfer at high speed. This book elucidates the concepts and innovative models around prospective developments with respect to communications engineering. Topics included herein delve into various applications of this field, as well as the rapid progress in technological innovations. Some of the diverse topics covered in this text address the varied branches that fall under this category. With state-of-the-art inputs by acclaimed experts of this field, this book targets students and professionals.

9 特價6075
立即代訂
下次再買

Information Security Management

Fiona,Hobbs  著
Ingram 出版
2021/10/22 出版

Information security has gained significance over the last decade. It is playing a crucial role in designing algorithms and data bases which are implemented for international security applications. This book aims to bridge the gap between the researches and practices in this field. Some of the topics included in this book are intelligence information sharing, enterprise risk management, infrastructure protection, etc. This text will serve as a useful reference for students, professionals and researchers.

9 特價6075
立即代訂
下次再買

Internet Computing: Technologies, Frameworks and Applications

Ingram 出版
2021/10/22 出版

Internet computing is an emerging concept in the field of information technology and computer engineering which is related to creating and providing on-demand access to various computing resources like networks, servers, etc. This book aims to elucidate novel techniques and applications of internet computing. It is a compilation of various topics that focus on diverse concepts of network architecture, software engineering, network security, etc. It will prove to be an excellent guide for students and professionals engaged in this field.

9 特價5872
立即代訂
下次再買

Introduction to Cryptography

Joey,Holland  著
Ingram 出版
2021/10/22 出版

The practice and study of methods for secure communication in the presence of hostile third parties is known as cryptography. It consists of construction and analysis of protocols to prevent third parties from reading private messages. Some of the important aspects of cryptography are data integrity, data confidentiality, authentication and non-repudiation. There are several applications of this field of study such as digital currencies, military communications and electronic commerce. The field of cryptography consists of different areas of study like symmetric-key cryptography and public key cryptography. The sphere of study which seeks to detect insecurity or weakness in a cryptographic scheme is known as cryptanalysis. This book provides significant information of this discipline to help develop a good understanding of cryptography and related fields. Those in search of information to further their knowledge will be greatly assisted by this book. It will serve as a reference to a broad spectrum of readers.

9 特價5872
立即代訂
下次再買

Computer Networking: An Innovative Approach

Henry,Martin  著
Ingram 出版
2021/10/22 出版

The digital communications network which facilitates the sharing of resources between nodes is termed as a telecommunication network. The process of sharing resources and data between two computers is called computer networking. The connections between them can be established using both cable media and wireless media. Some of the cable media which are used in computer networking are fiber-optic cables and twisted pair cables. A few of the other components of computer networks are generally classified on the basis of their bandwidth, network size, transmission medium and organizational intent. There are various applications and services which depend on computer networking such as World Wide Web, email, fax machines, shared use of printers, etc. This book provides comprehensive insights into the field of computer networking. It elucidates the concepts and innovative models around prospective developments with respect to this field. Coherent flow of topics, student-friendly language and extensive use of examples make this book an invaluable source of knowledge.

9 特價5911
立即代訂
下次再買

Artificial Neural Systems Handbook: Volume I

Ingram 出版
2021/10/22 出版

This book attempts to understand the intricacies of artificial neural systems and how they are relevant in our lives. The various projects that are constantly contributing towards advancing technologies and the evolution of this field are looked at in detail. The innovative concepts from across the globe in this field are glanced at and discussed. Those in search of information to further their knowledge of this field will be significantly assisted by this book.

9 特價6073
立即代訂
下次再買

Internet of Things

Ingram 出版
2021/10/22 出版

Internet has been a major economic tool of the modern times. The internet of things makes every object unique and identifiable which makes transfer of data easy. This book aims to provide advanced knowledge and concepts revolving around this area of study. The research works included in this book on Internet of Things are latest and bound to provide incredible insights to its readers.

9 特價6073
立即代訂
下次再買
頁數61/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing