0408~0410_屁屁偵探讀本13對決!怪盜學院星星篇
0408~0410_4月選書

英文書 > 全部商品

Practical Webdriverio

Apress 出版
2020/10/17 出版

Learn how to quickly set up the test automation tool WebdriverIO, one of the major Node.js-based test frameworks. Software testing is here to stay, and an integral part of this is test automation. Dive into the amazing possibilities that WebDriverIO offers to automate browser interactions for a user of any web application. You will learn to automate a vast range of actions that a user takes to interact with the browser. From a simple click to more complex user actions such as frame switches, selecting from drop-downs, and file downloads using WebDriverIO APIs. You will also learn about assertions, timeouts, waits, parallel testing frameworks, and the general pros and cons of WebDriverIO.With over 150 working code samples demonstrating various test scenarios that you require in your day-to-day automation testing, this book is your practical handbook to WebDriverIO. What You'll Learn Set up and install WebdriverIO efficientlyRun parallel execution using WebdriverIOReview the pros, cons and challenges you may face with WebdriverIOEnsure optimum usage and avoid common mistakes Who This Book Is ForThis book is ideal for test engineers who have a basic understanding of test automation with Selenium, developers who want to implement this testing tool for internal testing, Test Managers/IT Project Managers who want to get some general understanding of this tool and its advantage, and students who want to pursue career in test automation.

9 特價2223
立即代訂
下次再買

Practical Python Programming for IoT

Gary,Smart  著
Packt 出版
2020/10/16 出版

Leverage Python and Raspberry Pi to create complex IoT applications capable of creating and detecting movement and measuring distance, light, and a host of other environmental conditionsKey featuresLearn the fundamentals of electronics and how to integrate them with a Raspberry PiUnderstand how to build RESTful APIs, WebSocket APIs, and MQTT-based applicationsExplore alternative approaches to structuring IoT applications with PythonBook DescriptionThe age of connected devices is here, be it fitness bands or smart homes. It's now more important than ever to understand how hardware components interact with the internet to collect and analyze user data. The Internet of Things (IoT), combined with the popular open source language Python, can be used to build powerful and intelligent IoT systems with intuitive interfaces.This book consists of three parts, with the first focusing on the "Internet" component of IoT. You'll get to grips with end-to-end IoT app development to control an LED over the internet, before learning how to build RESTful APIs, WebSocket APIs, and MQTT services in Python. The second part delves into the fundamentals behind electronics and GPIO interfacing. As you progress to the last part, you'll focus on the "Things" aspect of IoT, where you will learn how to connect and control a range of electronic sensors and actuators using Python. You'll also explore a variety of topics, such as motor control, ultrasonic sensors, and temperature measurement. Finally, you'll get up to speed with advanced IoT programming techniques in Python, integrate with IoT visualization and automation platforms, and build a comprehensive IoT project.By the end of this book, you'll be well-versed with IoT development and have the knowledge you need to build sophisticated IoT systems using Python.What you will learnUnderstand electronic interfacing with Raspberry Pi from scratchGain knowledge of building sensor and actuator electronic circuitsStructure your code in Python using Async IO, pub/sub models, and moreAutomate real-world IoT projects using sensor and actuator integrationIntegrate electronics with ThingSpeak and IFTTT to enable automationBuild and use RESTful APIs, WebSockets, and MQTT with sensors and actuatorsSet up a Raspberry Pi and Python development environment for IoT projectsWho this book is forThis IoT Python book is for application developers, IoT professionals, or anyone interested in building IoT applications using the Python programming language. It will also be particularly helpful for mid to senior-level software engineers who are experienced in desktop, web, and mobile development, but have little to no experience of electronics, physical computing, and IoT.

9 特價2385
立即代訂
下次再買

Data Analytics for Internal Auditors

Ingram 出版
2020/10/15 出版

There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner's viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that auditors as well as management have the ability

9 特價3496
立即代訂
下次再買

Security in the Private Cloud

John R,Vacca  著
Ingram 出版
2020/10/15 出版

This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solutio

9 特價3287
立即代訂
下次再買

Autonomous Control for a Reliable Internet of Services

Ingram 出版
2020/10/14 出版

This open access book was prepared as a Final Publication of the COST Action IC1304 "Autonomous Control for a Reliable Internet of Services (ACROSS)". The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-graduate students, educators, faculty members, researchers, engineers, and research strategists working in this field.The explosive growth of the Internet has fundamentally changed the global society. The emergence of concepts like SOA, SaaS, PaaS, IaaS, NaaS, and Cloud Computing in general has catalyzed the migration from the information-oriented Internet into an Internet of Services (IoS). This has opened up virtually unbounded possibilities for the creation of new and innovative services that facilitate business processes and improve the quality of life. However, this also calls for new approaches to ensuring the quality and reliability of these services. The objective of this book is, by applying a systematic approach, to assess the state-of-the-art and consolidate the main research results achieved in this area. This work was published by Saint Philip Street Press pursuant to a Creative Commons license permitting commercial use. All rights not granted by the work's license are retained by the author or authors.

9 特價2475
立即代訂
下次再買

Autonomous Control for a Reliable Internet of Services

Ingram 出版
2020/10/14 出版

This open access book was prepared as a Final Publication of the COST Action IC1304 "Autonomous Control for a Reliable Internet of Services (ACROSS)". The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-graduate students, educators, faculty members, researchers, engineers, and research strategists working in this field.The explosive growth of the Internet has fundamentally changed the global society. The emergence of concepts like SOA, SaaS, PaaS, IaaS, NaaS, and Cloud Computing in general has catalyzed the migration from the information-oriented Internet into an Internet of Services (IoS). This has opened up virtually unbounded possibilities for the creation of new and innovative services that facilitate business processes and improve the quality of life. However, this also calls for new approaches to ensuring the quality and reliability of these services. The objective of this book is, by applying a systematic approach, to assess the state-of-the-art and consolidate the main research results achieved in this area. This work was published by Saint Philip Street Press pursuant to a Creative Commons license permitting commercial use. All rights not granted by the work's license are retained by the author or authors.

9 特價3026
立即代訂
下次再買

Security of Networks and Services in an All-Connected World

Ingram 出版
2020/10/14 出版

This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017.The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure. This work was published by Saint Philip Street Press pursuant to a Creative Commons license permitting commercial use. All rights not granted by the work's license are retained by the author or authors.

9 特價2567
立即代訂
下次再買

Model-Driven Development and Operation of Multi-Cloud Applications

Ingram 出版
2020/10/14 出版

This book summarizes work being undertaken within the collaborative MODAClouds research project, which aims to facilitate interoperability between heterogeneous Cloud platforms and remove the constraints of deployment, portability, and reversibility for end users of Cloud services. Experts involved in the project provide a clear overview of the MODAClouds approach and explain how it operates in a variety of applications.While the wide spectrum of available Clouds constitutes a vibrant technical environment, many early-stage issues pose specific challenges from a software engineering perspective. MODAClouds will provide methods, a decision support system, and an open source IDE and run-time environment for the high-level design, early prototyping, semiautomatic code generation, and automatic deployment of applications on multiple Clouds. It will free developers from the need to commit to a fixed Cloud technology stack during software design and offer benefits in terms of cost savings, portability of applications and data between Clouds, reversibility (moving applications and data from Cloud to non-Cloud environments), risk management, quality assurance, and flexibility in the development process. This work was published by Saint Philip Street Press pursuant to a Creative Commons license permitting commercial use. All rights not granted by the work's license are retained by the author or authors.

9 特價2475
立即代訂
下次再買

Cyber Security

Yu,Zhou  著
Ingram 出版
2020/10/14 出版

This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence analysis, vulnerability, artificial intelligence security, IPv6 risk research, cybersecurity policy and regulation research, big data analysis and industrial security. This work was published by Saint Philip Street Press pursuant to a Creative Commons license permitting commercial use. All rights not granted by the work's license are retained by the author or authors.

9 特價2475
立即代訂
下次再買

Cyber Security

Yu,Zhou  著
Ingram 出版
2020/10/14 出版

This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence analysis, vulnerability, artificial intelligence security, IPv6 risk research, cybersecurity policy and regulation research, big data analysis and industrial security. This work was published by Saint Philip Street Press pursuant to a Creative Commons license permitting commercial use. All rights not granted by the work's license are retained by the author or authors.

9 特價1925
立即代訂
下次再買

Model-Driven Development and Operation of Multi-Cloud Applications

Ingram 出版
2020/10/14 出版

This book summarizes work being undertaken within the collaborative MODAClouds research project, which aims to facilitate interoperability between heterogeneous Cloud platforms and remove the constraints of deployment, portability, and reversibility for end users of Cloud services. Experts involved in the project provide a clear overview of the MODAClouds approach and explain how it operates in a variety of applications.While the wide spectrum of available Clouds constitutes a vibrant technical environment, many early-stage issues pose specific challenges from a software engineering perspective. MODAClouds will provide methods, a decision support system, and an open source IDE and run-time environment for the high-level design, early prototyping, semiautomatic code generation, and automatic deployment of applications on multiple Clouds. It will free developers from the need to commit to a fixed Cloud technology stack during software design and offer benefits in terms of cost savings, portability of applications and data between Clouds, reversibility (moving applications and data from Cloud to non-Cloud environments), risk management, quality assurance, and flexibility in the development process. This work was published by Saint Philip Street Press pursuant to a Creative Commons license permitting commercial use. All rights not granted by the work's license are retained by the author or authors.

9 特價1925
立即代訂
下次再買

Deep Learning for Beginners

Pablo,Rivas  著
Packt 出版
2020/10/14 出版

Implementing supervised, unsupervised, and generative deep learning (DL) models using Keras and Dopamine over TensorFlow.Key Features Understand the fundamental machine learning concepts useful in deep learning Learn the underlying mathematical concepts as you implement deep learning models from scratch Explore easy-to-understand examples and use cases that will help you build a solid foundation in DL Book Description With information on the web exponentially increasing, it has become more difficult than ever to navigate through everything to find reliable content that will help you get started with deep learning. This book is designed to help you if you're a beginner looking to work on deep learning and build deep learning models from scratch, and already have the basic mathematical and programming knowledge required to get started. The book begins with a basic overview of machine learning, guiding you through setting up popular Python frameworks. You will also understand how to prepare data by cleaning and preprocessing it for deep learning, and gradually go on to explore neural networks. A dedicated section will give you insights into the working of neural networks by helping you get hands-on with training single and multiple layers of neurons. Later, you will cover popular neural network architectures such as CNNs, RNNs, AEs, VAEs, and GANs with the help of simple examples, and you will even build models from scratch. At the end of each chapter, you will find a question and answer section to help you test what you've learned through the course of the book. By the end of this book, you'll be well-versed with deep learning concepts and have the knowledge you need to use specific algorithms with various tools for different tasks. What you will learn Implement RNNs and Long short-term memory for image classification and Natural Language Processing tasks Explore the role of CNNs in computer vision and signal processing Understand the ethical implications of deep learning modeling Understand the mathematical terminology associated with deep learning Code a GAN and a VAE to generate images from a learned latent space Implement visualization techniques to compare AEs and VAEs Who this book is for This book is for aspiring data scientists and deep learning engineers who want to get started with the fundamentals of deep learning and neural networks. Although no prior knowledge of deep learning or machine learning is required, familiarity with linear algebra and Python programming is necessary to get started.

9 特價2018
立即代訂
下次再買

Design and Implementation of Real Time Transport Control Protocol

Ingram 出版
2020/10/14 出版

RTP, the Real Time Transport Protocol, has gained widespread acceptance as the transport protocol for voice and video on the Internet. Its companion control protocol, the Real Time Control Protocol (RTCP). Together these protocols provide controlled delivery of multimedia traffic over the Internet. RTCP is used for loose session control, QoS reporting, and media synchronization, delay, jitter and packet loss calculations.

9 特價1779
立即代訂
下次再買

Security of Networks and Services in an All-Connected World

Ingram 出版
2020/10/14 出版

This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017.The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure. This work was published by Saint Philip Street Press pursuant to a Creative Commons license permitting commercial use. All rights not granted by the work's license are retained by the author or authors.

9 特價2062
立即代訂
下次再買

A Contemporary Approach to Cybercrime

Ingram 出版
2020/10/13 出版

The internet is conceivably today's most compelling innovative development as well as it proceeds to change everyday life for almost everyone globally. Billions of individuals are plugged into the internet, in addition to thousands additional enter the online world each day. Cybercrime's pace globally is on a high rise. It is an offense that is even harder to identify and resolve as compared to traditional crimes. The respective work which has been carried out regarding the very notion of cybercrime has its significance in helping as well as exploring this dilemma via a multifaceted as well as contemporaneous approach. Authors intention is to critically analyze the multifaceted dimensions of cybercrime with respect to encompassing issues. This work can serve as a valuable resource with regards to contemporary approaches to cybercrime.

9 特價1925
立即代訂
下次再買

Advanced Gatsby Projects

Apress 出版
2020/10/13 出版

Roll your sleeves up and master advanced topics in Gatsby development by building two production-ready websites. This project-focused book teaches you how to use Gatsby alongside the latest technologies including Snipcart, and Firebase. It builds off of Foundation Gatsby Projects and it's recommended that you complete that first if you are new to Gatsby. In the first project, you will create a fully functional e-commerce site for a restaurant using Snipcart. Lastly, you'll learn to build a recipe site using the Firebase database. Many Gatsby tutorials out there today only cover how to create a simple blog site - get ahead of the crowd using this book today. What You'll Learn Create an e-commerce site in no time using Snipcart with GatsbyWork with the Firebase database from Google in a Gatsby siteDeploy all sites in NetlifyAdd functionalities with the powerful Gatsby plugin ecosystem Who This Book Is For Anyone who wants to create a site using Gatsby, though knowledge of React and Gatsby is expected. You will need to be familiar with JavaScript concepts and be confident with basic web development. It is advisable to complete Foundation Gatsby Projects first if you have no Gatsby experience.

9 特價1710
立即代訂
下次再買

Cybersecurity

Quinn,Kiser  著
Ingram 出版
2020/10/12 出版

If you want to discover how to protect yourself, your family, and business against cyber attacks, then keep reading... Have you been curious about how hackers choose their victims or develop their attack plans?Have you been hacked before? Do you want to learn to protect your systems and networks from hackers? If you answered "yes" to any of the questions above, this is the book for you. This book serves as a launchpad for learning more about the Internet and cybersecurity. Throughout this book, you will take a journey into the world of cybercrimes and cybersecurity. The information is designed to help you understand the different forms of hacking and what you can do to prevent being hacked. By the end of this book, you may decide to pursue a career in the domain of information security. In this book, you will discover the following: The importance of cybersecurity.A brief history of cybercrime, the different types, and its evolution over the years.The various types of cyber-attacks executed over the Internet.10 Types of Cyber hackers-the masterminds behind attacks.The secrets of phishing attacks and how you can protect yourself against them.The different kinds of malware that exist in the digital world.The fascinating tools to identify and tackle malware.Ransomware and how attackers leverage technology to make money.9 security testing methods you can learn to do.Social engineering and how to identify a social engineering attack.Network Security, Web Application Security, and Smartphone security.Examples of different types of hacks and past incidents to emphasize the need for cybersecurity.If you are keen to know more and get started, click on the "add to cart" button and grab a copy of this book today.

9 特價1026
立即代訂
下次再買

Computer Networking and Cybersecurity

Quinn,Kiser  著
Ingram 出版
2020/10/12 出版

If you want to learn the basics of computer networking and how to protect yourself from cyber attacks, then keep reading...Two manuscripts in one book: Computer Networking: An All-in-One Beginner's Guide to Understanding Communications Systems, Network Security, Internet Connections, Cybersecurity and HackingCybersecurity: A Simple Beginner's Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social EngineeringThis book delivers a variety of computer networking-related topics to be easily understood by beginners.It focuses on enabling you to create a strong foundation of concepts of some of the most popular topics in this area.We have provided the reader with a one-stop highway to learning about the fundamentals of computer networking, Internet connectivity, cybersecurity, and hacking. This book will have the following advantages: A formal yet informative tone, meaning it won't feel like a lecture.Straight-to-the-point presentation of ideas.Focus on key areas to help achieve optimized learning.Networking is a very important field of knowledge to which the average person may be oblivious, but it's something that is everywhere nowadays. In part 2 of this book, you will take a journey into the world of cybercrimes and cybersecurity. The information is designed to help you understand the different forms of hacking and what you can do to prevent being hacked. By the end of this part, you may decide to pursue a career in the domain of information security. In part 2, you will discover the following: The importance of cybersecurity.A brief history of cybercrime, the different types, and its evolution over the years.The various types of cyber-attacks executed over the Internet.10 Types of Cyber hackers-the masterminds behind attacks.The secrets of phishing attacks and how you can protect yourself against them.The different kinds of malware that exist in the digital world.The fascinating tools to identify and tackle malware.Ransomware and how attackers leverage technology to make money.9 security testing methods you can learn to do.Social engineering and how to identify a social engineering attack.Network Security, Web Application Security, and Smartphone security.Examples of different types of hacks and past incidents to emphasize the need for cybersecurity.The topics outlined in this book are delivered in a reader-friendly manner and in a language easy to understand, constantly piquing your interest so you will want to explore the topics presented even more.So if you want to learn about computer networking and cyber security in an efficient way, then scroll up and click the "add to cart" button!

9 特價1197
立即代訂
下次再買

Learn PHP 8

Apress 出版
2020/10/09 出版

Aims to be a first to market book on the new PHP 7Day and date book on PHP 7PHP, web development are relevant revenue memes in book database engines.Fills a hole in Apress PHP Programming roadmap.Book has market in all these: classroom, retail trade, and ebook database engines.

9 特價1539
立即代訂
下次再買

The Practice of Enterprise Modeling

Springer 出版
2020/10/08 出版

This book constitutes the proceedings papers of the 13th IFIP Working Conference on the Practice of Enterprise Modeling, held in Riga, Latvia, in November 2020. Due to the COVID-19 pandemic the conference took place virtually. The 19 full papers presented together with 7 short and 2 invited papers in this volume were carefully reviewed and selected from a total of 58 submissions to the main conference. The special focus of PoEM 2020 is on the role of enterprise modelling in the digital age. The selected papers are grouped by the following topics: Enterprise Modeling and Enterprise Architecture, Formal Aspects of Enterprise Modelling, Foundations and Applications of Enterprise Modeling, Enterprise Ontologies, Business Process Modeling, Risk and Security Modeling, Requirements Modeling, and Process Mining.

9 特價2870
立即代訂
下次再買

Kosten der IT-Sicherheit

Ingram 出版
2020/10/07 出版

Laut einer Umfrage des Digitalverbands Bitkom e.V., deren Ergebnisse im November 2019 ver繹ffentlicht wurden, verursachen Angriffe auf deutsche Unternehmen j瓣hrlich einen Gesamtschaden von knapp 103 Milliarden Euro. Im Gegenzug haben deutsche Unternehmen in 2019 allerdings nur ca. 4,6 Milliarden Euro f羹r Hardware, Software und Services im Bereich IT-Sicherheit ausgegeben. Aber was kostet es denn nun genau, ein Unternehmen sicher zu machen? Aufgrund der Komplexit瓣t der Informations- und IT-Sicherheit sind bei der Kosten- und Nutzenbetrachtung eine Vielzahl von Aspekten zu beleuchten. Die Beitr瓣ge dieses Buches haben nicht das Ziel, einen vollst瓣ndigen ?berblick zu geben. Vielmehr verdeutlichen sie die Situation in einigen relevanten Teilbereichen und sollen damit einen fundierten Ausgangspunkt f羹r weitergehende Betrachtungen bieten. Die Spannbreite der behandelten Themen reicht von einer systematischen und integrierten Methode zur Ermittlung der Kosten der IT-Sicherheit 羹ber den Datenschutz als Kostenfaktor, eine Analyse und Bewertung des Verfahrens "Return on Security Investment (RoSI)", die Kosten der Sicherheit von ERP-Systemen, die Kosten der IT-Sicherheit im Smart Home bis zu einem Ansatz zur Kostenkalkulation f羹r die Informationssicherheit von IoT-Ger瓣ten.

9 特價1476
立即代訂
下次再買

An Introduction to Internet of Things(IoT)

Ingram 出版
2020/10/06 出版

The significance of this book is to provide knowledge in the field of IOT. It explains the basic terminology and operation of IOT in different streams. Each chapter provides a concept of IOT application and, being arranged in a proper sequence, permits each topic to be built on earlier studies. This book contributes to a better understanding of the concept of machine learning and makes it more interesting for the beginners. This book will be very useful not only to the students but also to the teachers of the subject area.

9 特價1978
立即代訂
下次再買

Network Security Strategies

Packt 出版
2020/10/06 出版

Build a resilient network and prevent advanced cyber attacks and breachesKey featuresExplore modern cybersecurity techniques to protect your networks from ever-evolving cyber threatsPrevent cyber attacks by using robust cybersecurity strategiesUnlock the secrets of network securityBook DescriptionWith advanced cyber attacks severely impacting industry giants and the constantly evolving threat landscape, organizations are adopting complex systems to maintain robust and secure environments. Network Security Strategies will help you get well-versed with the tools and techniques required to protect any network environment against modern cyber threats.You'll understand how to identify security vulnerabilities across the network and how to effectively use a variety of network security techniques and platforms. Next, the book will show you how to design a robust network that provides top-notch security to protect against traditional and new evolving attacks. With the help of detailed solutions and explanations, you'll be able to monitor networks skillfully and identify potential risks. Finally, the book will cover topics relating to thought leadership and the management aspects of network security.By the end of this network security book, you'll be well-versed in defending your network from threats and be able to consistently maintain operational efficiency, security, and privacy in your environment.What you will learnUnderstand network security essentials, including concepts, mechanisms, and solutions to implement secure networksGet to grips with setting up and threat monitoring cloud and wireless networksDefend your network against emerging cyber threats in 2020Discover tools, frameworks, and best practices for network penetration testingUnderstand digital forensics to enhance your network security skillsAdopt a proactive approach to stay ahead in network securityWho this book is forThis book is for anyone looking to explore information security, privacy, malware, and cyber threats. Security experts who want to enhance their skill set will also find this book useful. A prior understanding of cyber threats and information security will help you understand the key concepts covered in the book more effectively.

9 特價2018
立即代訂
下次再買

Intrusion Detection Honeypots

Ingram 出版
2020/10/05 出版

When an attacker breaks into your network, you have a home-field advantage. But how do you use it?Intrusion Detection Honeypots is the foundational guide to building, deploying, and monitoring honeypots -- security resources whose value lies in being probed and attacked. These fake systems, services, and tokens lure attackers in, enticing them to interact. Unbeknownst to the attacker, those interactions generate logs that alert you to their presence and educate you about their tradecraft. Intrusion Detection Honeypots teaches you how to: Use the See-Think-Do framework to integrate honeypots into your network and lure attackers into your traps.Leverage honey services that mimic HTTP, SSH, and RDP. Hide honey tokens amongst legitimate documents, files, and folders. Entice attackers to use fake credentials that give them away.Create honey commands, honey tables, honey broadcasts, and other unique detection tools that leverage deceptionMonitor honeypots for interaction and investigate the logs they generateWith the techniques in this book, you can safely use honeypots inside your network to detect adversaries before they accomplish their goals.

9 特價2338
立即代訂
下次再買

Integrated system for the treatment of injuries or trauma

Johan,Garcia  著
Ingram 出版
2020/10/05 出版

This text describes the realization of a project destined to the treatment of injuries of fractures, Parkinson's disease, carpal tunnel among other syndromes in the cubic-radius joint that affect the life of many people nowadays.For this purpose, it was taken the already existing device called "Metacarpal rehabilitation system by means of a labyrinth" made previously, where it is integrated a network that includes the physiotherapist doctor as a central node with the patients that he manages, where the physiotherapist doctor's device acts as a server equipment and will be in charge of taking the data measured to his patients and generating graphs that show the progress of the patient that is being treated, comparing your measured data with data taken from a person without the syndrome or injury being treated, for this purpose the "client" device or patient device will be integrated with 14 levels that treat the above mentioned syndromes, additionally the physical therapist will have an application with network connection where he will be notified every time a rehabilitation session is performed.

9 特價1333
立即代訂
下次再買

Instagram Marketing

Ingram 出版
2020/10/05 出版

INSTAGRAM MARKETINGThe Instagram platform was created as a photo-sharing social network; so, where does business fit in? While the platform may have started as a social network for sharing photos, it has morphed into an excellent way to kick-start a business, reach sales goals, and connect with consumers. There are currently over 1-billion active monthly users on Instagram. Why not get your piece of the 1-billion customer pie?Inside this book, you will discover how to market effectively on Instagram. This includes everything from creating a profile, to choosing hashtags, to running paid advertising. No matter your goals for marketing on Instagram, the information in this book will be able to help you achieve them.Here Is A Preview Of What You'll Learn About Inside...The Basic Of InstagramUsing Instagram To Market Your BusinessHow To Run Ads On InstagramInstagram Marketing StrategiesWhat Types Of Content To PostHow To Become An Instagram InfluencerMuch, Much More!

9 特價855
立即代訂
下次再買

Large Scale Networks

Ingram 出版
2020/10/05 出版

This book offers new insight on the identification of relationships and behaviours of Internet traffic, based on the study of the influence of the topological characteristics of a network upon the traffic behaviour. The content refers to complex systems that have a network-like structure. In a complex system, it is often the case that the utilit

9 特價5375
立即代訂
下次再買

Multimedia Security Handbook

Borko,Furht  著
Ingram 出版
2020/10/01 出版

Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. This handbook addresses issues related to protecting digital media. It begins by introducing security fundamentals and discussing the vulnerabilities of individual protection schemes. Part two f

9 特價4331
立即代訂
下次再買

Computer Safety, Reliability, and Security. Safecomp 2020 Workshops

Springer 出版
2020/10/01 出版

This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2020, 39th International Conference on Computer Safety, Reliability and Security, Lisbon, Portugal, September 2020.The 26 regular papers included in this volume were carefully reviewed and selected from 45 submissions; the book also contains one invited paper. The workshops included in this volume are: DECSoS 2020: 15th Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems. DepDevOps 2020: First International Workshop on Dependable Development-Operation Continuum Methods for Dependable Cyber-Physical Systems. USDAI 2020: First International Workshop on Underpinnings for Safe Distributed AI. WAISE 2020: Third International Workshop on Artificial Intelligence Safety Engineering.The workshops were held virtually due to the COVID-19 pandemic.

9 特價5219
立即代訂
下次再買

Smart Grid in Iot-Enabled Spaces

Ingram 出版
2020/10/01 出版

In this book, we consider the most significant and emergent research topics in this domain, addressing major issues and challenges in IoT-based solutions proposed for the smart grid. The chapters provide insight on comprehensive topics in IoT-based smart grid, combining technical aspects with the most up to date theory.

9 特價7308
立即代訂
下次再買

Computer Safety, Reliability, and Security

Springer 出版
2020/10/01 出版

This book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, SAFECOMP 2020, held in Lisbon, Portugal, in September 2020.*The 27 full and 2 short papers included in this volume were carefully reviewed and selected from 116 submissions. They were organized in topical sections named: safety cases and argumentation; formal verification and analysis; security modelling and methods; assurance of learning-enabled systems; practical experience and tools; threat analysis and risk mitigation; cyber-physical systems security; and fault injection and fault tolerance. *The conference was held virtually due to the COVID-19 pandemic.The chapter 'Assurance Argument Elements for Off-the-Shelf, Complex Computational Hardware' is available open access under an Open Government License 3.0 via link.springer.com.

9 特價5219
立即代訂
下次再買

5g Multimedia Communication

Ingram 出版
2020/10/01 出版

The book aims to present current work and direction on the challenging subject of multimedia communications, with theoretical and practical roots. The book is divided into three major parts with each part containing 4-7 chapters: critical enabling technology; multiservices network and deployment scenarios.

9 特價7830
立即代訂
下次再買

Financial Cryptography and Data Security

Springer 出版
2020/10/01 出版

This book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020, in Kota Kinabalu, Malaysia, in February 2020. The 39 full papers and 3 short papers presented in this book were carefully reviewed and selected from 73 submissions. The papers feature four Workshops: The 1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020. The AsiaUSEC Workshop contributes an increase of the scientific quality of research in human factors in security and privacy. In terms of improving efficacy of secure systems, the research included an extension of graphical password authentication. Further a comparative study of SpotBugs, SonarQube, Cryptoguard and CogniCrypt identified strengths in each and refined the need for improvements in security testing tools. The CoDeFi Workshop discuss multi-disciplinary issues regarding technologies and operations of decentralized finance based on permissionless blockchain. The workshop consists of two parts; presentations by all stakeholders, and unconference style discussions. The VOTING Workshop cover topics like new methods for risk-limited audits, new ethods to increase the efficiency of mixnets, verification of security of voting schemes election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems, and new way of preventing voteselling by de-incentivising this via smart contracts. The WTSC Workshop focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of specialized blockchains.

9 特價6263
立即代訂
下次再買

Information Security and Privacy

Joseph K,Liu  著
Springer 出版
2020/10/01 出版

This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*. The 31 revised full papers and 5 short papers presented were carefully revised and selected from 151 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as post-quantum cryptography; symmetric cipher; signature; network security and blockchain; cryptographic primitives; mathematical foundation; machine learning security, among others. *The conference was held virtually due to COVID-19 pandemic.

9 特價5741
立即代訂
下次再買

Cryptography in the Information Society

Boris,Ryabko  著
Ingram 出版
2020/10/01 出版

This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in each chapter are mathematically proven, and the methods are described in sufficient detail to enable their computational implementation. Exercises are provided.

9 特價4593
立即代訂
下次再買

Artificial Intelligence and Security

Xingming,Sun  著
Springer 出版
2020/10/01 出版

The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; Internet of things; information security; Part III: information security; big data and cloud computing; information processing.

9 特價5741
立即代訂
下次再買

Artificial Intelligence and Security

Xingming,Sun  著
Springer 出版
2020/10/01 出版

The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; Internet of things; information security; Part III: information security; big data and cloud computing; information processing.

9 特價5741
立即代訂
下次再買

Artificial Intelligence and Security

Xingming,Sun  著
Springer 出版
2020/10/01 出版

The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; Internet of things; information security; Part III: information security; big data and cloud computing; information processing.

9 特價5741
立即代訂
下次再買

Interactivity, Game Creation, Design, Learning, and Innovation

Springer 出版
2020/10/01 出版

This book constitutes the refereed post-conference proceedings of two conferences: The 8th EAI International Conference on ArtsIT, Interactivity and Game Creation (ArtsIT 2019), and the 4th EAI International Conference on Design, Learning, and Innovation (DLI 2019). Both conferences were hosed in Aalborg, Denmark, and took place November 6-8, 2019. The 61 revised full papers presented were carefully selected from 98 submissions. The papers represent a forum for the dissemination of cutting-edge research results in the area of arts, design and technology, including open related topics like interactivity and game creation.

9 特價5741
立即代訂
下次再買

Similar Languages, Varieties, and Dialects

Ingram 出版
2020/10/01 出版

Language resources and computational models are becoming increasingly important for the study of language variation. A main challenge of this interdisciplinary field is that linguistics researchers may not be familiar with these helpful computational tools and many NLP researchers are often not familiar with language variation phenomena. This essential reference introduces researchers to the necessary computational models for processing similar languages, varieties, and dialects. In this book, leading experts tackle the inherent challenges of the field by balancing a thorough discussion of the theoretical background with a meaningful overview of state-of-the-art language technology. The book can be used in a graduate course, or as a supplementary text for courses on language variation, dialectology, and sociolinguistics or on computational linguistics and NLP. Part 1 covers the linguistic fundamentals of the field such as the question of status and language variation. Part 2 discusses data collection and pre-processing methods. Finally, Part 3 presents NLP applications such as speech processing, machine translation, and language-specific issues in Arabic and Chinese.

9 特價4404
立即代訂
下次再買

Digital Health

Elsevier 出版
2020/10/01 出版

Digital Health: Mobile and Wearable Devices for Participatory Health Applications is a key reference for engineering and clinical professionals considering the development or implementation of mobile and wearable solutions in the healthcare domain. The book presents a comprehensive overview of devices and appropriateness for the respective applications. It also explores the ethical, privacy, and cybersecurity aspects inherent in networked and mobile technologies. It offers expert perspectives on various approaches to the implementation and integration of these devices and applications across all areas of healthcare. The book is designed with a multidisciplinary audience in mind; from software developers and biomedical engineers who are designing these devices to clinical professionals working with patients and engineers on device testing, human factors design, and user engagement/compliance.

9 特價7312
立即代訂
下次再買

5g NR

Erik,Dahlman  著
Ingram 出版
2020/10/01 出版

5G NR: The Next Generation Wireless Access Technology, Second Edition, follows the authors' highly celebrated books on 3G and 4G and provides a new level of insight into 5G NR. After background discussion of 5G, including requirements, spectrum aspects, and the standardization timeline, all technology features of the first phase of NR are described in detail. The book covers the NR physical-layer structure and higher-layer protocols, RF and spectrum aspects, and co-existence and interworking with LTE. The book provides a good foundation in NR and different NR technology components, giving insight into why a certain solution has been selected.This second edition is updated to reflect the latest developments in Release 16 and includes brand new chapters on: NR in unlicensed spectrum; NR-U in Rel-16; IAB; V2X and sidelink in Rel-16; industrial IoT; IIoT and referring to the URLLC enhancements for PDCCH; RIM/CL; and positioning. Also included are the key radio-related requirements of NR; design principles; technical features of basic NR transmission structure--showing where it was inherited from LTE, where it deviates from it, and the reasons why-- NR multi-antenna transmission functionality; detailed description of the signals and functionality of the initial NR access, including signals for synchronization and system information; random access and paging; LTE/NR co-existence in the same spectrum and the benefits of their interworking as one system; and different aspects of mobility in NR. RF requirements for NR are described for BS and UE, the legacy bands, and for the new mm-wave bands.

9 特價5850
立即代訂
下次再買

Beginning Rails 6

Apress 出版
2020/10/01 出版

Springboard your journey into web application development and discover how much fun building web applications with Ruby on Rails can be. This book has been revised to cover what's new in Rails 6 including features such as WebPack, advanced JavaScript integration, Action Mailbox, Action Text, system and parallel testing, Action Cable testing, and more. Beginning Rails 6 gently guides you through designing your application, writing tests for the application, and then writing the code to make your application work as expected. It is a book that will guide you from never having programmed with Ruby, to having a Rails 6 application built and deployed to the web. After reading and using this book, you'll have the know-how and the freely available source code to get started with your own Rails-based web development in days. What You Will Learn Create Ruby on Rails 6 web applications from the bottom upGain the basics of the Ruby programming languageCombine all the components of Rails to develop your own web applications Apply TDD to make sure your application works exactly as you expect Use Git source control and best practice techniques to create applications like a pro Who This Book Is For Someone with little to no Ruby or Rails experience, or possibly even someone with no experience developing web applications at all. A basic familiarity with the web and typical web terms is assumed, but you don't need to be an expert in these.

9 特價2394
立即代訂
下次再買

Efficient Integration of 5g and Beyond Heterogeneous Networks

Zi-Yang,Wu  著
Springer 出版
2020/10/01 出版

This book discusses the smooth integration of optical and RF networks in 5G and beyond (5G+) heterogeneous networks (HetNets), covering both planning and operational aspects. The integration of high-frequency air interfaces into 5G+ wireless networks can relieve the congested radio frequency (RF) bands. Visible light communication (VLC) is now emerging as a promising candidate for future generations of HetNets. Heterogeneous RF-optical networks combine the high throughput of visible light and the high reliability of RF. However, when implementing these HetNets in mobile scenarios, several challenges arise from both planning and operational perspectives. Since the mmWave, terahertz, and visible light bands share similar wave propagation characteristics, the concepts presented here can be broadly applied in all such bands.To facilitate the planning of RF-optical HetNets, the authors present an algorithm that specifies the joint optimal densities of the base stations by drawing on stochastic geometry in order to satisfy the users' quality-of-service (QoS) demands with minimum network power consumption. From an operational perspective, the book explores vertical handovers and multi-homing using a cooperative framework. For vertical handovers, it employs a data-driven approach based on deep neural networks to predict abrupt optical outages; and, on the basis of this prediction, proposes a reinforcement learning strategy that ensures minimal network latency during handovers. In terms of multi-homing support, the authors examine the aggregation of the resources from both optical and RF networks, adopting a two-timescale multi-agent reinforcement learning strategy for optimal power allocation. Presenting comprehensive planning and operational strategies, the book allows readers to gain an in-depth grasp of how to integrate future coexisting networks at high-frequency bands in a cooperative manner, yielding reliable and high-speed 5G+ HetNets.

9 特價2870
立即代訂
下次再買

Semantic Modeling for Data

Ingram 出版
2020/10/01 出版

What value does semantic data modeling offer? As an information architect or data science professional, let's say you have an abundance of the right data and the technology to extract business gold--but you still fail. The reason? Bad data semantics. In this practical and comprehensive field guide, author Panos Alexopoulos takes you on an eye-opening journey through semantic data modeling as applied in the real world. You'll learn how to master this craft to increase the usability and value of your data and applications. You'll also explore the pitfalls to avoid and dilemmas to overcome for building high-quality and valuable semantic representations of data. Understand the fundamental concepts, phenomena, and processes related to semantic data modeling Examine the quirks and challenges of semantic data modeling and learn how to effectively leverage the available frameworks and tools Avoid mistakes and bad practices that can undermine your efforts to create good data models Learn about model development dilemmas, including representation, expressiveness and content, development, and governance Organize and execute semantic data initiatives in your organization, tackling technical, strategic, and organizational challenges

9 特價3078
立即代訂
下次再買

Code-Based Cryptography

Marco,Baldi  著
Springer 出版
2020/10/01 出版

This book constitutes the refereed and revised post-conference proceedings of the 8th International Workshop on Code-Based Cryptography, CBCrypto 2020, held in Zagreb, Croatia, in May 2020.*The seven papers presented in this book were carefully reviewed and selected from numerous submissions. These contributions focus on various topics such as code-based cryptography, from design to implementation, security, new systems, and improved decoding algorithms. * The conference was held virtually due to the COVID-19 pandemic.

9 特價2870
立即代訂
下次再買

Privacy

Wiley  著
Wiley 出版
2020/10/01 出版

Discover why privacy is a counterproductive, if not obsolete, concept in this startling new book It's only a matter of time-- the modern notion of privacy is quickly evaporating because of technological advancement and social engagement. Whether we like it or not, all our actions and communications are going to be revealed for everyone to see. Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity takes a controversial and insightful look at the concept of privacy and persuasively argues that preparing for a post-private future is better than exacerbating the painful transition by attempting to delay the inevitable. Security expert and author Ben Malisow systematically dismantles common notions of privacy and explains how: Most arguments in favor of increased privacy are wrong Privacy in our personal lives leaves us more susceptible to being bullied or blackmailed Governmental and military privacy leads to an imbalance of power between citizen and state Military supremacy based on privacy is an obsolete concept Perfect for anyone interested in the currently raging debates about governmental, institutional, corporate, and personal privacy, and the proper balance between the public and the private, Exposed also belongs on the shelves of security practitioners and policymakers everywhere.

9 特價684
立即代訂
下次再買

Hacking Multifactor Authentication

Wiley 出版
2020/10/01 出版

Protect your organization from scandalously easy-to-hack MFA security "solutions" Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That's right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. This book covers over two dozen ways that various MFA solutions can be hacked, including the methods (and defenses) common to all MFA solutions. You'll learn about the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. Finally, this book reveals a simple method for quickly evaluating your existing MFA solutions. If using or developing a secure MFA solution is important to you, you need this book. Learn how different types of multifactor authentication work behind the scenes See how easy it is to hack MFA security solutions--no matter how secure they seem Identify the strengths and weaknesses in your (or your customers') existing MFA security and how to mitigate Author Roger Grimes is an internationally known security expert whose work on hacking MFA has generated significant buzz in the security world. Read this book to learn what decisions and preparations your organization needs to take to prevent losses from MFA hacking.

9 特價1368
立即代訂
下次再買
頁數75/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing