0404~0405_CUPPY滿額贈
0404~0405_mamayo迷你磁力片

英文書 > 全部商品

The Security Hippie

Barak,Engel  著
Ingram 出版
2021/08/04 出版

In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field.

9 特價8352
立即代訂
下次再買

A quantum battery that never runs out

Blurb 出版
2021/08/04 出版

Are you tired of charging your smartphone everyday? Are you tired of using the regular generators and its maintenance cost? Are you still facing the problem in improper current supply? Do you worry about the peak electric bills? Here is the solution in the practical application of a QVF battery that helps you in getting rid of power problems. The QVF Battery was discovered by Ignulab Sicnarf as detailed down in this bestselling book. It is a simple and powerful battery that allows anyone to generate hundred percent free energy during day and night anywhere in the world. It works in submarine and in aeroplane using a weird source of energy. It is a step-by-step procedure that helps you to build the battery. You can power up any of your home appliance that is light and portable. This book is the culmination of two years of work that I have done to develop this new battery. I had never expected it would take anything like as long, but I have discovered vastly more than I ever thought possible, and in fact what I have done now touches almost every existing problem in energy. In the early years, I published some papers in the major scientific research journals which were well received but because they had become scattered, I resolved just to keep working quietly until I had finished, and was ready to present everything in a single coherent way. Two years later this book is the result. And with it my hope is to share what I have done with a wide range of scientists and non-scientists as possible. And now that I have finished building the intellectual structure that I describe in this book, it is my hope that those who read these words can share in the excitement I have had in making the discoveries that were involved.

9 特價3050
立即代訂
下次再買

The Security Hippie

Barak,Engel  著
Ingram 出版
2021/08/04 出版

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

9 特價2713
立即代訂
下次再買

Real-Time Twilio and Flybase

Apress 出版
2021/08/04 出版

Use Flybase and Twilio with Node.js to build real-time solutions and understand how real-time web technologies work. Written by the founder of Flybase, this book offers you practical solutions for communicating effectively with users on the modern web.Flybase.io is a web platform, used to store and retrieve data in real-time, as well as to send and receive real-time events such as triggers for incoming calls, incoming messages, agents logging off, etc. You will learn to send daily SMS messages, build an SMS call center to provide support to users, and build a call center to handle incoming and outgoing phone calls from the browser. You'll also build a group calling system to let groups send messages to each other: handy for managing events.Real-Time Twilio brings to light using the winning combination of Flybase and Twilio with Node.js for anyone with basic web development skills.What You'll LearnDevelop web apps with Flybase and TwilioBuild a live blogging tool and a group chat appCreate a click-to-call call center and a Salesforce-powered call centerSend daily SMS remindersDevelop a real-time call tracking dashboardWho This Book Is ForThose who want to learn to use Twilio and who wants to learn real-time development.

9 特價1539
立即代訂
下次再買

Angular Cookbook

Packt 出版
2021/08/03 出版

Discover actionable solutions to everyday problems in building applications with Angular and TypeScript, from app design to production deploymentKey Features: Explore recipes across core Angular topics to fill gaps in your knowledge of using Angular in productionDiscover industry best practices and tooling to enhance your development experience with AngularUnderstand advanced topics in Angular to help you become a proficient enterprise web developerBook Description: The Angular framework, powered by Google, is the framework of choice for many web development projects built across varying scales. It's known to provide much-needed stability and a rich tooling ecosystem for building production-ready web and mobile apps. This recipe-based guide enables you to learn Angular concepts in depth using a step-by-step approach. You'll explore a wide range of recipes across key tasks in web development that will help you build high-performance apps.The book starts by taking you through core Angular concepts such as Angular components, directives, and services to get you ready for building frontend web apps. You'll develop web components with Angular and go on to cover advanced concepts such as dynamic components loading and state management with NgRx for achieving real-time performance. Later chapters will focus on recipes for effectively testing your Angular apps to make them fail-safe, before progressing to techniques for optimizing your app's performance. Finally, you'll create Progressive Web Apps (PWA) with Angular to provide an intuitive experience for users.By the end of this Angular book, you'll be able to create full-fledged, professional-looking Angular apps and have the skills you need for frontend development, which are crucial for an enterprise Angular developer.What You Will Learn: Gain a better understanding of how components, services, and directives work in AngularUnderstand how to create Progressive Web Apps using Angular from scratchBuild rich animations and add them to your Angular appsManage your app's data reactivity using RxJSImplement state management for your Angular apps with NgRxOptimize the performance of your new and existing web appsWrite fail-safe unit tests and end-to-end tests for your web apps using Jest and CypressGet familiar with Angular CDK components for designing effective Angular componentsWho this book is for: The book is for intermediate-level Angular web developers looking for actionable solutions to common problems in Angular enterprise development. Mobile developers using Angular technologies will also find this book useful. Working experience with JavaScript and TypeScript is necessary to understand the topics covered in this book more effectively.

9 特價1789
立即代訂
下次再買

Building Enterprise Iot Applications

Ingram 出版
2021/08/03 出版

This book covers all aspects of Internet of Things (IoT) software development from startup, industry and academic perspectives with the ultimate goal of empowering readers to create state-of-the-art IoT applications. The cases presented in the book encourage readers to create innovative blue ocean software products.

9 特價3548
立即代訂
下次再買

Security and Auditing of Smart Devices

Sajay,Rai  著
Ingram 出版
2021/08/03 出版

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the IT organization but for the IT auditors as well. This book will serve as a guide to IT and Audit professionals on how to manage, secure and audit smart device. It provides guidance on the handling of corporate devices and the Bring Your Own Devices (BYOD) smart devices.

9 特價3026
立即代訂
下次再買

Cognitive Hack

James,Bone  著
Ingram 出版
2021/08/03 出版

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and identify patterns in the data on breaches. This analysis will assist security professionals not only in benchmarking their risk management programs but also in identifying forward looking security measures to narrow the path of future vulnerabilities.

9 特價3026
立即代訂
下次再買

Learn Clip Studio Paint - Third Edition

Packt 出版
2021/08/03 出版

Discover the tools to tell your own manga story with Clip Studio Paint and develop your digital drawing skillsKey FeaturesA helpful guide to gain a clear understanding of Clip Studio Paint and create your own manga stories with key images printed in colorLearn to put CSP into practice by implementing it in real-world drawing scenariosDiscover how to apply digital drawing techniques to your creation using CSPBook DescriptionClip Studio Paint is a versatile digital painting program for creating manga and illustrations, helping artists expand their digital portfolio. This software is packed with tools that make panel laying, speech adding, toning, and editing much easier. This easy-to-follow guide is clearly divided into chapters covering drawing tools, interface customization, and using various visual effects so you can focus on specific techniques in detail one at a time.Learn Clip Studio Paint is a comprehensive introduction for those who are new to Clip Studio Paint that will have you up to speed in no time. You'll start by experiencing what it's like to create manga digitally and find new ways to shape your drawing. Next, using practical tips and rich visual references, the book shows you how to apply techniques to your creations, giving you the opportunity to expand your range of visual expression. As you advance, you'll explore how to create special effect brushes using an in-depth example, along with discovering how to color, blend, and edit your art digitally. Finally, you'll find out how to print, use the Clip Studio Paint Assets, and learn how to create unique and inspiring art that stands out from the rest.By the end of this Clip Studio Paint book, you'll have gained a clear understanding of its tools and be able to start telling your own manga story using your improved digital drawing skills.What you will learnExplore Clip Studio Paint and create your own manga storiesFamiliarize yourself with the CSP ecosystemUse Clip Studio Paint Pro's inking tools and find ways to customize your artExplore the flexibility of the brush engine in Clip Studio Paint ProUse palettes to generate colors between foreground and background colorsFind out alternative ways of coloring your manga art using black, white, and greyDiscover how to use layer blending to add textures to your imagesWho this book is forIf you're just starting out as a digital artist or want to switch to Clip Studio Paint from a different graphics software package, then this book is for you. Those with no prior knowledge of digital art or intermediate-level users looking to explore the unique features of Clip Studio Paint will also find this book useful.Table of ContentsImage Gallery of Manga and Illustrations Created by Clip Studio PaintInstalling Clip Studio Paint Pro and Interface BasicsPages and Panels to Shape MangaIntroducing Clip Studio Paint BrushesPenciling: Layer and Layer Property PalettesErasers, Selections, and the Sub View PaletteUsing Text and Balloon ToolsGetting Started with Inking ToolsInking Special EffectsVector Layers and the Material PaletteCreating Your Own Sound EffectsMaking Layer Masks and ScreentonesAll About RulersUsing 3D Figures and ObjectsColor PaletteUsing Clip Studio Paint to Color Your MangaAuto Actions and Your WorkflowExploring the Clip Studio Assets and AnimationExporting, Printing and Uploading Your MangaFinding Your Own Manga Look

9 特價2753
立即代訂
下次再買

The Insider Threat

Ingram 出版
2021/08/03 出版

This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. The book guides readers to a greater depth of understanding and action-oriented options.

9 特價3131
立即代訂
下次再買

Open Source Intelligence and Cyber Crime

Springer 出版
2021/08/02 出版

This book shows how open source intelligence can be a powerful tool for combating crime by linking local and global patterns to help understand how criminal activities are connected. Readers will encounter the latest advances in cutting-edge data mining, machine learning and predictive analytics combined with natural language processing and social network analysis to detect, disrupt, and neutralize cyber and physical threats. Chapters contain state-of-the-art social media analytics and open source intelligence research trends. This multidisciplinary volume will appeal to students, researchers, and professionals working in the fields of open source intelligence, cyber crime and social network analytics. Chapter Automated Text Analysis for Intelligence Purposes: A Psychological Operations Case Study is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

9 特價4697
立即代訂
下次再買

Efficient Integration of 5g and Beyond Heterogeneous Networks

Zi-Yang,Wu  著
Springer 出版
2021/07/31 出版

This book discusses the smooth integration of optical and RF networks in 5G and beyond (5G+) heterogeneous networks (HetNets), covering both planning and operational aspects. The integration of high-frequency air interfaces into 5G+ wireless networks can relieve the congested radio frequency (RF) bands. Visible light communication (VLC) is now emerging as a promising candidate for future generations of HetNets. Heterogeneous RF-optical networks combine the high throughput of visible light and the high reliability of RF. However, when implementing these HetNets in mobile scenarios, several challenges arise from both planning and operational perspectives. Since the mmWave, terahertz, and visible light bands share similar wave propagation characteristics, the concepts presented here can be broadly applied in all such bands.To facilitate the planning of RF-optical HetNets, the authors present an algorithm that specifies the joint optimal densities of the base stations by drawing on stochastic geometry in order to satisfy the users' quality-of-service (QoS) demands with minimum network power consumption. From an operational perspective, the book explores vertical handovers and multi-homing using a cooperative framework. For vertical handovers, it employs a data-driven approach based on deep neural networks to predict abrupt optical outages; and, on the basis of this prediction, proposes a reinforcement learning strategy that ensures minimal network latency during handovers. In terms of multi-homing support, the authors examine the aggregation of the resources from both optical and RF networks, adopting a two-timescale multi-agent reinforcement learning strategy for optimal power allocation. Presenting comprehensive planning and operational strategies, the book allows readers to gain an in-depth grasp of how to integrate future coexisting networks at high-frequency bands in a cooperative manner, yielding reliable and high-speed 5G+ HetNets.

9 特價2870
立即代訂
下次再買

Mastering Transformers

Packt 出版
2021/07/30 出版

Take a problem-solving approach to learning all about transformers and get up and running in no time by implementing methodologies that will build the future of NLPKey Features: - Explore quick prototyping with up-to-date Python libraries to create effective solutions to industrial problems- Solve advanced NLP problems such as named-entity recognition, information extraction, language generation, and conversational AI- Monitor your model's performance with the help of BertViz, exBERT, and TensorBoardBook Description: Transformer-based language models have dominated natural language processing (NLP) studies and have now become a new paradigm. With this book, you'll learn how to build various transformer-based NLP applications using the Python Transformers library.The book gives you an introduction to Transformers by showing you how to write your first hello-world program. You'll then learn how a tokenizer works and how to train your own tokenizer. As you advance, you'll explore the architecture of autoencoding models, such as BERT, and autoregressive models, such as GPT. You'll see how to train and fine-tune models for a variety of natural language understanding (NLU) and natural language generation (NLG) problems, including text classification, token classification, and text representation. This book also helps you to learn efficient models for challenging problems, such as long-context NLP tasks with limited computational capacity. You'll also work with multilingual and cross-lingual problems, optimize models by monitoring their performance, and discover how to deconstruct these models for interpretability and explainability. Finally, you'll be able to deploy your transformer models in a production environment.By the end of this NLP book, you'll have learned how to use Transformers to solve advanced NLP problems using advanced models.What You Will Learn: - Explore state-of-the-art NLP solutions with the Transformers library- Train a language model in any language with any transformer architecture- Fine-tune a pre-trained language model to perform several downstream tasks- Select the right framework for the training, evaluation, and production of an end-to-end solution- Get hands-on experience in using TensorBoard and Weights & Biases- Visualize the internal representation of transformer models for interpretabilityWho this book is for: This book is for deep learning researchers, hands-on NLP practitioners, as well as ML/NLP educators and students who want to start their journey with Transformers. Beginner-level machine learning knowledge and a good command of Python will help you get the best out of this book.Table of Contents- From Bag-of-Words to the Transformers- A Hands-On Introduction to the Subject- Autoencoding Language Models- Autoregressive and Other Language Models- Fine-Tuning Language Models for Text Classification- Fine-Tuning Language Models for Token Classification- Text Representation- Working with Efficient Transformers- Cross-Lingual and Multilingual Language Modeling- Serving Transformer Models- Attention Visualization and Experiment Tracking

9 特價2523
立即代訂
下次再買

Telecom Extreme Transformation

Ingram 出版
2021/07/30 出版

The next wave of telecommunication and service provider transformations will be very different, we call it extreme transformation, in that the communication service providers (CSP) have to become a Digital Service Provider (DSP) to stay relevant. The extreme transformation from a CSP to a DSP status is what is covered in this book.

9 特價4958
立即代訂
下次再買

A Vulnerable System

Ingram 出版
2021/07/30 出版

As threats to the security of information pervade the fabric of everyday life, A Vulnerable System describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are increasingly at risk.Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed.A Vulnerable System delivers a long view of the history of information security, beginning with the creation of the first digital computers during the Cold War. From the key institutions of the so-called military industrial complex in the 1950s to Silicon Valley start-ups in the 2020s, the relentless pursuit of new technologies has come at great cost. The absence of knowledge regarding the history of information security has caused the lessons of the past to be forsaken for the novelty of the present, and has led us to be collectively unable to meet the needs of the current day. From the very beginning of the information age, claims of secure systems have been crushed by practical reality.The myriad risks to technology, Stewart reveals, cannot be addressed without first understanding how we arrived at this moment. A Vulnerable System is an enlightening and sobering history of a topic that affects crucial aspects of our lives.

9 特價1195
立即代訂
下次再買

Dad's Secret Password Book

Lulu.com 出版
2021/07/29 出版

A special gift for Dad! A perfect logbook for storing your internet usernames and passwords. This handy book is easy to use for remembering, protecting, and keeping your valuable information safe and secure. Contains 130 pages dedicated for password entries, with website URL, username and password sections, clearly laid out with ample space, and an additional notes section at the end for further information that you need to save such as memorable questions and pins. The pages are alphabetised so you can easily find your passwords.

9 特價587
立即代訂
下次再買

Mum's Secret Password Book

Lulu.com 出版
2021/07/29 出版

A special gift for Mum! A perfect logbook for storing your internet usernames and passwords. This handy book is easy to use for remembering, protecting, and keeping your valuable information safe and secure. Contains 130 pages dedicated for password entries, with website URL, username and password sections, clearly laid out with ample space, and an additional notes section at the end for further information that you need to save such as memorable questions and pins. The pages are alphabetised so you can easily find your passwords.

9 特價587
立即代訂
下次再買

Instagram Marketing

Jason,Lazar  著
Ingram 出版
2021/07/27 出版

INSTAGRAM MARKETINGInstagram has a simple and user-friendly interface that makes it accessible for just about everyone. It is not just a platform for sharing photos and videos with your friends and family anymore. Every business with an up-to-date marketing strategy now has an online presence on Instagram.Inside, you will learn about a variety of marketing strategies and will gain access to a lot of tips that will help you leverage Instagram in the best way possible.Once you are finished reading this simple guide, you will know exactly what steps to take to begin marketing your business on Instagram successfully!

9 特價855
立即代訂
下次再買

Grandad’s Secret Password Book

Lulu.com 出版
2021/07/26 出版

A special gift for Grandad! A perfect logbook for storing your internet usernames and passwords. This handy book is easy to use for remembering, protecting, and keeping your valuable information safe and secure. Contains 130 pages dedicated for password entries, with website URL, username and password sections, clearly laid out with ample space, and an additional notes section at the end for further information that you need to save such as memorable questions and pins. The pages are alphabetised so you can easily find your passwords.

9 特價587
立即代訂
下次再買

Nan's Secret Password Book

Lulu.com 出版
2021/07/26 出版

A special gift for Nan! A perfect logbook for storing your internet usernames and passwords. This handy book is easy to use for remembering, protecting, and keeping your valuable information safe and secure. Contains 130 pages dedicated for password entries, with website URL, username and password sections, clearly laid out with ample space, and an additional notes section at the end for further information that you need to save such as memorable questions and pins. The pages are alphabetised so you can easily find your passwords.

9 特價587
立即代訂
下次再買

Instagram Marketing

Jason,Lazar  著
Ingram 出版
2021/07/26 出版

INSTAGRAM MARKETINGInstagram has a simple and user-friendly interface that makes it accessible for just about everyone. It is not just a platform for sharing photos and videos with your friends and family anymore. Every business with an up-to-date marketing strategy now has an online presence on Instagram.Inside, you will learn about a variety of marketing strategies and will gain access to a lot of tips that will help you leverage Instagram in the best way possible.Once you are finished reading this simple guide, you will know exactly what steps to take to begin marketing your business on Instagram successfully!

9 特價513
立即代訂
下次再買

Privacy-Preserving Deep Learning

Kwangjo,Kim  著
Springer 出版
2021/07/25 出版

Introduction.- Definition and Classification.- Background Knowledge.- X-based Hybrid PPDL.- The Gap Between Theory and Application of X-based PPDL.- Federated Learning and Split Learning-based PPDL.- Analysis and Performance Comparison.- Attacks on DL and PPDL as the Possible Solutions.- Challenges and Future Work.

9 特價4175
立即代訂
下次再買

Personalized Privacy Protection in Big Data

Youyang,Qu  著
Springer 出版
2021/07/25 出版

This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets.The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.

9 特價3653
立即代訂
下次再買

Selected Areas in Cryptography

Springer 出版
2021/07/25 出版

This book contains revised selected papers from the 27th International Conference on Selected Areas in Cryptography, SAC 2020, held in Halifax, Nova Scotia, Canada in October 2020. The 27 full papers presented in this volume were carefully reviewed and selected from 52 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, and secure elections and related cryptographic constructions

9 特價2870
立即代訂
下次再買

Vlsi-Soc: New Technology Enabler

Springer 出版
2021/07/25 出版

This book contains extended and revised versions of the best papers presented at the 27th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2019, held in Cusco, Peru, in October 2019. The 15 full papers included in this volume were carefully reviewed and selected from the 28 papers (out of 82 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like heterogeneous, neuromorphic and brain-inspired, biologically-inspired, approximate computing systems.

9 特價2870
立即代訂
下次再買

Applications and Usability of Interactive TV

Springer 出版
2021/07/24 出版

This book constitutes the refereed proceedings of the 9th Iberoamerican Conference on Applications and Usability of Interactive Television, jAUTI 2020, in Aveiro, Portugal, in December 2020.*The 12 full papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on audiovisual content and experiences; design and development of iTV applications; iTV and videos in learning; iTV for the elderly; usability and UX evaluations.*Due to the COVID-19 pandemic the conference was held online.

9 特價2870
立即代訂
下次再買

Attribution of Advanced Persistent Threats

Ingram 出版
2021/07/23 出版

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science.This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.

9 特價4175
立即代訂
下次再買

Threat Hunting with Elastic Stack

Andrew,Pease  著
Packt 出版
2021/07/23 出版

Get hands-on with advanced threat analysis techniques by implementing Elastic Stack security features with the help of practical examplesKey Features: Get started with Elastic Security configuration and featuresUnderstand how to use Elastic Stack features to provide optimal protection against threatsDiscover tips, tricks, and best practices to enhance the security of your environmentBook Description: Elastic Security is an open solution that equips professionals with the tools to prevent, detect, and respond to threats. Threat Hunting with Elastic Stack will show you how to make the best use of Elastic Security to provide optimal protection against cyber threats. With this book, security practitioners working with Kibana will be able to put their knowledge to work and detect malicious adversary activity within their contested network.You'll take a hands-on approach to learning the implementation and methodologies that will have you up and running in no time. Starting with the foundational parts of the Elastic Stack, you'll explore analytical models and how they support security response and finally leverage Elastic technology to perform defensive cyber operations. You'll then cover threat intelligence analytical models, threat hunting concepts and methodologies, and how to leverage them in cyber operations. Further, you'll apply the knowledge you've gained to build and configure your own Elastic Stack, upload data, and explore that data directly as well as by using the built-in tools in the Kibana app to hunt for nefarious activities.By the end of this book, you'll be able to build an Elastic Stack for self-training or to monitor your own network and/or assets and use Kibana to monitor and hunt for adversaries within your network.What You Will Learn: Explore cyber threat intelligence analytical models and hunting methodologiesBuild and configure Elastic Stack for cyber threat huntingLeverage the Elastic endpoint and Beats for data collectionPerform security data analysis using the Kibana Discover, Visualize, and Dashboard appsExecute hunting and response operations using the Kibana Security appUse Elastic Common Schema to ensure data uniformity across organizationsWho this book is for: Security analysts, cybersecurity enthusiasts, information systems security staff, or anyone who works with the Elastic Stack for security monitoring, incident response, intelligence analysis, or threat hunting will find this book useful. Basic working knowledge of IT security operations and network and endpoint systems is necessary to get started.

9 特價2523
立即代訂
下次再買

Applied Cryptography and Network Security Workshops

Springer 出版
2021/07/23 出版

This book constitutes the proceedings of the satellite workshops held around the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, held in Kamakura, Japan, in June 2021.The 26 papers presented in this volume were carefully reviewed and selected from 49 submissions. They stem from the following workshops: AIBlock 2021: Third International Workshop on Application Intelligence and Blockchain Security AIHWS 2021: Second International Workshop on Artificial Intelligence in Hardware Security AIoTS 2021: Third International Workshop on Artificial Intelligence and Industrial IoT Security CIMSS 2021: First International Workshop on Critical Infrastructure and Manufacturing System Security Cloud S&P 2021: Third International Workshop on Cloud Security and Privacy SCI 2021: Second International Workshop on Secure Cryptographic Implementation SecMT 2021: Second International Workshop on Security in Mobile Technologies SiMLA 2021; Third International Workshop on Security in Machine Learning and its ApplicationsDue to the Corona pandemic the workshop was held as a virtual event.

9 特價5219
立即代訂
下次再買

Deep Learning with fastai Cookbook

Mark,Ryan  著
Packt 出版
2021/07/23 出版

Harness the power of the easy-to-use, high-performance fastai framework to rapidly create complete deep learning solutions with few lines of codeKey Features: Discover how to apply state-of-the-art deep learning techniques to real-world problemsBuild and train neural networks using the power and flexibility of the fastai frameworkUse deep learning to tackle problems such as image classification and text classificationBook Description: fastai is an easy-to-use deep learning framework built on top of PyTorch that lets you rapidly create complete deep learning solutions with as few as 10 lines of code. Both predominant low-level deep learning frameworks, TensorFlow and PyTorch, require a lot of code, even for straightforward applications. In contrast, fastai handles the messy details for you and lets you focus on applying deep learning to actually solve problems.The book begins by summarizing the value of fastai and showing you how to create a simple 'hello world' deep learning application with fastai. You'll then learn how to use fastai for all four application areas that the framework explicitly supports: tabular data, text data (NLP), recommender systems, and vision data. As you advance, you'll work through a series of practical examples that illustrate how to create real-world applications of each type. Next, you'll learn how to deploy fastai models, including creating a simple web application that predicts what object is depicted in an image. The book wraps up with an overview of the advanced features of fastai.By the end of this fastai book, you'll be able to create your own deep learning applications using fastai. You'll also have learned how to use fastai to prepare raw datasets, explore datasets, train deep learning models, and deploy trained models.What You Will Learn: Prepare real-world raw datasets to train fastai deep learning modelsTrain fastai deep learning models using text and tabular dataCreate recommender systems with fastaiFind out how to assess whether fastai is a good fit for a given problemDeploy fastai deep learning models in web applicationsTrain fastai deep learning models for image classificationWho this book is for: This book is for data scientists, machine learning developers, and deep learning enthusiasts looking to explore the fastai framework using a recipe-based approach. Working knowledge of the Python programming language and machine learning basics is strongly recommended to get the most out of this deep learning book.

9 特價2248
立即代訂
下次再買

Get Good or Get Off

Ailsa,Page  著
Ingram 出版
2021/07/22 出版

Social media is a powerful set of tools, that can build your brand, connect you to your customers and facilitate relationships that convert. It can also zap your precious energy, cause stress and lead business owners into a state of marketing delusion. What if it was okay to get off certain social media platforms?Two marketing professionals from opposite sides of Australia are on a mission to stop Random Acts of Social Media. Jo Saunders is an international LinkedIn expert, digital marketing strategist and social media educator who is known for demystifying the complexities of LinkedIn and social media tools. She guides professionals and teams to market their expertise and build relationships in the era of social business. Ailsa Page known as the marketing dynamo is a small business marketing expert with over 20 years' experience successfully running her own businesses and helping other businesses navigate the marketing maze and improve their bottom line. She provides marketing strategy, advice, coaching, education services to small and medium business throughout Australia. Get Good or Get Off will help you get clear about why you are using social media, and identify when it really isn't working for you. Get in control of your social media, so you can stop feeling overwhelmed and take strategic action, allowing you to focus on your core genius. It's time to Get Good or Get Off.

9 特價1197
立即代訂
下次再買

Practical Machine Learning for Computer Vision

Ingram 出版
2021/07/22 出版

This practical book shows you how to employ machine learning models to extract information from images. ML engineers and data scientists will learn how to solve a variety of image problems including classification, object detection, autoencoders, image generation, counting, and captioning with proven ML techniques. This book provides a great introduction to end-to-end deep learning: dataset creation, data preprocessing, model design, model training, evaluation, deployment, and interpretability. Google engineers Valliappa Lakshmanan, Martin G繹rner, and Ryan Gillard show you how to develop accurate and explainable computer vision ML models and put them into large-scale production using robust ML architecture in a flexible and maintainable way. You'll learn how to design, train, evaluate, and predict with models written in TensorFlow or Keras. You'll learn how to: Design ML architecture for computer vision tasks Select a model (such as ResNet, SqueezeNet, or EfficientNet) appropriate to your task Create an end-to-end ML pipeline to train, evaluate, deploy, and explain your model Preprocess images for data augmentation and to support learnability Incorporate explainability and responsible AI best practices Deploy image models as web services or on edge devices Monitor and manage ML models

9 特價3078
立即代訂
下次再買

Future Access Enablers for Ubiquitous and Intelligent Infrastructures

Springer 出版
2021/07/22 出版

This book constitutes the refereed post-conference proceedings of the 5th International Conference on Future Access Enablers for Ubiquitous and Intelligent Infrastructures, FABULOUS 2021, held in May 2021. Due to COVID-19 pandemic the conference was held virtually. This year's conference topic covers security of innovative services and infrastructure in traffic, transport and logistic ecosystems. The 30 revised full papers were carefully reviewed and selected from 60 submissions. The papers are organized in thematic sessions on: Internet of things and smart city; smart environment applications; information and communications technology; smart health applications; sustainable communications and computing infrastructures.

9 特價2870
立即代訂
下次再買

Nmap Network Exploration and Security Auditing Cookbook - Third Edition

Packt 出版
2021/07/21 出版

A complete reference guide to mastering Nmap and its scripting engine, covering practical tasks for IT personnel, security engineers, system administrators, and application security enthusiastsKey Features: Learn how to use Nmap and other tools from the Nmap family with the help of practical recipesDiscover the latest and most powerful features of Nmap and the Nmap Scripting EngineExplore common security checks for applications, Microsoft Windows environments, SCADA, and mainframesBook Description: Nmap is one of the most powerful tools for network discovery and security auditing used by millions of IT professionals, from system administrators to cybersecurity specialists. This third edition of the Nmap: Network Exploration and Security Auditing Cookbook introduces Nmap and its family - Ncat, Ncrack, Ndiff, Zenmap, and the Nmap Scripting Engine (NSE) - and guides you through numerous tasks that are relevant to security engineers in today's technology ecosystems.The book discusses some of the most common and useful tasks for scanning hosts, networks, applications, mainframes, Unix and Windows environments, and ICS/SCADA systems. Advanced Nmap users can benefit from this book by exploring the hidden functionalities within Nmap and its scripts as well as advanced workflows and configurations to fine-tune their scans. Seasoned users will find new applications and third-party tools that can help them manage scans and even start developing their own NSE scripts. Practical examples featured in a cookbook format make this book perfect for quickly remembering Nmap options, scripts and arguments, and more.By the end of this Nmap book, you will be able to successfully scan numerous hosts, exploit vulnerable areas, and gather valuable information.What You Will Learn: Scan systems and check for the most common vulnerabilitiesExplore the most popular network protocolsExtend existing scripts and write your own scripts and librariesIdentify and scan critical ICS/SCADA systemsDetect misconfigurations in web servers, databases, and mail serversUnderstand how to identify common weaknesses in Windows environmentsOptimize the performance and improve results of scansWho this book is for: This Nmap cookbook is for IT personnel, security engineers, system administrators, application security enthusiasts, or anyone who wants to master Nmap and its scripting engine. This book is also recommended for anyone looking to learn about network security auditing, especially if they're interested in understanding common protocols and applications in modern systems. Advanced and seasoned Nmap users will also benefit by learning about new features, workflows, and tools. Basic knowledge of networking, Linux, and security concepts is required before taking up this book.

9 特價2523
立即代訂
下次再買

Vlsi-Soc: Design Trends

Springer 出版
2021/07/21 出版

This book contains extended and revised versions of the best papers presented at the 28th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2020, held in Salt Lake City, UT, USA, in October 2020.*The 16 full papers included in this volume were carefully reviewed and selected from the 38 papers (out of 74 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like low-power design of RF, analog and mixed-signal circuits, EDA tools for the synthesis and verification of heterogenous SoCs, accelerators for cryptography and deep learning and on-chip Interconnection system, reliability and testing, and integration of 3D-ICs. *The conference was held virtually.

9 特價7307
立即代訂
下次再買

Quantum Algorithms for Cryptographically Significant Boolean Functions

Springer 出版
2021/07/21 出版

1. Introduction.- 2. Deutsch-Jozsa and Walsh Spectrum.- 3. Grover's Algorithm and Walsh Spectrum.- 4. Simon's Algorithm and Autocorrelation Spectrum.- 5. Conclusion & Research Direction.

9 特價4175
立即代訂
下次再買

Data and Applications Security and Privacy XXXV

Ken,Barker  著
Springer 出版
2021/07/20 出版

This book constitutes the refereed proceedings of the 35th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2021, held in Calgary, Canada, in July 2021.*The 15 full papers and 8 short papers presented were carefully reviewed and selected from 45 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named differential privacy, cryptology, machine learning, access control and others.*The conference was held virtually due to the COVID-19 pandemic.

9 特價2870
立即代訂
下次再買

Tracing Attackers with Trust-Based Deterministic Packet Marking

Firos,A  著
Ingram 出版
2021/07/19 出版

Computer network attacks are on the increase and are more sophisticated in today's network environment than ever before. One step in tackling the increasing spate of attacks is the availability of a system that can trace attack packets back to their original sources irrespective of invalid or manipulated source addresses. This project introduces a novel use of these maps to influence IP traceback in general, and packet marking schemes in particular. The Trust-based deterministic packet marking approach is capable of tracing back attacks, which are composed of just a few packets. Since a trust relationship will be maintained between routers for revealing the attacker's information, the overall overhead for tracebacking will be minimal. In addition, a service provider can implement this scheme without revealing its internal network topology.

9 特價2275
立即代訂
下次再買

Post-Quantum Cryptography

Springer 出版
2021/07/16 出版

This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South Korea in July 2021. The 25 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.

9 特價5219
立即代訂
下次再買

Surveys That Work

Ingram 出版
2021/07/15 出版

Surveys That Work explains a seven-step process for designing, running, and reporting on a survey that gets accurate results. In a no-nonsense style with plenty of examples about real&ndashworld compromises, the book focuses on reducing the errors that make up Total Survey Error--a key concept in survey methodology. If you are conducting a survey, this book is a must-have.

9 特價2870
立即代訂
下次再買

Handbook on wireless mesh network

Madhumathy,P  著
Ingram 出版
2021/07/15 出版

Wireless Mesh networks are more and more frequently seen as a solution to large-scale tracking and monitoring applications, because of their low-data-rate, low-energy-consumption, and short-range link network which provides an opportunity to monitor and control the physical world to a previously unprecedented scale and resolution. I believe that this broad targeted audience is an attractive feature of this book, as most of the very limited selection of WMN books currently available were written primarily for academic researchers or as a textbook, presenting the fundamental basic concepts while providing, little guidance on how to carry out the actual design process. This book is unique in bringing together wireless communication principles with actual WMN design processes. It will enable readers to become increasingly capable in exploiting fully the new technologies described here in their research or industrial work

9 特價1978
立即代訂
下次再買

Cloud Security Band 2

Books on Demand 出版
2021/07/15 出版

Digitalisierung, Industrie 4.0 und Economy 4.0 sind Schlagworte, die unsere Gesellschaft und die Unternehmen unserer Zeit besch瓣ftigen. Dieses Buch gibt Antworten auf die Fragen, welche Ver瓣nderungen auf Prozesse und Unternehmensstrukturen erfolgen und zeigt die Ursachen auf. Weiterhin wird er繹rtert, welche Rolle die Cloud Technologie dabei spielt. Aufbauend auf Band 1 der Serie Cloud Security zeigt der vorliegende Band 2 Cloud Security Best Practice L繹sungen auf, wie die Cloud Technologie unter Einhaltung aller Vorgaben betreffend Informationssicherheit eingef羹hrt und betrieben werden kann. Es wird er繹rtert welche Massnahmen bez羹glich Risikomanagement, Governance und Compliance durchgef羹hrt werden sollten, welche ?nderungen in Prozessen und Organisation erfolgen und auf welche Frameworks ein Unternehmen zur羹ckgreifen kann, wenn es um die Einf羹hrung von Cloud Technologie geht. Abschliessend zeigt dieses Buch Massnahmen auf, wie die Cloud Technologie zukunftsweisend im Unternehmen eingesetzt wird und gibt Ausblicke auf k羹nftige Entwicklungen.

9 特價2110
立即代訂
下次再買

Resell Rights Questions Answered

Jim,Stephens  著
Ingram 出版
2021/07/15 出版

Exchange Rights can sound all "outsider" to you particularly in the event that you are new to the showcasing scene or essentially stepped in straight from the universe of working together traditionally. Maybe you are more acquainted with the expression "retail" and "discount" in the disconnected universe of working together yet a few things can change somewhat in the realm of E-Commerce however many have named Internet Marketing as a method of selling through the Internet as a medium with a large number of the traditional and dependable standards unblemished. So at this point that you've caught wind of Resell Rights, you're likely considering what is the issue here and how you get your own slice of the pie from it. I was the point at which I previously found the might of Resell Rights. More or less, most top advertisers today support their pay and add spikes to their traffic and edges to building their mailing records through imaginative use and influence on Resell Rights. What's more, it can possibly be your influence to your next leap forward in Internet Marketing, as well, however just on the off chance that you comprehend it first! Believe it or not. So on the off chance that you have questions like beneath, overflowing and beating hard in your mind right, this book is for you.

9 特價412
立即代訂
下次再買

Cryptography

Keith,Martin  著
Ingram 出版
2021/07/15 出版

Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins the security of our mobile phone calls, credit card payments, web searches, internet messaging, and cryptocurrencies--in short, everything we do online. Increasingly, it also runs in the background of our smart refrigerators, thermostats, electronic car keys, and even the cars themselves. As our daily devices get smarter, cyberspace--home to all the networks that connect them--grows.Broadly defined as a set of tools for establishing security in this expanding cyberspace, cryptography enables us to protect and share our information. Understanding the basics of cryptography is the key to recognizing the significance of the security technologies we encounter every day, which will then help us respond to them.What are the implications of connecting to an unprotected Wi-Fi network? Is it really so important to have different passwords for different accounts? Is it safe to submit sensitive personal information to a given app, or to convert money to bitcoin? In clear, concise writing, information security expert Keith Martin answers all these questions and more, revealing the many crucial ways we all depend on cryptographic technology. He demystifies its controversial applications and the nuances behind alarming headlines about data breaches at banks, credit bureaus, and online retailers. We learn, for example, how encryption can hamper criminal investigations and obstruct national security efforts, and how increasingly frequent ransomware attacks put personal information at risk. Yet we also learn why responding to these threats by restricting the use of cryptography can itself be problematic.Essential reading for anyone with a password, Cryptography offers a profound perspective on personal security, online and off.

9 特價579
立即代訂
下次再買

Analyse des Datensatzes wage2 mit der Programmiersprache R

Daniel,Gatz  著
Ingram 出版
2021/07/14 出版

Studienarbeit aus dem Jahr 2021 im Fachbereich Informatik - IT-Security, Note: 2,0, FOM Hochschule f羹r Oekonomie & Management gemeinn羹tzige GmbH, M羹nchen fr羹her Fachhochschule, Sprache: Deutsch, Abstract: Diese Arbeit handelt von der Analyse des Datensatzes wage2. Am 16. April 2018 verk羹ndete Bundesminister f羹r Wirtschaft und Energie Peter Altmaier per Pressemitteilung, dass die berufliche Bildung ein Erfolgsmodell f羹r den deutschen Mittelstand darstellt. Dabei ist gerade das duale Ausbildungssystem weitgehend anerkannt und stellt ein Vorbild f羹r viele weitere L瓣nder dar. Neben der Berufsausbildung setzt die Bundesregierung auf die Strategie der Weiterbildung. Denn hier wird der Schl羹ssel zur Fachkr瓣ftesicherung und demnach zur Innovations- und Wettbewerbsf瓣higkeit der Bundesrepublik identifiziert. Ein Studium kann keine Karrierespr羹nge oder bedeutende Gehaltserh繹hungen garantieren. Daher soll die folgende Ausarbeitung er繹rtern, wie sich pers繹nliche Attribute auf das k羹nftige Gehalt auswirken und die Relevanz der beruflichen Bildung er繹rtern. Zu diesem Zweck wird in der folgenden Ausarbeitung ein thematisch passender Datensatz vorerst beschrieben und im Anschluss statistisch ausgewertet. Final werden die Ergebnisse erl瓣utert und die Signifikanz pers繹nlicher Eigenschaften auf das k羹nftige Gehalt konkretisiert.

9 特價1882
立即代訂
下次再買

Mobility Management in CoAP-Based IoT Networks

Sajid,Anwar  著
Ingram 出版
2021/07/14 出版

From recently, the innovative technology named as Constrained Application Protocol (CoAP) has been classified for numerous sensors in the field of IoT. Service discovery should be performed again in CoAP to support handover in mobile device. By this the handover delay and packets losses improved expressively. To reduce certain amount of packet losses and delay we will use a partial bicasting with buffering scheme. In proposed scheme, the bicasting is implemented in the "partial" region between the Mobile Access Gateway (MAG) and the Local Mobility Anchor (LMA) when a sensor node comes in the handover domain. At MAGnew data packets are buffered throughout handover to forward to sensors nodes and to decrease data losses.

9 特價1978
立即代訂
下次再買

Security in MANET’S by using Symmetric Key Cryptography

Ch,Anusha  著
Ingram 出版
2021/07/14 出版

The current textbook is about the security in mobile ad-hoc networks by using cryptographic secrete key. Now-a-days security is a major challenging problem in mobile ad-hoc networks because the nodes in mobile ad-hoc networks are moving from one place to another due to this the structure of the network changes frequently. The topology changes may cause "routing modification attack" problem that can easily be exploited against the MANETs. The main goal of routing attacks is to disrupt normal functioning of network by advertising false routing updates. On the other hand data communication attacks include modification or dropping of data packet that does not disrupt routing protocol. In this work, this could be achieved by adding some extensions for secure routing. These extensions include integrity which means the message modification is not allowed and authentication which means the node validation (identification) is done. This protection is provided by a hashed message authentication code function that provides fast message verification and information about sender as well as intermediate node authentication.

9 特價1978
立即代訂
下次再買

Modernizing Enterprise CMS Using Pimcore

Packt 出版
2021/07/12 出版

A practical guide to developing, administering, and scaling content management solutions in your organization for supporting digital transformation using PimcoreKey Features: Kick-start your CMS career by preparing for Pimcore developer certificationsCreate custom websites with a rich digital experience for your business users with the help of step-by-step examplesGet to grips with Pimcore's enterprise features for product management and data managementBook Description: Used by over eighty thousand companies worldwide, Pimcore is the leading open source enterprise-level content management system (CMS) solution. It is an impressive alternative to conventional CMSes and is ideal for creating e-commerce and complex enterprise websites.This book helps developers working with standard CMSes such as WordPress and Drupal to use their knowledge of CMSes to learn Pimcore CMS in a practical way. You'll start by learning what Pimcore is and explore its various services such as PIM, MDM, and DAM. The book then shows you various techniques for developing custom websites in Pimcore based on the scale of your organization. You'll learn how to use Pimcore to improve the digital transformation of a company by implementing enterprise Pimcore features. As you advance, you'll discover Pimcore's capabilities and features that make it a faster and more secure alternative to traditional CMSes. As well as demonstrating practical use cases, Modernizing Enterprise CMS Using Pimcore can help you understand the benefits of using Pimcore as a CMS solution, sharing best practices and proven techniques for designing professional Pimcore sites.By the end of this book, you'll be a trained Pimcore developer, able to create complex websites, and be well-versed in Pimcore's enterprise features such as MDM, PIM, and DAM.What You Will Learn: Create, edit, and manage Pimcore documents for your web pagesManage web assets in Pimcore using the digital asset management (DAM) featureDiscover how to create layouts, templates, and custom widgets for your web pagesAdminister third-party add-ons for your Pimcore site using the admin UIDiscover practices to use Pimcore as a product information management (PIM) systemExplore Pimcore's master data management (MDM) for enterprise CMS developmentBuild reusable website components and save time using effective tips and tricksWho this book is for: This book is for web developers and CMS professionals looking for an alternative to WordPress and traditional CMS. Enterprise application developers looking for enterprise solutions for digital transformation will find this book useful. Beginner-level knowledge of PHP, HTML, and CSS is needed to understand the code examples used in the book.

9 特價2248
立即代訂
下次再買
頁數65/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing