0406~0407_時報全書系
0406~0407_新天鵝堡4月

英文書 > 全部商品

Internet Computing: Technologies, Frameworks and Applications

Ingram 出版
2021/10/22 出版

Internet computing is an emerging concept in the field of information technology and computer engineering which is related to creating and providing on-demand access to various computing resources like networks, servers, etc. This book aims to elucidate novel techniques and applications of internet computing. It is a compilation of various topics that focus on diverse concepts of network architecture, software engineering, network security, etc. It will prove to be an excellent guide for students and professionals engaged in this field.

9 特價5872
立即代訂
下次再買

Introduction to Cryptography

Joey,Holland  著
Willford Press 出版
2021/10/22 出版

The practice and study of methods for secure communication in the presence of hostile third parties is known as cryptography. It consists of construction and analysis of protocols to prevent third parties from reading private messages. Some of the important aspects of cryptography are data integrity, data confidentiality, authentication and non-repudiation. There are several applications of this field of study such as digital currencies, military communications and electronic commerce. The field of cryptography consists of different areas of study like symmetric-key cryptography and public key cryptography. The sphere of study which seeks to detect insecurity or weakness in a cryptographic scheme is known as cryptanalysis. This book provides significant information of this discipline to help develop a good understanding of cryptography and related fields. Those in search of information to further their knowledge will be greatly assisted by this book. It will serve as a reference to a broad spectrum of readers.

9 特價5872
立即代訂
下次再買

Information Security Management

Fiona,Hobbs  著
Ingram 出版
2021/10/22 出版

Information security has gained significance over the last decade. It is playing a crucial role in designing algorithms and data bases which are implemented for international security applications. This book aims to bridge the gap between the researches and practices in this field. Some of the topics included in this book are intelligence information sharing, enterprise risk management, infrastructure protection, etc. This text will serve as a useful reference for students, professionals and researchers.

9 特價6075
立即代訂
下次再買

Computer and Information Security

Audrey,Coon  著
Ingram 出版
2021/10/22 出版

This comprehensive book provides a global overview of computer and information security. It offers an in-depth analysis of theories, technology and applications of this field. This book focuses on the emerging topic of security informatics. It brings forth some innovative research applications and rigorous case studies from around the globe under one umbrella. It includes contributions of renowned experts in the areas of cyber warfare and security, system security and data storage. This text will serve as a valuable reference to experts, IT engineers and interested readers.

9 特價6075
立即代訂
下次再買

Cyber Security in Business and Management

Ingram 出版
2021/10/22 出版

The security of digital databases has become increasingly important in the context of modern business set-ups today. There has been a lot of emphasis on innovating and improving cyber security systems for preventing theft or hacking of vital information and databases. This book includes concepts such as developing cyber security architecture and software, assessing various cyber threats, emerging trends in cyber security, etc. that tries to outline the current progress in this field. With state-of-the-art inputs by acclaimed experts of this field, this book targets students and professionals.

9 特價5872
立即代訂
下次再買

Applications of Cryptography and Network Security

Ingram 出版
2021/10/22 出版

Cryptography is the essential and efficient ingredient to the recipe of security solutions. With the arrival of new age communication systems and high speed networks in the future, cryptography will have a key role to play. This book talks about the crucial security challenges that the computing world is facing today and also discusses several techniques to fight against such attacks. The chapters in this book discuss various facets of cryptography and their applications. It will cater to the needs of researchers, engineers, graduates and PhD students working in this field. It will also be beneficial to teachers at universities and colleges as a reference.

9 特價6073
立即代訂
下次再買

Industrial Communications and Networks

Ingram 出版
2021/10/22 出版

Wireless communications are the primary means of industrial communications. They facilitate faster and accurate communication as well as transfer of data for varied purposes. The ever growing need of advanced technology is the reason that has fueled the research in this field in recent times. This book brings forth some of the most innovative concepts and elucidates the unexplored aspects of industrial communications and networks. It is appropriate for students seeking detailed information in this area as well as for experts. In this book, using case studies and examples, constant effort has been made to make the understanding of the difficult concepts of industrial communications as easy and informative as possible, for the readers.

9 特價5384
立即代訂
下次再買

Information Security: Principles and New Concepts (Volume III)

Fiona,Hobbs  著
Ingram 出版
2021/10/22 出版

This is the era of information. We can read up about everything on the internet. The data is freely available, thus the important data needs to be secured. Hence, the need for information security has risen in the past few years. This book includes specialised researches on topics related to information security, along with new concepts and theories in this field.

9 特價6073
立即代訂
下次再買

Artificial Neural Networks: Advanced Principles

Ingram 出版
2021/10/22 出版

Artificial neural networks refer to the computing systems inspired by biological neural networks. They are based on nodes or artificial neurons, which are a replica of biological neurons found in the brain of animals. This enables them to learn and thereby perform tasks by considering examples. The use of artificial neural networks is vast as they are applied in varied fields like medical diagnosis, speech recognition, computer vision, machine translation, etc. Some common variants include convolutional neural networks, deep stacking networks, deep belief networks, deep predictive coding networks, etc. The theoretical properties of artificial neural networks are capacity, generalization and statistics, computational power, convergence, etc. This book is a valuable compilation of topics, ranging from the basic to the most complex advancements in the field of artificial neural networks. The book attempts to assist those with a goal of delving into this field. The various studies that are constantly contributing towards advancing technologies and evolution of this field are examined in detail.

9 特價5913
立即代訂
下次再買

Data Security and Cryptography

Gina,Simpson  著
Ingram 出版
2021/10/22 出版

Data security is the practice of protecting digital data from unauthorized access and unwanted actions such as cyberattack or data breach. Various technologies are used for ensuring data security. These include disk encryption, software-based security, hardware-based security, data masking, backups and data erasure. Securing communication in the presence of third parties is under the domain of cryptography. Diverse aspects of data confidentiality, integrity, non-repudiation and authentication are fundamental considerations of cryptography. The areas of study in cryptography include symmetric-key cryptography, public-key cryptography, cryptanalysis, cryptosystems, etc. This domain is crucial in the areas of electronic commerce, digital currencies, military communications and chip-based payment cards. This book contains some path-breaking studies in the field of data security and cryptography. It elucidates the concepts and innovative models around prospective developments with respect to these fields. It is a complete source of knowledge on the present status of these important fields.

9 特價6075
立即代訂
下次再買

Handbook of Computer Networks and Communications: Volume I

Akira,Hanako  著
Ingram 出版
2021/10/22 出版

Computer networks and communications are the future of our existence. Even today, they are deeply integrated into our lives. The objective of the book is to give a general view of the different areas of computer networks, and its applications. This book is meant for students who are looking for an elaborated written script on computer networks and communication. The listed topics cover the advanced concepts of computer networks, ad-hoc networks, protocols, key issues regarding establishment of networks, data control, etc. The chapters in this book are written by experts, and this book also contains practical examples to illustrate the concept of communication.

9 特價6073
立即代訂
下次再買

Handbook of Computer Networks and Communications: Volume II

Akira,Hanako  著
Ingram 出版
2021/10/22 出版

Computer networks and communications are the future of our existence. Even today, they are deeply integrated into our lives. The objective of the book is to give a general view of the different areas of computer networks, and its applications. This book is meant for students who are looking for an elaborated written script on computer networks and communication. The listed topics cover the advanced concepts of computer networks, ad-hoc networks, protocols, key issues regarding establishment of networks, data control, etc. The chapters in this book are written by experts, and this book also contains practical examples to illustrate the concept of communication.

9 特價6073
立即代訂
下次再買

Integrated Research in Steganography

Audrey,Coon  著
Ingram 出版
2021/10/22 出版

Steganography involves the art of concealing one message or data file within another. Stenographic technologies form an essential part of the future of internet privacy and security. This book emphasizes a novel field of study in steganography. They are the underlying science and art of communicating which keep the existence of the communication hidden. This book provides a broad overview of this technology by introducing distinct and latest concepts of steganography and steganalysis. The book also briefly covers the history of steganography and evaluates steganalysis methods considering their modeling techniques. It also presents some new steganography techniques for hiding secret data in images. The book also analyzes steganography in speeches and presents a new approach for concealing data in speeches.

9 特價3035
立即代訂
下次再買

Supervised Machine Learning for Text Analysis in R

Ingram 出版
2021/10/22 出版

This book is designed to provide practical guidance and directly applicable knowledge for data scientists and analysts who want to integrate text into their modeling pipelines. We assume that the reader is somewhat familiar with R, predictive modeling concepts for non-text data, and the tidyverse family of packages.

9 特價3809
立即代訂
下次再買

Guia Para Iniciantes Em Hacking de Computadores

Tektime  著
Ingram 出版
2021/10/21 出版

Este livro ensinar獺 como voc礙 pode se proteger dos ataques mais comuns de hackers, sabendo como os hackings realmente funcionam! Afinal, para evitar que seu sistema seja comprometido, voc礙 precisa ficar um passo ? frente de qualquer hacker criminoso. Voc礙 pode fazer isso aprendendo como hackear e como fazer um contra-hack. Neste livro, existem t矇cnicas e ferramentas usadas por hackers tanto criminais quanto 矇ticos - tudo o que voc礙 encontrar獺 aqui mostrar獺 como a seguran癟a das informa癟繭es pode ser comprometida, e como voc礙 pode identificar um ataque em um sistema que voc礙 est獺 tentando proteger . Ao mesmo tempo, voc礙 tamb矇m aprender獺 como minimizar qualquer dano em seu sistema ou interromper um ataque em andamento. Com o Hacking: Guia para Iniciantes em Hacking de computadores ..., voc礙 aprender獺 tudo o que precisa saber para entrar no mundo secreto dos hackers de computadores. Ele fornece uma vis瓊o geral completa de hackers, crackers e seus efeitos no mundo. Voc礙 aprender獺 sobre os pr矇-requisitos para hackers, os v獺rios tipos de hackers e os v獺rios tipos de ataques de hacking: - Ataques Ativos - Ataques Mascarados - Ataques De Repeti癟瓊o Modifica癟瓊o De Mensagens T矇cnicas De Falsifica癟瓊o - Hacking Wifi - Ferramentas De Hacking - Hacking Seu Primeiro Hacker Ataques Passivos Download Hacking: Guia Para Iniciantes Em Hacking De Computadores Como Hackear Redes Sem Fio, Seguran癟a B獺sica E Testes De Penetra癟瓊o, Kali Linux, Seu Primeiro Hack Imediatamente - Esta Incr穩vel Nova Edi癟瓊o Coloca Uma Vasta Riqueza De Conhecimentos ? Sua Disposi癟瓊o. Voc礙 aprender獺 como hackear uma senha de e-mail, t矇cnicas de spoofing, hacking WiFi e dicas para hackers 矇ticos. Voc礙 at矇 aprender獺 como fazer seu primeiro hack. Role Para Cima E Comece A Desfrutar Deste Neg籀cio Incr穩vel Instantaneamente

9 特價607
立即代訂
下次再買

The Cybersecurity Self-Help Guide

Arun,Soni  著
CRC Press 出版
2021/10/20 出版

This book is an up-to-date self-help guide on Cybersecurity for everyone who connects to the Internet and uses technology. It is an effort to spread awareness about Cybersecurity by explaining techniques and methods to be implemented practically by readers.

9 特價3287
立即代訂
下次再買

The the Cybersecurity Self-Help Guide

Arun,Soni  著
CRC Press 出版
2021/10/20 出版

This book is an up-to-date self-help guide on Cybersecurity for everyone who connects to the Internet and uses technology. It is an effort to spread awareness about Cybersecurity by explaining techniques and methods to be implemented practically by readers.

9 特價8352
立即代訂
下次再買

Partially Homomorphic Encryption

Springer 出版
2021/10/19 出版

Introduction.- Mathematical Background.- Rivest-Shamir-Adleman Algorithm.- Goldwasser-Micali Algorithm.- ElGamal Algorithm.- Benaloh Algorithm.- Naccache-Stern Algorithm.- Okamoto-Uchiyama Algorithm.- Paillier Algorithm.- Damg疇rd-Jurik Algorithm.- Boneh-Goh-Nissim Algorithm.- Sander-Young-Yung Algorithm.- Bibliography.- Index.

9 特價7307
立即代訂
下次再買

Cybersecurity Issues in Emerging Technologies

Ingram 出版
2021/10/19 出版

This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. . Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed.

9 特價5793
立即代訂
下次再買

Information Security and Cryptology

W,Yu  著
Springer 出版
2021/10/19 出版

This book constitutes the post-conference proceedings of the 17th International Conference on Information Security and Cryptology, Inscrypt 2021, in August 2021. Due the COVID-19, the conference was held onlineThe 28 full papers presented were carefully reviewed and selected from 81 submissions. The papers presents papers about research advances in all areas of information security, cryptology, and their applications.

9 特價5219
立即代訂
下次再買

The Ciso's Transformation

Raj,Badhwar  著
Springer 出版
2021/10/19 出版

The first section of this book addresses the evolution of CISO (chief information security officer) leadership, with the most mature CISOs combining strong business and technical leadership skills. CISOs can now add significant value when they possess an advanced understanding of cutting-edge security technologies to address the risks from the nearly universal operational dependence of enterprises on the cloud, the Internet, hybrid networks, and third-party technologies demonstrated in this book. In our new cyber threat-saturated world, CISOs have begun to show their market value. Wall Street is more likely to reward companies with good cybersecurity track records with higher stock valuations. To ensure that security is always a foremost concern in business decisions, CISOs should have a seat on corporate boards, and CISOs should be involved from beginning to end in the process of adopting enterprise technologies.The second and third sections of this book focus on building strong security teams, and exercising prudence in cybersecurity. CISOs can foster cultures of respect through careful consideration of the biases inherent in the socio-linguistic frameworks shaping our workplace language and through the cultivation of cyber exceptionalism. CISOs should leave no stone unturned in seeking out people with unique abilities, skills, and experience, and encourage career planning and development, in order to build and retain a strong talent pool. The lessons of the breach of physical security at the US Capitol, the hack back trend, and CISO legal liability stemming from network and data breaches all reveal the importance of good judgment and the necessity of taking proactive stances on preventative measures. This book will target security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs. Risk personnel, CROs, IT, security auditors and security researchers will also find this book useful.

9 特價3653
立即代訂
下次再買

Datenschutzanalyse, Folgenabsch瓣tzung und Gew瓣hrleistung eines besseren Datenschutzes f羹r definierte Gesch瓣ftsprozesse bei Nutzung von Cloud-Computing mittels homomorpher Kryptographie

Ingram 出版
2021/10/18 出版

Masterarbeit aus dem Jahr 2019 im Fachbereich Informatik - IT-Security, Note: 1,3, Fachhochschule Trier - Hochschule f羹r Wirtschaft, Technik und Gestaltung, Sprache: Deutsch, Abstract: Die vorliegende Masterarbeit besch瓣ftigt sich mit der Definition und Implementierung von Gesch瓣ftsprozessen, die 羹blicherweise auf der internen Unternehmensinfrastruktur ausgef羹hrt werden und im Zuge der voranschreitenden Digitalisierung auf Cloud-Services umgesetzt werden sollen. Durch die Nutzung von Cloud-Services entstehen viele datenschutzrechtliche Probleme. Es wird versucht werden, diese mittels homomorpher Kryptografie auszubessern und ein h繹heres Datenschutzniveau zu erlangen. Dazu wird im ersten Schritt eine ?bersicht aller relevanten Datenschutzregularien gegeben und eine Marktanalyse durchgef羹hrt, die aufzeigt, wie die meistgenutzten Cloud-Anbieter die Datenschutzregularien umsetzen. Darauffolgend werden vier Gesch瓣ftsprozesse definiert, Teile der internen Infrastruktur auf die Cloud-Infrastruktur umgestellt sowie eine Datenschutzanalyse und -Folgenabsch瓣tzung f羹r die abge瓣nderten Konzepte durchgef羹hrt. Um die daraus resultierenden Datenschutzprobleme auszubessern, werden Konzepte zur Nutzung von homomorpher Kryptografie beschrieben. Im letzten Schritt werden Anforderungen an die zu implementierenden Anwendungen definiert, die definierten Konzepte implementiert und eine ?berpr羹fung der implementierten Anwendungen durchgef羹hrt. Schlussendlich wird eine Diskussion der umgesetzten Gesch瓣ftsprozesse durchgef羹hrt, die aufzeigt welche Punkte verbesserungsw羹rdig sind und f羹r einen Produktivbetrieb umgesetzt werden m羹ssen. Als wichtiger Punkt wird diesbez羹glich das Schl羹sselmanagement angef羹hrt werden. Im Fazit wird deutlich werden, dass homomorphe Kryptografie durchaus das Potenzial hat datenschutzrechtliche Aspekte auszubessern, aber dennoch nur in begrenzten Situationen einsetzbar ist.

9 特價3379
立即代訂
下次再買

Blockchain

Ingram 出版
2021/10/18 出版

Blockchains are seen as a technology for the future, which reduce the cost of trust and revolutionize transactions between individuals, companies and governments. The sense of using blockchains is to minimize the probability of errors, successful frauds and paper-intensive processes. For these reasons, blockchains already have and will have a significant impact to the society and every day's life, especially in field of Machine to Machine (M2M) communications, which are one of the basic technologies for Internet of Things (IoT). Therefore, blockchains with their inherent property to provide security, privacy and decentralized operation are engine for todays and future reliable, autonomous and trusted IoT platforms. Specially, a disruptive role of ledger technologies in future smart personal mobility systems, which combine smart car industry, smart energy/smart cities will be explained in the book, considering its importance for development of new industrial and business models.

9 特價1915
立即代訂
下次再買

Performance Modeling and Analysis of Communication Networks

Ingram 出版
2021/10/15 出版

This textbook provides an introduction to common methods of performance modeling and analysis of communication systems. These methods form the basis of traffic engineering, teletraffic theory, and analytical system dimensioning. The fundamentals of probability theory, stochastic processes, Markov processes, and embedded Markov chains are presented. Basic queueing models are described with applications in communication networks. Advanced methods are presented that have been frequently used in recent practice, especially discrete-time analysis algorithms, or which go beyond classical performance measures such as Quality of Experience or energy efficiency. Recent examples of modern communication networks include Software Defined Networking and the Internet of Things. Throughout the book, illustrative examples are used to provide practical experience in performance modeling and analysis. Target group: The book is aimed at students and scientists in computer science and technical computer science, operations research, electrical engineering and economics.

9 特價4018
立即代訂
下次再買

Advances in Digital Forensics XVII

Springer 出版
2021/10/15 出版

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems.Advances in Digital Forensics XVII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the seventeenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of thirteen edited papers from the Seventeenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held virtually in the winter of 2021. Advances in Digital Forensics XVII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

9 特價7307
立即代訂
下次再買

Computer Security - ESORICS 2021

Springer 出版
2021/10/15 出版

The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021. The conference was originally planned to take place in Darmstadt, Germany, but changed to an online event due to the COVID-19 pandemic. The 71 full papers presented in this book were carefully reviewed and selected from 351 submissions. They were organized in topical sections as follows: Part I: network security; attacks; fuzzing; malware; user behavior and underground economy; blockchain; machine learning; automotive; anomaly detection; Part II: encryption; cryptography; privacy; differential privacy; zero knowledge; key exchange; multi-party computation.​

9 特價6263
立即代訂
下次再買

Digital Twin Technology

Ingram 出版
2021/10/14 出版

This book explores the latest developments and covers the significant challenges, issues, and advances in Digital Twin Technology. It will be an essential resource for anybody involved in related industries, as well as anybody interested in learning more about this nascent technology.

9 特價3339
立即代訂
下次再買

Pro Data Visualization Using R and JavaScript

Tom,Barker  著
Apress 出版
2021/10/14 出版

Use R 4, RStudio, Tidyverse, and Shiny to interrogate and analyze your data, and then use the D3 JavaScript library to format and display that data in an elegant, informative, and interactive way. You will learn how to gather data effectively, and also how to understand the philosophy and implementation of each type of chart, so as to be able to represent the results visually. With the popularity of the R language, the art and practice of creating data visualizations is no longer the preserve of mathematicians, statisticians, or cartographers. As technology leaders, we can gather metrics around what we do and use data visualizations to communicate that information. Pro Data Visualization Using R and JavaScript combines the power of the R language with the simplicity and familiarity of JavaScript to display clear and informative data visualizations. Gathering and analyzing empirical data is the key to truly understanding anything. We can track operational metrics to quantify the health of our products in production. We can track quality metrics of our projects, and even use our data to identify bad code. Visualizing this data allows anyone to read our analysis and easily get a deep understanding of the story the data tells. This book makes the R language approachable, and promotes the idea of data gathering and analysis mostly using web interfaces. What You Will Learn Carry out data visualization using R and JavaScript Use RStudio for data visualization Harness Tidyverse data pipelines Apply D3 and R Notebooks towards your data Work with the R Plumber API generator, Shiny, and more Who This Book Is For Programmers and data scientists/analysts who have some prior experience with R and JavaScript.

9 特價2223
立即代訂
下次再買

I-Mode Crash Course

John R,Vacca  著
Ingram 出版
2021/10/13 出版

i-mode is NYY SoCoMo's mobile Internet access system. It allows users to access email, weather, stock prices, message friends and buy airline tickets from their cellular phones. This book follows the Crash Course series format, provides everything a service provider needs to know to gauge the effect of i-mode on his or her business. It covers technology basics, business context and has a detailed analysis of the ley markets involved.

9 特價1436
立即代訂
下次再買

.Net Framework Programmer’s Reference

Dan,Rahmel  著
Ingram 出版
2021/10/13 出版

This guide provides developers with a complete overview of the .NET architecture. It contains definitions for all of the relevant classes in the .NET framework and includes an API quick-reference, which indexes the most used classes.

9 特價855
立即代訂
下次再買

Start!

Greg,Simsic  著
Ingram 出版
2021/10/13 出版

This volume provides beginners with practical hands-on advice and detailed steps to utilising the functions and capabilities of OS X to meet their needs.

9 特價752
立即代訂
下次再買

Accelerating Angular Development with Ivy

Packt 出版
2021/10/13 出版

Get a comprehensive introduction to the major Angular framework rewrite known as Angular IvyKey Features: Upgrade your Angular applications from traditional View Engine to modern Angular IvyGet a detailed walkthrough of the new features and breaking changes in AngularExplorer new Angular APIs, syntax, tooling, and configurations for modern frontend web developmentBook Description: Angular Ivy is the latest rendering engine and compiler introduced in Angular. Ivy helps frontend developers to make their Angular applications faster, better optimized, and more robust. This easy-to-follow guide will help you get to grips with the new features of Angular Ivy and show you how to migrate your Angular apps from View Engine to Ivy.You'll begin by learning about the most popular features of Angular Ivy with the help of simple stand-alone examples and realize its capabilities by working on a real-world application project. You'll then discover strategies to improve your developer workflow through new debugging APIs, testing APIs, and configurations that support higher code quality and productive development features. Throughout the book, you'll explore essential components of Angular, such as Angular Component Dev Kit (CDK), Ahead-of-time (AOT) compilation, and Angular command line interface (CLI). Finally, you'll gain a clear understanding of these components along with Angular Ivy which will help you update your Angular applications with modern features.By the end of this Angular Ivy book, you will learn about the core features of Angular Ivy, discover how to migrate your Angular View Engine application, and find out how to set up a high-quality Angular Ivy project.What You Will Learn: Find out why Angular Ivy tests are faster and more robustExplore the concept of CSS custom properties and scoping of values and learn how to use them with Angular IvyUse testing harnesses present in Angular components to write effective testsExplore the architecture of the Angular compatibility compiler and understand why it is importantDiscover effective techniques for migrating your existing Angular apps to the Ivy engineOvercome challenges that you might face when switching to AOT compilationWho this book is for: This book is for experienced Angular web developers who want to migrate to the latest Ivy engine for building faster web applications. Intermediate knowledge of Angular and TypeScript will help you get the most out of this book.

9 特價1513
立即代訂
下次再買

Create! Photoshop Elements 2

Greg,Simsic  著
Ingram 出版
2021/10/13 出版

This introductory guide aims to help the reader learn to perform all kinds of image editing tasks, including photo restoration, collage-making, overlaying images, and much more.

9 特價752
立即代訂
下次再買

Thomas' Telecom & Networking Dictionary

Ingram 出版
2021/10/13 出版

This reference for engineers involved in networking and communications is arranged alphabetically to cover major definitions including UNIX, LINUX, Novell, Microsoft and Solaris, all flavours of LAN and WAN, xDSL, voice over IP VPNs and Network Security.

9 特價752
立即代訂
下次再買

Wireless Internet Crash Course

Roman,Kikta  著
Ingram 出版
2021/10/13 出版

This text provides a crash course in the wireless Internet. WAP, SMS, i-mode, and Bluetooth are all compared and contrasted for their respective strengths and weaknesses, along with the existing and potential wireless markets. Other topics are mobile applications development languages and interoperability issues.

9 特價1436
立即代訂
下次再買

Networking A to Z

Ingram 出版
2021/10/13 出版

This volume covers the key concepts and technologies of Local Area Networking in 100 three- to five-page articles, heavily illustrated, covering the basic concepts, technologies, standards and protocols - everything you need to master the field in handy 5 x 8 format. From traditional data and management topics to cutting-edge wireless options, this aims to be a precise - and concise - reference to the industry.

9 特價1265
立即代訂
下次再買

Security without Obscurity

Ingram 出版
2021/10/13 出版

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security Without Obscurity books, to provide clear information and answers to the most commonly asked questions about information security solutions that use or rely on cryptography and key management methods.

9 特價2870
立即代訂
下次再買

Corporate Cybersecurity

John,Jackson  著
Ingram 出版
2021/10/13 出版

CORPORATE CYBERSECURITY An insider's guide showing companies how to spot and remedy vulnerabilities in their security programs A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs. This book addresses the technical aspect of tooling and managing a bug bounty program and discusses common issues that engineers may run into on a daily basis. The author includes information on the often-overlooked communication and follow-through approaches of effective management. Corporate Cybersecurity provides a much-needed resource on how companies identify and solve weaknesses in their security program. This important book: Contains a much-needed guide aimed at cyber and application security engineers Presents a unique defensive guide for understanding and resolving security vulnerabilities Encourages research, configuring, and managing programs from the corporate perspective Topics covered include bug bounty overview; program set-up; vulnerability reports and disclosure; development and application Security Collaboration; understanding safe harbor and SLA Written for professionals working in the application and cyber security arena, Corporate Cybersecurity offers a comprehensive resource for building and maintaining an effective bug bounty program.

9 特價5459
立即代訂
下次再買

Principles of Information Security

Liam,Lewis  著
Willford Press 出版
2021/10/12 出版

The practice of protecting information by eliminating or reducing information risks is termed as information security. It is an important constituent of information risk management. It is primarily concerned with the prevention or reduction of the probability of inappropriate access, disclosure, use, disruption, destruction, modification, and recording. The key concepts related to information security are confidentiality, integrity and availability. Confidentiality ensures that information is not disclosed to unauthorized individuals or entities. Maintaining the accuracy and completeness of data over its entire lifecycle is termed as data integrity. Availability of information involves making it available whenever it is needed. This book is compiled in such a manner, that it will provide in-depth knowledge about the theory and principles of information security. It unfolds the innovative aspects of this field which will be crucial for the holistic understanding of the subject matter. This book will serve as a valuable source of reference for those interested in this field.

9 特價6075
立即代訂
下次再買

Information and Software Technologies

Springer 出版
2021/10/11 出版

This book constitutes the refereed proceedings of the 27th International Conference on Information and Software Technologies, ICIST 2021, held in Kaunas, Lithuania, in October 2021.The 24 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions. The papers discuss such topics as ​business intelligence for information and software systems, intelligent methods for data analysis and computer aided software engineering, information technology applications, smart e-learning technologies and applications, language technologies.

9 特價4697
立即代訂
下次再買

Recent Advances in Cryptography and Network Security

Pinaki,Mitra  著
Ingram 出版
2021/10/11 出版

In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats.

9 特價5456
立即代訂
下次再買

Science of Cyber Security

Wenlian,Lu  著
Springer 出版
2021/10/11 出版

This book constitutes the proceedings of the Third International Conference on Science of Cyber Security, SciSec 2021, held in Shanghai, China, in August 2021.The 17 full papers and 5 short papers presented in this volume were carefully reviewed and selected from 50 submissions. These papers cover the following subjects: Cyber Security, Detection, Machine Learning and much more.

9 特價3653
立即代訂
下次再買

Privilege Escalation Techniques

Alexis,Ahmed  著
Packt 出版
2021/10/11 出版

Enumerate and exploit Linux or Windows systems and escalate your privileges to the highest levelKey Features: Discover a range of techniques to escalate privileges on Windows and Linux systemsUnderstand the key differences between Windows and Linux privilege escalationExplore unique exploitation challenges in each chapter provided in the form of pre-built VMsBook Description: Privilege escalation is a crucial step in the exploitation life cycle of a penetration tester. It helps penetration testers to set up persistence and facilitates lateral movement. This book is one of a kind, covering a range of privilege escalation techniques and tools for both Windows and Linux systems.The book uses virtual environments that you can download to test and run tools and techniques. Each chapter will feature an exploitation challenge in the form of pre-built virtual machines (VMs). As you progress, you will learn how to enumerate and exploit a target Linux or Windows system. This privilege escalation book then demonstrates how you can escalate your privileges to the highest level.By the end of this book, you will have gained the skills you need to be able to perform local kernel exploits, escalate privileges through vulnerabilities in services, maintain persistence, and enumerate information from the target such as passwords and password hashes.What You Will Learn: Understand the privilege escalation process and set up a pentesting labGain an initial foothold on the systemPerform local enumeration on target systemsExploit kernel vulnerabilities on Windows and Linux systemsPerform privilege escalation through password looting and finding stored credentialsGet to grips with performing impersonation attacksExploit Windows services such as the secondary logon handle service to escalate Windows privilegesEscalate Linux privileges by exploiting scheduled tasks and SUID binariesWho this book is for: This Windows and Linux privilege escalation book is for intermediate-level cybersecurity students and pentesters who are interested in learning how to perform various privilege escalation techniques on Windows and Linux systems, which includes exploiting bugs, design flaws, and more. An intermediate-level understanding of Windows and Linux systems along with fundamental cybersecurity knowledge is expected.

9 特價2523
立即代訂
下次再買

5G Simply In Depth

Ajit,Singh  著
Ingram 出版
2021/10/10 出版

● The fifth generation of wireless access technology (5G) is facing a daunting task of meeting constant demands for higher data rates and system capacity, as well as wide range of applications and users' quality of experience (QoE) requirements. Although not standardized yet, 5G technology is expected to offer significantly higher throughput than long-term evolution (LTE), have a latency in the low milliseconds and be able to accommodate and support the anticipated explosion in the Internet of Things (IoT) devices. New device types (e.g. probes, meters, sensors, actuators) will significantly contribute to traffic increase and new market sectors will bring new priorities (e.g. critical infrastructures). ● This book is a comprehensive overview of the present state of 5G. Explaining everything from the most likely use cases, spectrum aspects, and a wide range of technology options to potential 5G system architectures, it is an indispensable reference for academics and professionals involved in wireless and mobile communications. Global research efforts are summarised, and key component technologies including D2D, mm-wave communications, massive MIMO, coordinated multi-point, wireless network coding, interference management and spectrum issues are described and explained. The significance of 5G for the automotive, manufacturing, energy, retail and healtcare sectors is addressed, as is the relationship between IoT, machine type communications, and cyber-physical systems. ● This book equips you with a solid insight into the evolution, architecture, network stack protocol, application, and of corse the challenges and future scope and prospect of 5G. Featured With: ● 5G Architecture Design ● Machine Type Communication ● Small Cells for 5G Mobile Network ● Low-Power Networking ● 5G Radio Access Technologies ● Security in 5G Communication ● Applications and Use CasesOther Valuable Titles.... ■ Edge Computing ■ Fog Computing ■ Python Simply In Depth ■ Formal Language And Automata Theory ■ Virtual Reality ■ IoT Programming ■ Internet of Things

9 特價571
立即代訂
下次再買

Snowflake Security

Ben,Herzberg  著
Apress 出版
2021/10/09 出版

This book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of access control, and making the most of the security features in Snowflake. Snowflake is the fastest growing cloud data warehouse in the world, and having the right methodology to protect the data is important both to data engineers and security teams. It allows for faster data enablement for organizations, as well as reducing security risks, meeting compliance requirements, and solving data privacy challenges. There are currently tens of thousands of people who are either data engineers/data ops in Snowflake-using organizations, or security people in such organizations. This book provides guidance when you want to apply certain capabilities, such as data masking, row-level security, column-level security, tackling rolehierarchy, building monitoring dashboards, etc., to your organizations. What You Will Learn Implement security best practices for SnowflakeSet up user provisioning, MFA, OAuth, and SSOSet up a Snowflake security modelDesign roles architectureUse advanced access control such as row-based security and dynamic maskingAudit and monitor your Snowflake Data Cloud Who This Book Is For Data engineers, data privacy professionals, and security teams either with security knowledge (preferably some data security knowledge) or with data engineering knowledge; in other words, either "Snowflake people" or "data people" who want to get security right, or "security people" who want to make sure that Snowflake gets handled right in terms of security

9 特價1881
立即代訂
下次再買

Information, Communication and Computing Technology

Springer 出版
2021/10/08 出版

This book constitutes the refereed proceedings of the 6th International Conference on Information, Communication and Computing Technology, ICICCT 2021, held in New Delhi, India, in May 2021.The 16 full papers and 4 short paper presented in this volume were carefully reviewed and selected from 83 qualified submissions. The papers are organized in topical sections on communication and network systems; computational intelligence techniques.

9 特價4436
立即代訂
下次再買

Cyber Defense Mechanisms

Gautam,Kumar  著
Ingram 出版
2021/10/08 出版

This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.

9 特價3444
立即代訂
下次再買

Digital Twin Technology

Ingram 出版
2021/10/07 出版

This book explores the latest developments and covers the significant challenges, issues, and advances in Digital Twin Technology. It will be an essential resource for anybody involved in related industries, as well as anybody interested in learning more about this nascent technology.

9 特價7308
立即代訂
下次再買
頁數62/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing