Artificial Intelligence in Recruiting. A Literature Review on Artificial Intelligence Technologies, Ethical Implications and the Resulting Chances and Risks
Master's Thesis from the year 2020 in the subject Computer Sciences - Artificial Intelligence, grade: 1,3, Friedrich-Alexander University Erlangen-Nuremberg (Wirtschaftsinformatik), language: English, abstract: The thesis aims to analyze this field of tension between the benefits and risks caused by the introduction of AI into recruiting based on a systematic analysis of academic publications. To the knowledge of the author, neither a literature review on ethical challenges of AI-based recruiting tools nor an overview addressing application fields and the resulting ethical risks has been published so far. Consequently, this thesis aims to close this research gap by disclosing how AI technologies affect the recruiting process and how ethical challenges arising from the implementation of AI-based tools are addressed in the same publications. Consequently, research question (RQ) one (RQ1) and RQ two (RQ2) can be derived: Which AI technologies are applied in the field of recruiting, and how do they influence the recruiting process? Which major ethical challenges arise from the introduction of AI into recruiting, and how are these challenges addressed by the proposed AI-based tools? Addressing these two RQs, the remainder of this thesis is structured as follows. Chapter 2 classifies recruiting and its subprocesses as a part of Human Resources (HR), establishes a common understanding of AI and machine learning (ML) algorithms relevant in AI-based recruiting tools, and derives major ethical challenges with a focus on the ethical principles fairness and transparency. In chapter 3, the methodical approach used for identifying and selecting relevant literature is described. Chapter 4 answers both RQs, based on the AI-based recruiting tools included in the literature set. In turn, the first part of the analysis focuses on analyzing how the needs raised through traditional recruiting means are addressed by AI-based recruiting tools, also touching base on the underlying techno
Dise簽o de asistente artificial en bibliotecas y usos acad矇micos
Projektarbeit aus dem Jahr 2020 im Fachbereich Informatik - K羹nstliche Intelligenz, Instituto Tecnol籀gico Superior de Tierra Blanca, Sprache: Deutsch, Abstract: Este proyecto tiene como finalidad dise簽ar y desarrollar un asistente inteligente personal para personas que necesiten la ayuda para actualizarse en el nuevo mundo de la tecnolog穩a, con el fin de facilitar la adaptaci籀n de las nuevas tecnolog穩as, tambi矇n ayudar en la vida cotidiana de las personas, as穩 como personalizarlo al propio gusto del usuario y hacer diversas actividades que est矇n al alcance. La idea de este proyecto surge con crear una versi籀n reducida, una demo de un asistente inteligente que tenga la capacidad de servir a los dem獺s y de bajo coste, pero con las mismas prestaciones que los asistentes inteligentes ya existentes en el mercado actual como pueden ser Siri o Google Home y con el prop籀sito de que el dispositivo dise簽ado sea capaz de procesar la voz y reproducir las respuestas dirigidas al usuario en espa簽ol. El proyecto como finalidad tiene a ayudar las necesidades de las personas, as穩 como tambi矇n llegar a hacer cosas por su usuario con el simple hecho de solo recibir la orden. As穩 mismo tiene tambi矇n de base construir un asistente artificial inteligente cubriendo las necesidades del usuario en el 獺mbito laboral y vida cotidiana a un costo considerable dejando satisfecho al cliente. En los 繳ltimos a簽os ha llegado a crecer la idea de que llegan nuevas tecnolog穩as, por lo cual nos hemos dado cuenta de que nosotros mismos estamos construyendo el futuro con nuevas ideas usando la nueva tecnolog穩a y aprendi矇ndola a usar, no obstante, no todos en el mundo est獺n a la disposici籀n de poderse actualizar a un nuevo mundo lleno de cosas nuevas. Tambi矇n en los 繳ltimos a簽os ha llegado a crecer el uso de nuevos asistentes artificiales inteligentes en tel矇fonos celulares y el hogar. Aunque tr獺gicamente un asiste como este puede ser muy caro y no puede cubrir exactamente todas las necesidades del usu
Mastering Veeam Backup & Replication 10
Gain proficiency in monitoring infrastructure along with focusing on cloud backup and recoveryKey Features: Explore the 3-2-1 rule of backups in Veeam to keep your data safeGain in-depth knowledge of NAS backups and Scale-Out Repositories to use in your virtual environmentDiscover Veeam's monitoring and reporting utility - Veeam ONE - along with Linux and Window's proxyBook Description: Veeam is one of the leading modern data protection solutions, and mastering this technology can help you to protect your virtual environments effectively. This book guides you through implementing modern data protection solutions for your cloud and virtual infrastructure with Veeam. You will even gain in-depth knowledge of advanced concepts such as DataLabs, cloud backup and recovery, Instant VM Recovery, and Veeam ONE.This book starts by taking you through Veeam essentials, including installation, best practices, and optimizations for Veeam Backup & Replication. You'll get to grips with the 3-2-1 rule to safeguard data along with understanding how to set up a backup server, proxies, repositories, and more. Later chapters go on to cover a powerful feature of Veeam 10 - NAS backup. As you progress, you'll learn about scale-out Repositories and best practices for creating them. In the concluding chapters, you'll explore the new proxy option available in both Linux and Windows. Finally, you'll discover advanced topics such as DataLabs, cloud backup and recovery, Instant VM Recovery, and Veeam ONE.By the end of this book, you will be equipped with the skills you need to implement Veeam Backup & Replication for your environment and disaster recovery.What You Will Learn: Discover the advanced concepts of Veeam Backup & Replication 10Master application optimizations based on Veeam best practicesUnderstand how to configure NAS backups and work with repositories and proxiesExplore different ways to protect your backups, including object immutability and cloud backup and recoveryDiscover how DataLabs worksUnderstand how Instant VM Recovery allows you to restore virtual machinesBecome well versed in Veeam ONE for monitoring and reporting on your environmentWho this book is for: This Veeam backup book is for IT professionals who have intermediate to advanced-level knowledge of virtualization as well as backups and backup applications. Anyone who needs a reference guide for learning the advanced features of Veeam Backup & Replication and how they are used, including best practices and optimizations, will also find this book useful.
Cybersecurity Now
The Importance of Cybersecurity NowAs we look back on 2020, there are many things we have learned, and one thing holds true for every business owner: preparing for the unknown is crucial to business longevity. Last year brought a level of uncertainty to the business community that threatened business owners worldwide. Almost overnight, entrepreneurs around the world had to change their business model and the way they had been operating for years. With this change came new threats to businesses. Cybersecurity is not a commodity - instead, cybersecurity is essential for every business owner and this must be conveyed to the business community. We must educate the business community about the importance of cybersecurity and the dire need for securing the information within their business.Cybersecurity Now is co-written by a group of 11 high-level IT & Cybersecurity experts who have come together to teach business owners what you need to know about protecting your business from cybersecurity threats. Topics covered are: Proactive Cyber Defense Inside the Mind of a Hacker The Importance of Email SecurityYou Are A Target: Why Hackers Are Looking For You Are You Being Hacked? What to Look Out For Understanding the Risk of a Cyber Attack How to Avoid Being a Security Risk The Business Impact of a Breach Cybersecurity Defined How Human Error Can Cost You Thousands How to Protect Your Data No business is too small to avoid getting hacked; it is simply a matter of time. Learn what to do NOW so you can protect your business.Brought together by Chris Wiser of 7 Figure MSP, the co-authors are: ContentsGeorge McCracken, Amir Sachs, Fred Hughes, Christopher Bartosz, Izak Oosthuizen, Ron Trotto, James Grabatin, Jerry Swartz, Whit Taylor, Joseph A. Vitti and Tim Smoot.
Rust Web Programming
Adopt the Rust programming language by learning how to build fully functional web applications and services and address challenges relating to safety and performanceKey Features: Build scalable web applications in Rust using popular frameworks such as Actix, Rocket, and WarpCreate front-end components that can be injected into multiple viewsDevelop data models in Rust to interact with the databaseBook Description: Are safety and high performance a big concern for you while developing web applications?While most programming languages have a safety or speed trade-off, Rust provides memory safety without using a garbage collector. This means that with its low memory footprint, you can build high-performance and secure web apps with relative ease.This book will take you through each stage of the web development process, showing you how to combine Rust and modern web development principles to build supercharged web apps.You'll start with an introduction to Rust and understand how to avoid common pitfalls when migrating from traditional dynamic programming languages. The book will show you how to structure Rust code for a project that spans multiple pages and modules. Next, you'll explore the Actix Web framework and get a basic web server up and running. As you advance, you'll learn how to process JSON requests and display data from the web app via HTML, CSS, and JavaScript. You'll also be able to persist data and create RESTful services in Rust. Later, you'll build an automated deployment process for the app on an AWS EC2 instance and Docker Hub. Finally, you'll play around with some popular web frameworks in Rust and compare them.By the end of this Rust book, you'll be able to confidently create scalable and fast web applications with Rust.What You Will Learn: Structure scalable web apps in Rust in Rocket, Actix Web, and WarpApply data persistence for your web apps using PostgreSQLBuild login, JWT, and config modules for your web appsServe HTML, CSS, and JavaScript from the Actix Web serverBuild unit tests and functional API tests in Postman and NewmanDeploy the Rust app with NGINX and Docker onto an AWS EC2 instanceWho this book is for: This book on web programming with Rust is for web developers who have programmed in traditional languages such as Python, Ruby, JavaScript, and Java and are looking to develop high-performance web applications with Rust. Although no prior experience with Rust is necessary, a solid understanding of web development principles and basic knowledge of HTML, CSS, and JavaScript are required if you want to get the most out of this book.
Incident Response in the Age of Cloud
Learn to identify security incidents and build a series of best practices to stop cyber attacks before they create serious consequencesKey Features: Discover Incident Response (IR), from its evolution to implementationUnderstand cybersecurity essentials and IR best practices through real-world phishing incident scenariosExplore the current challenges in IR through the perspectives of leading expertsBook Description: Cybercriminals are always in search of new methods to infiltrate systems. Quickly responding to an incident will help organizations minimize losses, decrease vulnerabilities, and rebuild services and processes.In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book uses frameworks such as MITRE ATT&CK(R) and the SANS IR model to assess security risks.The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply these strategies, with discussions on incident alerting, handling, investigation, recovery, and reporting.Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence and the procedures involved in IR in the cloud. Finally, the book concludes with an "Ask the Experts" chapter wherein industry experts have provided their perspective on diverse topics in the IR sphere.By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently.What You Will Learn: Understand IR and its significanceOrganize an IR teamExplore best practices for managing attack situations with your IR teamForm, organize, and operate a product security team to deal with product vulnerabilities and assess their severityOrganize all the entities involved in product security responseRespond to security vulnerabilities using tools developed by Keepnet Labs and BinalyzeAdapt all the above learnings for the cloudWho this book is for: This book is aimed at first-time incident responders, cybersecurity enthusiasts who want to get into IR, and anyone who is responsible for maintaining business security. It will also interest CIOs, CISOs, and members of IR, SOC, and CSIRT teams. However, IR is not just about information technology or security teams, and anyone with a legal, HR, media, or other active business role would benefit from this book. The book assumes you have some admin experience. No prior DFIR experience is required. Some infosec knowledge will be a plus but isn't mandatory.
Cryptography, Information Theory, and Error-Correction
CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTION A rich examination of the technologies supporting secure digital information transfers from respected leaders in the fieldAs technology continues to evolve Cryptography, Information Theory, and Error-Correction: A Handbook for the 21ST Century is an indispensable resource for anyone interested in the secure exchange of financial information. Identity theft, cybercrime, and other security issues have taken center stage as information becomes easier to access. Three disciplines offer solutions to these digital challenges: cryptography, information theory, and error-correction, all of which are addressed in this book.This book is geared toward a broad audience. It is an excellent reference for both graduate and undergraduate students of mathematics, computer science, cybersecurity, and engineering. It is also an authoritative overview for professionals working at financial institutions, law firms, and governments who need up-to-date information to make critical decisions. The book's discussions will be of interest to those involved in blockchains as well as those working in companies developing and applying security for new products, like self-driving cars. With its reader-friendly style and interdisciplinary emphasis this book serves as both an ideal teaching text and a tool for self-learning for IT professionals, statisticians, mathematicians, computer scientists, electrical engineers, and entrepreneurs.Six new chapters cover current topics like Internet of Things security, new identities in information theory, blockchains, cryptocurrency, compression, cloud computing and storage. Increased security and applicable research in elliptic curve cryptography are also featured. The book also: Shares vital, new research in the field of information theoryProvides quantum cryptography updatesIncludes over 350 worked examples and problems for greater understanding of ideas.Cryptography, Information Theory, and Error-Correction guides readers in their understanding of reliable tools that can be used to store or transmit digital information safely.
Tactile Internet
Tactile Internet with Human-in-the-Loop describes the change from the current Internet, which focuses on the democratization of information independent of location or time, to the Tactile Internet, which democratizes skills to promote equity that is independent of age, gender, sociocultural background or physical limitations. The book promotes the concept of the Tactile Internet for remote closed-loop human-machine interaction and describes the main challenges and key technologies. Current standardization activities in the field for IEEE and IETF are also described, making this book an ideal resource for researchers, graduate students, and industry R&D engineers in communications engineering, electronic engineering, and computer engineering.
Secure Edge Computing
The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept to address the challenges associated with IoE that facilitates data analysis at the edge of the network.
Big Breaches
The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone--not just techies--to become informed and empowered on the subject of cybersecurity.In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this book.You will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more. These valuable lessons are applied to real-world cases, helping you deduce just how high-profile mega-breaches at Target, JPMorgan Chase, Equifax, Marriott, and more were able to occur.Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, Big Breaches ensures that everybody comes away with essential knowledge to move forward successfully. Arm yourself with this book's expert insights and be prepared for the future of cybersecurity. Who This Book Is For Those interested in understanding what cybersecurity is all about, the failures have taken place in the field to date, and how they could have been avoided. For existing leadership and management in enterprises and government organizations, existing professionals in the field, and for those who are considering entering the field, this book covers everything from how to create a culture of security to the technologies and processes you can employ to achieve security based on lessons that can be learned from past breaches.
Hacking with Kali-Linux
In my work, I keep coming across networks and websites with significant security problems. In this book, I try to show the reader how easy it is to exploit security holes with various tools. Therefore, in my opinion, anyone who operates a network or a website should know to some extent how various hacking tools work to understand how to protect themselves against them. Many hackers don't even despise small home networks. Even if the topic is very technical, I will try to explain the concepts in a generally comprehensible form. A degree in computer science is by no means necessary to follow this book. Nevertheless, I don't just want to explain the operation of various tools, I also want to explain how they work in such a way that it becomes clear to you how the tool works and why a certain attack works.
Distributed Denial of Service (Ddos) Attacks
This book is designed for readers who have an interest in the cyber security domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals focusing on defensive schemes and applications for detecting or mitigating DDoS attacks.
Online Social Networks Security
This book elaborates on various attacks on Social Networks with classifications, countermeasures and consequences. It also highlights some key contributions related to current defensive approaches of various attacks on OSNs.
Zabbix 5 IT Infrastructure Monitoring Cookbook
Discover practical recipes to help you efficiently monitor enterprise IT infrastructure for Windows, Linux, and networkingKey Features: Find out how you can leverage some of the most exciting features of Zabbix 5Perform professional IT infrastructure and application monitoring on multiple platformsDiscover easy-to-follow, practical solutions to problems in network monitoring with ZabbixBook Description: Zabbix offers useful insights into your infrastructure performance and issues and enables you to enhance your monitoring setup with its variety of powerful features. This book covers hands-on, easy-to-follow recipes for using Zabbix 5 for effectively monitoring the performance of devices and applications over networks.The book starts by guiding you through the installation of Zabbix and using the Zabbix frontend. You'll then work your way through the most prominent features of Zabbix and make the right design choices for building a scalable and easily manageable environment. The book contains recipes for building items and triggers for different types of monitoring, building templates, and using Zabbix proxies. As you advance, you'll learn how to use the Zabbix API for customization and manage your Zabbix server and database efficiently. Finally, you'll find quick solutions to the common and not-so-common problems that you may encounter in your everyday Zabbix monitoring work.By the end of this Zabbix book, you'll have learned how to use Zabbix for all your monitoring needs and be able to build a solid Zabbix setup by leveraging its key functionalities.What You Will Learn: Explore the different types of monitoring available in Zabbix 5Find out how to build your own Zabbix templatesUse Zabbix proxies for effective load balancing/scalingWork with custom integrations and the Zabbix APISet up triggers and alerting with Zabbix 5Maintain your Zabbix setup for scaling, backups, and upgradesDiscover how to perform advanced Zabbix database managementMonitor cloud-based products such as Amazon Web Services (AWS), Azure, and DockerWho this book is for: This book is for IT engineers who want to get started with Zabbix and anyone with an intermediate understanding of Zabbix looking to extend their knowledge. Although not necessary, prior experience with Zabbix will help you to make the most of this book.
The Cyber-Elephant in the Boardroom
We've all read the cybersecurity horror stories: a prominent company exposes the private information of their customers only to scramble after the fact to apologize and safeguard the data. Cybersecurity is often an afterthought, a much lower priority than profit--until a data breach threatens the bottom line anyway. In The Cyber-Elephant in the Boardroom, data security expert and CEO Mathieu Gorge, along with a host of guests, shows why protecting a company's data should be top of mind for C-suites and corporate boards. With the innovative 5 Pillars of Security Framework, any C-level executive can understand their organization's cyber risk and the steps they need to take to protect their information. There's a cyber-elephant in the boardroom and it needs to be addressed!
Security, Privacy, and Anonymity in Computation, Communication, and Storage
This book constitutes seven refereed workshops and symposiums, SpaCCS Workshops 2020, which are held jointly with the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, in Nanjing, China, in December 2020. The 48 papers were carefully reviewed and selected from 131 submissions and cover a broad range of topics on security, privacy and anonymity in computation communication, and storage, including the 11th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2020), the 10th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2020), the 9th International Symposium on Security and Privacy on Internet of Things (SPIoT 2020), the 6th International Symposium on Sensor-Cloud Systems (SCS 2020), the Second International Workshop on Communication, Computing, Informatics and Security (CCIS 2020), the First International Workshop on Intelligence and Security in Next Generation Networks (ISNGN 2020), the First International Symposium on Emerging Information Security and Applications (EISA 2020).
Digital Hate
The euphoria that has accompanied the birth and expansion of the internet as a liberation technology is increasingly eclipsed by an explosion of vitriolic language on a global scale.Digital Hate: The Global Conjuncture of Extreme Speech provides the first distinctly global and interdisciplinary perspective on hateful language online. Moving beyond Euro-American allegations of fake news, contributors draw attention to local idioms and practices and explore the profound implications for how community is imagined, enacted, and brutally enforced around the world. With a cross-cultural framework nuanced by ethnography and field-based research, the volume investigates a wide range of cases--from anti-immigrant memes targeted at Bolivians in Chile to trolls serving the ruling AK Party in Turkey--to ask how the potential of extreme speech to talk back to authorities has come under attack by diverse forms of digital hate cultures.Offering a much-needed global perspective on the dark side of the internet, Digital Hate is a timely and critical look at the raging debates around online media's failed promises.
Ich hacke Technik
Ich bin das, was man als Hacker bezeichnet. Knapp 50 Jahre alt und suche in der letzten H瓣lfte meines Arbeitslebens nochmal einen so richtig coolen Job. Aber leider rei?en sich die Arbeitgeber um mich. F羹r den Job, den ich seit 20 Jahren mache, Top-Spezialist bin und keinen Spa? mehr daran habe, weil er mich nicht mehr fordert. Wor羹ber andere ganze Doktorarbeiten schreiben, langweilt mich mittlerweile. Und die Arbeitgeber, die die coolen Jobs vergeben, wie Milit瓣r, 3-Buchstaben Dienste oder Konzerne mit einem Hang zur Sicherheit, wollen mich nicht. Nicht studiert? Weg! Wir brauchen qualifizierte Mitarbeiter. Leute, als ich h瓣tte studieren k繹nnen, habe ich Eure Netzwerke platt gemacht. Einfach nur, weil ich wissen wollte, ob ich es kann. Als ich h瓣tte studieren k繹nnen, habe ich herausgefunden, dass das Netzwerk des Pentagon das meist gehackte Netzwerk der Welt war. Aber ich kann Euch nicht zwingen, mir einen coolen Job zu einem genialen Gehalt zu geben. Und Ihr k繹nnt mich nicht zwingen, mein Wissen nicht weiter zu geben. Ich beweise Euch, dass ich mit winzig kleinen Heftchen auf weniger als 100 Seiten aus interessierten ahnungslosen Leuten Top-Hacker machen kann. Warum? Weil ich es kann! Seht es als die Zeugnisse an, die ich bei Bewerbungen nicht liefern kann, weil ich an den Schulungen nicht teilnehme, da ich sie selbst durchf羹hre. Und als Test f羹r Eure qualifizierten Master-Absolventen, 30 Jahre jung, 25 Jahre Berufserfahrung, 8 Sprachen verhandlungssicher.
Practical Empathy
Conventional product development focuses on the solution. Empathy is a mindset that focuses on people, helping you to understand their thinking patterns and perspectives. Practical Empathy will show you how to gather and compare these patterns to make better decisions, improve your strategy, and collaborate successfully.
Managing Chaos
Few organizations realize a return on their digital investment. They're distracted by political infighting and technology-first solutions. To reach the next level, organizations must realign their assets-people, content, and technology--by practicing the discipline of digital governance. Managing Chaos inspires new and necessary conversations about digital governance and its transformative power to support creativity, real collaboration, digital quality, and online growth.
The User’s Journey
Like a good story, successful design is a series of engaging moments structured over time. The User's Journey will show you how, when, and why to use narrative structure, technique, and principles to ideate, craft, and test a cohesive vision for an engaging outcome. See how a "story first" approach can transform your product, feature, landing page, flow, campaign, content, or product strategy.
Service Design
Service Design is an eminently practical guide to designing services that work for people. It offers powerful insights, methods, and case studies to help you design, implement, and measure multichannel service experiences with greater impact for customers, businesses, and society.
Eye Tracking the User Experience
Eye tracking is a widely used research method, but there are many questions and misconceptions about how to effectively apply it. Eye Tracking the User Experience-the first how-to book about eye tracking for UX practitioners--offers step-by-step advice on how to plan, prepare, and conduct eye tracking studies; how to analyze and interpret eye movement data; and how to successfully communicate eye tracking findings.
Cyber-Physical Security for Critical Infrastructures Protection
This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020, and held online on September 2020.The 14 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They were organized in topical sections named: security threat intelligence; data anomaly detection: predict and prevent; computer vision and dataset for security; security management and governance; and impact propagation and power traffic analysis.The book contains 6 chapters which are available open access under a CC-BY license.
Why We Fail
Just as pilots and doctors improve by studying crash reports and postmortems, experience designers can improve by learning how customer experience failures cause products to fail in the marketplace. Rather than proselytizing a particular approach to design, Why We Fail holistically explores what teams actually built, why the products failed, and how we can learn from the past to avoid failure ourselves.
Content Everywhere
Care about content? Better copy isn't enough. As devices and channels multiply-and as users expect to relate, share, and shift information quickly--we need content that can go more places, more easily. Content Everywhere will help you stop creating fixed, single-purpose content and start making it more future-ready, flexible, reusable, manageable, and meaningful wherever it needs to go.
Build Better Products
It's easier than ever to build a new product. But developing a great product that people actually want to buy and use is another story. Build Better Products is a hands-on, step-by-step guide that helps teams incorporate strategy, empathy, design, and analytics into their development process. You'll learn to develop products and features that improve your business's bottom line while dramatically improving customer experience.
Penetration Testing Step By Step Guide
This book is intended for people who have no prior knowledge of penetration testing, ethical hacking and would like to enter the field. It is a practical step by step guide to penetration testing that teaches the techniques and tools the real hackers use to hack networks and exploit vulnerabilities. The guide is based in Kali Linux and other tools . This guide assumes that readers have no knowledge Kali Linux and teaches you through penetration testing exercises. This guide covers the all the phases of penetrations testing starting from reconnaissance, scanning, gaining access, maintaining assess and covering tracks. The main feature of the guide will be 73 Pen-tests exercises that cover wireless and Wi-Fi penetration testing, client side penetration testing, server side penetration testing, creating and delivering malware, social engineering, email spoofing, complete web penetration testing and Mobile phones penetration testing. I hope you find this guide helpful and insightful as you learn more about penetration testing.
Digital Forensics and Watermarking
This volume constitutes the proceedings of the 19th International Workshop on Digital Forensics and Watermarking, IWDW 2020, held in Melbourne, VIC, Australia, in November 2020.The 20 full papers in this volume were carefully reviewed and selected from 43 submissions. They cover topics such as: novel research, development and application of digital watermarking and forensics techniques for multimedia security.
Security in Computing and Communications
This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.
Cybersecurity ABCs
Cybersecurity issues, problems and incidents don't always relate to technological faults. Many can be avoided or mitigated through improved cybersecurity awareness, behaviour and culture change (ABCs). This book guides organisations looking to create an enhanced security culture through improved understanding and practice of cybersecurity at an individual level. Key awareness, behaviour and culture concepts are covered from the ground up, alongside practical tips and examples.
Information and Communication Technology and Applications
This book constitutes revised selected papers from the Third International Conference on Information and Communication Technology and Applications, ICTA 2020, held in Minna, Nigeria, in November 2020. Due to the COVID-19 pandemic the conference was held online. The 67 full papers were carefully reviewed and selected from 234 submissions. The papers are organized in the topical sections on Artificial Intelligence, Big Data and Machine Learning; Information Security Privacy and Trust; Information Science and Technology.
The #ArtOfTwitter
MASTERING TWITTER IS THE MOST POWERFUL WAY TO GET YOUR VOICE HEARD AS A CREATIVE PROFESSIONAL In The #ArtOfTwitter, fantasy writer and Twitter coach Daniel Parsons explains how he grew a 90,000 strong army of loyal followers and gained real-world influence as an indie author. Breaking his tactics into short chapters and simple, actionable steps, he demonstrates exactly how any creative professional can achieve similar results. Whether you're a writer, artist, musician, or any other creative professional, The #ArtOfTwitter will show you how to: - Understand the changing world of social media- Avoid common mistakes- Grow your popularity without being suspended- Gain a bigger audience by using hashtags- Build strong relationships with your followers- Nurture follower engagement- Save time with Twitter apps- Implement a strategy for sustained growth- Make money with Twitter ads- Ensure every tweet is a hit- Get real-world influence
Modern Front-End Architecture
Learn how to build front-end applications that can help you ship applications faster with fewer defects. Many software projects fail because they are not planned well, or lack organization. Applying strategies from other industries can help you create better software. This book explores the "mise en place" technique from cooking and reveals how you can apply it to the art of creating software.In many professional kitchens, the work of preparing a meal is divided and performed in workstations to help create the whole. You'll review the philosophy behind this and see how to leverage this approach in your code. You'll also learn to visualize your applications as a series of components and build parts of your application in isolation - just like a professional chef crafting each part of the meal.The book describes to how to structure your code base for reuse, and how to communicate the code's intent to other developers. You'll develop your components in isolation and testthese building blocks for quality at a granular level. Then compose these components as building blocks in increasingly complicated features. Finally, you'll apply some strategies not directly related to code to ensure maximum quality and efficiency.With Modern Front-end Architecture, developers of all levels will learn strategies that they and their teams can leverage to be more productive. What You'll LearnStructure an application as a series of componentsBuild a component library that others in an organization can leverageEnsure quality and accessibility at a component level rather than a page or app levelTest code in a way that gives the maximum amount of confidence while providing an excellent developer experienceAutomate repeatable tasksWho This Book Is For Front end developers looking to maximize their code for reuse, quality, and shipping featuresquickly. Experienced developers will pick up new techniques that they can apply to their code base. Less experienced developers will be able to start applications off on the right foot.
CX Trinity
CX Trinity explores three key facets of customer experience (CX): how we talk to customers, the content we provide to them, and the contexts in which they consume our content.Any good customer experience is driven by a combination of three critical elements: Meeting the customer's needsDelivering the right content to help the customerUnderstanding the context of where, when, and how the customer interacts with youThis book pulls together 52 essays that originally appeared as blog posts on Alan's Content Pool blog, LinkedIn, and the CMS Wire website. They reflect Alan's years of experience writing, designing, and managing content for both large and small corporations. These essays have been collected, updated, and edited for this volume.
The Theory of Hash Functions and Random Oracles
Hash functions are the cryptographer's Swiss Army knife. Even though they play an integral part in today's cryptography, existing textbooks discuss hash functions only in passing and instead often put an emphasis on other primitives like encryption schemes. In this book the authors take a different approach and place hash functions at the center. The result is not only an introduction to the theory of hash functions and the random oracle model but a comprehensive introduction to modern cryptography.After motivating their unique approach, in the first chapter the authors introduce the concepts from computability theory, probability theory, information theory, complexity theory, and information-theoretic security that are required to understand the book content. In Part I they introduce the foundations of hash functions and modern cryptography. They cover a number of schemes, concepts, and proof techniques, including computational security, one-way functions, pseudorandomness and pseudorandom functions, game-based proofs, message authentication codes, encryption schemes, signature schemes, and collision-resistant (hash) functions. In Part II the authors explain the random oracle model, proof techniques used with random oracles, random oracle constructions, and examples of real-world random oracle schemes. They also address the limitations of random oracles and the random oracle controversy, the fact that uninstantiable schemes exist which are provably secure in the random oracle model but which become insecure with any real-world hash function. Finally in Part III the authors focus on constructions of hash functions. This includes a treatment of iterative hash functions and generic attacks against hash functions, constructions of hash functions based on block ciphers and number-theoretic assumptions, a discussion of privately keyed hash functions including a full security proof for HMAC, and a presentation of real-world hash functions.The text is supported with exercises, notes, references, and pointers to further reading, and it is a suitable textbook for undergraduate and graduate students, and researchers of cryptology and information security.
Information Security and Cryptology
This book constitutes the post-conference proceedings of the 16th International Conference on Information Security and Cryptology, Inscrypt 2020, held in, China, in December 2020.Due the COVID-19, the conference was held online and physical. The 24 full papers presented together with 8 short papers were carefully reviewed and selected from 79 submissions. The papers presents papers about research advances in all areas of information security, cryptology, and their applications.
Privacy and Identity Management. Data for Better Living: AI and Privacy
This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com.
Information Security and Cryptology - Icisc 2020
This book constitutes selected papers from the 23rd International Conference on Information Security and Cryptology, ICISC 2020, held in Seoul, South Korea, in December 2020. Due to the COVID-19, the confere was held online.The total of 15 papers presented in this volume were carefully reviewed and selected from 51 submissions. The aim of this conference was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptology.
Building Vue.js Applications with GraphQL
Take your Vue.js knowledge to the next level by understanding full-stack development concepts and exploring modern web technologies such as AWS Amplify, GraphQL, and Quasar FrameworkKey Features: Build a fully functional Vue.js web app and learn how it integrates with GraphQLTransform your chat application into a Progressive Web Application (PWA) for web deploymentDiscover practical recipes, exploring the capabilities of the GraphQL API for full-stack development using Quasar FrameworkBook Description: Since its release by Facebook in 2012, GraphQL has taken the internet by storm. Huge companies such as Airbnb and Audi have started to adopt it, while small to medium-sized companies are now recognizing the potential of this query-based API.GraphQL may seem strange at first, but as you start to read about and experience more of it, you won't want to use REST APIs anymore.With the recipes in this book, you will learn how to build a complete real-time chat app from scratch. Starting by creating an AWS Amplify environment, you will delve into developing your first GraphQL Schema. You will then learn how to add the AppSync GraphQL client and create your first GraphQL mutation. The book also helps you to discover the simplicity and data fetching capabilities of GraphQL that make it easy for front-end developers to communicate with the server. You will later understand how to use Quasar Framework to create application components and layouts. Finally, you will find out how to create Vuex modules in your application to manage the app state, fetch data using the GraphQL client, and deploy your application to the web.By the end of this book, you'll be well versed in proof-of-concept full-stack applications that explore the power of GraphQL with AWS Amplify, and you'll be able to use Quasar Framework to create your Vue applications.What you will learn: Set up your Vue.js projects with Vue CLI and explore the power of Vue componentsDiscover steps to create functional components in Vue.js for faster renderingBecome familiar with AWS Amplify and learn how to set up your environmentUnderstand how to create your first GraphQL schemaUse Quasar Framework to create simple and effective interfacesDiscover effective techniques to create queries for interacting with dataExplore Vuex for adding state management capabilities to your appDiscover techniques to deploy your applications effectively to the webWho this book is for: This book is for intermediate-level Vue.js developers who want to take their first step toward full-stack development. Prior knowledge of Vue.js and JavaScript is required before getting started with this book.
Euro-Par 2020: Parallel Processing Workshops
This book constitutes revised selected papers from the workshops held at the 26th International Conference on Parallel and Distributed Computing, Euro-Par 2020, which took place in Warsaw, Poland, in August 2020. The workshops were held virtually due to the coronavirus pandemic.The 27 full papers presented in this volume were carefully reviewed and selected from 50 submissions. Euro-Par is an annual, international conference in Europe, covering all aspects of parallel and distributed processing. These range from theory to practice, from small to the largest parallel and distributed systems and infrastructures, from fundamental computational problems to full-edged applications, from architecture, compiler, language and interface design and implementation to tools, support infrastructures, and application performance aspects.
Artificial Intelligence and Social Work
This book marries social work and artificial intelligence to provide an introductory guide for using AI for social good. Following an introductory chapter laying out approaches and ethical principles of using AI for social work interventions, the book describes in detail an intervention to increase the spread of HIV information by using algorithms to determine the key individuals in a social network of homeless youth. Other chapters present interdisciplinary collaborations between AI and social work students, including a chatbot for sexual health information and algorithms to determine who is at higher stress among persons with Type 2 Diabetes. For students, academic researchers, industry leaders, and practitioners, these real-life examples from the USC Center for Artificial Intelligence in Society demonstrate how social work and artificial intelligence can be used in tandem for the greater good.
Data Protection Officer
This book provides a practical guide to the DPO role, encompassing the key activities you'll need to manage to succeed in the role. Coverage includes data protection fundamentals and processes, understanding risk and relevant standards, frameworks and tools, with DPO tips also embedded throughout the book and case studies included to support practice-based learning.
Software-Defined Networks
Software-Defined Networks (SDN) are transforming the Internet by replacing bundled, proprietary hardware and control software. SDN is being embraced by cloud providers, telcos, and enterprises, as it enables a new era of innovation in networking. This book provides a comprehensive introduction to SDN from the perspective of those who are developing and leveraging the technology.Book Features: Describes a complete SDN stack, illustrated with example open source software.Emphasizes underlying concepts, abstractions, and design rationale.Describes both fixed-function and programmable switching chips.Describes the P4-based toolchain for programming and controlling switches.Describes a range of SDN use cases: enterprises, datacenters, access networks.Includes hands-on programming exercises, downloadable from GitHub.
Advanced Natural Language Processing with TensorFlow 2
One-stop solution for NLP practitioners, ML developers and data scientists to build effective NLP systems that can perform real-world complicated tasksKey FeaturesImplement deep learning algorithms such as BiLSTMS, CRFs, and many more using TensorFlow 2Explore classical NLP techniques and libraries including parts-of-speech tagging and tokenizationLearn practical applications of NLP covering the forefronts of the field like sentiment analysis and generating textBook DescriptionIn the last couple of years, there have been tremendous advances in natural language processing, and we are now moving from research labs into practical applications. Advanced Natural Language Processing comes with a perfect blend of both the theoretical and practical aspects of trending and complex NLP techniques. This book is focused on innovative applications in the field of NLP, language generation, and dialogue systems. It goes into the details of applying the concepts of text pre-processing using techniques such as tokenization, parts of speech tagging, and lemmatization using popular libraries such as Stanford NLP and SpaCy. Named Entity Recognition (NER), a cornerstone of task-oriented bots, is built from scratch using Conditional Random Fields and Viterbi Decoding on top of RNNs. Taking a practical and application-focused perspective, the book covers key emerging areas such as generating text for use in sentence completion and text summarization, bridging images and text by generating captions for images, and managing dialogue aspects of chatbot design. It also covers one of the most important reasons behind recent advances in NLP - applying transfer learning and fine-tuning using TensorFlow 2. Further, it covers practical techniques that can simplify the labelling of textual data which otherwise proves to be a costly affair. The book also has a working code for each tech piece so that you can adapt them to your use cases. By the end of this TensorFlow book, you will have an advanced knowledge of the tools, techniques and deep learning architecture used to solve complex NLP problems.What You Will LearnGrasp important pre-steps in building NLP applications like POS taggingDeal with vast amounts of unlabeled and small labelled Datasets in NLPUse transfer and weakly supervised learning using libraries like SnorkelPerform sentiment analysis using BERTApply encoder-decoder NN architectures and beam search for summarizing textUse transformer models with attention to bring images and text togetherBuild applications that generate captions and answer questions about imagesUse advanced TensorFlow techniques like learning rate annealing, custom layers, and custom loss functions to build the latest deep NLP modelsWho this book is forThis is not an introductory book and assumes the reader is familiar with basics of NLP and has fundamental Python skills, as well as basic knowledge of machine learning and undergraduate-level calculus and linear algebra.The readers who can benefit the most from this book include: Intermediate ML developers who are familiar with the basics of supervised learning and deep learning techniquesProfessionals who already use TensorFlow/Python for purposes such as data science, ML, research, and analysis
Cybersecurity for Connected Medical Devices
The cybersecurity of connected medical devices is one of the biggest challenges facing healthcare today. The compromise of a medical device can result in severe consequences for both patient health and patient data. Cybersecurity for Connected Medical Devices covers all aspects of medical device cybersecurity, with a focus on cybersecurity capability development and maintenance, system and software threat modeling, secure design of medical devices, vulnerability management, and integrating cybersecurity design aspects into a medical device manufacturer's Quality Management Systems (QMS). This book is geared towards engineers interested in the medical device cybersecurity space, regulatory, quality, and human resources specialists, and organizational leaders interested in building a medical device cybersecurity program.
Hybrid Encryption Algorithm Over Wireless Communication Channels
Encryption and processing of digital data at every stage is vital due for its security. This work covers various topics ranging from digital data encryption algorithms, hybrid encryption algorithm, evaluation matrices, efficient data transmission for guarding against effective communication channel degradation.
Secret HistoryThe Story of Cryptology
The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading.Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here.The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken.The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field.FEATURES Presents a chronological development of key concepts Includes the Vigen癡re cipher, the one-time pad, transposition ciphers, Jefferson's wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively Includes quantum cryptography and the impact of quantum computers