Computer Performance Engineering
This book constitutes the refereed proceedings of the 20th European Workshop on Computer Performance Engineering, EPEW 2024, held in Venice, Italy, on June 14, 2024. The 10 papers presented in this volume together with one invited talk were carefully reviewed and selected from 14 submissions. The concept of performance in EPEW 2024 is considered in its broadest sense including the notions of Quality of Service, scalability as well as reliability, availability and systems management, among the others.
Learning Langchain
If you're looking to build a production-ready AI application that enables users to "chat" with your company's private data, then you'll need to master LangChain--a premier AI development framework used by global corporations and startups like Zapier, Replit, Databricks, and more. This guide is an indispensable resource for developers who understand Python or JavaScript but are beginners eager to harness the power of AI. Authors Mayo Oshin and Nuno Campos demystify the use of LangChain through practical insights and in-depth tutorials. Starting with basic concepts, this book will show you step-by-step how to build a production-ready AI chatbot trained on your own data. After reading this book, you'll be equipped to: Understand and use the core components of LangChain in your development projects Harness the power of retrieval-augmented generation (RAG) to enhance the accuracy of LLMs using external, up-to-date data Develop and deploy AI chatbots that interact intelligently and contextually with users Utilize LangChain Expression Language to create custom, efficient AI operational chains Integrate and manage third-party APIs and tools to extend the functionality of your AI applications Learn the foundations of LLM app development and how they can be used with LangChain
Ultimate Figma for UI/UX Design
Crack the Code to Solving Customer Problems with Exceptional User Experience Designs Powered by Figma. Book DescriptionFigma is a powerful, collaborative design tool that has transformed the UI/UX design process. With its intuitive interface and advanced features, it enables seamless collaboration and the creation of exceptional user experiences, making it the go-to choice for designers. Ultimate Figma for UX/UI Design guides you through Figma's capabilities, covering everything from the basics to advanced features, collaboration, and real-world applications. Each chapter includes hands-on exercises and examples to reinforce learning, covering topics such as Figma's interface, design principles (shapes, colors, typography), UI element design, interactive prototypes, real-time collaboration, plugin integration, responsive design, and more. This book offers a structured approach for professionals at all design skill levels. Readers will gain tips, tricks, and best practices to enhance their efficiency, collaboration, and design skills, opening doors to success in UX design. Through practical exercises and real-world examples, this guide equips you to excel with Figma and become a proficient UX designer. Unlock your full design potential-dive into Ultimate Figma for UX/UI Design and start crafting exceptional user experiences today! Table of Contents1. Introduction to Figma2. Understanding Design Principles in Figma3. Mastering the Figma Interface4. Designing UI in Figma5. Prototyping and Iterating User Interface Design6. Advanced Design Techniques in Figma7. Collaboration and Team Workflows8. Integrating Plugins and External Tools9. Designing Responsively for Multiple Devices10. Real-World Projects and Case Studies Index
Safeguarding the Future
In the ever-evolving landscape of technology, emerging innovations like Artificial Intelligence, Blockchain, Quantum Computing, Brain-Computer Interfaces (BCI), and the Metaverse are transforming industries at an unprecedented rate. However, with these advancements come significant challenges, particularly in the realms of security and privacy. Safeguarding the Future by Dr. Alan Tang offers a comprehensive guide to navigating these challenges, providing a holistic framework to secure and protect the privacy of these cutting-edge technologies.What sets this book apart is its unique blend of technical depth and practical application. Dr. Tang leverages his extensive experience in privacy and security to deliver actionable insights that are crucial for organizations looking to stay ahead in this rapidly changing digital era. From aligning business strategies with security and privacy goals to implementing unified frameworks across multiple technologies, this book is an essential resource for executives, security professionals, and anyone involved in the deployment of emerging technologies.Key Features: In-depth Analysis: Detailed exploration of the security and privacy risks associated with AI, Blockchain, Quantum Computing, BCI, and other emerging technologies. Unified Frameworks: A comprehensive, step-by-step guide to creating and operationalizing a unified security and privacy framework adaptable to various technologies. Regulatory Alignment: Insights into aligning security and privacy practices with global regulations such as GDPR, CCPA, and ISO standards. Case Studies and Real-world Examples: Practical case studies and examples that illustrate how to apply the concepts discussed in real-world scenarios. Ethical Considerations: Examination of ethical issues surrounding the deployment of these technologies, with recommendations for addressing them proactively. Future-proofing Strategies: Guidance on preparing for future advancements and ensuring long-term compliance and security. Whether you are a Chief Technology Officer, Chief Privacy Officer, Data Protection Officer, or a security professional, this book equips you with the knowledge and tools needed to protect your organization's data and ensure the secure deployment of emerging technologies. By adopting the principles outlined in this book, you can not only harness the full potential of these innovations but also safeguard the privacy and security of your organization and its stakeholders.
Combating Cyberattacks Targeting the AI Ecosystem
This book explores in detail the AI-driven cyber threat landscape, including inherent AI threats and risks that exist in Large Language Models (LLMs), Generative AI applications, and the AI infrastructure. The book highlights hands-on technical approaches to detect security flaws in AI systems and applications utilizing the intelligence gathered from real-world case studies. Lastly, the book presents a very detailed discussion of the defense mechanisms and practical solutions to secure LLMs, GenAI applications, and the AI infrastructure. The chapters are structured with a granular framework, starting with AI concepts, followed by practical assessment techniques based on real-world intelligence, and concluding with required security defenses. Artificial Intelligence (AI) and cybersecurity are deeply intertwined and increasingly essential to modern digital defense strategies. The book is a comprehensive resource for IT professionals, business leaders, and cybersecurity experts for understanding and defending against AI-driven cyberattacks. FEATURES: Includes real-world case studies with detailed examples of AI-centric attacks and defense mechanismsFeatures hands-on security assessments with practical techniques for evaluating the security of AI systemsDemonstrates advanced defense strategies with proven methods to protect LLMs, GenAI applications, and the infrastructure
CyberMedics
"CyberMedics: Navigating AI and Security in the Medical Field" is a comprehensive exploration of the transformative role of artificial intelligence (AI) in healthcare and the critical importance of securing medical data in an increasingly digital world. As AI technologies revolutionize diagnostics, treatment planning, and patient care, they also introduce new challenges related to data privacy, ethical considerations, and cybersecurity.This book offers a balanced perspective, providing healthcare professionals, technologists, and policymakers with the tools they need to understand and navigate the intersection of AI and security. Through detailed case studies, expert insights, and practical guidance, readers will discover how AI can be leveraged to improve patient outcomes while maintaining the highest standards of data protection.Key topics include: - the ethical implications of AI in healthcare- strategies for safeguarding sensitive information against cyber threats- future frameworks governing the use of AI in medical settings.- AI in healthcare, exploring how emerging technologies like machine learning, natural language processing, and predictive analytics are poised to reshape the industry.Whether you're on the front lines of patient care, involved in healthcare IT, or shaping policy, "CyberMedics: Navigating AI and Security in the Medical Field" equips you with the knowledge to make informed decisions in a rapidly evolving landscape, ensuring that innovation and security go hand in hand to enhance the quality of care.
Broadband Communications, Networks, and Systems
This two-volume set, LNICST 601 and LNICST 602, constitutes the refereed post-conference proceedings of the 14th International Conference on Broadband Communications, Networks, and Systems, BROADNETS 2024, held in Hyderabad, India, in February 16-17, 2024. The 49 full papers presented here were carefully reviewed and selected from 122 submissions. These papers have been organized under the following topical sections in the two volumes: - Part I: Communications, Networks and Architectures; Smart City Smart Grid; Communication-inspired Machine Learning (ML) for 5G/6G. Part II: Wireless Network Security and Privacy; AI applications for 5G/6G.
Broadband Communications, Networks, and Systems
This two-volume set, LNICST 601 and LNICST 602, constitutes the refereed post-conference proceedings of the 14th International Conference on Broadband Communications, Networks, and Systems, BROADNETS 2024, held in Hyderabad, India, in February 16-17, 2024. The 49 full papers presented here were carefully reviewed and selected from 122 submissions. These papers have been organized under the following topical sections in the two volumes: - Part I: Communications, Networks and Architectures; Smart City Smart Grid; Communication-inspired Machine Learning (ML) for 5G/6G. Part II: Wireless Network Security and Privacy; AI applications for 5G/6G.
From Street-smart to Web-wise(R)
In Book 3, 5th and 6th graders are maturing, becoming more independent and online activities are second nature. "From Street-smart to Web-wise(R) A Cyber Safety Training Manual Built for Teachers and Designed for Children," isn't just another book--it's a passionate call to action for teachers. It is a roadmap to navigate the digital landscape safely, with confidence and care, as the critical job of ensuring student's safety in a digital world expands.Written by authors, who are recognized experts in their respective fields, this accessible manual is a timely resource for educators. Dive into engaging content that illuminates the importance of cyber safety, not only in our classrooms but extending into the global community.Each chapter is filled with practical examples, stimulating discussion points, and ready-to-use lesson plans tailored for students in fifth and sixth grades. Regardless of your technology skill level, this book will provide you with the guidance and the tools you need to make student cyber-safety awareness practical, fun, and impactful.As parents partner with educators to create cyber-secure spaces, this book stands as a framework of commitment to that partnership. It's a testament to taking proactive steps in equipping our young learners with the awareness and skills they need to tread the digital world securely.By choosing "From Street-smart to Web-wise(R) A Cyber Safety Training Manual Built for Teachers and Designed for Children," you position yourself at the forefront of educational guardianship, championing a future where our children can explore, learn, and grow online without fear. Join us on this journey to empower the next generation--one click at a time!
The Core Network for 5g Advanced
The Core Network for 5G Advanced, Second Edition covers up to the 3GPP release 17 & 18 which includes the core network for 5G Advanced as well as a large number of new features added by 3GPP to expand the initial 5G Core specifications in rel-15/16. This new release includes A complete update to reflect developments in Releases 17 and 18, along with new chapters on Service Exposure, non-3GPP access, 3GPP access for new use cases, Edge computing, Industry and Enterprise features, Regulatory services and Network automation and AI/ML, an overview of the 5G Core Architecture, and much more. Examples of 5G network deployment options for different use cases are also included. Written by authors who are heavily involved in the development of 5G standards, and who have written several successful books on 4G and 5G Core Networks, this book provides an authoritative reference on the technologies and standards of the 3GPP 5G Core network.
Securing the Digital Realm
This book, Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics, is a comprehensive guide that explores the intricate world of digital security and forensics. As our lives become increasingly digital, understanding how to protect our digital assets, communication systems, and investigate cybercrimes is more crucial than ever. This book begins by laying a strong foundation in the fundamental concepts of hardware and software security. It explains the design of modern computer systems and networks to defend against a myriad of threats, from malware to data breaches, in clear and accessible language.One of the standout features of this book is its coverage of cutting-edge technologies like blockchain, artificial intelligence, and machine learning. It demonstrates how these innovations are used to enhance digital security and combat evolving threats.Key features of the book include: - Comprehensive coverage of digital security, communication, and forensics- Exploration of cutting-edge technologies and trends- Emphasis on digital forensics techniques and tools- Coverage of ethical and legal aspects of digital security- Practical guidance for applying cybersecurity principlesAdditionally, the book highlights the importance of secure communication in the digital age, discussing encryption, secure messaging protocols, and privacy-enhancing technologies. It empowers readers to make informed decisions about protecting their online communications. Written by experts in the field, this book addresses the ethical and legal dimensions of digital security and forensics, providing readers with a comprehensive understanding of these complex topics. This book is essential reading for anyone interested in understanding and navigating the complexities of digital security and forensics.
Surveillance and the panopticon in the digital age
Java Basics Using Chatgpt/GPT-4
This book is designed for those new to Java and interested in understanding how ChatGPT/GPT-4 can enhance programming. It offers a unique approach to learning Java, combining traditional hand-written code with cutting-edge ChatGPT-generated examples. The book covers the basics of Java programming and development environments, including understanding recursion, strings, arrays, fundamental data structures, algorithm analysis, queues and stacks, and follows with the role of ChatGPT in generating, explaining, and debugging code. Companion files with source code and figures available for downloading. It's an essential resource for those starting Java programming and for anyone curious about the applications of ChatGPT in coding. FEATURESCombines hand-crafted Java code with ChatGPT-generated examples for a multifaceted learning experienceOffers practical Java coding skills, with examples in recursion, data structures, and algorithm analysisCovers the capabilities of ChatGPT for code generation, debugging, and explanation, providing a modern perspective on programmingIncludes companion files for downloading with source code and figures
Introduction to Machine Learning Through Poetry
Organized Skepticism in the Age of Misinformation
Drawing from philosophy, information theory, and network science, Organized Skepticism in the Age of Misinformation: Surviving the Kingdom of Gossip offers a novel conceptual framework that views information as a form of gossip. This book challenges the idea that truthfulness is a necessary, or even a relevant condition, of information. Instead, the book develops a conceptual framework in which information is understood as gossip, which fits within a more general account of information and knowledge as constrained but contingent social practices. Using this framework, the book provides a nuanced understanding of the "grammar" of gossip that permeates both online and real-world environments, and sheds light on the often overused and confused terms of our time: information, misinformation, and knowledge. The book offers a fundamental reconfiguration of the evolving virtual interdependence of humans and information technology. It is a key resource for students and scholars in areas relating to social media, information diffusion, human/computer interface, and computational social science.
Vulnerability Assessment and Penetration Testing (VAPT)
Natural Language Processing in Action, Second Edition
Develop your NLP skills from scratch! This revised bestseller now includes coverage of the latest Python packages, Transformers, the HuggingFace packages, and chatbot frameworks. In Natural Language Processing in Action, Second Edition you will learn how to: Process, analyze, understand, and generate natural language text Build production-quality NLP pipelines with spaCy Build neural networks for NLP using Pytorch BERT and GPT transformers for English composition, writing code, and even organizing your thoughts Create chatbots and other conversational AI agents Natural Language Processing in Action has helped thousands of data scientists build machines that understand human language. In this new and revised edition, you'll discover state-of-the art NLP models like BERT and HuggingFace transformers, popular open-source frameworks for chatbots, and more. As you go, you'll create projects that can detect fake news, filter spam, and even answer your questions, all built with Python and its ecosystem of data tools. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Deep learning has been a giant leap forward for NLP applications. Developers can now build chatbots and other natural language tools that can imitate real people, diagnose illness, automatically summarize documents, and more. Accessible open source tools such as spaCy and PyTorch make production-level NLP easier and more impactful than ever before. About the book Natural Language Processing in Action, Second Edition is your guide to building software that can read and interpret human language. This new edition is updated to include the latest Python packages and comes with full coverage of cutting-edge models like BERT, GPT-J and HuggingFace transformers. In it, you'll learn to create fun and useful NLP applications such as semantic search engines that are even better than Google, chatbots that can help you write a book, and a multilingual translation program. Soon, you'll be ready to start tackling real-world problems with NLP. About the reader This book requires a basic understanding of deep learning and intermediate Python skills. About the author Hobson Lane is a data scientist and machine learning engineer. He has over twenty years experience building autonomous systems and NLP pipelines for both large corporations and startups. Currently, Hobson is an instructor at UCSD Extension and Springboard, and the CTO and cofounder of Tangible AI and ProAI.org. Maria Dyshel is a social entrepreneur and artificial intelligence expert. She held a variety of AI research, engineering, and management roles in diverse industries, from designing and improving algorithms for autonomous vehicles, to implementing company-wide Conversational AI program in one of the world's largest pharma companies. Maria is currently the CEO and cofounder of Tangible AI. Cole Howard and Hannes Max Hapke were authors of the first edition of Natural Language Processing in Action and their legacy lives on in the collective intelligence of the community around the book.