The Little Book of Sitecore(R) Tips
In Volume 2 I stated sequels are never as good, that means by this point you must be a sucker for punishment.As ever, here we have yet another light-hearted look at some useful Sitecore tips.With a marriage, a birth, a skiing accident, and a global pandemic all taking place since Volume 2, there has been quite a delay in Volume 3 entering the world - meaning this book only takes us up to 9.1 Initial Release, even though we're now on Sitecore v10.1!
IBM Watson Solutions for Machine Learning
Utilize Python and IBM Watson to put real-life use cases into production. Key Features● Use of popular Python packages for building Machine Learning solutions from scratch.● Practice various IBM Watson Machine Learning tools for Computer Vision and Natural Language Processing applications.● Expert-led best practices to put your Machine Learning solutions into the production environment. DescriptionThis book will take you through the journey of some amazing tools IBM Watson has to offer to leverage your machine learning concepts to solve some real-life use cases that are pertinent to the current industry. This book explores the various Machine Learning fundamental concepts and how to use the Python programming language to deal with real-world use cases. It explains how to take your code and deploy it into IBM Cloud leveraging IBM Watson Machine Learning. While doing so, the book also introduces you to several amazing IBM Watson tools such as Watson Assistant, Watson Discovery, and Watson Visual Recognition to ease out various machine learning tasks such as building a chatbot, creating a natural language processing pipeline, or an optical object detection application without a single line of code. It covers Watson Auto AI with which you can apply various machine learning algorithms and pick out the best for your dataset without a single line of code. Finally, you will be able to deploy all of these into IBM Cloud and configure your application to maintain the production-level runtime. After reading this book, you will find yourself confident to administer any machine learning use case and deploy it into production without any hassle. You will be able to take up a complete end-to-end machine learning project with complete responsibility and deliver the best standards the current industry has to offer.. Towards the end of this book, you will be able to build an end-to-end production-level application and deploy it into Cloud. What you will learn● Review the basics of Machine Learning and learn implementation using Python.● Learn deployment using IBM Watson Studio and Watson Machine Learning.● Learn how to use Watson Auto AI to automate hyperparameter tuning..● Learn Watson Assistant, Watson Visual Recognition, and Watson Discovery. Who this book is forThis book is for all data professionals, ML enthusiasts, and software developers who are looking for real solutions to be developed. The reader is expected to have a prior knowledge of the web application architecture and basic Python fundamentals. Table of Contents1. Introduction to Machine Learning2. Deep Learning3. Features and Metrics4. Build Your Own Chatbot5. First Complete Machine Learning Project6. Perfecting Our Model7. Visual Recognition8. Watson Discovery9. Deployment and Others10. Deploying the Food Ordering Bot About the Authors Arindam Ganguly has been working in one of the top multinational companies in India for several years. He is a Machine Learning Engineer and has proven his knowledge in several domains. He has completed his Masters in Computer Applications and also teaches in several tech forums
Social Media Marketing
SOCIAL MEDIA MARKETINGToday, platforms like Facebook, Twitter, and Instagram are making it amazingly easy for businesses to convey their message, identity, and products to millions of people, all without having to spend millions of dollars in the process.But make no mistake, social media marketing isn't always as simple as it seems...In order to be successful, you first need to have a solid understanding of the different social media platforms and how their algorithms work. It's also vital that you know how to craft cost-effective campaigns that are tailored to your specific audience.This book is here to help with all of that, and more!Inside, you'll discover the true potential that social media offers to you as both a business and an individual. You'll also gain an understanding of the marketing mechanics of the most prominent social media platforms and discover a variety of ways you can use them to successfully grow your brand!
Social Media Marketing
SOCIAL MEDIA MARKETINGToday, platforms like Facebook, Twitter, and Instagram are making it amazingly easy for businesses to convey their message, identity, and products to millions of people, all without having to spend millions of dollars in the process.But make no mistake, social media marketing isn't always as simple as it seems...In order to be successful, you first need to have a solid understanding of the different social media platforms and how their algorithms work. It's also vital that you know how to craft cost-effective campaigns that are tailored to your specific audience.This book is here to help with all of that, and more!Inside, you'll discover the true potential that social media offers to you as both a business and an individual. You'll also gain an understanding of the marketing mechanics of the most prominent social media platforms and discover a variety of ways you can use them to successfully grow your brand!
Not Just Chatting
"Bravo! Who would have thought such a vast variety of ways to be entertained, educated, soothed, and best of all to connect with our humanity, via the podcast generation, could be written up in such a concise, simple, accessible, way-if you are just beginning, thinking about, or even have been doing podcasts for a while, this book is your tool to highlight and absorb."-Sandra Fish Actor/Writer, Co-founder of Humane Prison Hospice ProjectFrom the host of the acclaimed Zestful Aging Podcast, learn how to up your podcast interview game and create a podcast that stands out in the crowd. Want to create a podcast that stands out from the 2 million podcasts currently available? Create compelling, intimate podcast interviews that will be enriching and memorable for your audience, your guest, and for you. Nicole Christina, author of "Not Just Chatting: How to Become a Master Podcast Interviewer" and host of the acclaimed Zestful Aging Podcast will show you how. "Nicole is a master at breaking down the components of successful podcasting into easily digestible tidbits that are relevant to those just starting their own show, all the way to podcast veterans. She's got a simple and direct delivery-and she dives deep into vital topics that every podcaster can learn something from. I highly recommend this book to all those interested in improving their shows."-Eric Kussin, SameHere Global Mental Health Movement, We're All A Little "Crazy"
Detection of Intrusions and Malware, and Vulnerability Assessment
This book constitutes the proceedings of the 18th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2021, held virtually in July 2021.The 18 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 65 submissions. DIMVA serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas.Chapter "SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracing" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Innovations in Digital Economy
This book constitutes the revised and extended papers of the Second International Conference on Innovations in Digital Economy, SPBU IDE 2020, held in St. Petersburg, Russia, in October 2020.The 9 papers presented were thoroughly reviewed and selected for publication from 117 submissions. The papers are organized according the following topical sections: economic efficiency and social consequences of digital innovations implementation; industrial, service and agricultural digitalization; end-to-end digital technologies in industry.
Rapid Application Development with AWS Amplify
Get to grips with the AWS Amplify framework and use it to build scalable cloud-native progressive web apps with React and cross-platform mobile apps with React Native in TypeScriptKey Features: Explore the capabilities of AWS Amplify with popular app frameworks for both web and mobile app platformsBuild your first cloud-native web and mobile applications using AWS AmplifyLeverage AWS Amplify to design GraphQL APIs for your web and mobile applicationsBook Description: AWS Amplify is a modern toolkit that includes a command line interface (CLI); libraries for JS, iOS, and Android programming; UI component libraries for frameworks like React, Angular, and Vue.js for web development, and React Native and Flutter for mobile development.You'll begin by learning how to build AWS Amplify solutions with React and React Native with TypeScript from scratch, along with integrating it with existing solutions. This book will show you the fastest way to build a production-ready minimum viable product (MVP) within days instead of years. You'll also discover how to increase development speed without compromising on quality by adopting behavior-driven development (BDD) and Cypress for end-to-end test automation, as well as the Amplify build pipeline (DevOps or CI/CD pipeline) to ensure optimal quality throughout continuous test automation and continuous delivery. As you advance, you'll work with React to determine how to build progressive web apps (PWAs) with Amplify and React Native for cross-platform mobile apps. In addition to this, you'll find out how to set up a custom domain name for your new website and set up the AWS Amplify Admin UI for managing the content of your app effectively.By the end of this AWS book, you'll be able to build a full-stack AWS Amplify solution all by yourself.What You Will Learn: Build React and React Native apps with Amplify and TypeScriptExplore pre-built Amplify UI components for rapid prototypingAdd user management with Amplify authentication to your appUse Amplify GraphQL to create a blog postDiscover how to upload photos to Amplify StorageEnable DevOps with the Amplify pipeline for your appGet to grips with BDD and test automation with Cypress and CucumberSet up a custom domain name for your website and manage app content with the Amplify Admin UIWho this book is for: This book is for developers and tech companies looking to develop cloud-native products rapidly with the AWS ecosystem. Web and mobile developers with little-to-no experience in TypeScript programming will also find this book helpful. Although no prior experience with AWS or TypeScript is required, basic familiarity with modern frameworks such as React and React Native is useful.
Hackable
If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you're a technology executive, developer, or security professional, you are responsible for securing your application. However, you may be uncertain about what works, what doesn't, how hackers exploit applications, or how much to spend. Or maybe you think you do know, but don't realize what you're doing wrong. To defend against attackers, you must think like them. As a leader of ethical hackers, Ted Harrington helps the world's foremost companies secure their technology. Hackable teaches you exactly how. You'll learn how to eradicate security vulnerabilities, establish a threat model, and build security into the development process. You'll build better, more secure products. You'll gain a competitive edge, earn trust, and win sales.
Set Up Your Own Platform
Wouldn't you like to have your own platform for your personal or business website instead of depending on Facebook or other website creation services? This manual is a complete step-by-step guide on how to create and launch a WordPress website, create a newsletter for your site using a WordPress plugin, and manage your social media presence. By using this guide, you will be in control of your presence on the World Wide Web! You will discover how easy it is to: - Create a WordPress website - Buy a domain name and assign it to your website - Customize your site through themes and social media links - Use a WordPress plugin to create a site newsletter to attract and engage readers - How to set up a Linux virtual server for just $5/month - Use a virtual server to run applications to enhance your site Andy Sylvester is the author of four books on microblogging, using and creating web applications, and web server setup. He has worked in software development for over 36 years in the aerospace industry, academia, and government research and development. This guide shows you how to make your place on the Web. What are you waiting for?
Cybersecurity and Third-Party Risk
Move beyond the checklist and fully protect yourself from third-party cybersecurity risk Over the last decade, there have been hundreds of big-name organizations in every sector that have experienced a public breach due to a vendor. While the media tends to focus on high-profile breaches like those that hit Target in 2013 and Equifax in 2017, 2020 has ushered in a huge wave of cybersecurity attacks, a near 800% increase in cyberattack activity as millions of workers shifted to working remotely in the wake of a global pandemic. The 2020 SolarWinds supply-chain attack illustrates that lasting impact of this dramatic increase in cyberattacks. Using a technique known as Advanced Persistent Threat (APT), a sophisticated hacker leveraged APT to steal information from multiple organizations from Microsoft to the Department of Homeland Security not by attacking targets directly, but by attacking a trusted partner or vendor. In addition to exposing third-party risk vulnerabilities for other hackers to exploit, the damage from this one attack alone will continue for years, and there are no signs that cyber breaches are slowing. Cybersecurity and Third-Party Risk delivers proven, active, and predictive risk reduction strategies and tactics designed to keep you and your organization safe. Cybersecurity and IT expert and author Gregory Rasner shows you how to transform third-party risk from an exercise in checklist completion to a proactive and effective process of risk mitigation. Understand the basics of third-party risk management Conduct due diligence on third parties connected to your network Keep your data and sensitive information current and reliable Incorporate third-party data requirements for offshoring, fourth-party hosting, and data security arrangements into your vendor contracts Learn valuable lessons from devasting breaches suffered by other companies like Home Depot, GM, and Equifax The time to talk cybersecurity with your data partners is now. Cybersecurity and Third-Party Risk is a must-read resource for business leaders and security professionals looking for a practical roadmap to avoiding the massive reputational and financial losses that come with third-party security breaches.
Advances in Cryptology - Crypto 2021
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it was an online event in 2021.The 103 full papers presented in the proceedings were carefully reviewed and selected from a total of 426 submissions. The papers are organized in the following topical sections: Part I: Award Papers; Signatures; Quantum Cryptography; Succinct Arguments. Part II: Multi-Party Computation; Lattice Cryptography; and Lattice Cryptanalysis. Part III: Models; Applied Cryptography and Side Channels; Cryptanalysis; Codes and Extractors; Secret Sharing. Part IV: Zero Knowledge; Encryption++; Foundations; Low-Complexity Cryptography; Protocols.
Advances in Cryptology - Crypto 2021
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it was an online event in 2021.The 103 full papers presented in the proceedings were carefully reviewed and selected from a total of 426 submissions. The papers are organized in the following topical sections: Part I: Award Papers; Signatures; Quantum Cryptography; Succinct Arguments. Part II: Multi-Party Computation; Lattice Cryptography; and Lattice Cryptanalysis. Part III: Models; Applied Cryptography and Side Channels; Cryptanalysis; Codes and Extractors; Secret Sharing. Part IV: Zero Knowledge; Encryption++; Foundations; Low-Complexity Cryptography; Protocols.
Advances in Cryptology - Crypto 2021
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it was an online event in 2021.The 103 full papers presented in the proceedings were carefully reviewed and selected from a total of 426 submissions. The papers are organized in the following topical sections: Part I: Award Papers; Signatures; Quantum Cryptography; Succinct Arguments. Part II: Multi-Party Computation; Lattice Cryptography; and Lattice Cryptanalysis. Part III: Models; Applied Cryptography and Side Channels; Cryptanalysis; Codes and Extractors; Secret Sharing. Part IV: Zero Knowledge; Encryption++; Foundations; Low-Complexity Cryptography; Protocols.
Advances in Cryptology - Crypto 2021
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it was an online event in 2021.The 103 full papers presented in the proceedings were carefully reviewed and selected from a total of 426 submissions. The papers are organized in the following topical sections: Part I: Award Papers; Signatures; Quantum Cryptography; Succinct Arguments. Part II: Multi-Party Computation; Lattice Cryptography; and Lattice Cryptanalysis. Part III: Models; Applied Cryptography and Side Channels; Cryptanalysis; Codes and Extractors; Secret Sharing. Part IV: Zero Knowledge; Encryption++; Foundations; Low-Complexity Cryptography; Protocols.
Advanced Cybersecurity Technologies
This book looks at the technical fields of Cybersecurity progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research.
Computer Safety, Reliability, and Security
This book constitutes the proceedings of the 40th International Conference on Computer Safety, Reliability and Security, SAFECOMP 2021, which took place in York, UK, in September 2021.The 17 full papers included in this volume were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: machine learning safety assurance; security engineering; safety and assurance cases; machine learning applications; safety validation and simulation; and fault tolerance.
Computer Safety, Reliability, and Security. Safecomp 2021 Workshops
This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2021, the 40th International Conference on Computer Safety, Reliability and Security, which took place in York, UK, in September 2021. The 26 regular papers included in this volume were carefully reviewed and selected from 34 submissions. The workshops included in this volume are: DECSoS 2021: 16th Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-SystemsWAISE 2021: Fourth International Workshop on Artificial Intelligence Safety EngineeringDepDevOps 2021: Second International Workshop on Dependable Development-Operation Continuum Methods for Dependable Cyber-Physical SystemsUSDAI 2021: Second International Workshop on Underpinnings for Safe Distributed AI MAPSOD 2021: First International Workshop on Multi-concern Assurance Practices in Software Design
A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts, managerial issues related to enterprise network and security planning and design are explained from a practitioner's perspective.Because of the critical importance of cybersecurity in today's enterprise networks, security-related issues are explained throughout the book, and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading.This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course, it has enough material for a semester or a quarter.FEATURES Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity Offers a solid knowledge base for those preparing for certificate tests, such as CompTIA and CISSP Takes advantage of actual cases, examples, industry products, and services so students can relate concepts and theories to practice Explains subjects in a systematic and practical manner to facilitate understanding Includes practical exercise questions that can be individual or group assignments within or without a classroom Contains several information-rich screenshots, figures, and tables carefully constructed to solidify concepts and enhance visual learning The text is designed for students studying information systems or computer science for the first time. As a textbook, this book includes hands-on assignments based on the Packet Tracer program, an excellent network design and simulation tool from Cisco. Instructor materials also are provided, including PowerPoint slides, solutions for exercise questions, and additional chapter questions from which to build tests.
Natural Language Processing Fundamentals for Developers
This book is for developers who are looking for an overview of basic concepts in Natural Language Processing. It casts a wide net of techniques to help developers who have a range of technical backgrounds. Numerous code samples and listings are included to support myriad topics. The first chapter shows you various details of managing data that are relevant for NLP. The next pair of chapters contain NLP concepts, followed by another pair of chapters with Python code samples to illustrate those NLP concepts. Chapter 6 explores applications, e.g., sentiment analysis, recommender systems, COVID-19 analysis, spam detection, and a short discussion regarding chatbots. The final chapter presents the Transformer architecture, BERT-based models, and the GPT family of models, all of which were developed during the past three years and considered SOTA ("state of the art"). The appendices contain introductory material (including Python code samples) on regular expressions and probability/statistical concepts. Companion files with source code and figures are included. FEATURES: Covers extensive topics related to natural language processing Includes separate appendices on regular expressions and probability/statisticsFeatures companion files with source code and figures from the book.The companion files are available online by emailing the publisher with proof of purchase at info@merclearning.com.
A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management is written for people who are self-studying or studying information systems or computer science in the classroom setting. The book provides a balanced understanding of introductory and fairly advanced subjects on both computer networking and cybersecurity.
Die Post-Quanten-Kryptographie. Ein ?berblick
Studienarbeit aus dem Jahr 2021 im Fachbereich Informatik - IT-Security, Note: 1,0, Technische Universit瓣t Ilmenau (Institut f羹r Praktische Informatik und Medieninformatik - Fachgebiet Telematik/Rechnernetze), Sprache: Deutsch, Abstract: Stellen Sie sich eine Welt vor, in der die digitale Sicherheit, wie wir sie kennen, durch die immense Rechenleistung von Quantencomputern bedroht wird. Dieses Buch dringt in die hochaktuelle Materie der Post-Quanten-Kryptographie ein und beleuchtet innovative L繹sungsans瓣tze, die unseren digitalen Raum vor den Angriffen der Zukunft sch羹tzen sollen. Im Zentrum steht die Frage: Wie wappnen wir uns gegen eine ?ra, in der etablierte Verschl羹sselungsstandards wie RSA und DSA obsolet werden? Die vorliegende Analyse konzentriert sich auf die vielversprechendsten Kandidaten der quantenresistenten Kryptographie, darunter die hashbasierte Kryptographie, ein faszinierender Ansatz, der auf der Widerstandsf瓣higkeit von Hashfunktionen gegen Quantenalgorithmen basiert. Ein besonderes Augenmerk gilt dem Merkle-Signaturverfahren (MSS), einer eleganten Konstruktion, die die Grenzen des Lamport-Diffie Einmal-Signaturverfahrens 羹berwindet und die mehrfache Verwendung von Schl羹sseln erm繹glicht. Doch die Reise geht weiter: Auch codierungstheorie-basierte und gitterbasierte Kryptosysteme werden detailliert unter die Lupe genommen, wobei Verfahren wie Classic McEliece und NTRU im Fokus stehen. Dieser umfassende ?berblick vergleicht klassische und quantenresistente Ans瓣tze, deckt die St瓣rken und Schw瓣chen der jeweiligen Methoden auf und bietet eine fundierte Grundlage f羹r die Bewertung zuk羹nftiger Sicherheitsarchitekturen. Tauchen Sie ein in die Welt der digitalen Signaturen, lernen Sie die algorithmischen Grundlagen von Shor's und Grover's Algorithmen kennen und verstehen Sie, warum die Entwicklung quantenresistenter Verfahren von entscheidender Bedeutung f羹r die Netzwerksicherheit von morgen ist. Entdecken Sie die Schl羹sselkonzepte und Algorithmen, die das
Not Just Chatting
"Bravo! Who would have thought such a vast variety of ways to be entertained, educated, soothed, and best of all to connect with our humanity, via the podcast generation, could be written up in such a concise, simple, accessible, way-if you are just beginning, thinking about, or even have been doing podcasts for a while, this book is your tool to highlight and absorb."-Sandra Fish Actor/Writer, Co-founder of Humane Prison Hospice Project From the host of the acclaimed Zestful Aging Podcast, learn how to up your podcast interview game and create a podcast that stands out in the crowd. Want to create a podcast that stands out from the 2 million podcasts currently available? Create compelling, intimate podcast interviews that will be enriching and memorable for your audience, your guest, and for you. Nicole Christina, author of "Not Just Chatting: How to Become a Master Podcast Interviewer" and host of the acclaimed Zestful Aging Podcast will show you how. "Nicole is a master at breaking down the components of successful podcasting into easily digestible tidbits that are relevant to those just starting their own show, all the way to podcast veterans. She's got a simple and direct delivery-and she dives deep into vital topics that every podcaster can learn something from. I highly recommend this book to all those interested in improving their shows."-Eric Kussin, SameHere Global Mental Health Movement, We're All A Little "Crazy"
Nonlinear Control Systems Using Matlab(r)
This book introduces nonlinear control systems for control engineering and science to graduate, undergraduate students and researchers; it targets control engineering students who do not have time to derive and prove mathematical results for nonlinear control systems. It can serve as a textbook, especially for feedback linearization techniques.
Private Security and the Law
Private Security and the Law, 5e, is a singular resource that provides the most comprehensive analysis of practices in the security industry with respect to law, regulation, licensure, and constitutional questions of case and statutory authority. It examines the constitutional and due-process dimensions of private security both
Networking Argument
This edited volume presents selected works from the 20th Biennial Alta Argumentation Conference, sponsored by the National Communication Association and the American Forensics Association and held in 2017. The conference brought together scholars from Europe, Asia, and North America to engage in intensive conversations about how argument functions in our increasingly networked society. The essays discuss four aspects of networked argument. Some examine arguments occurring in online networks, seeking to both understand and respond more effectively to the acute changes underway in the information age. Others focus on offline networks to identify historical and contemporary resources available to advocates in the modern day. Still others discuss the value-added of including argumentation scholars on interdisciplinary research teams analyzing a diverse range of subjects, including science, education, health, law, economics, history, security, and media. Finally, the remainder network argumentation theories explore how the interactions between and among existing theories offer fruitful ground for new insights for the field of argumentation studies. The wide range of disciplinary backgrounds and methodological approaches employed in Networking Argument make this volume a unique compilation of perspectives for understanding urgent and sustaining issues facing our society.
Machine Learning for Biometrics
Machine Learning for Biometrics: Concepts, Algorithms and Applications highlights the fundamental concepts of machine learning, processing and analyzing data from biometrics and provides a review of intelligent and cognitive learning tools which can be adopted in this direction. Each chapter of the volume is supported by real-life case studies, illustrative examples and video demonstrations. The book elucidates various biometric concepts, algorithms and applications with machine intelligence solutions, providing guidance on best practices for new technologies such as e-health solutions, Data science, Cloud computing, and Internet of Things, etc. In each section, different machine learning concepts and algorithms are used, such as different object detection techniques, image enhancement techniques, both global and local feature extraction techniques, and classifiers those are commonly used data science techniques. These biometrics techniques can be used as tools in Cloud computing, Mobile computing, IOT based applications, and e-health care systems for secure login, device access control, personal recognition and surveillance.
Wireless Communication Networks Supported by Autonomous Uavs and Mobile Ground Robots
Wireless Communication Networks Supported by Autonomous UAVs and Mobile Ground Robots covers wireless sensor networks and cellular networks. For wireless sensor networks, the book presents approaches using mobile robots or UAVs to collect sensory data from sensor nodes. For cellular networks, it discusses the approaches to using UAVs to work as aerial base stations to serve cellular users. In addition, the book covers the challenges involved in these two networks, existing approaches (e.g., how to use the public transportation vehicles to play the role of mobile sinks to collect sensory data from sensor nodes), and potential methods to address open questions.
Microelectronic Devices, Circuits and Systems
This book constitutes selected papers from the Second International Conference on Microelectronic Devices, Circuits and Systems, ICMDCS 2021, held in Vellore, India, in February 2021. The 32 full papers and 6 short papers presented were thoroughly reviewed and selected from 103 submissions. They are organized in the topical sections on ​digital design for signal, image and video processing; VLSI testing and verification; emerging technologies and IoT; nano-scale modelling and process technology device; analog and mixed signal design; communication technologies and circuits; technology and modelling for micro electronic devices; electronics for green technology.
Reputation Systems in Web3
Organizational structures are shifting from classical hierarchical firms from before the emergence of the Web to e-commerce firms in the Web2- and most recently to Web3-based Decentralized Autonomous Organizations (DAOs), due to blockchain technology. A DAO is a decentralized organizational network, which runs fully autonomously, is governed by code and benefits the ones who contribute. The latter should be ensured by a reputation system. Hence, fraud-resistant reputation systems play a central role in DAOs, ensuring a fair give and take by detecting malicious peers like free riders. However, some of the most commonly used e-commerce platforms and DAOs show design flaws in their reputation systems. Therefore, this master thesis identifies and summarizes components of fraud-resistant reputation systems in decentralized networks to provide starting points for further scientific research. To this end, Web2-based e-commerce platforms as Airbnb and eBay together with Web3-based DOAs as Bitcoin, Steemit, Token Curated Registries, uPort, Sovrin, Augur und DAO Maker are analyzed and described in this work.Organizational structures are shifting from classical hierarchical firms from before the emergence of the Web to e-commerce firms in the Web2- and most recently to Web3-based Decentralized Autonomous Organizations (DAOs), due to blockchain technology. A DAO is a decentralized organizational network, which runs fully autonomously, is governed by code and benefits the ones who contribute. The latter should be ensured by a reputation system. Hence, fraud-resistant reputation systems play a central role in DAOs, ensuring a fair give and take by detecting malicious peers like free riders. However, some of the most commonly used e-commerce platforms and DAOs show design flaws in their reputation systems. Therefore, this master thesis identifies and summarizes components of fraud-resistant reputation systems in decentralized networks to provide starting points for further scientific research. To this end, Web2-based e-commerce platforms as Airbnb and eBay together with Web3-based DOAs as Bitcoin, Steemit, Token Curated Registries, uPort, Sovrin, Augur und DAO Maker are analyzed and described in this work.
Modern Socio-Technical Perspectives on Privacy
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book's primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a "professional issues" course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.
Modern Socio-Technical Perspectives on Privacy
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book's primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a "professional issues" course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.
5g Wireless
Gain a Deep, Practical Understanding of 5G Technology, Applications, Architecture, Standards, and Ecosystem The 5G ultra-high-speed wireless communication standard is a major technological leap forward--substantially increasing speed and capacity, enhancing current use cases, and making many new applications practical. For technical professionals, managers, and students, 5G requires significant new knowledge and expertise. In 5G Wireless: A Comprehensive Introduction, renowned information technology author William Stallings presents a comprehensive and unified explanation of 5G's key applications, technologies, and standards. Like Stallings' other award-winning texts, this guide will help you quickly find the information and gain the mastery to succeed with critical new technology. Stallings first explains how cellular networks have evolved through 4G and now 5G, and surveys 5G's application areas and use cases. Next, he thoroughly introduces the 5G core network, covering SDN, NFV, network slicing, QoS, and edge computing--and provides a detailed coverage of the 5G air interface and radio access network. Throughout, key concepts are illuminated through realistic examples, review questions help you test your understanding, and references support further exploration. Understand the 5G ecosystem, its building blocks, standards, and R&D roadmaps Explore the Enhanced Mobile Broadband (eMBB) use case, where 5G enhances 4G in applications such as smart offices and dense urban communications Learn how Massive Machine Type Communications (mMTC) and Ultra-Reliable and Low-Latency Communications (URLCC) support new applications such as fog, IoT, and cloud Discover how 5G NextGen core (backbone) networks serve and interconnect wireless access networks that connect user devices Master key 5G NR Air Interface and Radio Access Network (RAN) concepts, including millimeter-wave transmission, MIMO antennas, and OFDM multiplexing
Choose Your Infosec Path
Cybersecurity is a pressing issue across industries, as well as increasingly important in people's personal lives. Learning the basic fundamentals is essential in order for companies and individuals to thrive. Although much of the literature around this hot-button topic can seem impenetrable and convoluted to a new learner, Choose Your InfoSec Path is an informative, fun, interactive cybersecurity adventure that has been written specifically with beginners in mind. Step into the shoes of a Chief Information Security Officer (CISO) and find out what could possibly go wrong during a breach. Author Alexander J. Roxon weaves together essential InfoSec concepts with an exciting and fast-paced storyline to make the lessons relatable and easy to understand. Determine what steps your character takes next and affect the outcome of your path. Will you emerge from the breach unscathed? With over 50 different endings, you can explore the what-ifs and experience a new path each time. A supporting glossary makes this book a resource you can return to long after your story is completed. Crucially, the integrity of the cybersecurity concepts is maintained and all events are genuinely plausible from a technical perspective. The book includes commentary to examine key concepts and reflect on decisions. This book is for those who are interested in understanding what cybersecurity is about but without a high technical barrier of entry. Learn some of the basics of incident response, how to dampen the effects of a breach, and get the jump on the bad guys. Your journey starts now. What You'll LearnUnderstand some of the basic concepts of incident response.Experience how a real-life incident can go from zero to chaos very rapidly.Find out how being proactive can significantly improve how information security breaches play out.Discover how to dampen the effects of a breach. Who This Book Is For This book is for those who are interested in understanding what cybersecurity is about but without a high technical barrier of entry. People who like to laugh as well as learn.
Socio-Technical Aspects in Security and Trust
This book constitutes the refereed post-conference proceedings of the 10th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2020, held as a virtual event, in September 2020. The 8 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions and are organized in the following topical sections: personality and behavior; behavior in face of adversaries; smart environments; decentralized systems and digital ledgers; and reflections on socio-technical aspects of security.The Chapter "Statistical Reliability of 10 Years of Cyber Security User Studies" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Screen Time Is Not Forever
Help young children learn screen-time boundaries and fun ways to spend "screens-off" time. As important as screens are in our lives, we all need to unplug, especially children. This active, encouraging board book offers young children and families an easy way to set boundaries and limits for screen time, and to find enjoyable ways to spend time without screens. "Together, we say, 'All done.' Now follow up with something fun." Screen time can be helpful and fun, but it's important for toddlers to learn that screen time can't be all the time. The American Academy of Pediatrics recommends consistent limits on screen time for young children. With her trademark mix of empathy and encouragement, author Elizabeth Verdick offers appealing and healthy alternatives to using screens, like singing, swinging, or playing pretend! The book ends with additional ideas and activities to help adults navigate screen time with toddlers and preschoolers. Best Behavior(R) Series The Best Behavior(R) series uses simple words and delightful full-color illustrations to guide children to choose peaceful, positive behaviors. Select titles are available in two versions: a durable board book for ages baby to preschool, and a longer, more in-depth paperback for ages four to seven. Bilingual board books and paperback editions are available for select titles. Kids, parents, and teachers love these award-winning books. All include helpful tips and ideas for parents and caregivers.
Screen Time Is Not Forever
Children learn boundaries and safety when using screens, and fun things to do when screens are off. As important as screens are in our lives, we all need to unplug, especially children. This reassuring picture book offers children and families a starting point for limiting screen time and making the most of the time you have with your screens and without. While screens can be helpful and fun, they are not intended for use all the time. The American Academy of Pediatrics recommends consistent limits on screen time for children, and adults should take steps to ensure online safety for kids. With straightforward suggestions, children will learn valuable information about online safety, setting healthy screen-time boundaries, and the importance of screen-free time. With her trademark mix of empathy and encouragement, author Elizabeth Verdick offers appealing and healthy alternatives to using screens, as well as ways to stay safe and happy when online. Illustrator Marieka Heinlen's active and vibrant illustrations of young children interacting with their caregivers and families bring the activities and suggestions for screen-free fun to life. A section for adults at the end of the book includes information on the effects of too much screen time and suggestions for establishing screen-time boundaries. Best Behavior(R) Series Simple words and lively full-color illustrations guide children to choose positive behaviors. Select titles are available in two versions: a durable board book for ages 1-4 and an expanded paperback for ages 4-7. Bilingual board book and paperback editions of select titles also are available. Kids, parents, and teachers love these award-winning books. All include helpful tips for teachers, caregivers, and parents.
Securing Systems
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle.
Computing Meaning
This book is a collection of papers by leading researchers in computational semantics. It presents a state-of-the-art overview of recent and current research in computational semantics, including descriptions of new methods for constructing and improving resources for semantic computation, such as WordNet, VerbNet, and semantically annotated corpora. It also presents new statistical methods in semantic computation, such as the application of distributional semantics in the compositional calculation of sentence meanings. Computing the meaning of sentences, texts, and spoken or texted dialogue is the ultimate challenge in natural language processing, and the key to a wide range of exciting applications. The breadth and depth of coverage of this book makes it suitable as a reference and overview of the state of the field for researchers in Computational Linguistics, Semantics, Computer Science, Cognitive Science, and Artificial Intelligence. ​
21st Century Prometheus
Introduction.- Part I The Changing CBRN Risk Landscape.- The XXI Century: The Epoch of Advanced Military Systems and Growing Vulnerabilities.- The Dark Side of Nuclear Energy: Risks of Proliferation from Domestic Fuel Cycle Technologies.- Chemical and Biological Risks in the 21st Century.- Neuroscience-Based Weapons.- Hybrid Emerging Threats and AI Information Warfare: The Story of the Cyber-AI Deception Machine.- Artificial Intelligence and Warfare.- Artificial Intelligence in Autonomous Weapon Systems.- Understanding the Threat Posed by COTS and Small UAVs Armed with CBW.- Education and Training as a Disruptive Dual Use Technology.- Part II Evolving Risk Mitigation Strategies and Technologies.- Detection and Identification Technologies for CBRN Agents.- Chemical Forensics.- Recent Developments in Clinical Toxicology and the Use of Weaponized Nerve Agents.- Diagnosing the Cause of Disease - Interactive Teaching Approaches.- Evaluation Systems for Biological Security Risk Mitigation Training and Education.- Biological Forensics.
Kids and Today’s Media
Old and new media are adversely effecting children in many ways. The doctors in this volume discuss their thoughts on the subject.
Kids and Today’s Media
Old and new media are adversely effecting children in many ways. The doctors in this volume discuss their thoughts on the subject.
The Art of Micro Frontends
Apply your experience of web development with HTML and JavaScript to build micro frontends for large-scale web projects using frameworks such as React and popular web tooling such as Node.js with Express or webpackKey Features: Cut through the complexities of designing a monolithic web architecture using micro frontend architectureExplore architecture patterns for building large-scale applicationsLearn how to build, test, and secure your micro frontends efficientlyBook Description: Micro frontend is a web architecture for frontend development borrowed from the idea of microservices in software development, where each module of the frontend is developed and shipped in isolation to avoid complexity and a single point of failure for your frontend.Complete with hands-on tutorials, projects, and self-assessment questions, this easy-to-follow guide will take you through the patterns available for implementing a micro frontend solution. You'll learn about micro frontends in general, the different architecture styles and their areas of use, how to prepare teams for the change to micro frontends, as well as how to adjust the UI design for scalability. Starting with the simplest variants of micro frontend architectures, the book progresses from static approaches to fully dynamic solutions that allow maximum scalability with faster release cycles. In the concluding chapters, you'll reinforce the knowledge you've gained by working on different case studies relating to micro frontends.By the end of this book, you'll be able to decide if and how micro frontends should be implemented to achieve scalability for your user interface (UI).What You Will Learn: Understand how to choose the right micro frontend architectureDesign screens for compositional UIsCreate a great developer experience for micro frontend solutionsAchieve enhanced user experiences with micro frontendsIntroduce governance and boundary checks for managing distributed frontendsBuild scalable modular web applications from scratch or by migrating an existing monolithWho this book is for: This book is for software/solution architects or (mostly lead) developers as well as web developers and frontend engineers. Beginner-level knowledge of HTML and CSS along with a solid understanding of JavaScript programming and its ecosystem, including Node.js and NPM, is assumed.
The 60-Minute Podcast Startup
How to start and monetize a podcast in one monthWould you like to turn your podcast idea into a viable, revenue-producing show? Now you can, and Ramesh Dontha will show you step-by-step how.Ramesh is the host of iTunes Top 500 podcast The Agile Entrepreneurship Podcast, iTunes Top 250 podcast The Data Transformers, and BrightTALK top-ranking web series AI - The Future of Business.In The 60-Minute Podcast Startup: A Proven System to Start Your Podcast in 1 Hour a Day and Get Your Initial Audience in 30 Days (or Less), Ramesh tells all. He shares how to brainstorm, record, publish, distribute, and promote a podcast people enjoy-all in one month or less!. Based on what works for him and dozens of other successful podcasters, Ramesh also teaches the best way to quickly monetize podcast episodes so the thing actually makes money.Whether you want to see if podcasting is for you or you want to make podcasting your next income stream, The 60-Minute Podcast Startup offers simple steps to attract, entertain, grow, and monetize an audience in any niche.Perfect my podcasters who want to make money!
Cyber Security Cryptography and Machine Learning
This book constitutes the refereed proceedings of the 5th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2021, held in Be'er Sheva, Israel, in July 2021.The 22 full and 13 short papers presented together with a keynote paper in this volume were carefully reviewed and selected from 48 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
Advances in Cybersecurity Management
This book concentrates on a wide range of advances related to IT cybersecurity management. The topics covered in this book include, among others, management techniques in security, IT risk management, the impact of technologies and techniques on security management, regulatory techniques and issues, surveillance technologies, security policies, security for protocol management, location management, GOS management, resource management, channel management, and mobility management. The authors also discuss digital contents copyright protection, system security management, network security management, security management in network equipment, storage area networks (SAN) management, information security management, government security policy, web penetration testing, security operations, and vulnerabilities management. The authors introduce the concepts, techniques, methods, approaches and trends needed by cybersecurity management specialists and educators for keeping current their cybersecurity management knowledge. Further, they provide a glimpse of future directions where cybersecurity management techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity management experts in the listed fields and edited by prominent cybersecurity management researchers and specialists.
Fundamentals of Cryptography
Cryptography, as done in this century, is heavily mathematical. But it also has roots in what is computationally feasible.This unique textbook text balances the theorems of mathematics against the feasibility of computation. Cryptography is something one actually "does", not a mathematical game one proves theorems about. There is deep math; there are some theorems that must be proved; and there is a need to recognize the brilliant work done by those who focus on theory. But at the level of an undergraduate course, the emphasis should be first on knowing and understanding the algorithms and how to implement them, and also to be aware that the algorithms must be implemented carefully to avoid the "easy" ways to break the cryptography. This text covers the algorithmic foundations and is complemented by core mathematics and arithmetic.
Antivirus Bypass Techniques
Develop more secure and effective antivirus solutions by leveraging antivirus bypass techniquesKey Features: Gain a clear understanding of the security landscape and research approaches to bypass antivirus softwareBecome well-versed with practical techniques to bypass antivirus solutionsDiscover best practices to develop robust antivirus solutionsBook Description: Antivirus software is built to detect, prevent, and remove malware from systems, but this does not guarantee the security of your antivirus solution as certain changes can trick the antivirus and pose a risk for users. This book will help you to gain a basic understanding of antivirus software and take you through a series of antivirus bypass techniques that will enable you to bypass antivirus solutions.The book starts by introducing you to the cybersecurity landscape, focusing on cyber threats, malware, and more. You will learn how to collect leads to research antivirus and explore the two common bypass approaches used by the authors. Once you've covered the essentials of antivirus research and bypassing, you'll get hands-on with bypassing antivirus software using obfuscation, encryption, packing, PowerShell, and more. Toward the end, the book covers security improvement recommendations, useful for both antivirus vendors as well as for developers to help strengthen the security and malware detection capabilities of antivirus software.By the end of this security book, you'll have a better understanding of antivirus software and be able to confidently bypass antivirus software.What You Will Learn: Explore the security landscape and get to grips with the fundamentals of antivirus softwareDiscover how to gather AV bypass research leads using malware analysis toolsUnderstand the two commonly used antivirus bypass approachesFind out how to bypass static and dynamic antivirus enginesUnderstand and implement bypass techniques in real-world scenariosLeverage best practices and recommendations for implementing antivirus solutionsWho this book is for: This book is for security researchers, malware analysts, reverse engineers, pentesters, antivirus vendors looking to strengthen their detection capabilities, antivirus users and companies that want to test and evaluate their antivirus software, organizations that want to test and evaluate antivirus software before purchase or acquisition, and tech-savvy individuals who want to learn new topics.