0408~0410_屁屁偵探讀本13對決!怪盜學院星星篇
0408~0410_4月選書

英文書 > 全部商品

Hybrid Encryption Algorithm Over Wireless Communication Channels

Ingram 出版
2021/02/01 出版

Encryption and processing of digital data at every stage is vital due for its security. This work covers various topics ranging from digital data encryption algorithms, hybrid encryption algorithm, evaluation matrices, efficient data transmission for guarding against effective communication channel degradation.

9 特價8613
立即代訂
下次再買

Full-Stack Web Development with Jakarta Ee and Vue.Js

Apress 出版
2021/02/01 出版

Harness the power of Jakarta EE to build sturdy back ends while applying Vue.js on the front end. The demand for modern, high-performing enterprise web applications is growing swiftly. The basic HTML front end is no longer enough to meet customer demands. This book shows you how to unlock professional full-stack web development using Jakarta EE and Vue.js. First, you will review the fundamental concepts of Vue.js and essential features of Jakarta EE. You'll then see how to build web applications through every stage of the process, taking into consideration requirement analysis, data model design, code design, the UI, and technical designs, all the way through to implementation, testing, production deployment, and monitoring. Towards the end of the book, you will also learn about the key design patterns and best practices that underpin professional full-stack web development. Full-stack development is the way forward on the web, and using JakartaEE and Vue.js is a great place to start. Get up-to-speed using this book today. What You'll Learn Connect an application's frontend and backend with Vue.js and Jakarta EEBuild enterprise web applications from start to finishTest, secure and deploy your enterprise web applicationsApply common patterns when building full stack applicationsUnderstand the current IT architecture situation of a company, and define a roadmap to accomplish the company goalsCreate decoupled applications using software craftsmanship ideas Who This Book Is For Java/Jakarta EE developers who would like to gain a stronghold on both frontend and backend development. Basic knowledge of Java EE is assumed.

9 特價2052
立即代訂
下次再買

Natural Language Processing

Yue,Zhang  著
Ingram 出版
2021/02/01 出版

With a machine learning approach and less focus on linguistic details, this gentle introduction to natural language processing develops fundamental mathematical and deep learning models for NLP under a unified framework. NLP problems are systematically organised by their machine learning nature, including classification, sequence labelling, and sequence-to-sequence problems. Topics covered include statistical machine learning and deep learning models, text classification and structured prediction models, generative and discriminative models, supervised and unsupervised learning with latent variables, neural networks, and transition-based methods. Rich connections are drawn between concepts throughout the book, equipping students with the tools needed to establish a deep understanding of NLP solutions, adapt existing models, and confidently develop innovative models of their own. Featuring a host of examples, intuition, and end of chapter exercises, plus sample code available as an online resource, this textbook is an invaluable tool for the upper undergraduate and graduate student.

9 特價4158
立即代訂
下次再買

Secret HistoryThe Story of Cryptology

Craig,Bauer  著
Ingram 出版
2021/02/01 出版

The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading.Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here.The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken.The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field.FEATURES Presents a chronological development of key concepts Includes the Vigen癡re cipher, the one-time pad, transposition ciphers, Jefferson's wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively Includes quantum cryptography and the impact of quantum computers

9 特價6054
立即代訂
下次再買

Transformers for Natural Language Processing

Packt 出版
2021/02/01 出版

Take your NLP knowledge to the next level and become an AI language understanding expert by mastering the quantum leap of Transformer neural network modelsKey FeaturesBuild and implement state-of-the-art language models, such as the original Transformer, BERT, T5, and GPT-2, using concepts that outperform classical deep learning modelsGo through hands-on applications in Python using Google Colaboratory Notebooks with nothing to install on a local machine Test transformer models on advanced use casesBook DescriptionThe transformer architecture has proved to be revolutionary in outperforming the classical RNN and CNN models in use today. With an apply-as-you-learn approach, Transformers for Natural Language Processing investigates in vast detail the deep learning for machine translations, speech-to-text, text-to-speech, language modeling, question answering, and many more NLP domains with transformers.The book takes you through NLP with Python and examines various eminent models and datasets within the transformer architecture created by pioneers such as Google, Facebook, Microsoft, OpenAI, and Hugging Face.The book trains you in three stages. The first stage introduces you to transformer architectures, starting with the original transformer, before moving on to RoBERTa, BERT, and DistilBERT models. You will discover training methods for smaller transformers that can outperform GPT-3 in some cases. In the second stage, you will apply transformers for Natural Language Understanding (NLU) and Natural Language Generation (NLG). Finally, the third stage will help you grasp advanced language understanding techniques such as optimizing social network datasets and fake news identification.By the end of this NLP book, you will understand transformers from a cognitive science perspective and be proficient in applying pretrained transformer models by tech giants to various datasets.What You Will LearnUse the latest pretrained transformer modelsGrasp the workings of the original Transformer, GPT-2, BERT, T5, and other transformer modelsCreate language understanding Python programs using concepts that outperform classical deep learning modelsUse a variety of NLP platforms, including Hugging Face, Trax, and AllenNLPApply Python, TensorFlow, and Keras programs to sentiment analysis, text summarization, speech recognition, machine translations, and moreMeasure the productivity of key transformers to define their scope, potential, and limits in productionWho this book is forSince the book does not teach basic programming, you must be familiar with neural networks, Python, PyTorch, and TensorFlow in order to learn their implementation with Transformers.Readers who can benefit the most from this book include experienced deep learning & NLP practitioners and data analysts & data scientists who want to process the increasing amounts of language-driven data.

9 特價4589
立即代訂
下次再買

AR and VR Using the Webxr API

Apress 出版
2021/02/01 出版

Using a project-based approach, readers will see how to make the most of what spatial computing and immersive technology have to offer.

9 特價1881
立即代訂
下次再買

The Youtube Formula

Derral,Eves  著
Wiley 出版
2021/02/01 出版

The Wall Street Journal bestseller!Comes with free online companion course Learn the secrets to getting dramatic results on YouTube Derral Eves has generated over 60 billion views on YouTube and helped 24 channels grow to one million subscribers from zero. In The YouTube Formula: How Anyone Can Unlock the Algorithm to Drive Views, Build an Audience, and Grow Revenue, the owner of the largest YouTube how-to channel provides the secrets to getting the results that every YouTube creator and strategist wants. Eves will reveal what readers can't get anywhere else: the inner workings of the YouTube algorithm that's responsible for determining success on the platform, and how creators can use it to their advantage. Full of actionable advice and concrete strategies, this book teaches readers how to: Launch a channel Create life-changing content Drive rapid view and subscriber growth Build a brand and increase engagement Improve searchability Monetize content and audience Replete with case studies and information from successful YouTube creators, The YouTube Formula is perfect for any creator, entrepreneur, social media strategist, and brand manager who hopes to see real commercial results from their work on the platform.

9 特價923
立即代訂
下次再買

Lurking

Picador USA 出版
2021/02/01 出版

One of Esquire's Best Books to Elevate Your Reading List in 2020, , and a OneZero Best Tech Book of 2020. Named one of the 100 Notable books of 2020 by the End of the World Review. A concise but wide-ranging personal history of the internet from--for the first time--the point of view of the user In a shockingly short amount of time, the internet has bound people around the world together and torn us apart and changed not just the way we communicate but who we are and who we can be. It has created a new, unprecedented cultural space that we are all a part of--even if we don't participate, that is how we participate--but by which we're continually surprised, betrayed, enriched, befuddled. We have churned through platforms and technologies and in turn been churned by them. And yet, the internet is us and always has been. In Lurking, Joanne McNeil digs deep and identifies the primary (if sometimes contradictory) concerns of people online: searching, safety, privacy, identity, community, anonymity, and visibility. She charts what it is that brought people online and what keeps us here even as the social equations of digital life--what we're made to trade, knowingly or otherwise, for the benefits of the internet--have shifted radically beneath us. It is a story we are accustomed to hearing as tales of entrepreneurs and visionaries and dynamic and powerful corporations, but there is a more profound, intimate story that hasn't yet been told. Long one of the most incisive, ferociously intelligent, and widely respected cultural critics online, McNeil here establishes a singular vision of who we are now, tells the stories of how we became us, and helps us start to figure out what we do now.

9 特價752
立即代訂
下次再買

Local SEO Secrets

Roger,Bryan  著
Ingram 出版
2021/02/01 出版
9 特價634
立即代訂
下次再買

Secure It Systems

Springer 出版
2021/01/29 出版

This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Link繹ping University, Sweden, and held online during November 23-24, 2020.The 15 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: malware and attacks; formal analysis; applied cryptography; security mechanisms and training; and applications and privacy.

9 特價4175
立即代訂
下次再買

Foundations and Practice of Security

Springer 出版
2021/01/29 出版

This book constitutes the revised selected papers of the 13th International Symposium on Foundations and Practice of Security, FPS 2020, held in Montr矇al, QC, Canada, in December 2020. The 11full papers and 1 short paper presented in this book were carefully reviewed and selected from 23 submissions. They cover a range of topics such as Analysis and Detection; Prevention and Efficiency; and Privacy by Design.

9 特價2870
立即代訂
下次再買

Cross Layer Optimization for Protocols in Mobile Adhoc Networks

Anita,Yadav  著
Ingram 出版
2021/01/28 出版

Doctoral Thesis / Dissertation from the year 2016 in the subject Computer Science - Miscellaneous, grade: 16, language: English, abstract: In this thesis, we have modified AODV routing protocol by incorporating link prediction algorithm using a proposed link prediction model. This algorithm predicts the link availability time and even before the link breaks; either it repairs the route locally or sends information to the source nodes to enable them to initiate a new route search well in time. This algorithm improves the quality of service of the network. Simulation results show that AODV routing algorithm with link availability model performs better than the existing AODV. Advances in wireless technology and hand-held computing devices have brought revolution in the area of mobile communication. The increasing mobility of humans across the globe generated demand for infrastructure-less and quickly deployable mobile networks. Such networks are referred to as Mobile Adhoc Networks (MANET). Usually, nodes in a MANET also act as a router while being is free to roam while communicating each others. Adhoc networks are suited for use in situations where infrastructure is unavailable or to deploy one is not cost-effective. Frequent changes in network topology due to mobility and limited battery power of the mobile devices are the key challenges in the adhoc networks. The depletion of power source may cause early unavailability of nodes and thus links in the network. The mobility of nodes will also causes frequent routes breaks and adversely affects the required performance for the applications. Availability of a route in future mainly depends on the availability of links between the nodes forming the route. Therefore, it is important to predict the future availability of a link that is currently available. We have proposed an analytical model for link prediction using Newton divided difference method. This link availability algorithm is incorporated in AODV routing alg

9 特價3591
立即代訂
下次再買

The Ransomware Threat Landscape

Alan,Calder  著
Ingram 出版
2021/01/27 出版

The fastest-growing malware in the worldThe core functionality of ransomware is two-fold: to encrypt data and deliver the ransom message. This encryption can be relatively basic or maddeningly complex, and it might affect only a single device or a whole network.Ransomware is the fastest-growing malware in the world. In 2015, it cost companies around the world $325 million, which rose to $5 billion by 2017 and is set to hit $20 billion in 2021. The threat of ransomware is not going to disappear, and while the number of ransomware attacks remains steady, the damage they cause is significantly increasing. It is the duty of all business leaders to protect their organisations and the data they rely on by doing whatever is reasonably possible to mitigate the risk posed by ransomware. To do that, though, they first need to understand the threats they are facing.The Ransomware Threat LandscapeThis book sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in place to protect the organisation. These measures are structured so that any organisation can approach them. Those with more resources and more complex environments can build them into a comprehensive system to minimise risks, while smaller organisations can secure their profiles with simpler, more straightforward implementation.Suitable for senior directors, compliance managers, privacy managers, privacy officers, IT staff, security analysts and admin staff - in fact, all staff who use their organisation's network/online systems to perform their role - The Ransomware Threat Landscape - Prepare for, recognise and survive ransomware attacks will help readers understand the ransomware threat they face.From basic cyber hygiene to more advanced controls, the book gives practical guidance on individual activities, introduces implementation steps organisations can take to increase their cyber resilience, and explores why cyber security is imperative. Topics covered include: IntroductionAbout ransomwareBasic measuresAn anti-ransomwareThe control frameworkRisk managementControlsMaturityBasic controlsAdditional controls for larger organisationsAdvanced controlsDon't delay - start protecting your organisation from ransomware and buy this book today!

9 特價1184
立即代訂
下次再買

Enterprise Information Security Risk Assessment

Ingram 出版
2021/01/24 出版

This book is structured to focus on the practical implementation of risk assessment. The book is structured to go straight to the actions that a risk assessor will take to assess risk and provide recommendations that meet the business needs and risk appetite. The book is focused on specific implementation guidance rather than aspirational messages and vague high-level suggestions.Enterprise Information Security Risk Assessment details a methodology that adopts the best part of some established frameworks and teaches the reader how to use the available information to conduct a risk assessment that will identify high-risk assets. The book will provide you with the tools needed to execute a practical security risk assessment and adopt a suitable process for you.

9 特價1649
立即代訂
下次再買

Mastering Linux Security

Grmmy,Peter  著
Ingram 出版
2021/01/24 出版

With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system.Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure.With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security.

9 特價4183
立即代訂
下次再買

Search Engine Optimization and Marketing

Ingram 出版
2021/01/23 出版

This book explains the nuances of Search Engine Optimization (SEO) and Search Engine Marketing (SEM) for setting up digital websites. This book is suitable for undergraduates, graduates and developers of digital marketing, SEO and SEM.

9 特價7308
立即代訂
下次再買

IP Address Management, Second Edition

Ingram 出版
2021/01/22 出版

Rediscover fundamental and advanced topics in IPAM, DNS, DHCP and other core networking technologies with this updated one-stop reference The thoroughly revised second edition of IP Address Management is the definitive reference for working with core IP management technologies, like address allocation, assignment, and network navigation via DNS. Accomplished professionals and authors Timothy Rooney and Michael Dooley offer readers coverage of recent IPAM developments in the world of cloud computing, Internet of Things (IoT), and security, as well as a comprehensive treatment of foundational concepts in IPAM. The new edition addresses the way that IPAM needs and methods have evolved since the publication of the first edition. The book covers the impact of mainstream use of private and public cloud services, the maturation of IPv6 implementations, new DNS security approaches, and the proliferation of IoT devices. The authors have also reorganized the flow of the book, with much of the technical reference material appearing at the end and making for a smoother and simpler reading experience. The 2nd edition of IP Address Management also covers topics like such as: Discussions about the fundamentals of Internet Protocol Address Management (IPAM), including IP addressing, address allocation and assignment, DHCP, and DNS An examination of IPAM practices, including core processes and tasks, deployment strategies, IPAM security best-practices, and DNS security approaches A treatment of IPAM in the modern context, including how to adapt to cloud computing, the Internet of Things, IPv6, and new trends in IPAM A one-stop reference for IPAM topics, including IP addressing, DHCP, DNS, IPv6, and DNS security Perfect for IP network engineers and managers, network planners, network architects, and security engineers, the second edition of IP Address Management also belongs on the bookshelves of senior undergraduate and graduate students studying in networking, information technology, and computer security-related courses and programs.

9 特價6423
立即代訂
下次再買

Blockchain Technology and Application

Ke,Xu  著
Springer 出版
2021/01/22 出版

This book constitutes the refereed proceedings of the Third CCF China Blockchain Conference, CBCC 2020, held in Jinan, China, December 2020. The 8 revised full papers presented were carefully reviewed and selected from 64 submissions. The papers deal with research results and development activities in all aspects of blockchain science and technology.

9 特價2870
立即代訂
下次再買

Cyber Security

Wei,Lu  著
Springer 出版
2021/01/21 出版

This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.

9 特價2609
立即代訂
下次再買

AWS for Solutions Architects

Packt 出版
2021/01/21 出版

Apply cloud design patterns to overcome real-world challenges by building scalable, secure, highly available, and cost-effective solutionsKey Features: - Apply AWS Well-Architected Framework concepts to common real-world use cases- Understand how to select AWS patterns and architectures that are best suited to your needs- Ensure the security and stability of a solution without impacting cost or performanceBook Description: One of the most popular cloud platforms in the world, Amazon Web Services (AWS) offers hundreds of services with thousands of features to help you build scalable cloud solutions; however, it can be overwhelming to navigate the vast number of services and decide which ones best suit your requirements. Whether you are an application architect, enterprise architect, developer, or operations engineer, this book will take you through AWS architectural patterns and guide you in selecting the most appropriate services for your projects.AWS for Solutions Architects is a comprehensive guide that covers the essential concepts that you need to know for designing well-architected AWS solutions that solve the challenges organizations face daily. You'll get to grips with AWS architectural principles and patterns by implementing best practices and recommended techniques for real-world use cases. The book will show you how to enhance operational efficiency, security, reliability, performance, and cost-effectiveness using real-world examples.By the end of this AWS book, you'll have gained a clear understanding of how to design AWS architectures using the most appropriate services to meet your organization's technological and business requirements.What You Will Learn: - Rationalize the selection of AWS as the right cloud provider for your organization- Choose the most appropriate service from AWS for a particular use case or project- Implement change and operations management- Find out the right resource type and size to balance performance and efficiency- Discover how to mitigate risk and enforce security, authentication, and authorization- Identify common business scenarios and select the right reference architectures for themWho this book is for: This book is for application and enterprise architects, developers, and operations engineers who want to become well-versed with AWS architectural patterns, best practices, and advanced techniques to build scalable, secure, highly available, and cost-effective solutions in the cloud. Although existing AWS users will find this book most useful, it will also help potential users understand how leveraging AWS can benefit their organization.Table of Contents- Understanding AWS Cloud Principles and Key Characteristics- Leveraging the Cloud for Digital Transformation- Storage in AWS - Choosing the Right Tool for the Job- Harnessing the Power of Cloud Computing- Selecting the Right Database Service- Amazon Athena - Combining the Simplicity of Files with the Power of SQL- AWS Glue - Extracting, Transforming, and Loading Data the Simple Way- Best Practices for Application Security, Identity, and Compliance- Serverless and Container Patterns- Microservice and Event-Driven Architectures- Domain Driven Design- Data Lake Patterns - Integrating Your Data across the Enterprise- Availability, Reliability and Scalability Patterns- Hands on Lab and Use Cases

9 特價3671
立即代訂
下次再買

The Smartest Person in the Room

Ingram 出版
2021/01/21 出版

#1 Bestseller by leadership & cybersecurity expert Christian Espinosa that unveils a simple powerful 7 step process that awakens your leadership and life skills."Swiss Army Knife of Cyber/IT/Business/Life help...there is something for everyone here!""I highly recommend that any cybersecurity leader, or aspiring leader, read this book from cover-to-cover.""Christian Espinosa unveils the hard-hitting truth and bad practices that companies face when they hire inexperienced and ego-centric cybersecurity staff to protect their company's information."Cyberattack-an ominous word that strikes fear in the hearts of nearly everyone, especially business owners, CEOs, and executives. With cyberattacks resulting in often devastating results, it's no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren't always the best choice for your company?In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company's smartest minds to your benefit and theirs. Learn from Christian's own journey from cybersecurity engineer to company CEO. He describes why a high IQ is a lost superpower when effective communication, true intelligence, and self-confidence are not embraced. With his seven-step methodology and stories from the field, Christian helps you develop your team's technical minds so they become better humans and strong leaders who excel in every role. This book provides you with an enlightening perspective of how to turn your biggest unknown weakness into your strongest defense.

9 特價1197
立即代訂
下次再買

Tor Anonymity Network 101

Steven,Gates  著
Ingram 出版
2021/01/21 出版

Tor Anonymity Network 101 If you have been searching for how to access the most private and secure part of the internet, then look no more! "The Tor Anonymity Network 101 - An Introduction To The Most Private Part Of The Internet" has everything you've ever wanted to learn about how to be completely anonymous online. We live in an age where despite our best intentions, everything we do online is open to monitoring or attack. Our own advances in technology which were supposed to make our lives easier can be twisted and used against us. Knowing how to protect our own best interests is a vital skill that everyone should be aware of. The Tor Anonymity Network 101 includes: * How to maintain your anonymity online * The key to networking 101 * An introduction to the most private parts of the internet & much more! Tor doesn't stop you from being seen on the internet, but it will prevent people from learning your location and using that information against you. If you value your privacy, then you need to check out "Tor Anonymity Network 101 - An Introduction To The Most Private Part Of The Internet" for yourself!

9 特價1222
立即代訂
下次再買

Introduction to the Darknet

Ingram 出版
2021/01/21 出版

The Dark Web by Martin Hoffer is the essential and insightful read you have longed for. A detailed but readable deep dive that lifts the lid on really goes behind the gloss and sheen of the visible internet. Going step by step through 3 comprehensive chapters, Martin Hoffer provides a primer on the history and structure of the dark web, how the dark web functions today, and to what extent surveillance of the dark web can be an effective weapon in the fight against cybercrime. In a world that now has a truly digital economy, this work is an essential ready for everyone looking to understand what goes on behind the scenes of the online world.

9 特價1053
立即代訂
下次再買

The Smartest Person in the Room

Ingram 出版
2021/01/21 出版

#1 Bestseller by leadership & cybersecurity expert Christian Espinosa that unveils a simple powerful 7 step process that awakens your leadership and life skills."Swiss Army Knife of Cyber/IT/Business/Life help...there is something for everyone here!""I highly recommend that any cybersecurity leader, or aspiring leader, read this book from cover to cover.""Christian Espinosa unveils the hard-hitting truth and bad practices that companies face when they hire inexperienced and ego-centric cybersecurity staff to protect their company's information."Cyberattack-an ominous word that strikes fear in the hearts of nearly everyone, especially business owners, CEOs, and executives. With cyberattacks resulting in often devastating results, it's no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren't always the best choice for your company?In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company's smartest minds to your benefit and theirs. Learn from Christian's own journey from cybersecurity engineer to company CEO. He describes why a high IQ is a lost superpower when effective communication, true intelligence, and self-confidence are not embraced. With his seven-step methodology and stories from the field, Christian helps you develop your team's technical minds so they become better humans and strong leaders who excel in every role. This book provides you with an enlightening perspective of how to turn your biggest unknown weakness into your strongest defense.

9 特價684
立即代訂
下次再買

How to Destroy Surveillance Capitalism

Ingram 出版
2021/01/21 出版

OneZero, Medium's official technology publication, is thrilled to announce a print-on-demand edition of How to Destroy Surveillance Capitalism by Cory Doctorow, with an exclusive new chapter. How to Destroy Surveillance Capitalism was first published online in August, where it was an instant hit with readers, scholars, and critics alike. For years now, we've been hearing about the ills of surveillance capitalism - the business of extracting, collecting, and selling vast reams of user data that has exploded with the rise of tech giants like Google, Facebook, and Amazon. But what if everything we've been hearing is wrong? What if surveillance capitalism is not some rogue capitalism or a wrong turn taken by some misguided corporations? What if the system is working exactly as intended - and the only hope of restoring an open web is to take the fight directly to the system itself? In Doctorow's timely and crucial new nonfiction work, the internationally bestselling author of Walkaway, Down and Out in the Magic Kingdom, and Little Brother, argues that if we're to have any hope of destroying surveillance capitalism, we're going to have to destroy the monopolies that currently comprise the commercial web as we know it. Only by breaking apart the tech giants that totally control our online experiences can we hope to return to a more open and free web - one where predatory data-harvesting is not a founding principle. Doctorow shows how, despite popular misconception, Facebook and Google do not possess any "mind-control rays" capable of brainwashing users into, say, voting for a presidential candidate or joining an extremist group--they have simply used their monopoly power to profit mightily off of people interested in doing those things and made it easy for them to find each other.Doctorow takes us on a whirlwind tour of the last 30 years of digital rights battles and the history of American monopoly - and where the two intersect. Through a deeply compelling and highly readable narrative, he makes the case for breaking up Google, Facebook, Amazon, and Apple as a means of ending surveillance capitalism.

9 特價444
立即代訂
下次再買

Learning Helm

Matt,Butcher  著
Ingram 出版
2021/01/21 出版

Get up to speed with Helm, the preeminent package manager for the Kubernetes container orchestration system. This practical guide shows you how to efficiently create, install, and manage the applications running inside your containers. Helm maintainers Matt Butcher, Matt Farina, and Josh Dolitsky explain how this package manager fits into the Kubernetes ecosystem and provide an inside look at Helm's design and best practices. More than 70% of the organizations that work with Kubernetes use Helm today. While the Helm community provides thousands of packages, or charts, to help you get started, this book walks developers and DevOps engineers through the process of creating custom charts to package applications. If you have a working understanding of Kubernetes, you're ready to go. Explore primary features including frequently used Helm commands Learn how to build and deploy Helm charts from scratch Use Helm to manage complexity and achieve repeatable deployments Package an application and its dependencies for easy installation Manage the entire lifecycle of applications on Kubernetes Explore ways to extend Helm to add features and functionality Learn features for testing, handling dependencies, and providing security

9 特價1915
立即代訂
下次再買

Shosple Colupis

Mya  著
Lulu.com 出版
2021/01/21 出版

This series of illustrations intend to be a testimony of the social network time we are living through. Shosple Colupis' view aims to show how we face a technological progress that offers to facilitate the social interaction and how this virtuality goes beyond the screen and vice versa.

9 特價1274
立即代訂
下次再買

Virtual Foreplay

Ingram 出版
2021/01/20 出版

Entering the world of online dating can be daunting and even dangerous. Virtual Foreplay addresses the need for a guidebook to this still largely unexplored area, but the author takes an unusual approach. Using real-life examples, she helps readers find their self, soul, and passion in a way that makes presenting themselves online an honest and satisfying experience. Chapters like "Fifty Ways to Delete Your Lover" and "Don't Talk to Strangers--Except on the Internet!" keep the discussion lively as well as informative.

9 特價990
立即代訂
下次再買

High-Performance Computing Systems and Technologies in Scientific Research, Automation of Control and Production

Springer 出版
2021/01/20 出版

This book constitutes selected revised and extended papers from the 10th International Conference on High-Performance Computing Systems and Technologies in Scientific Research, Automation of Control and Production, HPCST 2020, Barnaul, Russia, in May 2020. Due to the COVID-19 pancemic the conference was partly held in virtual mode. The 14 full papers presented in this volume were thoroughly reviewed and selected form 51 submissions. The papers are organized in topical sections on hardware for high-performance computing and its applications; information technologies and computer simulation of physical phenomena.

9 特價2870
立即代訂
下次再買

Practical Threat Intelligence and Data-Driven Threat Hunting

Packt 出版
2021/01/20 出版

Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniquesKey Features: Set up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat huntingCarry out atomic hunts to start the threat hunting process and understand the environmentPerform advanced hunting using MITRE ATT&CK Evals emulations and Mordor datasetsBook Description: Threat hunting (TH) provides cybersecurity analysts and enterprises with the opportunity to proactively defend themselves by getting ahead of threats before they can cause major damage to their business.This book is not only an introduction for those who don't know much about the cyber threat intelligence (CTI) and TH world, but also a guide for those with more advanced knowledge of other cybersecurity fields who are looking to implement a TH program from scratch.You will start by exploring what threat intelligence is and how it can be used to detect and prevent cyber threats. As you progress, you'll learn how to collect data, along with understanding it by developing data models. The book will also show you how to set up an environment for TH using open source tools. Later, you will focus on how to plan a hunt with practical examples, before going on to explore the MITRE ATT&CK framework.By the end of this book, you'll have the skills you need to be able to carry out effective hunts in your own environment.What You Will Learn: Understand what CTI is, its key concepts, and how it is useful for preventing threats and protecting your organizationExplore the different stages of the TH processModel the data collected and understand how to document the findingsSimulate threat actor activity in a lab environmentUse the information collected to detect breaches and validate the results of your queriesUse documentation and strategies to communicate processes to senior management and the wider businessWho this book is for: If you are looking to start out in the cyber intelligence and threat hunting domains and want to know more about how to implement a threat hunting division with open-source tools, then this cyber threat intelligence book is for you.

9 特價2064
立即代訂
下次再買

ASP.NET Core 5 and React - Second Edition

Carl,Rippon  著
Packt 出版
2021/01/20 出版

Build fully functional, cloud-ready, and professional web applications using the latest features in the .NET 5 framework and React.js with Microsoft AzureKey FeaturesExplore the new features of .NET 5 with this updated edition of ASP.NET Core 5 and ReactDiscover strategies for adopting a full-stack development approach, clean architecture techniques, and development best practicesLearn how to manage data, design and package applications, and secure your web appsBook DescriptionMicrosoft's .NET framework is a robust server-side framework, now even more powerful thanks to the recent unification of the Microsoft ecosystem with the .NET 5 framework. This updated second edition addresses these changes in the .NET framework and the latest release of React.The book starts by taking you through React and TypeScript components for building an intuitive single-page application and then shows you how to design scalable REST APIs that can integrate with a React-based frontend. Next, you'll get to grips with the latest features, popular patterns, and tools available in the React ecosystem, including function-based components, React Router, and Redux. As you progress through the chapters, you'll learn how to use React with TypeScript to make the frontend robust and maintainable and cover key ASP.NET 5 features such as API controllers, attribute routing, and model binding to build a sturdy backend. In addition to this, you'll explore API security with ASP.NET 5 identity and authorization policies and write reliable unit tests using both .NET and React, before deploying your app on Azure.By the end of this book, you'll have gained the knowledge you need to enhance your C# and JavaScript skills and build full-stack, production-ready applications with ASP.NET 5 and React.What You Will LearnBuild RESTful APIs with .NET 5 using API controllersSecure REST APIs with identity and authorization policiesCreate strongly typed, interactive, and function-based React components using HooksUnderstand how to style React components using Emotion.jsPerform client-side state management with ReduxRun a range of automated tests on the frontend and backendImplement continuous integration and continuous delivery (CI/CD) processes in Azure using Azure DevOpsWho this book is forIf you're a web developer looking to get up to speed with full-stack web application development with .NET Core and React, this book is for you. Although the book does not assume any knowledge of React, a basic understanding of .NET Core will help you to get to grips with the concepts covered.

9 特價2018
立即代訂
下次再買

Up and Running Google AutoML and AI Platform

Amit,Agrawal  著
Ingram 出版
2021/01/19 出版

Learn how to work towards making the most out of a career in emerging tech Key Features Understand the core concepts related to careers in emerging tech. Learn innovative, exclusive, and exciting ways to design a successful career in ET. Reduce your learning curve by examining the career trajectories of eminent ET professionals. Ways to evolve and adapt to changing ET paradigms. Practical perspective from the field. Description Cracking the emerging tech code will help you attain your Emerging Technology (ET) career goals faster without spending years in committing avoidable mistakes, recovering from them, and learning things the hard way. You can apply practical tips in areas such as improving your ability to craft market-friendly use cases and evolving a solution approach in new and diverse tech or business environments, to propel forward your career in strategic and proactive ways.It outlines ways in which you can explore and capitalize on hidden opportunities while working on important career aspects. The anecdotes and solutions provided will aid you in getting an inside out view to reduce your learning curve. This book will help you in gaining both magnitude and direction in your ET career journey and prevent you from getting overwhelmed or pinned down by the forces of ET.Authored by an ET professional, this book will take you through a series of steps to deepen your understanding of the forces that shape one's ET career and successfully dealing with them.It also helps bust myths, addresses fallacies, and common misconceptions that could harm one's career prospects. There are also practical and easy-to-adopt tips, methods, tracking mechanisms, and information that will improve career standing and professional growth.This book makes it easy for you to enhance your employability and job market relevance so that you can sprint towards a rewarding career.What will you learnThrough this book, you will connect with ways and means to build a strong and rewarding emerging tech career. You will be able to work on identifying the right technology and employer, enhancing employability and differentiation in the job market, addressing challenges and connecting with enablers, accurate growth strategies and execution principles. Who this book is forThis book is for current and aspiring emerging tech professionals, students, and anyone who wishes to understand ways to have a fulfilling career in emerging technologies such as AI, blockchain, cybersecurity, IoT, space tech, and more. Table of Contents 1. Introduction2. The best ET for me and some myth bursting3. Getting prepared and charting a roadmap4. Identifying the requirements and getting help5. Dealing with headwinds and drawing a career change action plan6. Building an ET friendly r矇sum矇 and finding the right employer7. Getting hired through social media8. Job search9. Impressing the emerging tech jury10. The secret sauce11. Becoming a thought leader12. Measuring success and making course corrections13. Drawing the two-year plan14. Building your leadership capabilities15. To start-up or not?16. Communications skills: getting it right17. Building a personal brand18. Post-scriptAbout the Authors Prayukth has been actively involved in productizing and promoting cross eco-system collaboration in the IoT space for over half-a-decade. In recent years, he has focused on exposing APT groups, global footprint, and in evaluating the evolving threat landscape surrounding IoT and OT environments. In his current role, he has taken Subex's IoT business to new geographies. Your Linkedin profile: https: //www.linkedin.com/in/prayukthkv/

9 特價844
立即代訂
下次再買

Engineering Software As a Service

Ingram 出版
2021/01/18 出版

NOTE: This is the Beta of the 2nd Edition. Some content may change orbe added until May 2021. See http: //saasbook.info for details.Purchasers of Kindle version (available February 2021) will get free updates for life. Aone-semester college course in software engineering focusing on cloudcomputing, software as a service (SaaS), and Agile development usingExtreme Programming (XP) and the Rails and jQuery frameworks.Endorsed by leading companies including Google, leading scholarsincluding Turing Award winners, and students from all over the worldwho have taken the edX course series "Agile Development" fromBerkeleyX, to which this book is an ideal companion. Hands-onexercises are freely downloadable from GitHub. A complete version ofthe course including autograding for the exercises is available in theCodio web-based IDE. See http: //saasbook.info for details, table ofcontents, and extensive free resources for both classroom and remoteinstructors.

9 特價846
立即代訂
下次再買

Aws Certified Security Study Guide

Ingram 出版
2021/01/16 出版

Get prepared for the AWS Certified Security Specialty certification with this excellent resource By earning the AWS Certified Security Specialty certification, IT professionals can gain valuable recognition as cloud security experts. The AWS Certified Security Study Guide: Specialty (SCS-C01) Exam helps cloud security practitioners prepare for success on the certification exam. It's also an excellent reference for professionals, covering security best practices and the implementation of security features for clients or employers. Architects and engineers with knowledge of cloud computing architectures will find significant value in this book, which offers guidance on primary security threats and defense principles. Amazon Web Services security controls and tools are explained through real-world scenarios. These examples demonstrate how professionals can design, build, and operate secure cloud environments that run modern applications. The study guide serves as a primary source for those who are ready to apply their skills and seek certification. It addresses how cybersecurity can be improved using the AWS cloud and its native security services. Readers will benefit from detailed coverage of AWS Certified Security Specialty Exam topics. Covers all AWS Certified Security Specialty exam topics Explains AWS cybersecurity techniques and incident response Covers logging and monitoring using the Amazon cloud Examines infrastructure security Describes access management and data protection With a single study resource, you can learn how to enhance security through the automation, troubleshooting, and development integration capabilities available with cloud computing. You will also discover services and tools to develop security plans that work in sync with cloud adoption.

9 特價2052
立即代訂
下次再買

Cloud Computing. Eignet sich die Etablierung von Cloud-L繹sungen in Unternehmen?

Anonym  著
Ingram 出版
2021/01/15 出版

Studienarbeit aus dem Jahr 2020 im Fachbereich Informatik - Internet, neue Technologien, Note: 1,2, Frankfurt School of Finance & Management, Sprache: Deutsch, Abstract: Ziel der Seminararbeit ist es, wesentliche Chancen und Risiken des Cloud Computings zu untersuchen und daraufhin festzustellen, ob es sich f羹r die Nutzung innerhalb eines Unternehmen eignet. Mittlerweile sind Informationstechnologien aus dem Alltag nicht mehr wegzudenken, da Bestellungen beispielsweise 羹ber Amazon get瓣tigt und Finanztransaktionen online durchgef羹hrt werden. Diese Aktivit瓣ten bringen einen wachsenden Bedarf an Datenverarbeitungs- und Speichersystemen, der teilweise durch die eigene Rechenleistung im Unternehmen oder im privaten Umfeld nicht abgedeckt werden kann. Der in den 90er-Jahren erstmals von Ramnath Chellappa (Chellappa, 1997) genutzte Begriff des Cloud Computing kann einen L繹sungsansatz darstellen, um den stetig wachsenden Bedarf an IT-Ressourcen zu decken. Durch das Cloud Computing werden dem Anwender scheinbar unendliche Ressourcen zur Verf羹gung gestellt, die auf den eigenen Bedarf angepasst und flexibel genutzt werden kann. Somit liegt die Vermutung nahe, dass das Cloud Computing dazu beitr瓣gt, die zuk羹nftigen Herausforderungen zu bew瓣ltigen. Jedoch stellt sich die Frage, welche Potentiale das Cloud Computing tats瓣chlich erf羹llen kann, welche Herausforderungen den Anwender erwarten und wie diese zu bew瓣ltigen sind.

9 特價1602
立即代訂
下次再買

Ciberseguridad

Quinn,Kiser  著
Ingram 出版
2021/01/13 出版

Si quiere descubrir c籀mo protegerse a s穩 mismo, a su familia y a su empresa de los ciberataques, entonces contin繳e leyendo...聶Ha sentido curiosidad acerca de c籀mo los hacker eligen a sus v穩ctimas o desarrollan sus planes de ataque?聶Ha sido hackeado antes?聶Quiere aprender a proteger sus sistemas y redes de los hackers?Si respondi籀 "s穩" a cualquiera de las preguntas anteriores, este es el libro para usted.Este libro sirve como una plataforma de lanzamiento para aprender m獺s sobre Internet y la ciberseguridad.A lo largo de este libro, emprender獺 un viaje al mundo de los delitos cibern矇ticos y la ciberseguridad.La informaci籀n est獺 dise簽ada para ayudarlo a entender las diferentes formas de hackeo, y de lo que puede hacer para evitar ser hackeado.Al final de este libro, podr穩a decidir seguir una carrera en el campo de la seguridad inform獺tica.En este libro, usted descubrir獺 lo siguiente: La importancia de la ciberseguridad.Una breve historia del cibercrimen, los diferentes tipos, y su evoluci籀n a lo largo de los a簽os.Los varios tipos de ciberataques ejecutados a trav矇s de Internet.10 tipos de hackers cibern矇ticos: los autores intelectuales detr獺s de los ataques.Los secretos de los ataques de phishing y c籀mo puede protegerse de ellos.Los diferentes tipos de malware que existen en el mundo digital.Las fascinantes herramientas para identificar y combatir el malware.Ransomware y c籀mo los atacantes aprovechan la tecnolog穩a para obtener dinero.9 m矇todos de pruebas de seguridad que puede aprender a hacer.Ingenier穩a social y c籀mo identificar un ataque de ingenier穩a social.Seguridad de Red, Seguridad de Aplicaciones Web y Seguridad de Tel矇fonos Inteligentes.Ejemplos de diferentes tipos de hacks e incidentes pasados para enfatizar la necesidad de la ciberseguridad.癒Obtenga este libro ahora para aprender m獺s sobre la ciberseguridad!

9 特價1026
立即代訂
下次再買

Senior Cyber

Ingram 出版
2021/01/12 出版

As a cybersecurity expert who presents on TV and at security conferences regularly, Scott Schober has seen an alarmingly disproportionate number of seniors being coerced, targeted, and robbed through the same internet we all share.From the basics of the internet to the fight for healthcare privacy and security that is so critical to our aging population, Senior Cyber offers simple advice and expertise for all levels of internet experience. Whether you are a parent, grandparent, great-grandparent, or the son or daughter of one, this book is designed with your concerns in mind. Practical cybersecurity advice and examples affecting seniors put Senior Cyber atop any reading list for those helping others or themselves to stay cyber safe.Basic tech and security topics: - email, browsers, search engines- big data pitfalls, privacy, security- healthcare cybersecurity- computer and smartphone basics- politics of technology- internet and phone scams to avoid- video chat in the age of COVID19Advanced security topics: - spotting email phishing scams- dealing with spam and junk mail- creating strong passwords- keeping your searches private- avoiding big data collection- stopping identity theft before and after death- securing your digital footprint

9 特價1026
立即代訂
下次再買

Unhackable

Ingram 出版
2021/01/12 出版

Terrified about identity theft and data breaches? Discover a foolproof method to protect your information and get online with peace of mind.Are you worried about your family members getting scammed or hacked? Want to keep your computers and phones protected with iron-clad security? Cyber security expert George Mansour has helped individuals and businesses protect their data for over 15 years. Now he'll share his simple system for safeguarding your valuable digital life.Unhackable provides you with a unique Cyber security strategy that combines user psychology and easy-to-apply techniques that teach you how to become your own strongest line of defense. Informative and insightful, Mansour uses anecdotes, professional experience, and step-by-step procedures to make protecting your personal data as easy as hitting the power button.

9 特價549
立即代訂
下次再買

Digital Contention in a Divided Society

Paul,Reilly  著
Ingram 出版
2021/01/12 出版

How are platforms such as Facebook and Twitter used by citizens to frame contentious parades and protests in 'post-conflict' Northern Ireland? What do these contentious episodes tell us about the potential of information and communication technologies to promote positive intergroup contact in the deeply divided society? These issues are addressed in what is the first in-depth qualitative exploration of how social media were used during the union flag protests (December 2012-March 2013) and the Ardoyne parade disputes (July 2014 and 2015). The book focuses on the extent to which affective publics, mobilised and connected via expressions of solidarity on social media, appear to escalate or de-escalate sectarian tensions caused by these hybrid media events. It also explores whether citizen activity on these online platforms has the potential to contribute to peacebuilding in Northern Ireland.

9 特價7137
立即代訂
下次再買

Innovative Security Solutions for Information Technology and Communications

Diana,Maimut  著
Springer 出版
2021/01/11 出版

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Security for Information Technology and Communications, SecITC 2020, held in Bucharest, Romania, in November 2020.The 17 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 41 submissions. The conference covers topics from cryptographic algorithms, to digital forensics and cyber security and much more.

9 特價2870
立即代訂
下次再買

Internet of Things

Ingram 出版
2021/01/10 出版

Internet of Things (IoT) is expanding at a rapid rate and it is becoming increasingly important for professionals to understand what it is, how it works, and how to harness its power to improve business. Because of this it's very important to make sure that security is integrated into all IoT systems.

9 特價6315
立即代訂
下次再買

IT-Sicherheit und das Betriebssystem. Unterst羹tzung durch das Betriebssystem und alternative L繹sungsans瓣tze

Ingram 出版
2021/01/09 出版

Studienarbeit aus dem Jahr 2020 im Fachbereich Informatik - IT-Security, Note: 1,0, FOM Essen, Hochschule f羹r Oekonomie & Management gemeinn羹tzige GmbH, Hochschulleitung Essen fr羹her Fachhochschule, Sprache: Deutsch, Abstract: Diese Arbeit soll die aktuelle Situation der IT-Sicherheit in Bezug auf Betriebssysteme darstellen. Welche Schwachstellen k繹nnen entstehen und wie kann ein Betriebssystem optimiert werden? Die wissenschaftliche Recherche fokussiert sich auf einige Themen der IT-Sicherheit sowie der wichtigsten Steuerungselementen des Betriebssystems. Die digitale Revolution begann in den 1940ern mit der Entwicklung des Computers und bildet sich seitdem st瓣ndig weiter aus. Den H繹hepunkt bilden aktuell die technische Vielfalt des Internets sowie die zunehmende Digitalisierung von Gesch瓣ftsprozessen. Das Internet verbindet Milliarden von Menschen und rund 40 Milliarden von mobilen Endger瓣ten miteinander. Die ausgepr瓣gte digitale Vernetzung erm繹glicht autonomes Fahren, wie auch l羹ckenlose ?berwachung und Cyberkriminalit瓣t. Der Fortschritt der Kommunikationstechnik kreiert die Vision einer weitumfassenden Vernetzung von Computern und mobilen Endger瓣ten. Teure Kabelverbindungen werden durch Mikroprozessoren und Funksensoren ersetzt. Der technologische Wandel wurde von Menschen in ?berschall erschaffen und die IT-Sicherheit trottet noch hinterher. Es k繹nnen weltweit im Sekundentakt Millionen von Hacker- und Lauschangriffen registriert werden. Dadurch entstehen nicht nur gewaltige wirtschaftliche Sch瓣den, sondern auch datenschutzbed羹rftige Missbrauchsf瓣lle im Bereich der Privatsph瓣re. Die Annahme, die aktuelle Sicherheitstechnik sei ausreichend, ist unbefriedigend. Sie beruht auf der einzigen Tatsache, dass es dem Angreifer aufgrund physikalischer Rechenleistung nicht m繹glich ist, Verschl羹sselungen zu hacken. Zu den heut bekannten Cyber-Attacken z瓣hlen, Ausf瓣lle von Systemen, manipulierte und missbr瓣uchlich verwendete Daten und auch zerst繹rte Daten. Dies wird durch M

9 特價1729
立即代訂
下次再買

Machine Learning in Cyber Security

Ingram 出版
2021/01/08 出版

This book is addressed for both seasoned and beginners in the field of machine learning, we included a simple explanation for each idea and then we expanded to all technical details. We started by explaining KNN and all its challenges. Then we introduced a newly discovered dataset deficiency and an enhancement to counter that problem. The field of the experiment was on network traffic classification. We combined the precision of the DPI method and the privacy of blind classifiers, once the model is trained on known traffic flows, then we used the statistical data and the packet header for classification.

9 特價1375
立即代訂
下次再買

Full-Stack React, TypeScript, and Node

David,Choi  著
Packt 出版
2021/01/05 出版

Discover the current landscape of full-stack development and how to leverage modern web technologies for building production-ready React.js applications to deploy on AWSKey Features: Understand the architecture of React and single-page applicationsBuild a modern Web API for your SPA using Node.js, Express, and GraphQLGain a clear and practical understanding of how to build a complete full-stack applicationBook Description: React sets the standard for building high-performance client-side web apps. Node.js is a scalable application server that is used in thousands of websites, while GraphQL is becoming the standard way for large websites to provide data and services to their users. Together, these technologies, when reinforced with the capabilities of TypeScript, provide a cutting-edge stack for complete web application development.This book takes a hands-on approach to implementing modern web technologies and the associated methodologies for building full-stack apps. You'll begin by gaining a strong understanding of TypeScript and how to use it to build high-quality web apps. The chapters that follow delve into client-side development with React using the new Hooks API and Redux. Next, you'll get to grips with server-side development with Express, including authentication with Redis-based sessions and accessing databases with TypeORM. The book will then show you how to use Apollo GraphQL to build web services for your full-stack app. Later, you'll learn how to build GraphQL schemas and integrate them with React using Hooks. Finally, you'll focus on how to deploy your application onto an NGINX server using the AWS cloud.By the end of this book, you'll be able to build and deploy complete high-performance web applications using React, Node, and GraphQL.What You Will Learn: Discover TypeScript's most important features and how they can be used to improve code quality and maintainabilityUnderstand what React Hooks are and how to build React apps using themImplement state management for your React app using ReduxSet up an Express project with TypeScript and GraphQL from scratchBuild a fully functional online forum app using React and GraphQLAdd authentication to your web app using RedisSave and retrieve data from a Postgres database using TypeORMConfigure NGINX on the AWS cloud to deploy and serve your appsWho This Book Is For: The book is for web developers who want to go beyond front-end web development and enter the world of full-stack web development by learning about modern web technologies and how they come together. A good understanding of JavaScript programming is required before getting started with this web development book.

9 特價2248
立即代訂
下次再買

Security, Privacy, and Anonymity in Computation, Communication, and Storage

Guojun,Wang  著
Springer 出版
2021/01/05 出版

This book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, held in Nanjing, China, in December 2020. The 30 full papers were carefully reviewed and selected from 88 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage. SpaCCS 2020 is held jointly with the 11th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2020), the 10th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2020), the 9th International Symposium on Security and Privacy on Internet of Things (SPIoT 2020), the 6th International Symposium on Sensor-Cloud Systems (SCS 2020), the 2nd International Workshop on Communication, Computing, Informatics and Security (CCIS 2020), the First International Workshop on Intelligence and Security in Next Generation Networks (ISNGN 2020), the First International Symposium on Emerging Information Security and Applications (EISA 2020).

9 特價2870
立即代訂
下次再買

Constructive Side-Channel Analysis and Secure Design

Springer 出版
2021/01/04 出版

This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2020, held in Lugano, Switzerland, in April 2020. Due to COVID-19, the workshop was held online. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. The workshop covers subjects from wide ranges such as secure design, side channel attacks and countermeasures, and architectures and protocols.

9 特價2870
立即代訂
下次再買

Wordpress for Dummies

For Dummies 出版
2021/01/01 出版

Get to know WordPress with this simple and approachable reference WordPress For Dummies, 9th Edition helps readers discover the power of the WordPress web content building tool. Web builders have created 75 million websites using WordPress and this book will show you how to add your blogs and websites to that count. WordPress For Dummies, 9th Edition drops you right into the fast lane to publishing your first website or blog by teaching you to: - Customize a theme - Create your first post - Use WordPress as a content management system - Work with multimedia formats - Add plugins to your site - Establish a publishing routine Perfect for new bloggers, experienced bloggers converting to WordPress for the first time, and people accustomed to WordPress who want to learn more about the full potential of the technology, WordPress for Dummies, 9th Edition is an indispensable addition to the library of every blogger and webmaster.

9 特價1197
立即代訂
下次再買

Practical Jamstack

Apress 出版
2021/01/01 出版

Learn what JAMstack is all about, what those three big letters in the front mean and why it's so beneficial. This book shows you how to create sites and apps on the JAMstack using GatsbyJS, a tool made specifically for generating them. As part of that, you'll learn about React, one of the hottest front-end development tools out there today. You will build three separate projects, starting with a relatively simple site to get your feet wet, then a more robust and dynamic application to see more advanced topics like API usage and data storage. Finally, you'll build a game on the JAMstack to get a whole different perspective on how all the pieces can fit together. JAMstack, a modern take on best practices, is taking the web development world by storm and allowing developers to create web site and apps that are blazingly fast and highly secure. In many ways JAMstack is a throwback to web development of yesteryear, all while providing a simpler development experience that is streamlined by many years of best practices being brought to bear. What You'll Learn Review the principles of JAMstack: Javascript, APIs and MarkupUse React to build a front-endSet up a GitHub account and hosting using GitHub PagesHost in Netlify (the creators of JAMstack!)Understand Netlify functions and FaunaDB for persistent data storageExplore GraphQL usage for querying dataWork with the Phaser game library Who This Book Is ForWeb developers with some HTML, CSS and JavaScript experience, who want to apply best practices to build web sites that have no back-end server infrastructure while still providing dynamic content along with a streamlined development process. Architects who just want to learn JAMstack, even if they aren't going to be hacking code all day.

9 特價1881
立即代訂
下次再買
頁數71/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing