0408~0410_屁屁偵探讀本13對決!怪盜學院星星篇
0408~0410_4月選書

英文書 > 全部商品

Remote Desktop Protocol. Grundlagen, Sicherheit und RDP-Replay-Attacken

Ingram 出版
2020/12/04 出版

Studienarbeit aus dem Jahr 2020 im Fachbereich Informatik - IT-Security, Note: 1,3, Hochschule Albstadt-Sigmaringen; Albstadt (Informatik), Veranstaltung: Master of Science Digitale Forensik, Sprache: Deutsch, Abstract: Diese Arbeit widmet sich einer Einf羹hrung in das Remote Desktop Protocol (RDP), welches vornehmlich dem Fernzugriff auf entfernte Server und virtuelle Maschinen dient. Betrachtet wird insbesondere die Sicherheitsarchitektur des Protokolls sowie die Durchf羹hrung einer Erprobung einfacher Angriffsm繹glichkeiten, um als Au?enstehender Daten mitlesen und Nutzeraktionen so aufzuzeichnen, um sie sp瓣ter videographisch wiederzugeben zu k繹nnen. Seit Anbeginn der Vernetzung ist ein wesentlicher Aspekt der Zentralisierung von ITRescourcen, dass ein Anwender sich nicht physisch am Ort der maximalen Rechenleistung einfinden muss, sondern von einem beliebigen Terminal so auf einen Server zugreifen kann, als w瓣re der Nutzer direkt dort. Dies funktioniert seit jeher weltweit, sofern die Bandbreiten und Latenzen f羹r den jeweiligen Anwendungszweck ausreichend bemessen sind.

9 特價1729
立即代訂
下次再買

Foundation Gatsby Projects

Apress 出版
2020/12/04 出版

Enhance your Gatsby skillset by building a series of ready-to-use web sites. With the aid of four projects, this book teaches you how to use Gatsby alongside the latest technologies, including Contentful, Twillio, and Stackbit. In the first project, you will create a simple agency site with a contact form and deploy it to Netlify. You'll then quickly be able to create other basic client sites. Next, you will learn to set up a blog site using Stackbit and Dev CMS. Other projects include a large site built with Contentful and a video chat using Twilio. Many Gatsby tutorials out there today only cover how to create blog sites - get ahead of the crowd using this book today. What You'll Learn Use Contentful CMS with GatsbyBuild sites quickly with Stackbit serviceDevelop a video chat site similar to Skype with Twilio services Deploy all sites in NetlifyAdd functionalities with the powerful Gatsby plugin ecosystem Integrate advertisements Who This Book Is For Anyone who wants to create a site using Gatsby. A little knowledge of React is expected but is not a necessity. You will need to be familiar with JavaScript concepts and be confident with basic web development.

9 特價1710
立即代訂
下次再買

Tor Anonymity Network 101

Steven,Gates  著
Ingram 出版
2020/12/03 出版

Hvis du har s繪gt efter adgang til den mest private og sikre del af internettet, har du fundet den! TOR Anonymity Network 101 - En introduktion til den mest private del af internettet har alt, hvad du nogensinde har 繪nsket dig at l疆re om total anonymitet online. Vi lever i en tidsalder, hvor alt, hvad vi g繪r online, p疇 trods af vores bedste hensigter er udsat for overv疇gning eller angreb. Vores egne fremskridt inden for teknologien, som skulle g繪re vores liv nemmere, kan forvr疆nges og bruges imod os. Det er afg繪rende at vide, hvordan vi kan handle i vores egen bedste interesse, s疇 vi alle kan beskytte os selv. TOR Anonymity Network 101 omfatter: * S疇dan holder du dig anonym online * N繪glen til networking for begyndere * En introduktion til de mest private dele af internettet og meget mere! TOR forhindrer dig ikke i at blive set p疇 internettet, men programmet forhindrer, at folk finder ud af, hvor du befinder dig, og bruger disse oplysninger mod dig. Hvis du v疆rds疆tter dig privatliv, skal du l疆se TOR Anonymity Network 101 - En introduktion til den mest private del af internettet!

9 特價1137
立即代訂
下次再買

SSL/TLS Under Lock and Key

Hollie,Acres  著
Ingram 出版
2020/12/03 出版

If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.The first half of our book focuses on foundational theory, covering topics such as: Symmetric vs Asymmetric cryptographyOne-Way functionsDigital SignaturesKey GenerationHistory and ContextThe second half encourages fledgling administrators to jump in with both feet, outlining the quirks of common tasks such as: Generating a signing request for a certificate (CSR)Generating a self-signed certificate (and when it is safe to do or not do so)Converting certificates between different formats including java keystoresConfiguring servers to meet best practices, not in a vacuum, but for the security and compatibility needs of your business vertical.Are you a systems administrator just starting out? A developer looking to not just implement, but to understand? Or perhaps SSL/TLS has been a topic you've avoided over the years because it is very dense and implementation can be fraught with fidgety pitfalls. You can read this book cover to cover, crosswalk to the copiously linked RFCs, or use it as a desk reference.This is SSL/TLS for everyone.This is the Colour Edition

9 特價853
立即代訂
下次再買

Security Awareness for Dummies

Ira,Winkler  著
For Dummies 出版
2020/12/01 出版

Make security a priority on your team Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team's willingness to follow their rules and protocols, it's increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board with following it. Security Awareness For Dummies gives you the blueprint for implementing this sort of holistic and hyper-secure program in your organization. Written by one of the world's most influential security professionals--and an Information Systems Security Association Hall of Famer--this pragmatic and easy-to-follow book provides a framework for creating new and highly effective awareness programs from scratch, as well as steps to take to improve on existing ones. It also covers how to measure and evaluate the success of your program and highlight its value to management. Customize and create your own program Make employees aware of the importance of security Develop metrics for success Follow industry-specific sample programs Cyberattacks aren't going away anytime soon: get this smart, friendly guide on how to get a workgroup on board with their role in security and save your organization big money in the long run.

9 特價1026
立即代訂
下次再買

Microservices: Up and Running

Ronnie,Mitra  著
Ingram 出版
2020/12/01 出版

Microservices architectures offer faster change speeds, better scalability, and cleaner, evolvable system designs. But implementing your first microservices architecture is difficult. How do you make myriad choices, educate your team on all the technical details, and navigate the organization to a successful execution to maximize your chance of success? With this book, authors Ronnie Mitra and Irakli Nadareishvili provide step-by-step guidance for building an effective microservices architecture. Architects and engineers will follow an implementation journey based on techniques and architectures that have proven to work for microservices systems. You'll build an operating model, a microservices design, an infrastructure foundation, and two working microservices, then put those pieces together as a single implementation. For anyone tasked with building microservices or a microservices architecture, this guide is invaluable. Learn an effective and explicit end-to-end microservices system design Define teams, their responsibilities, and guidelines for working together Understand how to slice a big application into a collection of microservices Examine how to isolate and embed data into corresponding microservices Build a simple yet powerful CI/CD pipeline for infrastructure changes Write code for sample microservices Deploy a working microservices application on Amazon Web Services

9 特價1915
立即代訂
下次再買

Crypto Wars

Craig,Jarvis  著
Ingram 出版
2020/12/01 出版

CryptoWars offers a history of the half century contest between the US government and its citizens to control digital cryptography, a technology allowing citizens to place their communications beyond the State's reach, thus undermining law enforcement and intelligence capabilities.

9 特價2243
立即代訂
下次再買

Computer Security - Esorics 2020

Liqun,Chen  著
Springer 出版
2020/12/01 出版

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format. The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.

9 特價2870
立即代訂
下次再買

Interoperability in Iot for Smart Systems

Ingram 出版
2020/12/01 出版

This book discusses about different facets of interoperability issues among the IoT devices and their solutions, the scalability issues and solutions for plug-n-play of new devices with the existing IoT system. It also discusses the possible usage of interoperable and plug-n-play IoT networks in different systems to make them smarter.

9 特價8613
立即代訂
下次再買

Melee is Broken

Aj,Rappaport  著
Lulu.com 出版
2020/11/30 出版

In a world where most video game players crave the newest hardware or the latest game, one tight-knit global gaming community, thousands strong, has stood alone for nearly two decades: the competitive Super Smash Bros. Melee (SSBM) scene. SSBM's release for the Nintendo GameCube in 2001 signaled an exciting moment in gaming history: a continuation of the popular Smash Bros. franchise, boasting even more characters and iconography from players' favorite Nintendo properties. Melee is Broken argues that SSBM's unique staying power is sourced from its reliance on hardware objects from the early 2000s, through which new life is breathed into ostensibly "dead" media objects. Through blending textual analysis with artistic research-creation, this book interrogates the ideologies and principles that have sustained the competitive SSBM scene for so many years through examining hardware, software, community discourse, and the formation of universally adopted techniques both in- and out-of-game. This groundbreaking work aims to invite everyone from long-time SSBM competitors to those on the peripheral of SSBM, or even gaming in general, to inquire and learn more about the passion and dedication that defines competitive SSBM.

9 特價865
立即代訂
下次再買

Information Security

Willy,Susilo  著
Springer 出版
2020/11/29 出版

This book constitutes the proceedings of the 23rd International Conference on Information Security, ISC 2020, held in Bali, Indonesia, in December 2020. The 23 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers cover topics of research in theory and applications of information security, such as Security and privacy and Network security as well.

9 特價2870
立即代訂
下次再買

Security, Privacy, and Applied Cryptography Engineering

Lejla,Batina  著
Springer 出版
2020/11/24 出版

This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2020, held in Kolkata, India, in December 2020. Due to COVID-19 pandemic, the conference was held virtual. The 13 full papers presented were carefully reviewed and selected from 48submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.

9 特價2870
立即代訂
下次再買

Blockchain with Hyperledger Fabric, Second Edition

Nitin,Gaur  著
Packt 出版
2020/11/24 出版

Learn to develop blockchain-based distributed ledgers and deploy a Hyperledger Fabric network with concrete exercises and examplesKey featuresUpdated with the latest features and additions that come with Hyperledger Fabric 2Write your own smart contracts and services using Java and JavaScript on a Hyperledger Fabric networkDive into real-world blockchain challenges such as integration and scalabilityBook DescriptionBlockchain with Hyperledger Fabric - Second Edition is a refreshed and extended version of the successful book on practical Hyperledger Fabric blockchain development. This edition includes many new chapters, alongside comprehensive updates and additions to the existing ones. Entirely reworked for Hyperledger Fabric version 2, this edition will bring you right up to date with the latest in blockchain. Using a real-world Trade Finance and Logistics example, with working code available on GitHub, you'll really understand both how and why Hyperledger Fabric can be used to maximum effect. This book is your comprehensive guide and reference to explore and build blockchain networks using Hyperledger Fabric version 2.This edition of the book begins by outlining the evolution of blockchain, including an overview of relevant blockchain technologies. Starting from first principles, you'll learn how to design and operate a permissioned blockchain network based on Hyperledger Fabric version 2. You will learn how to configure the main architectural components of a permissioned blockchain network including Peers, Orderers, Certificate Authorities, Channels, and Policies. You'll then learn how to design, develop, package, and deploy smart contracts, and how they are subsequently used by applications. This edition also contains chapters on DevOps, blockchain governance, and security, making this your go-to book for Hyperledger Fabric version 2.What you will learnDiscover why blockchain is a technology and business game changerSet up blockchain networks using Hyperledger Fabric version 2Understand how to create decentralized applicationsLearn how to integrate blockchains with existing systemsWrite smart contracts and services quickly with Hyperledger Fabric and Visual Studio CodeDesign transaction models and smart contracts with Java, JavaScript, TypeScript, and GolangDeploy REST gateways to access smart contracts and understand how wallets maintain user identities for access controlMaintain, monitor, and govern your blockchain solutionsWho this book is forThis book is designed in such a way that professionals from different areas including business leaders, technology leaders, blockchain application developers, and even beginners can benefit from it.

9 特價2523
立即代訂
下次再買

Theoretical Issues in Natural Language Processing

Yorick,Wilks  著
Psychology 出版
2020/11/22 出版

Accompanying continued industrial production and sales of artificial intelligence and expert systems is the risk that difficult and resistant theoretical problems and issues will be ignored. The participants at the Third Tinlap Workshop, whose contributions are contained in Theoretical Issues in Natural Language Processing, remove that risk. They discuss and promote theoretical research on natural language processing, examinations of solutions to current problems, development of new theories, and representations of published literature on the subject. Discussions among these theoreticians in artificial intelligence, logic, psychology, philosophy, and linguistics draw a comprehensive, up-to-date picture of the natural language processing field.

9 特價3496
立即代訂
下次再買

Pirat矇

Tektime  著
Ingram 出版
2020/11/20 出版

Le livre de piratage est destin矇 ? servir de guide de niveau interm矇diaire ? certains outils et comp矇tences de test de p矇n矇tration courants, en particulier ceux du piratage sans fil et du maintien de l`anonymat. Le livre se concentre davantage sur l`ex矇cution pratique et fournit des proc矇dures 矇tape par 矇tape pour l`installation des plates-formes et des outils essentiels, ainsi que la th矇orie derri癡re certaines attaques de base. Acqu矇rez la possibilit矇 de faire du piratage 矇thique et des tests de p矇n矇tration en prenant ce livre sur le piratage! Obtenez des r矇ponses d`un expert informatique exp矇riment矇 ? chaque question que vous avez li矇e ? l`apprentissage que vous faites dans ce livre, y compris: - l`installation de Kali Linux en utilisant les bases de VirtualBox de Linux Rester anonyme avec Tor Proxychains, - Virtual Private Networks (VPN) Macchanger, - Nmap cracking wifi aircrack craquer les mots de passe Linux Quelles sont les exigences? Connexion Internet fiable et rapide. Carte r矇seau sans fil. Kali Linux Distribution Comp矇tences informatiques de base Que retirerez-vous du livre sur le piratage? R矇ponses ? chaque question que vous vous posez sur le piratage 矇thique et les tests d`intrusion par un professionnel de l`informatique exp矇riment矇! Vous apprendrez les bases du r矇seau Traitez avec de nombreux outils Kali Linux Apprenez quelques commandes Linux Conseils pour rester anonyme dans les activit矇s de piratage et de test de p矇n矇tration. Prot矇gez votre r矇seau WiFi contre toutes les attaques Acc矇dez ? n`importe quel compte client du r矇seau WiFi Un tutoriel complet expliquant comment cr矇er un environnement de piratage virtuel, attaquer les r矇seaux et casser les mots de passe. Instructions 矇tape par 矇tape pour l`isolation de VirtualBox et la cr矇ation de votre environnement virtuel sur Windows, Mac et Linux.

9 特價517
立即代訂
下次再買

Computer Security

Springer 出版
2020/11/19 出版

This book constitutes the refereed post-conference proceedings of the Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy, DETIPS 2020; the First International Workshop on Dependability and Safety of Emerging Cloud and Fog Systems, DeSECSys 2020; Third International Workshop on Multimedia Privacy and Security, MPS 2020; and the Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2020; held in Guildford, UK, in September 2020, in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. A total of 42 papers was submitted. For the DETIPS Workshop 8 regular papers were selected for presentation. Topics of interest address various aspect of the core areas in relation to digital economy. For the DeSECSys Workshop 4 regular papers are included. The workshop had the objective of fostering collaboration and discussion among cyber-security researchers and practitioners to discuss the various facets and trade-o s of cyber security. In particular, applications, opportunities and possible shortcomings of novel security technologies and their integration in emerging application domains. For the MPS Workshop 4 regular papers are presented which cover topics related to the security and privacy of multimedia systems of Internet-based video conferencing systems (e.g., Zoom, Microsoft Teams, Google Meet), online chatrooms (e.g., Slack), as well as other services to support telework capabilities. For the SPOSE Workshop 3 full papers were accepted for publication. They reflect the discussion, exchange, and development of ideas and questions regarding the design and engineering of technical security and privacy mechanisms with particular reference to organizational contexts.

9 特價2870
立即代訂
下次再買

Data Privacy Management, Cryptocurrencies and Blockchain Technology

Springer 出版
2020/11/18 出版

This book constitutes the revised selected post conference proceedings of the 15th International Workshop on Data Privacy Management, DPM 2020, and the 4th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2020, held in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020, held in Guildford, UK in September 2020.For the CBT Workshop 8 full and 4 short papers were accepted out of 24 submissions. The selected papers are organized in the following topical headings: Transactions, Mining, Second Layer and Inter-bank Payments. The DPM Workshop received 38 submissions from which 12 full and 5 short papers were selected for presentation. The papers focus on Second Layer, Signature Schemes, Formal Methods, Privacy, SNARKs and Anonymity.

9 特價2870
立即代訂
下次再買

Hackable

Ingram 出版
2020/11/17 出版

If you don't fix your security vulnerabilities, attackers will exploit them. It's simply a matter of who finds them first. If you fail to prove that your software is secure, your sales are at risk too. Whether you're a technology executive, developer, or security professional, you are responsible for securing your application. However, you may be uncertain about what works, what doesn't, how hackers exploit applications, or how much to spend. Or maybe you think you do know, but don't realize what you're doing wrong. To defend against attackers, you must think like them. As a leader of ethical hackers, Ted Harrington helps the world's foremost companies secure their technology. Hackable teaches you exactly how. You'll learn how to eradicate security vulnerabilities, establish a threat model, and build security into the development process. You'll build better, more secure products. You'll gain a competitive edge, earn trust, and win sales.

9 特價957
立即代訂
下次再買

Il Guerriglia-Marketing per il successo del tuo sito web

Ingram 出版
2020/11/15 出版

Sebastian Merz ha lavorato come consulente in diverse aziende di successo e per individui privati, guidando loro nella gestione della propria immagine su Internet. Nel fare questo, si 癡 sempre mantenuto aggiornato e inquadrato sulla sua strada. Sa che questo modo di fare porta migliori risultati, piuttosto che fare ci簷 che fanno tutti. L'autore evidenzia tecniche per attrarre nuovi visitatori al tuo sito web, con un piccolissimo budget. I metodi hanno dimostrato di essere validi per individui in proprio, cos穫 come per piccole e medie imprese, e questi metodi hanno generato un grande incremento del traffico dove altre compagnie non sono riuscite anche con budget molto pi羅 alti.

9 特價909
立即代訂
下次再買

Practical Git

Apress 出版
2020/11/15 出版

Practice your Git skills using exercises in your own environment. This book introduces concepts in an abstract visual way, and then enforces this learning through exercises - the Git katas. You will start with basic interactions such as commits and branches, and move on to both internals and collaborative workflows. Best practices are introduced and rehearsed throughout with hands-on exercises. Each topic is supplemented with interactive Git exercises that can be solved using any Git client - either the ubiquituous CLI or one of the many graphical clients so you'll learn in the environment you work in. The importance of Git is hard to overstate - it is used by 90% of software engineers worldwide and is the de facto standard for version control. Honing your Git skills is guaranteed to make you a better and more efficient developer. Building software can be stressful, but it doesn't need to be. Practical Git will give you the Git skills you need, and help keep your Git skills sharp. Add it to your library today. What You'll LearnUse Git through scripted exercises and the Git katas Understand Git's graph modelTroubleshoot common and rare scenarios you may faceSelect and apply the right Git tool for the taskMaintain and collaborate on Git repositoriesTweak Git to gain the most from this powerful tool Who This Book Is For Anyone who is currently using Git in a copy-paste fashion. It will take you from using Git to knowing Git.

9 特價1881
立即代訂
下次再買

Building Native Web Components

Carlos,Rojas  著
Apress 出版
2020/11/15 出版

Start developing single-page applications (SPAs) with modern architecture. This book shows you how to create, design, and publish native web components, ultimately allowing you to piece together those elements in a modern JavaScript framework. Building Native Web Components dives right in and gets you started building your first web component. You'll be introduced to native web component design systems and frameworks and discuss component-driven development to understand its importance in large-scale companies. You'll then move on to building web components using templates and APIs, and custom event lifecycles. Techniques and best practices for moving data, customizing, and distributing components are also covered. Throughout, you'll develop a foundation to start using Polymer, Vue.js, and Firebase in your day-to-day work. Confidently apply modern patterns and develop workflows to build agnostic software pieces that can be reused in SPAs. Building Native Web Components is your guide to developing small and autonomous web components that are focused, independent, reusable, testable, and works with all JavaScript frameworks, modern browsers, and libraries.What You Will LearnIncorporate component-driven development (CDD) and design systems into your workflowBuild apps with reusable UI components that are agnostic to JavaScript frameworksUtilize Polymer and Vue.js in your day-to-day workPublish your UI components in npm (Node Package Manager) Who This Book Is For The book is intended for Intermediate-Advanced level readers interested in single-page applications (SPAs), as well as Polymer, Vue.js, and Firebase.

9 特價1710
立即代訂
下次再買

R3 in Geomatics: Research, Results and Review

Springer 出版
2020/11/15 出版

This book constitutes the refereed proceedings of the First International Workshop in memory of Prof. Raffaele Santamaria on R3 in Geomatics: Research, Results and Review, R3GEO 2019, held in Naples, Italy*, in October 2019.The 27 full papers along with the 2 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on: GNSS and geodesy; photogrammetry and laser scanning; GIS and remote sensing.

9 特價2870
立即代訂
下次再買

Cloud Computing, Big Data & Emerging Topics

Enzo,Rucci  著
Springer 出版
2020/11/15 出版

This book constitutes the revised selected papers of the 8th International Conference on Cloud Computing, Big Data & Emerging Topics, JCC-BD&ET 2020, held in La Plata, Argentina*, in September 2020.The 11 full papers presented were carefully reviewed and selected from a total of 36 submissions. The papers are organized in topical sections of cloud computing and HPC; Big Data and machine and deep learning.*The conference was held virtually due to the COVID-19 pandemic.

9 特價2870
立即代訂
下次再買

The Next Generation Vehicular Networks, Modeling, Algorithm and Applications

Zhou,Su  著
Springer 出版
2020/11/15 出版

This book proposes the novel network envisions and framework design principles, in order to systematically expound the next generation vehicular networks, including the modelling, algorithms and practical applications. It focuses on the key enabling technologies to design the next generation vehicular networks with various vehicular services to realize the safe, convenient and comfortable driving. The next generation vehicular networks has emerged to provide services with a high quality of experience (QoE) to vehicles, where both better network maintainability and sustainability can be obtained than before.The framework design principles and related network architecture are also covered in this book. Then, the series of research topics are discussed including the reputation based content centric delivery, the contract based mobile edge caching, the Stackelberg game model based computation offloading, the auction game based secure computationoffloading, the bargain game based security protection and the deep learning based autonomous driving. Finally, the investigation, development and future works are also introduced for designing the next generation vehicular networks. The primary audience for this book are researchers, who work in computer science and electronic engineering. Professionals working in the field of mobile networks and communications, as well as engineers and technical staff who work on the development or the standard of computer networks will also find this book useful as a reference.

9 特價7307
立即代訂
下次再買

Model-Driven Simulation and Training Environments for Cybersecurity

Springer 出版
2020/11/14 出版

This book constitutes the refereed post-conference proceedings of the Second International Workshop on Model-Driven Simulation and Training Environments for Cybersecurity, MSTEC 2020, held in Guildford, UK, in September 2020 in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2020. The conference was held virtually due to the COVID-19 pandemic. The MSTEC Workshop received 20 submissions from which 10 full papers were selected for presentation. The papers are grouped in thematically on: cyber security training modelling; serious games; emulation & simulation studies; attacks; security policies.

9 特價2870
立即代訂
下次再買

Human Mental Workload: Models and Applications

Luca,Longo  著
Springer 出版
2020/11/14 出版

This book constitutes the refereed proceedings of the 4th International Symposium on Human Mental Workload: Models and Applications, H-WORKLOAD 2020, held in Granda, Spain*, in December 2020.The volume presents one keynote paper as well as 13 revised full papers, which were carefully reviewed and selected from 22 submissions. The papers are organized in two topical sections on models and applications.*The conference was held virtually due to the COVID-19 pandemic.

9 特價2870
立即代訂
下次再買

70 Tips and Tricks for Mastering the Cissp Exam

Apress 出版
2020/11/14 出版

Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter. Even the most experienced security professionals can fail because the questions are tricky and ask the test taker to pick the best of the options given. The CISSP exam conducted by ISC2 is the hardest and most rewarded cybersecurity examination. The test has several domains and sub-domains and covers a wide range of topics on security, including cyber and physical building security fields. It also covers breaches, discovery of breaches, and how to report data breaches. Because the subject area is vast and the questions are almost never repeated, it is hard for the exam taker to memorize or quickly discover the correct solution. The four options given as answers typically have two very close matches to the question. With quick analysis, it is possible to discover from the verbiage of a question what is truly being asked and learn how to find the closest possible solution without spending too much time on each question. What You Will Learn Think outside the box (the CISSP exam demands this of candidates)Quickly discern the gist of a question, eliminate the distractors, and select the correct answerUnderstand the use of words such as MOST, BEST, FIRST, LAST in the questionsSelect the correct answer when multiple options look like possible solutions Who This Book Is For Experienced security practitioners, managers, and executives interested in proving their knowledge across a wide array of security practices and principles, including chief information security officers, chief information officers, directors of security, IT directors and managers, security systems engineers, security analysts, security managers, security auditors, security architects, security consultants, private contractors, and network architects

9 特價2223
立即代訂
下次再買

The Pentester Blueprint

Wiley 出版
2020/11/13 出版

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties

9 特價1094
立即代訂
下次再買

A Complete Guide to Burp Suite

Apress 出版
2020/11/13 出版

Use this comprehensive guide to learn the practical aspects of Burp Suite--from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps. Burp Suite is a simple, yet powerful, tool used for application security testing. It is widely used for manual application security testing of web applications plus APIs and mobile apps. The book starts with the basics and shows you how to set up a testing environment. It covers basic building blocks and takes you on an in-depth tour of its various components such as intruder, repeater, decoder, comparer, and sequencer. It also takes you through other useful features such as infiltrator, collaborator, scanner, and extender. And it teaches you how to use Burp Suite for API and mobile app security testing.What You Will Learn Understand various components of Burp Suite Configure the tool for the most efficient use Exploit real-world web vulnerabilities using Burp Suite Extend the tool with useful add-onsWho This Book Is ForThose with a keen interest in web application security testing, API security testing, mobile application security testing, and bug bounty hunting; and quality analysis and development team members who are part of the secure Software Development Lifecycle (SDLC) and want to quickly determine application vulnerabilities using Burp Suite

9 特價1539
立即代訂
下次再買

Machine Learning for Cyber Security

Springer 出版
2020/11/13 出版

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence.

9 特價6785
立即代訂
下次再買

Machine Learning for Cyber Security

Springer 出版
2020/11/13 出版

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence.

9 特價2870
立即代訂
下次再買

Blockchain and Trustworthy Systems

Zibin,Zheng  著
Springer 出版
2020/11/13 出版

This book constitutes the thoroughly refereed post conference papers of the Second International Conference on Blockchain and Trustworthy Systems, Blocksys 2020, held in Dali, China*, in August 2020.The 42 full papers and the 11 short papers were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections: theories and algorithms for blockchain, performance optimization of blockchain, blockchain security and privacy, blockchain and cloud computing, blockchain and internet of things, blockchain and mobile edge computing, blockchain and smart contracts, blockchain and data mining, blockchain services and applications, trustworthy system development.*The conference was held virtually due to the COVID-19 pandemic.

9 特價5741
立即代訂
下次再買

Machine Learning for Cyber Security

Springer 出版
2020/11/12 出版

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi'an, China in October 2020.The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence.

9 特價5741
立即代訂
下次再買

Pioneering Advances for AI Driverless Cars

Lance,Eliot  著
Ingram 出版
2020/11/12 出版

Based on his popular AI Insider series and podcasts, this vital book by industry thought leader and global expert, Dr. Lance Eliot, provides pioneering advances for the advent of AI self-driving driverless cars. Included are insights about the practical application of Artificial Intelligence and Machines Learning.

9 特價1184
立即代訂
下次再買

Computer Networking

Ingram 出版
2020/11/11 出版

★★★ 2 Manuscripts in 1 Book ★★★Do you want to find out how a computer network works? Do you want to know how to keep your network safe? This book is all you need!Computers and the internet have changed this world and our lifestyle forever. We just need to touch a small button and within a fraction of a second, we can do almost anything! The major factor that lies behind this advanced technology is none other than computer network. That's why it's important to know how it works!Computers need to be connected to share resources and accomplish goals but, building these networks, requires a lot of skill: addresses must be set and approved, connections need to be sure. Whether it's the local area network for your company or the wired network in your home, this book gives you the right knowledge to get it started. In particular, you will learn: BOOK 1: NETWORKING FOR BEGINNERSNetworking Basics - Types of computer networks and network topologiesNetwork Hardware - The different network components (routers, hubs, switches, etc.).Network Cabling - The different cabling standards (coaxial, fiber optic cable, twisted-pair copper cable, etc.).Wireless Networking - Fundamental technicalities of wireless technology, how to set up and configure a computer for wireless connectivity.IP Addressing - Basics of IP addressing, and the different number systems (binary, decimal, and hexadecimal).IP Subnetting - Introduction to concepts of subnetting.Network Protocols - Various protocols of the TCP/IP suite.Internet Essentials - Different terminologies regarding the Internet, the worldwide web, and history of the Internet.Virtualization in cloud computing - Concept of virtualization and cloud services.Network Troubleshooting - Effective network management must address all issues pertaining to hardware, administration and end-user support, software, data management.BOOK 2: COMPUTER NETWORKING BEGINNERS GUIDE Introduction to Computer Networking - Components and classifications of computer networks.The Basics of Network Design - How to configure a LAN, network features and various responsibilities of network users.Wireless Communication Systems - How a computer network can be optimized, how to enjoy the benefits of Wi-Fi technology, an introduction to CISCO Certification Guide.Network Security - The most common computer network threats and fundamental guidelines on how to steer clear of such menaces.Hacking Network - Basics of hacking in computer networking, definitions, different methods of cybercrimes and an introduction to ethical hacking.Different Hacking Methods - The concept of social engineering and various hacking methods that could put your computer at risk, such as malware, keylogger, trojan horses, ransomware, etc.Working on a DoS attack - What is and how works one of the attacks that a hacker is likely to use to help get into their target's computer.Keeping Your Information Safe - How to keep our wireless network safe and some of the things that a hacker can potentially do.★★★ So, what are you waiting for? Scroll to the top of the page and grab your copy! ★★★

9 特價801
立即代訂
下次再買

Self-Stabilization

Shlomi,Dolev  著
Mit Press 出版
2020/11/11 出版

Shlomi Dolev presents the fundamentals of self-stabilization and demonstrates the process of designing self-stabilizing distributed systems. Self-stabilization, an important concept to theoreticians and practitioners in distributed computing and communication networks, refers to a system's ability to recover automatically from unexpected faults. In this book Shlomi Dolev presents the fundamentals of self-stabilization and demonstrates the process of designing self-stabilizing distributed systems. He details the algorithms that can be started in an arbitrary state, allowing the system to recover from the faults that brought it to that state. The book proceeds from the basic concept of self-stabilizing algorithms to advanced applications.

9 特價2340
立即代訂
下次再買

Frontiers in Cyber Security

Guangquan,Xu  著
Springer 出版
2020/11/11 出版

This book constitutes the proceedings of the Third International Conference on Frontiers in Cyber Security, FCS 2020, held in Tianjin, China*, in November 2020. The 39 full papers along with the 10 short papers presented were carefully reviewed and selected from 143 submissions. The papers are organized in topical sections on: IoT security; artificial intelligence; blockchain; cyber-physical systems security; cryptography; database security; depth estimation; mobile security; network security; privacy; program analysis; quantum cryptography; steganography; web security.*The conference was held virtually due to the COVID-19 pandemic.

9 特價5741
立即代訂
下次再買

Verification and Evaluation of Computer and Communication Systems

Springer 出版
2020/11/11 出版

This book constitutes the proceedings of the 14th International Conference on Verification and Evaluation of Computer and Communication Systems, VECoS 2020, which was supposed to be held in Xi'an, China, in October 2020, but was held virtually instead. The 19 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 60 submissions. The aim of the VECoS conference is to bring together researchers and practitioners in the areas of verification, control, performance, and dependability evaluation in order to discuss state of the art and challenges in modern computer and communication systems in which functional and extra-functional properties are strongly interrelated. Thus, the main motivation for VECoS is to encourage the cross-fertilization between various formal verification and evaluation approaches, methods and techniques, and especially those developed for concurrent and distributed hardware/software systems. The papers are organized in the following topical sections: petri-net, simulation, and scheduling; formal modeling and verification, testing; and artificial intelligence and machine learning.

9 特價2870
立即代訂
下次再買

Information, Communication and Computing Technology

Springer 出版
2020/11/11 出版

This book constitutes the refereed proceedings of the 5th International Conference on Information, Communication and Computing Technology, ICICCT 2020, held in New Delhi, India*, in May 2020.The 24 full papers and one short paper presented in this volume were carefully reviewed and selected from 220 submissions. The papers are organized in topical sections on data communication & networking; advanced computing using machine learning.*The conference was held virutally due to the COVID-19 pandemic.

9 特價2870
立即代訂
下次再買

Distributed Computing for Emerging Smart Networks

Imen,Jemili  著
Springer 出版
2020/11/10 出版

This book constitutes the refereed proceedings of the Second International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2020, held in Bizerte, Tunisia, in December 2020. Due to the COVID-19 pandemic the conference was held online. The 8 full papers included in this volume were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: ​intelligent transportation systems; emerging networking technologies; artificial intelligence and internet of things.

9 特價2870
立即代訂
下次再買

Mastering Corda

Oreilly & 出版
2020/11/10 出版

Mastering Corda provides you with a consistent, linear, and paced path to learning Corda and building modern enterprise-grade decentralized applications. Using this book, anyone from a complete blockchain beginner to an experienced blockchain or enterprise architect can rapidly understand and write applications like a pro while exploring the technical nuances and intricacies of the Corda platform. Corda is designed for use cases such as finance and investments, supply chain, healthcare, trade finance, insurance, and real estate that require a high-volume of transactions, scalability, and data privacy. If you have basic Java skills, this book will help you understand blockchain and show how you can get started immediately and be involved in the disruption of the future. With this book, you will: Understand Corda's value proposition and alignment with business strategies--particularly relevant to business executives and architects Dive deep into Corda's architecture and blockchain fundamentals Rapidly gain extensive knowledge of and hands-on experience with building Corda applications Compare and contrast Corda with Bitcoin, Ethereum, and Hyperledger Effectively prepare for the Corda certification exam and job interviews involving blockchain Perform data analytics and machine learning on Corda nodes

9 特價2736
立即代訂
下次再買

Integration von python-basierten Vorhersagemodellen in ein Monitoring-Webdashboard

Ingram 出版
2020/11/10 出版

Bachelorarbeit aus dem Jahr 2020 im Fachbereich Informatik - K羹nstliche Intelligenz, Note: 1,0, Fachhochschule Amberg-Weiden, Sprache: Deutsch, Abstract: In dieser Arbeit sollte mittels Deep Learning ein Modell erstellt werden, mit dem sich die Auslastung eines Servers in einem Rechenzentrum vorhersagen l瓣sst. Daf羹r sollte evaluiert werden, welche Modell-Architektur f羹r diese Zeitreihenvorhersage am besten geeignet sind. Daf羹r wurde zun瓣chst eine theoretische Untersuchung durchgef羹hrt und anschlie?end ein Vergleich der geeigneten Modell-Architekturen angestellt. Es stellte sich heraus, dass ein Convolutional Neural Network (CNN) mit einer Long Short Term Memory (LSTM) Schicht die besten Prognosen erzeugt. Es wurde untersucht, wie sich die Hauptkomponentenanalyse zur Dimensionsreduktion auf die Modelle auswirkt. Dies zeigte, dass die Effekte stark von der Architektur abh瓣ngen. Die System-Architektur einer Webanwendung wurde so erweitert, dass es m繹glich ist, neben der historischen Serverauslastung auch Prognosen anzuzeigen. Die Visualisierungen der aufgezeichneten Daten wurden um die Vorhersagen erweitert. Die Arbeit stellt schlie?lich eine M繹glichkeit dar, wie der Lebenszyklus des Prognosemodells in einem produktiven System mit stetiger Auslastungsmessung integriert werden kann.

9 特價3252
立即代訂
下次再買

Graphical Models for Security

Springer 出版
2020/11/10 出版

This book constitutes the proceedings of the 7th International Workshop on Graphical Models for Security, GramSec 2020, which took place on June 22, 2020. The workshop was planned to take place in Boston, MA, USA but changed to a virtual format due to the COVID-19 pandemic. The 7 full and 3 short papers presented in this volume were carefully reviewed and selected from 14 submissions. The papers were organized in topical sections named: attack trees; attacks and risks modelling and visualization; and models for reasoning about security.

9 特價2870
立即代訂
下次再買

Hacking

Ingram 出版
2020/11/10 出版

Do you want to become a hardcore hacker?Knowing how to hack is a super valuable skill. It's useful in almost any field of work and any company. It's said that hacking is for geeks, but that's all a myth. This book, Book 1 in the Hacking For Beginners Series presents hacking in a serious and fun way. It includes: The basics of hackingHow to complete a penetration testGaining physical access to a systemHacking passwordsSocial engineeringHow to complete a wireless network attackUsing a keylogger to gain informationMan-in-the-middle attacksHow to hack into a smartphoneAnd other easy tips to help you as a beginner Are you ready to become a hacker? You can start now.

9 特價549
立即代訂
下次再買

Cyber Security

Ingram 出版
2020/11/10 出版

Are you afraid of getting hacked?Knowing how to protect yourself from hackers is a super valuable skill. It's useful in almost any field of work and any company. This book, Book 2 in the Hacking For Beginners Series gives you all you need to protect yourself so you don't need to worry about ever getting hacked. Learn about the best software, best practices, and the easy way to protect all your, your business, and your family's private information. Prepare before the damage is done and start building your cybersecurity system today.

9 特價549
立即代訂
下次再買

Advanced Communication Systems and Information Security

Springer 出版
2020/11/09 出版

This book constitutes selected papers of the Second International Conference on Advanced Communication Systems and Information Security, ACOSIS 2019, held in Marrakesh, Morocco, in November 2019.The 10 full papers and 10 short papers were thoroughly reviewed and selected from 94 submissions. The papers are organized accroding to the following topical sections: wireless communications and services; vehicular communications; channel coding; construction of error correcting codes; intrusion detection techniques; wireless and mobile network security; applied cryptography.

9 特價2870
立即代訂
下次再買

Ospf and Is-Is

Rui,Valadas  著
Ingram 出版
2020/11/08 出版

This book describes and compares both the IPv4 and IPv6 versions of OSPF and IS-IS. It explains OSPF and IS-IS by grounding the analysis on the principles of link state routing.

9 特價3339
立即代訂
下次再買

Business Data Communications and Networking

Wiley 出版
2020/11/04 出版

Business Data Communications and Networking, 14th Edition presents a classroom-tested approach to the subject, combining foundational concepts, practical exercises, and real-world case studies. The text provides a balanced, well-rounded presentation of data communications while highlighting its importance to nearly every aspect of modern business. This fully-updated new edition helps students understand how networks work and what is required to build and manage scalable, mobile, and secure networks. Clear, student-friendly chapters introduce, explain, and summarize fundamental concepts and applications such as server architecture, network and transport layers, network design processes and tools, wired and wireless networking, and network security and management. An array of pedagogical features teaches students how to select the appropriate technologies necessary to build and manage networks that meet organizational needs, maximize competitive advantage, and protect networks and data from cybersecurity threats. Discussions of real-world management and technical issues, from improving device performance to assessing and controlling costs, provide students with insight into the daily networking operations of actual businesses.

9 特價4254
立即代訂
下次再買
頁數73/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing