0408~0410_屁屁偵探讀本13對決!怪盜學院星星篇
0408~0410_4月選書

英文書 > 全部商品

Financial Cryptography and Data Security

Springer 出版
2020/07/01 出版

This book constitutes the thoroughly refereed post-conference proceedings of the 24th International Conference on Financial Cryptography and Data Security, FC 2020, held in Kota Kinabalu, Malaysia, in February 2020. The 34 revised full papers and 2 short papers were carefully selected and reviewed from 162 submissions. The papers are grouped in the following topical sections: attacks; consensus; cryptoeconomics; layer 2; secure computation; privacy; crypto foundations; empirical studies; and smart contracts.

9 特價5741
立即代訂
下次再買

Statistical Methods in Computer Security

Ingram 出版
2020/07/01 出版

Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and m

9 特價3548
立即代訂
下次再買

Podcast PlannerDaily Plan Your Podcasts Episodes Goals & Notes, Podcasting Journal, Keep T

Amy,Newton  著
Ingram 出版
2020/07/01 出版

This beautiful Podcast Planner is a perfect way to keep your podcast episodes organized. This will help in your business planning and management of your podcast content and agenda whether you record and post daily, weekly, or monthly. Each page includes space for: Podcast Name & Episode # - Write the Name of your Podcast and the Episode number.Recording Date, Broadcast Date, & Recording Location - Log the date and location details.Host - Record the Host's name.Guests - For writing any Guests you may have.Main Feature - Write your Main Topic for the episode.Running Order - Log any specifics for Time Stamp & Segment.Music/ FX - Write which Music to play.Contest - Record the Sponsor, Prize and the Winner.Talking Points - Blank Lined Notes for writing any other important information you want to bring up and talk about.Whether you are making a podcast for your class at school, post on social media, for fun or professionally as a career, this planner is a great tool to have. You can see your progress over time and watch your success grow. Simple and easy to use. Will make a great gift for anyone who has a podcast. Size is 8x10 inches, 110 pages, white paper, black ink, soft matte finish cover, paperback.

9 特價917
立即代訂
下次再買

Cable and Wireless Networks

Ingram 出版
2020/07/01 出版

This book presents a comprehensive approach to networking, cable and wireless communications, and networking security. It describes the most important state-of-the-art fundamentals and system details in the field, as well as many key aspects concerning the development and understanding of current and emergent services. Each chapter illustrates t

9 特價3548
立即代訂
下次再買

Node.js Web Development - Fifth Edition

David,Herron  著
Packt 出版
2020/07/01 出版

Build scalable web applications using Node.js, Express.js, and the latest ECMAScript techniques, along with deploying applications with AWS and Docker with this updated fifth editionKey Features Learn backend web programming with the JavaScript stack Explore best practices, right from configuring and building web servers to deploying them on a production cloud hosting system: AWS using Docker and Terraform Work through the different stages of developing robust and scalable apps using Node.js 14 Book Description Node.js is the leading choice of server-side web development platform, enabling developers to use the same tools and paradigms for both server-side and client-side software. This updated fifth edition of Node.js Web Development focuses on the new features of Node.js 14, Express 4.x, and ECMAScript, taking you through modern concepts, techniques, and best practices for using Node.js. The book starts by helping you get to grips with the concepts of building server-side web apps with Node.js. You'll learn how to develop a complete Node.js web app, with a backend database tier to help you explore several databases. You'll deploy the app to real web servers, including a cloud hosting platform built on AWS EC2 using Terraform and Docker Swarm, while integrating other tools such as Redis and NGINX. As you advance, you'll learn about unit and functional testing, along with deploying test infrastructure using Docker. Finally, you'll discover how to harden Node.js app security, use Let's Encrypt to provision the HTTPS service, and implement several forms of app security with the help of expert practices. With each chapter, the book will help you put your knowledge into practice throughout the entire life cycle of developing a web app. By the end of this Node.js book, you'll have gained practical Node.js web development knowledge and be able to build and deploy your own apps on a public web hosting solution. What you will learn Install and use Node.js 14 and Express 4.17 for both web development and deployment Implement RESTful web services using the Restify framework Develop, test, and deploy microservices using Docker, Docker Swarm, and Node.js, on AWS EC2 using Terraform Get up to speed with using data storage engines such as MySQL, SQLite3, and MongoDB Test your web applications using unit testing with Mocha, and headless browser testing with Puppeteer Implement HTTPS using Let's Encrypt and enhance application security with Helmet Who this book is for If you're looking for an alternative to the 'P' languages (Perl, PHP, and Python), or if you want to get started with server-side web development with JavaScript programming, or if you want a deep dive into deploying services to cloud hosting, this Node.js book is for you. A rudimentary understanding of JavaScript and web application development is a must before you get started with this book.

9 特價2018
立即代訂
下次再買

The Applied TensorFlow and Keras Workshop

Packt 出版
2020/07/01 出版

Cut through the noise and get real results with this workshop for beginners. Use a project-based approach to exploring machine learning with TensorFlow and Keras.Key Features Understand the nuances of setting up a deep learning programming environment Gain insights into the common components of a neural network and its essential operations Get to grips with deploying a machine learning model as an interactive web application with Flask Book Description Machine learning gives computers the ability to learn like humans. It is becoming increasingly transformational to businesses in many forms, and a key skill to learn to prepare for the future digital economy. As a beginner, you'll unlock a world of opportunities by learning the techniques you need to contribute to the domains of machine learning, deep learning, and modern data analysis using the latest cutting-edge tools. The Applied TensorFlow and Keras Workshop begins by showing you how neural networks work. After you've understood the basics, you will train a few networks by altering their hyperparameters. To build on your skills, you'll learn how to select the most appropriate model to solve the problem in hand. While tackling advanced concepts, you'll discover how to assemble a deep learning system by bringing together all the essential elements necessary for building a basic deep learning system - data, model, and prediction. Finally, you'll explore ways to evaluate the performance of your model, and improve it using techniques such as model evaluation and hyperparameter optimization. By the end of this book, you'll have learned how to build a Bitcoin app that predicts future prices, and be able to build your own models for other projects. What you will learn Familiarize yourself with the components of a neural network Understand the different types of problems that can be solved using neural networks Explore different ways to select the right architecture for your model Make predictions with a trained model using TensorBoard Discover the components of Keras and ways to leverage its features in your model Explore how you can deal with new data by learning ways to retrain your model Who this book is for If you are a data scientist or a machine learning and deep learning enthusiast, who is looking to design, train, and deploy TensorFlow and Keras models into real-world applications, then this workshop is for you. Knowledge of computer science and machine learning concepts and experience in analyzing data will help you to understand the topics explained in this book with ease.

9 特價1513
立即代訂
下次再買

Cybersecurity

Routledge 出版
2020/07/01 出版

A cogent overview of the threat spectrum of cyberspace attacks and cyber weapons, this book introduces the arsenal of cyber tools and sophisticated attacks targeting our national security and our critical infrastructure sectors. Topics include the history of cybersecurity and the computer industry, cyber intelligence, and recent conflicts and wa

9 特價3235
立即代訂
下次再買

Smart Things and Femtocells

Ingram 出版
2020/07/01 出版

This book provides a comprehensive overview for the use of femtocells in smart Internet of Things (IoT) environments.

9 特價3287
立即代訂
下次再買

Mastering Windows Security and HardeningSecure and protect your Windows environment from i

Packt 出版
2020/07/01 出版

Enhance Windows security and protect your systems and servers from various cyber attacksKey Features- Protect your device using a zero-trust approach and advanced security techniques- Implement efficient security measures using Microsoft Intune, Configuration Manager, and Azure solutions- Understand how to create cyber-threat defense solutions effectivelyBook DescriptionAre you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users?Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions.We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you'll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations.By the end of this book, you'll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.What you will learn- Understand baselining and learn the best practices for building a baseline- Get to grips with identity management and access management on Windows-based systems- Delve into the device administration and remote management of Windows-based systems- Explore security tips to harden your Windows server and keep clients secure- Audit, assess, and test to ensure controls are successfully applied and enforced- Monitor and report activities to stay on top of vulnerabilitiesWho this book is forThis book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. A basic understanding of Windows security concepts, Intune, Configuration Manager, Windows PowerShell, and Microsoft Azure will help you get the best out of this book.Table of Contents- Fundamentals of Windows Security- Building a Baseline- Server Infrastructure Management- End User Device Management- Hardware and Virtualization- Network Fundamentals for Hardening Windows- Identity and Access Management- Administration and Remote Management- Keeping Your Windows Client Secure- Keeping Your Windows Server Secure- Security Monitoring and Reporting- Security Operations- Testing and Auditing- Top 10 Recommendations and the Future

9 特價2523
立即代訂
下次再買

AI Self-Driving Cars DivulgementPractical Advances In Artificial Intelligence And Machine Learning

Lance,Eliot  著
Ingram 出版
2020/07/01 出版

A vital book by industry thought leader and global AI expert, Dr. Lance Eliot, and based on his popular AI Insider series and podcasts, this fascinating book provides pioneering advances for the advent of AI self-driving driverless autonomous cars. Included too are keen insights about the practical application of Artificial Intelligence (AI) and Machines Learning (ML).

9 特價1184
立即代訂
下次再買

11 Simple Steps to Being a Podcast SensationHow to create, launch and run a professional p

Ange,Dove  著
Ingram 出版
2020/07/01 出版

If you've always fancied having your own podcast but don't know how to go about setting one up let alone run it on a regular basis, this book is for you. This was me not too long ago, but when I found out how to set up a podcast, I couldn't believe how easy it was, when you know what to do of course! So there is no reason, with the help of this book, that you can't create, launch and run your own podcast and have it up in a matter of days even!Inside these pages, you will find handy insights into why you should have a podcast in the first place, deciding what kind of podcast suits you and your audience best, who your audience is and where to find them to promote your podcast, how to plan your content, all the tech hardware and software you will need to get going, what podcast format you should pick that best suits how you want to run the podcast, how to do podcast interviews and some money making strategies you can deploy. I'll also cover your podcast launch strategy so you can launch with some listeners already on board, and how to grow your subscriber list over time so that you can create an amazing fanbase.

9 特價529
立即代訂
下次再買

SQL Injection Strategies

Packt 出版
2020/07/01 出版

Learn to exploit vulnerable database applications using SQL injection tools and techniques, while understanding how to effectively prevent attacksKey Features Understand SQL injection and its effects on websites and other systems Get hands-on with SQL injection using both manual and automated tools Explore practical tips for various attack and defense strategies relating to SQL injection Book Description SQL injection (SQLi) is probably the most infamous attack that can be unleashed against applications on the internet. SQL Injection Strategies is an end-to-end guide for beginners looking to learn how to perform SQL injection and test the security of web applications, websites, or databases, using both manual and automated techniques. The book serves as both a theoretical and practical guide to take you through the important aspects of SQL injection, both from an attack and a defense perspective. You'll start with a thorough introduction to SQL injection and its impact on websites and systems. Later, the book features steps to configure a virtual environment, so you can try SQL injection techniques safely on your own computer. These tests can be performed not only on web applications but also on web services and mobile applications that can be used for managing IoT environments. Tools such as sqlmap and others are then covered, helping you understand how to use them effectively to perform SQL injection attacks. By the end of this book, you will be well-versed with SQL injection, from both the attack and defense perspective. What you will learn Focus on how to defend against SQL injection attacks Understand web application security Get up and running with a variety of SQL injection concepts Become well-versed with different SQL injection scenarios Discover SQL injection manual attack techniques Delve into SQL injection automated techniques Who this book is for This book is ideal for penetration testers, ethical hackers, or anyone who wants to learn about SQL injection and the various attack and defense strategies against this web security vulnerability. No prior knowledge of SQL injection is needed to get started with this book.

9 特價1789
立即代訂
下次再買

Energy-Efficient Wireless Sensor Networks

Ingram 出版
2020/07/01 出版

The advances in low-power electronic devices integrated with wireless communication capabilities are one of recent areas of research in the field of Wireless Sensor Networks (WSNs). One of the major challenges in WSNs is uniform and least energy dissipation while increasing the lifetime of the network. This is the first book that introduces the

9 特價3131
立即代訂
下次再買

Geospatial Data Science Techniques and Applications

Ingram 出版
2020/07/01 出版

The lack of a clear understanding of geoscience science data techniques and related uncertainties could generate incorrect results and interpretations.

9 特價3600
立即代訂
下次再買

Location Privacy in Wireless Sensor Networks

Ruben,Rios  著
Ingram 出版
2020/07/01 出版

Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks.Location Privacy in W

9 特價3339
立即代訂
下次再買

Security and Data Reliability in Cooperative Wireless Networks

Emad,Hassan  著
Ingram 出版
2020/07/01 出版

There is a resurgence of interest in the security of data transmission in wireless systems from physical layer point of view. To enhance the security and data reliability in cooperative wireless networks, this book provides new solutions for these problems.

9 特價3339
立即代訂
下次再買

Internet of Things (Iot)

Bk,Tripathy  著
Ingram 出版
2020/07/01 出版

Aimed at better understanding of current trends, technologies, challenges in IoT, this volume deals with the processes, protocols, communications, integrity and security along with ubiquitous data collection, potential for unexpected uses of consumer data and heightened security risks, including relevant examples.

9 特價4227
立即代訂
下次再買

Spectrum Sharing in Wireless Networks

Ingram 出版
2020/07/01 出版

To date, commercial cellular networks and broadband providers have utilized dedicated spectrum to provide services. However, the growing difficulty in identifying new spectrum for the exclusive use of wireless networks and the length of time the reallocation process takes has precipitated a growing interest in using shared spectrum for offloadin

9 特價3339
立即代訂
下次再買

Mobile Ad Hoc Networks

Ingram 出版
2020/07/01 出版

Centralized approach for routing in Mobile Ad Hoc Networks (MANETs) lack scalability and fault-tolerance. In contrast, Swarm Intelligence (SI) techniques provide an effective solution to this problem through distributed approach to the adaptive routing. On trhis note, proposed book clearly distinguishes between principles of traditional protocol

9 特價3600
立即代訂
下次再買

Device-To-Device Based Proximity Service

Yufeng,Wang  著
Ingram 出版
2020/07/01 出版

D2D-based proximity service is a very hot topic with great commercial potential from an application standpoint. Unlike existing books which focus on D2D communications technologies, this book fills a gap by summarizing and analyzing the latest applications and research results in academic, industrial fields, and standardization. The authors pres

9 特價3339
立即代訂
下次再買

Blockchain-Enabled Fog and Edge Computing: Concepts, Architectures and ApplicationsConcepts, Architectures and Applications

Ingram 出版
2020/07/01 出版

This book unveils the working relationship of blockchain and the fog/edge computing. The contents of the book have been designed in such a way that the reader will not only understand blockchain and fog/edge computing, but will also understand their co-existence and their collaborative power to solve a range of versatile problems.

9 特價5793
立即代訂
下次再買

Telegeoinformatics

Ingram 出版
2020/07/01 出版

This unique book covers the theory, technologies, and applications of telegeoinformatics in some depth.

9 特價3600
立即代訂
下次再買

Computer Network Simulation Using Ns2

Ingram 出版
2020/07/01 出版

This book provides a solid foundation of computer networking knowledge and skills, covering everything from network performance evaluation to socket programming. The text describes a number of computer network protocols and TCP/IP and OSI models, and then shows how to use the NS2 to simulate the protocols for both wired and wireless networks. Th

9 特價3600
立即代訂
下次再買

Handbook of Internet Computing

Borko,Furht  著
Ingram 出版
2020/07/01 出版

Scientists in different geographical locations conduct real-time experiments in a virtual shared workspace. E-commerce provides an emerging market for businesses large and small. E-mail, Servers, and Enterprise Resources Planning have revolutionized businesses on every level. People from all over the globe gather in chat rooms. The Internet is here to stay and Internet technologies and applications continue to grow and evolve. The Handbook of Internet Computing presents comprehensive coverage of all technical issues related to the Internet and its applications. It addresses hot topics such as Internet architectures, content-based multimedia retrieval on the Internet, Web-based collaboration, Web search engines, digital libraries, and more. Real-life examples illustrate the concepts so that technical, non-technical and business people can quickly grasp the fundamentals.

9 特價2243
立即代訂
下次再買

Web Form Design

Ingram 出版
2020/06/26 出版

Forms make or break the most crucial online interactions: checkout (commerce), registration (community), data input (participation and sharing), and any task requiring information entry. In Web Form Design, Luke Wroblewski draws on original research, his considerable experience at Yahoo! and eBay, and the perspectives of many of the field's leading designers to show you everything you need to know about designing effective and engaging Web forms.

9 特價2870
立即代訂
下次再買

Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data

Maosong,Sun  著
Springer 出版
2020/06/15 出版

This book constitutes the refereed proceedings of the 14th China National Conference on Computational Linguistics, CCL 2014, and of the Third International Symposium on Natural Language Processing Based on Naturally Annotated Big Data, NLP-NABD 2015, held in Guangzhou, China, in November 2015.The 34 papers presented were carefully reviewed and selected from 283 submissions. The papers are organized in topical sections on lexical semantics and ontologies; semantics; sentiment analysis, opinion mining and text classification; machine translation; multilinguality in NLP; machine learning methods for NLP; knowledge graph and information extraction; discourse, coreference and pragmatics; information retrieval and question answering; social computing; NLP applications.

9 特價2870
立即代訂
下次再買

Intelligent Robotics and Applications

Honghai,Liu  著
Springer 出版
2020/06/05 出版

Mobile robots and intelligent autonomous systems.- Intelligent system and cybernetics.- Robot mechanism and design.- Robotic vision.- Recognition and reconstruction.- Active control in tunneling boring machine.

9 特價2870
立即代訂
下次再買

Adventures Of Full Stack Software Development

Blurb 出版
2020/06/01 出版

Master the skills required to become a Full Stack Software Developer. In this book you will learn how to write a front-end single-page web application and write middle-tier object-orientated class components. To complete the full stack you will also learn how to design a back-end database and write applications that support database transactions and data integrity. Included in the book are the following topics: Microservices Architecture, Planning and Design; Message Queuing with RabbitMQ; Microsoft .NET Core Web API and asynchronous processing; JSON Web Token (JWT) security; Microsoft .NET Core Entity Framework; Atomic transactions and SQL-Server isolation levels; SOLID Design Principles; NoSQL databases and MongoDB; Developing a Single-Page Application (SPA) with ReactJS; The fundamentals of TypeScript; Developing a web user interface with Google's Material Design; Responsive web page design; Source code examples and sample applications available on GitHub;

9 特價1710
立即代訂
下次再買

Virtuele particuliere netwerken in theorie en praktijk

Ingram 出版
2020/06/01 出版

Dit boek behandelt zowel theoretische als praktische technologie禱n van het virtuele priv矇-netwerk. In deze gids laat het zien hoe VPN's daadwerkelijk werken en hoe ze in verschillende laboratoriumscenario's in de praktijk worden toegepast, stap voor stap. Het doel van dit boek is om studenten en professionals op een eenvoudige manier te onderwijzen. In dit boek leert de lezer theoretische kennis over VPN's, maar de praktische implementatie van verschillende soorten VPN's thuis en op kantoor op basis van IOS. Er zijn verschillende soorten VPN's met verschillende scenario's. Na bestudering van dit boek raakt de lezer vertrouwd met bijna alle soorten VPN's en kan hij al deze soorten VPN's met verschillende scenario's in zijn kantoor en thuis implementeren.

9 特價3465
立即代訂
下次再買

Digital DownfallTechnology, Cyberattacks and the End of the American Republic

Hugh,Taylor  著
Ingram 出版
2020/06/01 出版

Is America on the brink of civil war?Could foreign cyber plots turn Americans against one another and cause a disastrous domestic conflict? What would happen if the lights went out and the technology we rely upon to run American life is no longer available?The present dangers are real. The US is more vulnerable to destructive foreign interference today than it has been in over a century. As Russia and China realize they can't win shooting wars against the US, they have devised new and cunning ways to destabilize American politics and cripple the US economy.Cyber meddling in elections, disinformation campaigns, abuse of social media to widen racial and political divides, and the theft of military data are just some of the malicious acts threatening the Republic. Digital Downfall examines the potential effects of such attacks, with a look at: -The vulnerability of the US to cyber attack-American technological weaknesses that could be exploited by our enemies-How the US military could be affected by cyberwar-The possibility that the American Republic we know could be destroyed-America's relationship with racism-What the future may hold-And more...The dangers posed by external sources can only be real when the internal politics of the United States is in a fragile state. The past four years bear testimony to this political decline as does every passing day of the Trump presidency.The perfect storm of external interference, a rampant and deadly pandemic, and a culture of racism that will no longer be tolerated is upon us.Who knows where it will lead to, or what will be left at the end...About the Author: Hugh Taylor is Executive Editor of The Journal of Cyber Policy, a cybersecurity industry blog. He has been working in the enterprise technology and cybersecurity fields for over 20 years, earning the Certified Information Security Manager (CISM) credential in the process. His previous books include The Joy of SOX (Wiley) about IT and the Sarbanes Oxley Act, and Event Driven Architecture (Prentice-Hall). After serving in executive roles at venture-backed startups and global tech giants like IBM and Microsoft, he now works as a freelance tech writer. His professional writing spans technology and cybersecurity for a clientele that includes HPE, IBM, Google, Microsoft and SAP. Prior to working in technology, Taylor served in script development roles in primetime television-an experience that gives him insights into the relationship between technology, society and the media.

9 特價719
立即代訂
下次再買

Research in Wireless Sensor Networks

Ingram 出版
2020/06/01 出版
9 特價1375
立即代訂
下次再買

K羹nstliche Intelligenz verstehen. Wie funktionieren die Methoden ”Sensitivity Analysis” (S

Enzo,Muschik  著
Ingram 出版
2020/06/01 出版

Studienarbeit aus dem Jahr 2020 im Fachbereich Informatik - K羹nstliche Intelligenz, Note: 1.0, FernUniversit瓣t Hagen (Lehrstuhl f羹r Parallelverarbeitung und IT-Sicherheit), Sprache: Deutsch, Abstract: Die Defense Advanced Research Projects Agency (DARPA) des Verteidigungsministeriums der Vereinigten Staaten von Amerika rief 2016 das Explainable Artificial Intelligence (XAI)-Programm ins Leben, mit dem Fokus, Techniken maschinellen Lernens zu entwickeln, die erstens erkl瓣rbare Modelle bei gleichbleibend hoher Lernf瓣higkeit erzeugen und zweitens den Menschen bef瓣higen, AI-Systeme zu verstehen, ihnen angemessen zu vertrauen und die n瓣chste Generation intelligenter Systeme kontrollieren zu k繹nnen. Denn nur, wenn wir Menschen verstehen, wie KI-Systeme zu Entscheidungen gelangen, haben wir die M繹glichkeit, sie mehrwertbringend in industriellen Prozessen anzuwenden und positiv in das t瓣gliche Leben unserer Gesellschaft zu integrieren. Zielvorgabe der vorliegenden Arbeit ist die Darstellung und Analyse zweier Methoden, namentlich der Sensitivity Analysis (SA) und der Layerwise Relevance Propagation (LRP), deren eigene Zielsetzung es ist, die Entscheidungen intelligenter Systeme f羹r den menschlichen Betrachter nachvollziehbar zu machen. Bevor jedoch auf die einzelnen Methoden, deren Funktionsweise und auf eine kritischen Betrachtung eingegangen werden kann, bedarf es einer Abgrenzung des Forschungsgebiets der XAI. Artificial Intelligence (AI) - ein popul瓣rer Begriff aktueller Zeit, der mit einer Vielzahl an technologischen Anwendungen in Verbindung gebracht wird. Manchmal prominent und tangibel in Form von menschen瓣hnlichen Robotern, wieder andere Male subtil, weder sichtbar noch greifbar in Form von Algorithmen. Dabei ist die konzeptionelle Idee der Abbildung k羹nstlicher Intelligenz durch Computersysteme keine neue Errungenschaft, sondern geht bis auf die Erkenntnisse von Warren McCulloch und Walter Pitts im Jahr 1943 zur羹ck. McCulloch/Pitts (1943) offerierten ein Modell,

9 特價1671
立即代訂
下次再買

Linux for Hackers

Ingram 出版
2020/06/01 出版

The book, 'Linux for Hackers: The Advanced Guide on Kali Linux Operating System, ' contains condensed knowledge and information regarding the essential tools and maneuvers that a typical veteran hacker would employ in a penetration attack. This information is presented to the readers in the context of an Operating System that is not only recommended for hacking tasks but is practically made for hackers.This book features a balance of both theoretical and practical information with each topic giving the best of both worlds to the readers and allowing them to learn and practice without any difficulty.The chapters in this book feature interactive guiding-style practical demonstrations that show the reader the implementation and use of some of the most important modules, tools, and commands highlighted in the respective topics. This book emphasizes methods and techniques that can help boost the success rate of the penetration attack. It also highlights the practices that can help the attacker maintain his stealth and protect his identity from being exposed; this is a topic that should be discussed with the utmost detail.Apart from that, the reader will find useful implementations and tricks regarding tools such as Metasploit, PowerShell, etc. which offer advanced functionality in hacking tasks. Moreover, with an elaborative chapter dedicated to Social Engineering facilitating physical attacks, the book opens new avenues for the reader to explore and provides an oppurtunity to learn how to implement creativity and ingenuity in hacking. Now is your chance to learn advanced hacking strategies with Kali Linux. Click the Buy Now button to get started!

9 特價684
立即代訂
下次再買

Linux for Hackers

Ingram 出版
2020/06/01 出版

Whether you are a Kali Linux beginner or a professional, this book is for you. This book provides a thorough explanation of what Linux is. The explanation in the book starts with the emergence of Linux and how it was developed until the present day. The differences between Linux as it was then and Linux today are explained in detail. The book progresses to how to use Kali Linux; the advanced aspects of Linux. Kali is loaded with advanced tools for penetration testing. Added to these tools are commands that help to make the penetration testing process very easy. Some of these commands include: pwd, whoami, cd, ls, help, locate, find, whereis, grep, cat, mkdir, cp, rm, rmdir, set, and echo. This book explains each of the tools listed above and many others. It also examines some basic processes that can help a hacker excel at his or her skills. Using Kali Linux is not only different from using other operating systems but also more advanced than most operating systems like Windows and Mac OS. This book examines the complexities of Kali Linux and provides shortcuts to some of the complexities. In this book, you will learn how to install Kali on your system and how to run Kali through a virtual machine. The knowledge of the virtual machine is such that running Kali Linux on the system poses no threat to running other operating systems.In addition, advanced hacking knowledge, like how to use the host file to direct traffic on your LAN and how you can use the SUID bit to gain access to malicious information like passwords at the etc/shadows, are also provided. With this book, you will learn how to cover your tracks using the rsyslog utility and how to connect and listen to wireless networks. You would also learn how to build your hacking devices, like cameras, for spying and password crackers. All of the provided information and instructions in the book are simple, thorough, and flexible. If you're interested in ethical hacking with Linux and are looking for tips and tricks to help you advance your skills, then this book is for you! Click the Buy Now button to get started.

9 特價684
立即代訂
下次再買

Building an Effective Security Program

Ingram 出版
2020/06/01 出版

Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today's persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics: IT Security Mindset--Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks. Risk Management--Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk. Effective Cyberdefense--Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data. Cyber Operations--Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done. IT Security Awareness and Training--Promote effective cybersecurity practices at work, on travel, and at home, among your organization's business leaders, IT professionals, and staff. Resilient IT Security--Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future.

9 特價2394
立即代訂
下次再買

CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies

Ben,Piper  著
Ingram 出版
2020/06/01 出版

The practical and conceptual knowledge you need to attain CCNP Enterprise certification From one of the most trusted study guide publishers comes CCNP Enterprise Certification Study Guide: Exam 350-401. This guide helps you develop practical knowledge and best practices for critical aspects of enterprise infrastructure so you can gain your CCNP Enterprise certification. If you're hoping to attain a broader range of skills and a solid understanding of Cisco technology, this guide will also provide fundamental concepts for learning how to implement and operate Cisco enterprise network core technologies. By focusing on real-world skills, each chapter prepares you with the knowledge you need to excel in your current role and beyond. It covers emerging and industry-specific topics, such as SD-WAN, network design, wireless, and automation. This practical guide also includes lessons on: ● Automation ● Network assurance ● Security ● Enterprise infrastructure ● Dual-stack architecture ● Virtualization In addition to helping you gain enterprise knowledge, this study guidecan lead you toward your Cisco specialist certification. When you purchase this guide, you get access to the information you need to prepare yourself for advances in technology and new applications, as well as online study tools such as: ● Bonus practice exams ● Pre-made flashcards ● Glossary of key terms ● Specific focus areas Expand your skillset and take your career to the next level with CCNP Enterprise Certification Study Guide.

9 特價2052
立即代訂
下次再買

API SuccessThe Journey to Digital Transformation

Ingram 出版
2020/06/01 出版

Authoritative advice on creating and running a successful API program.The number of articles, books, and documents available on the topic of Application Programming Interfaces (APIs) might lead you to believe the topic has been well researched and well documented. But in fact, confusion abounds, especially about the best ways to create and maintain a successful API program. This book addresses that confusion. It encapsulates years of practical experience on how to make the right decisions at the right times when planning, designing, developing, and marketing APIs. It's your go-to resource when you want to: Understand how to develop your API program's business caseDiscover how to best engage your API consumer audienceLearn the best ways to design, build, test, and deploy APIs regardless of technologyImprove the chances of success of your API program over the long haulTechnology will come and go, but the best practices for building an API program are here to stay. Make your journey through the world of APIs a successful one with this book as your experienced guide.Petracek provides an excellent guide on how corporations should leverage an API based service ecosystem to deliver amazing digital customer experiences.-T.M. Ravi, Managing Director, The HiveNelson has taken the complex, technical, arcane, but critical topic of application programming interfaces (APIs) and explained them in a manner that allows the reader and Information Technology practitioner to understand.-Salil Kulkarni, EVP & Interim Chief Information Officer, Caesar's EntertainmentThis book takes you through everything you need to think about and work through to build an API competency. Each chapter sets out concrete actions for making your program state-of-the-art, and I highly recommend it to anyone involved in that effort.- Maureen Fleming, Program Vice President & Analyst, IDC

9 特價1024
立即代訂
下次再買

Internet Password Keeper

Eric,Butow  著
Sterling 出版
2020/06/01 出版

Keep all your passwords, user IDs, and more all together in this one perfect logbook, which also features important tips from an internet security expert on keeping your data safe. These days we have so much data to remember, we need one handy place to keep track of it all--and this easy-to-use logbook with tabbed A to Z pages is the perfect solution. It includes space to list usernames, passwords, security answers, web addresses, and extra notes, and features an introduction from internet technology and security expert Eric Butow on how to create the strongest passwords, keep your online data safe, and more. In addition, it has a removable, horizontal, wrap-around belly band with the title; when you take the belly band off, the book case itself is unprinted, making it discreet. A section in the back includes space to track other important information, including e-mail addresses and passwords, and modem and router model and serial numbers.

9 特價376
貨到通知
下次再買

The Art of Hacking

May,Ken  著
Ingram 出版
2020/06/01 出版

From Sun Tzu to Machiavelli, from Thucydides to Musashi, and more, the teachings of the greatest minds of the world have endured through countless generations. Information Security professional and educator, Ken May, takes us through choice bits of wisdom in the most lauded writings about warfare, political intrigue, martial arts, history, and strategy, and shows how it can pertain to protecting modern data systems. The tools and techniques may change, but the primary principles remain the same. This edition includes original language source texts, when available.

9 特價684
立即代訂
下次再買

100 Things Every Designer Needs to Know about People

New Riders 出版
2020/06/01 出版

Apply psychology and behavioral science to web, UX, and graphic design Behavioral science leader and CEO at The Team W, Inc., Susan M. Weinschenk, provides a guide that every designer needs, combining real science and research with practical examples on everything from font size to online interactions. With this book you'll design more intuitive and engaging apps, software, websites and products that match the way people think, decide and behave. Here are some of the questions this book will answer: What grabs and holds attention? What makes memories stick? What motivates people? How does listening to music make people feel? How do you engineer a decision? What line length for text is best? Are some fonts better than others? We design to elicit responses from people. We want them to buy something, read more, or take action of some kind. Designing without understanding what makes people act the way they do is like exploring a new city without a map: results will be haphazard, confusing, and inefficient. Increase the effectiveness of your designs by using science-backed examples on human behavior. "Every once in a while, a book comes along that is so well-written, researched, and designed that I just can't put it down. That's how good 100 Things Every Designer Needs to Know About People is!" --Lynne Cooke, Clinical Assistant Professor at Arizona State University

9 特價1197
加入購物車
下次再買

Transferring Information Literacy Practices

Springer 出版
2020/06/01 出版
9 特價5219
立即代訂
下次再買

Ict Systems Security and Privacy Protection34th Ifip Tc 11 International Conference, SEC 2

Springer 出版
2020/06/01 出版

This book constitutes the refereed proceedings of the 34th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2019, held in Lisbon, Portugal, in June 2019. The 26 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on intrusion detection, access control, organizational and behavioral, crypto and encryption, and integrity.

9 特價5741
立即代訂
下次再買

Practical Natural Language ProcessingA Pragmatic Approach to Processing and Analyzing Lang

Ingram 出版
2020/06/01 出版

Many books and courses tackle natural language processing (NLP) problems with toy use cases and well-defined datasets. But if you want to build, iterate, and scale NLP systems in a business setting and tailor them for particular industry verticals, this is your guide. Software engineers and data scientists will learn how to navigate the maze of options available at each step of the journey. Through the course of the book, authors Sowmya Vajjala, Bodhisattwa Majumder, Anuj Gupta, and Harshit Surana will guide you through the process of building real-world NLP solutions embedded in larger product setups. You璽 ll learn how to adapt your solutions for different industry verticals such as healthcare, social media, and retail. With this book, you璽 ll: Understand the wide spectrum of problem statements, tasks, and solution approaches within NLP Implement and evaluate different NLP applications using machine learning and deep learning methods Fine-tune your NLP solution based on your business problem and industry vertical Evaluate various algorithms and approaches for NLP product tasks, datasets, and stages Produce software solutions following best practices around release, deployment, and DevOps for NLP systems Understand best practices, opportunities, and the roadmap for NLP from a business and product leader璽 s perspective

9 特價2736
立即代訂
下次再買

Arista Warrior

Oreilly & 出版
2020/05/05 出版

Arista Networks has become a key player in software-driven cloud networking solutions for large data center, storage, and computing environments, and is poised to make an impact in other areas as well. In this updated edition, renowned trainer, consultant, and technical author Gary A. Donahue (Network Warrior) provides an in-depth, objective guide to Arista's products. You'll learn why the company's network switches, software products, and Extensible Operating System (EOS) are so effective. Anyone who has or is pursuing networking certification (especially Arista's own!) or who is just curious about why Arista is better will benefit from this book, especially entrenched administrators, engineers, or architects tasked with building an Arista network. Pick up this in-depth guide and find out how Arista can help both you and your company. Topics in the second edition include: Configuration Management: config sessions, config replace, and config checkpoints CloudVision: Arista's management, workload orchestration, workflow automation, and configuration tool VXLAN: Layer 2 overlay networking FlexRoute: two million routes in hardware Tap Aggregation: make your switch or blade into a Tap Aggregation device Advanced Mirroring: mirror to a port-channel or even the CPU eAPI: Arista's fabulous extended Application Programmable Interface

9 特價2736
立即代訂
下次再買

Prediction of Adverse Drug Reaction (ADR) Outcomes with use of Machine Learning. Feed-Forw

Ingram 出版
2020/05/01 出版

Master's Thesis from the year 2019 in the subject Computer Sciences - Artificial Intelligence, grade: 88.2, Institute of Technology Carlow, language: English, abstract: Adverse Drug Reactions contribute to $ 7.2 billion in medical expenses annually in the United States alone. Apart from economic impact, the adverse drug reactions are one of the main causes of deaths in developed countries. An ability to predict adverse drug reaction outcomes or identify patients that are likely to experience adverse drug reactions after ingesting medicinal drug product can reduce the fatality rates and financial burden associated with medical treatments of patients experiencing adverse drug reactions. To date, two studies attempted to predict adverse drug reactions with use of machine learning algorithms and Food and Drug Administration database. However, one of them did not provide sufficient accuracy scores and the other was a small-scale proof of concept study. This research has built on top of these two studies and aimed to improve predictive results and provide more specific adverse drug reaction predictive labels. Two deep, fully connected Neural Networks have been created to predict adverse drug reaction outcomes. Model 7 and the Binary Model. The model 7 was a multi-label classification algorithm that was trained to classify patients that were hospitalised, died or have been hospitalised then died. The binary model was trained to segregate the adverse drug reaction outcomes to 2 classes - hospitalisation and death. The multiclass Model-7 achieved similar performance (74 % accuracy) to standard machine learning (binary) models generated in previous studies. However, it did not achieve better performance than binary proof of concept Artificial Neural Network model built by other researchers. The binary Artificial Neural Network model created in this study, significantly outperformed other binary standard machine learning models designed in past by achieving 83 % of accuracy

9 特價3464
立即代訂
下次再買

Pulsed radar signals and intelligent system

Jenan,Ayad  著
Ingram 出版
2020/05/01 出版
9 特價2721
立即代訂
下次再買
頁數78/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing