0404~0405_CUPPY滿額贈
0404~0405_mamayo迷你磁力片

英文書 > 全部商品

Network Architecture with Recursive Addressing

Ingram 出版
2021/05/14 出版

A network architecture, named NARA, based on recursive addressing is proposed. The Internet is modeled as a network of autonomous sites, each being a collection of nodes. Each site is named by a site address drawn from a global number space while each node is named by a node address drawn from a number space local to each site. Routing among sites depends solely on site addresses while that among nodes within each site on node addresses. Flat routing to render inherent mobility and cached routing as well as virtual routing to additionally cope with the table size are proposed. The model can recursively repeat itself both outwards and inwards in the network, enabling its applicability, for example, to inter-planetary as well as body area networks. The generic architecture NARA is then projected on IPv6 as an implementation example. Instead of introducing a new number space to unload the equivocal semantics of the IP address, the specific implementation, called SID6 (Subnet ID Deprecated for IPv6), removes the interface semantics of the Global Unicast IPv6 address which is then to exclusively identify a node and so is to be used solely as the node address.

9 特價1333
立即代訂
下次再買

Book of Anonymity

Ingram 出版
2021/05/14 出版

Anonymity is highly contested, marking the limits of civil liberties and legality. Digital technologies of communication, identification, and surveillance put anonymity to the test. They challenge how anonymity can be achieved, and dismantled. Everyday digital practices and claims for transparency shape the ways in which anonymity is desired, done, and undone.The Book of Anonymity includes contributions by artists, anthropologists, sociologists, media scholars, and art historians. It features ethnographic research, conceptual work, and artistic practices conducted in France, Germany, India, Iran, Switzerland, the UK, and the US. From police to hacking cultures, from Bitcoin to sperm donation, from Yik-Yak to Amazon and IKEA, from DNA to Big Data - thirty essays address how the reconfiguration of anonymity transforms our concepts of privacy, property, self, kin, addiction, currency, and labor.The Book of Anonymity is written in the tradition of author-less texts. Editing and contributing anonymously constitute experiments in anonymity that speak to the aggressive valuation regimes shaping contemporary artistic and academic knowledge productions alike. This is not to discount the usefulness of attribution, but to trouble the ease with which labour is still dissected, measured and attached to the nexus of person, value and knowledge. To name, one contribution insists is to "define people, things, as individuals, to mark them, hold them, hierarchize them, to press them into service and turn them into value." Another contribution advocates and questions if an ethics of anonymity can engender the kind of care that individualised practices arguably strive for yet undermine. Not all contributions speak to such concerns directly but all consider what is at stake in the im/possibilities of anonymous expression, at a time of thick digital traces. Editing and contributing anonymously thus is a practical commitment to one of the red threads that criss-cross the kaleidoscopic accounts presented in this book.

9 特價1395
立即代訂
下次再買

Applied Natural Language Processing in the Enterprise

Ingram 出版
2021/05/14 出版

NLP has exploded in popularity over the last few years. But while Google, Facebook, OpenAI, and others continue to release larger language models, many teams still struggle with building NLP applications that live up to the hype. This hands-on guide helps you get up to speed on the latest and most promising trends in NLP. With a basic understanding of machine learning and some Python experience, you'll learn how to build, train, and deploy models for real-world applications in your organization. Authors Ankur Patel and Ajay Uppili Arasanipalai guide you through the process using code and examples that highlight the best practices in modern NLP. Use state-of-the-art NLP models such as BERT and GPT-3 to solve NLP tasks such as named entity recognition, text classification, semantic search, and reading comprehension Train NLP models with performance comparable or superior to that of out-of-the-box systems Learn about Transformer architecture and modern tricks like transfer learning that have taken the NLP world by storm Become familiar with the tools of the trade, including spaCy, Hugging Face, and fast.ai Build core parts of the NLP pipeline--including tokenizers, embeddings, and language models--from scratch using Python and PyTorch Take your models out of Jupyter notebooks and learn how to deploy, monitor, and maintain them in production

9 特價2941
立即代訂
下次再買

Modern Cryptography for Cybersecurity Professionals

Lisa,Bock  著
Packt 出版
2021/05/14 出版

As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey FeaturesDiscover how cryptography is used to secure data in motion as well as at restCompare symmetric with asymmetric encryption and learn how a hash is usedGet to grips with different types of cryptographic solutions along with common applicationsBook Description: In today's world, it is important to have confidence in your data storage and transmission strategy. Cryptography can provide you with this confidentiality, integrity, authentication, and non-repudiation. But are you aware of just what exactly is involved in using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals helps you to gain a better understanding of the cryptographic elements necessary to secure your data.The book begins by helping you to understand why we need to secure data and how encryption can provide protection, whether it be in motion or at rest. You'll then delve into symmetric and asymmetric encryption and discover how a hash is used. As you advance, you'll see how the public key infrastructure (PKI) and certificates build trust between parties, so that we can confidently encrypt and exchange data. Finally, you'll explore the practical applications of cryptographic techniques, including passwords, email, and blockchain technology, along with securely transmitting data using a virtual private network (VPN).By the end of this cryptography book, you'll have gained a solid understanding of cryptographic techniques and terms, learned how symmetric and asymmetric encryption and hashed are used, and recognized the importance of key management and the PKI.What you will LearnUnderstand how network attacks can compromise dataReview practical uses of cryptography over timeCompare how symmetric and asymmetric encryption workExplore how a hash can ensure data integrity and authenticationUnderstand the laws that govern the need to secure dataDiscover the practical applications of cryptographic techniquesFind out how the PKI enables trustGet to grips with how data can be secured using a VPNWho this book is forThis book is for IT managers, security professionals, students, teachers, and anyone looking to learn more about cryptography and understand why it is important in an organization as part of an overall security framework. A basic understanding of encryption and general networking terms and concepts is needed to get the most out of this book.

9 特價2018
立即代訂
下次再買

Topics in Cryptology - Ct-Rsa 2021

Springer 出版
2021/05/13 出版

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2021, CT-RSA 2021, held in San Francisco, CA, USA, in May 2021.*The 27 full papers presented in this volume were carefully reviewed and selected from 100 submissions.CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto-graphic protocols to primitives and their implementation security.*The conference was held virtually.

9 特價6785
立即代訂
下次再買

Video Marketing Rules

Ingram 出版
2021/05/13 出版

Video Marketing Rules shows entrepreneurs and business owners how to take advantage of the Online Video Revolution for business and revenue growth. The Web - and in fact the whole world - has gone video. Cisco Systems predicts that, in the next couple of years, 90% of all web traffic will be video. Video has become the way we share, the way we communicate, the way we connect, and the way we buy and sell. Video has also become the way we search (YouTube is the second most popular search engine), the way we "surf," and the way we make buying decisions. 65% of consumers will visit a brand's website and make a purchase decision after watching a video. As an entrepreneur, video marketing is your single most powerful tool for getting more visibility more quickly, so you can get your message out, attract your ideal clients, make more money and have more impact. It's no surprise that ReelSEO reports 87% of online marketers are now using video to promote their products and services. And eMarketer confirms that 4 times as many consumers would rather watch a video about a product than read about it. Video Marketing Rules, and the accompanying website, will walk you through everything you need to know to succeed with video marketing. Once armed with your new video "superpower," there will be nothing you can't accomplish using video marketing.

9 特價844
立即代訂
下次再買

Instagram Marketing Step-By-Step

Bryan,Bren  著
Ingram 出版
2021/05/12 出版

Are you looking to grow your branding through social media powerhouses like Instagram? Would you like to be able to make the most of it by finding a niche and using relative and targeted ads to be able to deliver the best services and products to your customers? Then you've found the right book! This guide will teach you the essentials of marketing on Instagram that you can use time and time again.Marketing and campaigning through Instagram is another avenue for reaching people and turning them into loyal customers while delivering a top quality services and products. The fact that it's used globally is a huge benefit for being able to reach customers. But, another key element that comes into play is the visuals that Instagram is known for. If you want to make the most of Instagram for making your services known, then THIS is what you'll want to read.In this guide, you'll find: The essentials of Instagram and how to get startedHow your marketing efforts can benefit using InstagramThe elements of creating your own brandCreating an outstanding bio and how a top quality one makes a differenceHow to pick a profitable niche and pursue itThe ideal times to post content that help generate leads and how you can take advantage of trending topicsHow to create high quality content on Instagram including how it drives followersFinding apps that help make content creation easierThe methods that you can use to earn money through InstagramUsing stories and contests as a means to generate leads and sales, especially for your brandHow you can have well known people and brands stand behind your marketing efforts to help your brand growThe importance of Instagram algorithms and how they workHow you can track, report and break down the data that's relative to your ad campaign and use this to forecast future dataPlus so much more!If you own a business, then it's about time that you started taking advantage of the opportunities that websites like Instagram provides, and help grow your business organically by capturing your audience's attention.So, scroll up and preview this book and then click the button "Buy Now" to jump start your reach to new customers today!

9 特價684
立即代訂
下次再買

Jumpstart Jamstack Development

Packt 出版
2021/05/12 出版

Leverage Jamstack principles, techniques, and best practices to build dynamic websites and web apps focused on speed, security, and accessibilityKey Features: Understand how JavaScript integrates with reusable application program interfaces (APIs) and browser markup to build a serverless web applicationGain a solid understanding of static site development with Gatsby and its importance in JamstackFind out how to deploy a Jamstack event website directly from GitHub using NetlifyBook Description: The Jamstack (JavaScript, API, and Markup) enables web developers to create and publish modern and maintainable websites and web apps focused on speed, security, and accessibility by using tools such as Gatsby, Sanity, and Netlify. Developers working with the Jamstack will be able to put their knowledge to good use with this practical guide to static site generation and content management. This Jamstack book takes a hands-on approach to implementation and related methodologies that will have you up and running with modern web development in no time.Complete with step-by-step explanations of essential concepts, practical examples, and self-assessment questions, you'll begin by building an event and venue schema structure, and then expand the functionality, exploring all that Jamstack has to offer. You'll learn how an example Jamstack is built, build structured content using a schema, use GraphQL to expose the content, and employ Gatsby to build an event website using page and template components. Lastly, you'll deploy the website to a Netlify server.By the end of this book, you'll have gained the knowledge and skills you need to install, configure, build, extend, and deploy a simple events website by using the Jamstack.What You Will Learn: Discover the Jamstack approach and build speedy, secure, and accessible websites and web apps with its component technologiesBuild an events website by using the Jamstack and the Gatsby static site generatorCreate and modify your templates and pages to build creative web appsBuild, modify, and extend structured content schemas in SanityUnderstand Gatsby plugins, project structure, and files, and how it can be used to build Jamstack appsFind out how GatsbyJS uses GraphQL to source contentWho this book is for: This book is for web developers looking to implement Jamstack practically. JavaScript developers who want to build modern speedy and secure web apps will also find this book useful. Familiarity with JavaScript and Database programming is assumed.

9 特價1789
立即代訂
下次再買

The Subcritical Brain

Ingram 出版
2021/05/12 出版

Have over a hundred years of brain research revealed all its secrets? This book is motivated by a realization that cortical structure and behavior can be explained by a synergy of seemingly different mathematical notions: global attractors, which define non-invertible neural firing rate dynamics, random graphs, which define connectivity of neural circuit, and prime numbers, which define the dimension and category of cortical operation. Quantum computation is shown to ratify the main conclusion of the book: loosely connected small neural circuits facilitate higher information storage and processing capacities than highly connected large circuits. While these essentially separate mathematical notions have not been commonly involved in the evolution of neuroscience, they are shown in this book to be strongly inter-related in the cortical arena. Furthermore, neurophysiological experiments, as well as observations of natural behavior and evidence found in medical testing of neurologically impaired patients, are shown to support, and to be supported by the mathematical findings.

9 特價5115
立即代訂
下次再買

Mathematical Modeling and Supercomputer Technologies

Springer 出版
2021/05/11 出版

This book constitutes selected and revised papers from the 20th International Conference on Mathematical Modeling and Supercomputer Technologies, MMST 2020, held in Nizhny Novgorod, Russia, in November 2020. Due to the COVID-19 pandemic the conference was held online. The 25 full papers and 8 short papers presented in the volume were thoroughly reviewed and selected from the 106 submissions. They are organized in topical secions on ​computational methods for mathematical models analysis; computation in optimization and optimal control; supercomputer simulation.

9 特價2870
立即代訂
下次再買

Public-Key Cryptography - Pkc 2021

Juan A,Garay  著
Springer 出版
2021/05/10 出版

The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021. The conference was originally planned to take place in Edinburgh, UK, but had to change to an online format due to the COVID-19 pandemic.The 52 papers included in these proceedings were carefully reviewed and selected from 156 submissions. They focus on all aspects of public-key cryptography, covering theory, implementations and applications. This year, post-quantum cryptography, PQC constructions and cryptanalysis received special attention.

9 特價7307
立即代訂
下次再買

Advances in Artificial Intelligence and Security

Xingming,Sun  著
Springer 出版
2021/05/10 出版

​The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence;Part II: artificial intelligence; big data; cloud computing and security; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.

9 特價5741
立即代訂
下次再買

Advances in Artificial Intelligence and Security

Xingming,Sun  著
Springer 出版
2021/05/10 出版

The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence;Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.

9 特價5741
立即代訂
下次再買

Advances in Artificial Intelligence and Security

Xingming,Sun  著
Springer 出版
2021/05/10 出版

The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence;Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.

9 特價5741
立即代訂
下次再買

Zscaler Cloud Security Essentials

Packt 出版
2021/05/09 出版

Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end usersKey Features: Get up to speed with Zscaler without the need for expensive trainingImplement Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) security solutions with real-world deploymentsFind out how to choose the right options and features to architect a customized solution with ZscalerBook Description: Many organizations are moving away from on-premises solutions to simplify administration and reduce expensive hardware upgrades. This book uses real-world examples of deployments to help you explore Zscaler, an information security platform that offers cloud-based security for both web traffic and private enterprise applications.You'll start by understanding how Zscaler was born in the cloud, how it evolved into a mature product, and how it continues to do so with the addition of sophisticated features that are necessary to stay ahead in today's corporate environment. The book then covers Zscaler Internet Access and Zscaler Private Access architectures in detail, before moving on to show you how to map future security requirements to ZIA features and transition your business applications to ZPA. As you make progress, you'll get to grips with all the essential features needed to architect a customized security solution and support it. Finally, you'll find out how to troubleshoot the newly implemented ZIA and ZPA solutions and make them work efficiently for your enterprise.By the end of this Zscaler book, you'll have developed the skills to design, deploy, implement, and support a customized Zscaler security solution.What You Will Learn: Understand the need for Zscaler in the modern enterpriseStudy the fundamental architecture of the Zscaler cloudGet to grips with the essential features of ZIA and ZPAFind out how to architect a Zscaler solutionDiscover best practices for deploying and implementing Zscaler solutionsWho this book is for: This book is for security engineers, security architects, security managers, and security operations specialists who may be involved in transitioning to or from Zscaler or want to learn about deployment, implementation, and support of a Zscaler solution. Anyone looking to step into the ever-expanding world of zero-trust network access using the Zscaler solution will also find this book useful.

9 特價2248
立即代訂
下次再買

Cisco Certified CyberOps Associate 200-201 Certification Guide

Glen D,Singh  著
Packt 出版
2021/05/09 出版

Begin a successful career in cybersecurity operations by achieving Cisco Certified CyberOps Associate 200-201 certificationKey FeaturesReceive expert guidance on how to kickstart your career in the cybersecurity industryGain hands-on experience while studying for the Cisco Certified CyberOps Associate certification examWork through practical labs and exercises mapped directly to the exam objectivesBook DescriptionAchieving the Cisco Certified CyberOps Associate 200-201 certification helps you to kickstart your career in cybersecurity operations. This book offers up-to-date coverage of 200-201 exam resources to fully equip you to pass on your first attempt.The book covers the essentials of network security concepts and shows you how to perform security threat monitoring. You'll begin by gaining an in-depth understanding of cryptography and exploring the methodology for performing both host and network-based intrusion analysis. Next, you'll learn about the importance of implementing security management and incident response strategies in an enterprise organization. As you advance, you'll see why implementing defenses is necessary by taking an in-depth approach, and then perform security monitoring and packet analysis on a network. You'll also discover the need for computer forensics and get to grips with the components used to identify network intrusions. Finally, the book will not only help you to learn the theory but also enable you to gain much-needed practical experience for the cybersecurity industry.By the end of this Cisco cybersecurity book, you'll have covered everything you need to pass the Cisco Certified CyberOps Associate 200-201 certification exam, and have a handy, on-the-job desktop reference guide.What you will LearnIncorporate security into your architecture to prevent attacksDiscover how to implement and prepare secure designsIdentify access control models for digital assetsIdentify point of entry, determine scope, contain threats, and remediateFind out how to perform malware analysis and interpretationImplement security technologies to detect and analyze threatsWho this book is forThis book is for students who want to pursue a career in cybersecurity operations, threat detection and analysis, and incident response. IT professionals, network security engineers, security operations center (SOC) engineers, and cybersecurity analysts looking for a career boost and those looking to get certified in Cisco cybersecurity technologies and break into the cybersecurity industry will also benefit from this book. No prior knowledge of IT networking and cybersecurity industries is needed.

9 特價2248
立即代訂
下次再買

Technological Innovation for Applied AI Systems

Springer 出版
2021/05/06 出版

This book constitutes the refereed proceedings of the 12th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2021, held in Costa de Caparica, Portugal, in July 2021.*The 34 papers presented were carefully reviewed and selected from 92 submissions. The papers present selected results produced in engineering doctoral programs and focus on technological innovation for industry and service systems. Research results and ongoing work are presented, illustrated and discussed in the following areas: collaborative networks; smart manufacturing; cyber-physical systems and digital twins; intelligent decision making; smart energy management; communications and electronics; classification systems; smart healthcare systems; and medical devices. *The conference was held virtually.Chapters "Characteristics of Adaptable Control of Production Systems and the Role of Self-organization Towards Smart Manufacturing" and "Predictive Manufacturing: Enabling Technologies, Frameworks and Applications" are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

9 特價6785
立即代訂
下次再買

Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity

Yan,Lin  著
Springer 出版
2021/05/06 出版

There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was considered hard without the support of source code. The second component is embedding the CFI policy securely. Current CFI enforcement usually inserts checks before indirect branches to consult a read-only table which stores the valid CFG information. However, this kind of read-only table can be overwritten by some kinds of attacks (e.g., the Rowhammer attack and data-oriented programming). The third component is to efficiently enforce the CFI policy. In current approaches CFI checks are always executed whenever there is an indirect control flow transfer. Therefore, it is critical to minimize the performance impact of CFI checks.In this book, we propose novel solutions to handle these three fundamental components.To generate a precise CFI policy without the support of the source code, we systematically study two methods which recover CFI policy based on function signature matching at the binary level and propose our novel rule- and heuristic-based mechanism to more accurately recover function signature. To embed CFI policy securely, we design a novel platform which encodes the policy into the machine instructions directly without relying on consulting any read-only data structure, by making use of the idea of instruction-set randomization. Each basic block is encrypted with a key derived from the CFG. To efficiently enforce CFI policy, we make use of a mature dynamic code optimization platform called DynamoRIO to enforce the policy so that we are only required to do the CFI check when needed.

9 特價5741
立即代訂
下次再買

Applied Cryptography and Network Security

Kazue,Sako  著
Springer 出版
2021/05/06 出版

The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.

9 特價4697
立即代訂
下次再買

Deep Learning and Linguistic Representation

Ingram 出版
2021/05/06 出版

Deep Learning and Linguistic Representation looks at the application of a variety of deep learning systems to several cognitively interesting NLP tasks. It also considers the extent to which this work illuminates our understanding of the way in which humans acquire and represent linguistic knowledge.

9 特價4175
立即代訂
下次再買

Silicon Valley Cybersecurity Conference

Springer 出版
2021/05/06 出版

This book constitutes selected and revised papers from the First Silicon Valley Cybersecurity Conference, held in San Jose, USA, in December 2020. Due to the COVID-19 pandemic the conference was held in a virtual format. The 9 full papers and 6 short papers presented in this volume were thoroughly reviewed and selected from 30 submissions. They present most recent research on dependability, reliability, and security to address cyber-attacks, vulnerabilities, faults, and errors in networks and systems.

9 特價2870
立即代訂
下次再買

Hey Cyba

Steve,Young  著
Ingram 出版
2021/05/05 出版

Recent developments in artificial intelligence, especially neural network and deep learning technology, have led to rapidly improving performance in voice assistants such as Siri and Alexa. Over the next few years, capability will continue to improve and become increasingly personalised. Today's voice assistants will evolve into virtual personal assistants firmly embedded within our everyday lives. Told through the view of a fictitious personal assistant called Cyba, this book provides an accessible but detailed overview of how a conversational voice assistant works, especially how it understands spoken language, manages conversations, answers questions and generates responses. Cyba explains through examples and diagrams the neural network technology underlying speech recognition and synthesis, natural language understanding, knowledge representation, conversation management, language translation and chatbot technology. Cyba also explores the implications of this rapidly evolving technology for security, privacy and bias, and gives a glimpse of future developments. Cyba's website can be found at HeyCyba.com.

9 特價1286
立即代訂
下次再買

Campus Network Architectures and Technologies

Ningguo,Shen  著
Ingram 出版
2021/05/05 出版

The book will provide readers with a comprehensive understanding of next-generation campus network solutions, technical implementation, planning, design, and additional know-how, leveraging Huawei's years of technical expertise and practices in the network field.

9 特價8352
立即代訂
下次再買

Secure Searchable Encryption and Data Management

Brij B,Gupta  著
Ingram 出版
2021/05/05 出版

This book provides every necessary detail required to develop the secure searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models which ensures the minimum security requirements for real-world application.

9 特價3600
立即代訂
下次再買

Internet of Things

Ingram 出版
2021/05/03 出版

This book provides future research directions in energy, industry, and healthcare domain, and explores the different applications of IoT and its associated technologies. The book discusses software architecture, middleware, data processing and management as well as security, sensors and algorithms.

9 特價3705
立即代訂
下次再買

Beginning Ruby 3

Apress 出版
2021/05/01 出版

Learn the principles behind object-oriented programming in Ruby and within a few chapters create a fully functional Ruby 3-based application. You'll gain a basic understanding of many ancillary technologies such as databases, XML, web frameworks, and networking - some of which will be needed for your first Ruby application. Based on the bestselling first and second editions, Beginning Ruby 3, 4th Edition is a leading guide to learn Ruby from the ground up. The new edition of this book provides the same excellent introduction to Ruby as the previous editions plus updates for the newest version of Ruby, including performance through an improved allocator, decreased heap fragmentation and more. Also, added: details on the just-in-time compiler, fewer limits on GIL (Global Interpreter Lock), and a static type checker. You'll see why the light and agile Ruby programming language remains a popular open source scripting option for developers building today's web applications. This book can also be used as a textbook or companion to a textbook on beginning Ruby programming. After reading and using this book, you'll have a firm handle to program in the Ruby language. What You Will Learn Discover the fundamentals of Ruby and its object-oriented building blocks Use the Ruby libraries, gems, and documentation Work with files and databases Write and deploy Ruby applications Harness the various Ruby web frameworks and use them effectively Do network programming with Ruby Who This Book Is For Beginning programmers, programmers new to Ruby, and web developers interested in learning the foundations of the Ruby programming language.

9 特價2052
立即代訂
下次再買

The Digital Frontier

Ingram 出版
2021/05/01 出版

The global web and its digital ecosystem can be seen as tools of emancipation, communication, and spreading knowledge or as means of control, fueled by capitalism, surveillance, and geopolitics.The Digital Frontier interrogates the world wide web and the digital ecosystem it has spawned to reveal how their conventions, protocols, standards, and algorithmic regulations represent a novel form of global power. Sangeet Kumar shows the operation of this power through the web's "infrastructures of control" visible at sites where the universalizing imperatives of the web run up against local values, norms, and cultures. These include how the idea of the "global common good" is used as a ruse by digital oligopolies to expand their private enclosures, how seemingly collaborative spaces can simultaneously be exclusionary as they regulate legitimate knowledge, how selfhood is being redefined online along Eurocentric ideals, and how the web's political challenge is felt differentially by sovereign nation states. In analyzing this new modality of cultural power in the global digital ecosystem, The Digital Frontier is an important read for scholars, activists, academics and students inspired by the utopian dream of a truly representative global digital network.

9 特價4095
立即代訂
下次再買

The Cybersecurity Manager's Guide

Todd,Barnum  著
Ingram 出版
2021/05/01 出版

If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manager's guide offers a new approach to building and maintaining an information security program that's both effective and easy to follow. Author and longtime chief information security officer (CISO) Todd Barnum upends the assumptions security professionals take for granted. CISOs, chief security officers, chief information officers, and IT security professionals will learn a simple seven-step process for building a new program or improving a current one. Build better relationships across the organization Align your role with your company's values, culture, and tolerance for information loss Lay the groundwork for your security program Create a communications program to share your team's contributions and educate your coworkers Transition security functions and responsibilities to other teams Organize and build an effective InfoSec team Measure your company's ability to recognize and report security policy violations and phishing emails

9 特價1573
立即代訂
下次再買

The Digital Frontier

Ingram 出版
2021/05/01 出版

The global web and its digital ecosystem can be seen as tools of emancipation, communication, and spreading knowledge or as means of control, fueled by capitalism, surveillance, and geopolitics.The Digital Frontier interrogates the world wide web and the digital ecosystem it has spawned to reveal how their conventions, protocols, standards, and algorithmic regulations represent a novel form of global power. Sangeet Kumar shows the operation of this power through the web's "infrastructures of control" visible at sites where the universalizing imperatives of the web run up against local values, norms, and cultures. These include how the idea of the "global common good" is used as a ruse by digital oligopolies to expand their private enclosures, how seemingly collaborative spaces can simultaneously be exclusionary as they regulate legitimate knowledge, how selfhood is being redefined online along Eurocentric ideals, and how the web's political challenge is felt differentially by sovereign nation states. In analyzing this new modality of cultural power in the global digital ecosystem, The Digital Frontier is an important read for scholars, activists, academics and students inspired by the utopian dream of a truly representative global digital network.

9 特價1755
立即代訂
下次再買

Ruby Cat Farm

Blurb 出版
2021/04/30 出版

This is a friendly walkthrough that'll help you build your first web application using a powerful, beautiful language called Ruby. The framework's called Rails. We'll be helping cats run a farm.

9 特價1606
立即代訂
下次再買

Preparing for Digital Disruption

Springer 出版
2021/04/29 出版

This open access book offers an analysis of why preparations for digital disruption should become a stated goal of security policy and policies that aim to safeguard the continuity of critical infrastructure. The increasing use of digital technology implies new and significant vulnerabilities for our society. However, it is striking that almost all cyber-security measures taken by governments, international bodies and other major players are aimed at preventing incidents. But there is no such thing as total digital security. Whether inside or outside the digital domain, incidents can and will occur and may lead to disruption. While a raft of provisions, crisis contingency plans and legal regulations are in place to deal with the possibility of incidents in the 'real world', no equivalence exists for the digital domain and digital disruption. Hence, this book uniquely discusses several specific policy measures government and businesses should take in order to be better prepared to dealwith a digital disruption and prevent further escalation.

9 特價2609
立即代訂
下次再買

Vue.js 3 By Example

Packt 出版
2021/04/28 出版

Kick-start your Vue.js development career by learning the fundamentals of Vue 3 and its integration with modern web technologies such as Electron, GraphQL, Ionic, and LaravelKey Features: Download complete source code for all Vue.js projects built throughout the bookDiscover steps to build production-ready Vue.js apps across web, mobile, and desktopBuild a compelling portfolio of web apps, including shopping cart system, booking app, slider puzzle game, real-time chat app, and moreBook Description: With its huge ecosystem and wide adoption, Vue is one of the leading frameworks thanks to its ease of use when developing applications. However, it can get challenging for aspiring Vue.js developers to make sense of the ecosystem and build meaningful applications.This book will help you understand how you can leverage Vue effectively to develop impressive apps quickly using its latest version - Vue 3.0.The book takes an example-based approach to help you get to grips with the basics of Vue 3 and create a simple application by exploring features such as components and directives. You'll then enhance your app building skills by learning how to test the app with Jest and Vue Test Utils. As you advance, you'll understand how to write non-web apps with Vue 3, create cross-platform desktop apps with the Electron plugin, and build a multi-purpose mobile app with Vue and Ionic. You'll also be able to develop web apps with Vue 3 that interact well with GraphQL APIs. Finally, you'll build a chat app that performs real-time communication using Vue 3 and Laravel.By the end of this Vue.js book, you'll have developed the skills you need to build real-world apps using Vue 3 by working through a range of projects.What You Will Learn: Get to grips with Vue architecture, components, props, directives, mixins, and other advanced featuresUnderstand the Vue 3 template system and use directivesUse third-party libraries such as Vue Router for routing and Vuex for state managementCreate GraphQL APIs to power your Vue 3 web appsBuild cross-platform Vue 3 apps with Electron and IonicMake your Vue 3 apps more captivating with PrimeVueBuild real-time communication apps with Vue 3 as the frontend and LaravelWho this book is for: This book is for web developers who want to learn frontend web development with Vue 3 and use it to create professional applications. You'll also find this book useful if you're looking to create full-stack web apps with Vue.js 3.0 as the frontend. Knowledge of JavaScript programming is required to get the most out of this book.

9 特價2018
立即代訂
下次再買

Python Natural Language Processing Cookbook

Zhenya,Antic  著
Packt 出版
2021/04/27 出版

Get to grips with solving real-world NLP problems, such as dependency parsing, information extraction, topic modeling, and text data visualizationKey Features: Analyze varying complexities of text using popular Python packages such as NLTK, spaCy, sklearn, and gensimImplement common and not-so-common linguistic processing tasks using Python librariesOvercome the common challenges faced while implementing NLP pipelinesBook Description: Python is the most widely used language for natural language processing (NLP) thanks to its extensive tools and libraries for analyzing text and extracting computer-usable data. This book will take you through a range of techniques for text processing, from basics such as parsing the parts of speech to complex topics such as topic modeling, text classification, and visualization.Starting with an overview of NLP, the book presents recipes for dividing text into sentences, stemming and lemmatization, removing stopwords, and parts of speech tagging to help you to prepare your data. You'll then learn ways of extracting and representing grammatical information, such as dependency parsing and anaphora resolution, discover different ways of representing the semantics using bag-of-words, TF-IDF, word embeddings, and BERT, and develop skills for text classification using keywords, SVMs, LSTMs, and other techniques. As you advance, you'll also see how to extract information from text, implement unsupervised and supervised techniques for topic modeling, and perform topic modeling of short texts, such as tweets. Additionally, the book shows you how to develop chatbots using NLTK and Rasa and visualize text data.By the end of this NLP book, you'll have developed the skills to use a powerful set of tools for text processing.What You Will Learn: Become well-versed with basic and advanced NLP techniques in PythonRepresent grammatical information in text using spaCy, and semantic information using bag-of-words, TF-IDF, and word embeddingsPerform text classification using different methods, including SVMs and LSTMsExplore different techniques for topic modeling such as K-means, LDA, NMF, and BERTWork with visualization techniques such as NER and word clouds for different NLP toolsBuild a basic chatbot using NLTK and RasaExtract information from text using regular expression techniques and statistical and deep learning toolsWho this book is for: This book is for data scientists and professionals who want to learn how to work with text. Intermediate knowledge of Python will help you to make the most out of this book. If you are an NLP practitioner, this book will serve as a code reference when working on your projects.

9 特價2523
立即代訂
下次再買

Blockchain, Artificial Intelligence, and the Internet of Things

Pethuru,Raj  著
Springer 出版
2021/04/27 出版

This book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. This book aids readers in gaining insight and knowledge about providing security and solutions to different challenges in IoT using Blockchain technology. This book primarily focuses on challenges to addressing the integration of the IoT with Blockchain with respect to potential benefits for IoT. This book gives descriptive analysis of Blockchain integrated with IoT applications and platforms for the development of IoT solutions along with possible topologies to that integration. Several application examples are included in a variety of industries.

9 特價3131
立即代訂
下次再買

Implementing Enterprise Cybersecurity with Open-Source Software and Standard Architecture

Anand,Handa  著
Ingram 出版
2021/04/27 出版

Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with knowledge of the standard architecture of enterprise security, tools are often used ineffectively. The Editors have developed multiple projects which can help in developing cybersecurity solution architectures and the use of the right tools from the open-source software domain. This book has 8 chapters describing these projects in detail with recipes on how to use open-source tooling to obtain standard cyber defense and the ability to do self-penetration testing and vulnerability assessment. This book also demonstrates work related to malware analysis using machine learning and implementation of honeypots, network Intrusion Detection Systems in a security operation center environment. It is essential reading for cybersecurity professionals and advanced students.

9 特價6786
立即代訂
下次再買

Scam Proof Your Life in the End Times

Ingram 出版
2021/04/27 出版

Scams come in all sizes. Some are schoolyard scams by teenage bullies. Others are hedge-fund sized scams like Bernie Madoff's Ponzi scheme. In our new digital age, there are scams involving e-commerce, ransomware online job interviews, bitcoin mining and cryptocurrency robberies. The list goes on and on.Scammers can target anyone, but especially trusting people like Christians. That's why Jesus told Christians to be wise as serpents and harmless as doves (Matthew 10:16). By the time a scam is discovered, oftentimes the damage is done and hard to reverse. To sue for recovery in court may cost you an arm and a leg in stress and legal fees. To expect the government to fix your scam may take a very long time. Meanwhile, you've been hit. What can you do? There is something that you can do if you're a child of God. You just may not know it yet. In this book, you will learn the steps to take both spiritually and naturally to find peace and justice once you've been scammed. You will also be equipped with practical ways to avoid the most common scams so you do not have to become a victim. If there is one thing most needed in the Body of Christ, it is wisdom. This book will make the law-abiding citizen wise.

9 特價529
立即代訂
下次再買

Infosec Strategies and Best Practices

Packt 出版
2021/04/27 出版

Advance your career as an information security professional by turning theory into robust solutions to secure your organizationKey Features: Convert the theory of your security certifications into actionable changes to secure your organizationDiscover how to structure policies and procedures in order to operationalize your organization's information security strategyLearn how to achieve security goals in your organization and reduce software riskBook Description: Information security and risk management best practices enable professionals to plan, implement, measure, and test their organization's systems and ensure that they're adequately protected against threats.The book starts by helping you to understand the core principles of information security, why risk management is important, and how you can drive information security governance. You'll then explore methods for implementing security controls to achieve the organization's information security goals. As you make progress, you'll get to grips with design principles that can be utilized along with methods to assess and mitigate architectural vulnerabilities. The book will also help you to discover best practices for designing secure network architectures and controlling and managing third-party identity services. Finally, you will learn about designing and managing security testing processes, along with ways in which you can improve software security.By the end of this infosec book, you'll have learned how to make your organization less vulnerable to threats and reduce the likelihood and impact of exploitation. As a result, you will be able to make an impactful change in your organization toward a higher level of information security.What You Will Learn: Understand and operationalize risk management concepts and important security operations activitiesDiscover how to identify, classify, and maintain information and assetsAssess and mitigate vulnerabilities in information systemsDetermine how security control testing will be undertakenIncorporate security into the SDLC (software development life cycle)Improve the security of developed software and mitigate the risks of using unsafe softwareWho this book is for: If you are looking to begin your career in an information security role, then this book is for you. Anyone who is studying to achieve industry-standard certification such as the CISSP or CISM, but looking for a way to convert concepts (and the seemingly endless number of acronyms) from theory into practice and start making a difference in your day-to-day work will find this book useful.

9 特價2018
立即代訂
下次再買

Digital Robbery

Springer 出版
2021/04/25 出版

The insecure nature of cyberspace.- Why rob banks? That's where the money is......even online!.- The ATM hacking case.- Implications of FCB Case.

9 特價4175
立即代訂
下次再買

Electronics and Communications Engineering

Ingram 出版
2021/04/25 出版

Every day, millions of people are unaware of the amazing processes that take place when using their phones, connecting to broadband internet, watching television, or even the most basic action of flipping on a light switch. Advances are being continually made in not only the transmission of this data but also in the new methods of receiving it. These advancements come from many different sources and from engineers who have engaged in research, design, development, and implementation of electronic equipment used in communications systems. This volume addresses a selection of important current advancements in the electronics and communications engineering fields, focusing on signal processing, chip design, and networking technology. The sections in the book cover: Microwave and antennasCommunications systemsVery large-scale integrationEmbedded systemsIntelligent control and signal processing systems

9 特價5167
立即代訂
下次再買

Mobile Information Service for Networks

Springer 出版
2021/04/25 出版

This book introduces readers to mobile information services for networks. The content is divided into eight chapters, each of which presents a specific concept and the latest related developments in mobile information services. Mobile information services for networks can be defined as platform-independent functional entities that provide various services based on the communication network platform. The book discusses the three main supporting technologies for mobile information services: neighbor discovery in the data link layer; routing and balanced association in the network layer; and community structure detection in the application layer. Lastly, the book describes the development of applications based on the authors' mobile information service platform, as well as related key technologies in the domains of intelligent transportation, smart tourism, and mobile payment, such as trajectory analysis, location recommendation, and mobile behavior authentication, which are promoting the development of mobile information services. This book offers a valuable reference guide for researchers in the field of computer science and technology, as well as those in the field of network mobile information service technology.

9 特價5741
立即代訂
下次再買

Mobile, Wireless and Sensor Networks

Amine,Dahane  著
Ingram 出版
2021/04/25 出版

Wireless networking covers a variety of topics involving many challenges. The main concern of clustering approaches for mobile wireless sensor networks (WSNs) is to prolong the battery life of the individual sensors and the network lifetime. For a successful clustering approach, the need of a powerful mechanism to safely elect a cluster head remains a challenging task in many research works that take into account the mobility of the network. In Mobile, Wireless and Sensor Networks: A Clustering Algorithm for Energy Efficiency and Safety, the authors use an approach based on computing of the weight of each node in the network as the proposed technique to deal with this problem. They present a virtual laboratory platform (VLP) of baptized mercury, allowing students and researchers to make practical work (PW) on different aspects of mobile wireless sensor networks. The authors' choice of WSNs is motivated mainly by the use of real experiments needed in most college courses on WSNs. These usual experiments, however, require an expensive investment and many nodes in the classroom. The platform presented here aims at showing the feasibility, the flexibility, and the reduced cost using the authors' approach. The authors demonstrate the performance of the proposed algorithms that contribute to the familiarization of the learners in the field of WSNs.The book will be a valuable resource for students in networking studies as well as for faculty and researchers in this area.    

9 特價5167
立即代訂
下次再買

Side-Channel Analysis of Embedded Systems

Springer 出版
2021/04/23 出版

It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted device is protected by random masking. The authors explain advances in the field and provide the reader with mathematical formalizations. They present all known analyses within the same notation framework, which allows the reader to rapidly understand and learn contrasting approaches. It will be useful as a graduate level introduction, also for self-study by researchers and professionals, and the examples are taken from real-world datasets.

9 特價3653
立即代訂
下次再買

At Large

Simon & Sc 出版
2021/04/23 出版

Hailed as "a chilling portrait" by The Boston Globe and "a crafty thriller" by Newsweek, this astonishing story of an obsessive hacker promises to change the way you look at the Internet forever. At Large chronicles the massive manhunt that united hard-nosed FBI agents, computer nerds, and uptight security bureaucrats against an elusive computer outlaw who broke into highly secured computer systems at banks, universities, federal agencies, and top-secret military weapons-research sites. Here is "a real-life tale of cops vs. hackers, by two technology writers with a flair for turning a complicated crime and investigation into a fast-moving edge-of-your-seat story" (Kirkus Reviews, starred). At Large blows the lid off the frightening vulnerability of the global online network, which leaves not only systems, but also individuals, exposed.

9 特價1284
立即代訂
下次再買

Mike Meyers’ Comptia Security+ Certification Guide, Third Edition (Exam Sy0-601)

McGraw-Hill 出版
2021/04/20 出版

An up-to-date CompTIA Security+ exam guide from training and exam preparation guru Mike Meyers In Mike Meyers' CompTIA Security+(TM) Certification Guide, Third Edition (Exam SY0-601), the leading expert on CompTIA certification and training brings his highly effective methodology to IT security. Within each chapter, modules drill down on specific exam objectives, providing a clear learning path. All official exam objectives are covered, and chapter-ending practice exam questions reinforce the concepts presented. This practical resource goes beyond knowledge application and teaches you the skills you need to anticipate security risks and guard against them. Covers all the exam topics, including: Risk managementCryptographyAuthentication and authorizationHost, LAN, and application securityWireless, cloud, and mobile securityEnvironmental security and controlsOnline content includes: 200+ practice exam questions in a customizable test engineOne hour+ of video training from Mike MeyersFree lab simulationsMike's toolbox of favorite network security-related freeware and shareware

9 特價1368
立即代訂
下次再買

Facebook for Dummies

For Dummies 出版
2021/04/20 出版

Be a new face on Facebook! If you're new to the Facebook user community, don't be shy: you're joining around 2.7 billion users (roughly two-and-a-half Chinas) worldwide, so you'll want to make sure you're being as sociable as possible. And with more functionality and ways to say hello--like 3-D photos and Video Chat rooms--than ever before, Facebook For Dummies is the perfect, informative companion to get and new and inexperienced users acquainted with the main features of the platform and comfortable with sharing posts, pictures (or whatever else you find interesting) with friends, family, and the world beyond! In a chatty, straightforward style, your friendly hosts, Carolyn Abram and Amy Karasavas--both former Facebook employees--help you get settled in with the basics, like setting up your profile and adding content, as well as protecting your privacy when you want to decide who can and can't see your posts. They then show you how to get involved as you add new friends, toggle your newsfeed, shape your timeline story, join groups, and more. They even let you in on ways to go pro and use Facebook for work, such as building a promo page and showing off your business to the world. Once you come out of your virtual shell, there'll be no stopping you! Build your profile and start adding friends Send private messages and instant notes Share your memories Tell stories about your day Set your privacy and curate your news feed Don't be a wallflower: with this book you have the ideal icebreaker to get the party started so you can join in with all the fun!

9 特價1026
立即代訂
下次再買

NVivo R 1

Ingram 出版
2021/04/20 出版

As a continuation of the previous work (NVivo R 1: Handling Qualitative Data), this book will address how to import project, text file, PDF file, Doc and RTF file, Audio file, Video file, Picture file, Memo, External file, NCapture, Facebook, and Tweeter data, Capturing the data from a Korean site, SNS, Facebook, Twitter, and Endnote data. Then, the demonstration will be extended to the issue of how to code to capture the essence of these data.

9 特價3068
立即代訂
下次再買

Media and Law

Ingram 出版
2021/04/19 出版

In Media and Law: Between Free Speech and Censorship, Mathieu Deflem and Derek M.D Silva have gathered an interdisciplinary team of leading experts to make a valuable contribution to the existing literature. This volume explores free speech and the control thereof from both a political as well as cultural lens. These topics have once again moved center stage in scholarly as well as popular discussions on what must, should, and should not be said in the public sphere of ideas, opinions, and tastes. In a world of alternative facts, fake news, gender politics, company self-censorship, edited art, hate speech, and career-ending tweets, the chapters in this volume make a timely contribution.

9 特價6367
立即代訂
下次再買

Digital Forensics Explained

Greg,Gogolin  著
Ingram 出版
2021/04/18 出版

Digital Forensics Explained, 2nd edition, covers the full life cycle of conducting a mobile and computer digital forensic examinations including planning and performing an investigation as well as report writing and testifying.

9 特價4070
立即代訂
下次再買
頁數68/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing