Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book covers cybersecurity, privacy and control methods and technologies integrated with blockchain and multimedia AI, including encryption and watermarking techniques, wearable-based IoT security methods, multimedia data forensics and video monitoring.
This book presents cutting-edge research on the use of AI for biometrics and cybersecurity including Machine and Deep Learning architectures, emerging applications and ethical and legal concerns.
This book significantly contributes the digital transformation of construction. The book explores the capabilities of deep learning to provide smart solutions for the construction industry, particularly in areas of managing equipment, design optimization, energy optimization and detect cracks for buildings and highways. It provides conceptual solutions but also practical techniques. A new deep learning CNN-based highway cracks detection is demonstrated, and its usefulness is tested. The resulting deep learning CNN model will enable users to scan long distance of highway and detect types of cracks accurately in a very short time compared to traditional approaches.The book explores the integration of IoT and blockchain to provide practical solutions to tackle existing challenges like the endemic fragmentation in supply chain, the need for monitoring construction projects remotely and tracking equipment on the site. The Blockchain of Things (BCoT) concept has been introduced to exploit the advantages of IoT and blockchain, and different applications were developed based on this integration in leading industries such as shared economy and health care. Workable potential use cases to exploit successful utilization of BCoT for the construction industry are explored in the book's chapters.This book will appeal to researchers in providing a comprehensive review of related literature on blockchain, the IoT and construction identify gaps and offer a springboard for future research. Construction practitioners, research and development institutes and policy makers will also benefit from its usefulness as a reference book and collection of case studies on the application of these new approaches in construction.
This textbook focuses on the basics and complex themes of group theory taught to senior undergraduate mathematics students across universities. The contents focus on the properties of groups, subgroups, cyclic groups, permutation groups, cosets and Lagrange¿s theorem, normal subgroups and factor groups, group homomorphisms and isomorphisms, automorphisms, direct products, group actions and Sylow theorems. Pedagogical elements such as end of chapter exercises and solved problems are included to help understand abstract notions. Intermediate lemmas are also carefully designed so that they not only serve the theorems but are also valuable independently. The book is a useful reference to undergraduate and graduate students besides academics.
...understanding the blockchain revolution...Learn the story from Bitcoin's perspective!"If you are a Bitcoin beginner or just want to hear my story, this book is a must-read for anyone interested in understanding 'the Internet of Money', providing a comprehensive overview of my groundbreaking technology!" -BTC
Are you ready to dive into the fascinating world of meme coins? Before you invest a single dollar, make sure you have all the facts. "The Birth of Meme Coins: Exploring the Pre-2017 Crypto Landscape" is your comprehensive guide to understanding the rise and fall of some of the most famous meme coins in history.This book takes you on a journey through the early days of crypto, exploring the emergence of Dogecoin, the first meme coin to capture the attention of the masses. You'll discover the technical features of each meme coin, including Rare Pepe Party, BBQCoin, NyanCoin, and HoboNickels, and the real-world use cases that made them stand out in the crowded crypto landscape.But this book is more than just a history lesson. You'll also learn about the challenges and opportunities of investing in meme coins, and the lessons learned from the rise and fall of these early coins. Discover the potential risks and rewards of investing in meme coins, and learn how to spot the warning signs of a potential scam.With expert insights and real-world examples, "The Birth of Meme Coins" is the essential guide to navigating the volatile world of cryptocurrency. Whether you're a seasoned investor or just getting started, this book will equip you with the knowledge and tools you need to make informed decisions about your investments.Don't miss out on this exciting opportunity to explore the origins of meme coins and discover the potential of this emerging asset class. Order your copy of "The Birth of Meme Coins: Exploring the Pre-2017 Crypto Landscape" today and join the ranks of savvy investors who are shaping the future of finance.
The Hekatompathia (1582), the first English sonnet sequence, surprises its readers with a cryptographic puzzle at a critical juncture in the text. The puzzle's instructions, enumerated in five points, promise that a message can be deciphered using a specific set of published cryptographic tables. This odd, indeed unique, interruption of a poetic text has long baffled critics. Some have dismissed the puzzle as esoterica; one critic argued that the puzzle is unsolvable because its construction is flawed; what no one has previously done is to solve the puzzle. And so, until now, the mystery has remained. However, by applying both cryptographic and literary skills, Labyrinth of Ruins uncovers the solution to this extraordinarily elaborate 7-stage puzzle, in which each stage produces a cryptographic message. Even more surprising, in its grand finale, the seventh stage's cryptographic message reveals that the work's author is not actually he whose name appears on the title page, Thomas Watson, but rather the philosopher, statesman, and harbinger of scientific progress, Francis Bacon. This study's arguments are quantifiable, unlike any matters of literary interpretation or authorship attribution based on the historical record. Indeed, false claims based on a true cryptographic system are difficult to concoct because such systems impose significant constraints. Mathematical techniques are applied to validate the deciphered messages. Solving the Hekatompathia's puzzle not only produces seven messages, but also reorders the sonnet sequence, producing what is, in effect, a new sequence with a different ending. Labyrinth of Ruins, in addition to solving the puzzle, is a critical study of the reordered sequence. The Hekatompathia, in its new order, provides valuable insights into the intellectual history of its day. It reveals much about early modern rhetorical practices, the role of natural philosophy (especially Lucretian cosmology) in Elizabethan poetry, and the structural organization of sonnet sequences. The Hekatompathia's poet, with the decipherer's assistance, has accomplished the unprecedented feat of publishing, what is effectively a new literary work four centuries after his death.Book's website: Hekatompathia.com
¿Dieses kompakte essential vermittelt die mathematischen Grundlagen des RSA-Verfahrens. Es stellt dafür ¿ bewusst beispielorientiert statt beweisvollständig ¿ zunächst die algebraischen Grundlagen sowie den (erweiterten) euklidischen Algorithmus und schließlich natürlich das RSA-Verfahren selbst dar. Außerdem wird eine kurze Einordnung des Verfahrens in die Welt der Kryptographie gegeben und seine Risiken dargestellt.
This book offers the latest research results in security and privacy for Intelligent Edge Computing Systems. It presents state-of-the art content and provides an in-depth overview of the basic background in this related field. Practical areas in both security and risk analysis are addressed as well as connections directly linked to Edge Computing paradigms. This book also offers an excellent foundation on the fundamental concepts and principles of security, privacy and risk analysis in Edge Computation infrastructures. It guides the reader through the core ideas with relevant ease.Edge Computing has burst onto the computational scene offering key technologies for allowing more flexibility at the edge of networks. As Edge Computing has evolved as well as the need for more in-depth solutions in security, privacy and risk analysis at the edge. This book includes various case studies and applications on Edge Computing. It includes the Internet of Things related areas, such as smart cities, blockchain, mobile networks, federated learning, cryptography and cybersecurity.This book is one of the first reference books covering security and risk analysis in Edge Computing Systems. Researchers and advanced-level students studying or working in Edge Computing and related security fields will find this book useful as a reference. Decision makers, managers and professionals working within these fields will want to purchase this book as well.
The metaverse, a hybrid society of the real and the virtual is attracting significant attention from academia to industry and is starting to change the world. Composed of ten chapters, this book introduces the metaverse from three aspects ¿ concept, content and context. It starts with numerous concepts related to the metaverse, such as virtual reality, augmented reality, Web 3.0 and NFTs and describes the background, features, advantages and disadvantages. It then presents the content or key techniques around the metaverse, Artificial Intelligence, big data, edge computing, 3D modeling and blockchain. For each technique, it depicts how it performs to advance the development of the metaverse. Finally, it gives the context of the metaverse and illustrates the new society in the virtual world, consisting of economic systems, assets, social activities, security, law, etcetera. Overall, Metaverse: Concept, Content and Context provides a panoramic view of the metaverse, a key feature of which is the intuitive visualizations with numerous figures that clearly address the main aspects. This book is well-designed and well-written and will appeal to beginners and students as well as professionals, welcome to the metaverse community!
We are at the threshold of a new area of the internet that promises to transform the way we engage financially and take the power of data and privacy back from big corporations and give it to the individual through decentralization. This is sometimes called Web 3.0. While Web 1.0 transformed information sharing and commerce and brought us giants like Google and Amazon and Web 2.0 unlocked the social potential of the internet and created Facebook, Twitter, and Snapchat, exactly what will come of Web 3.0 remains to be seen.It is indisputable that the seed of Web 3.0 is the technological, social, and economic innovations that came together in Bitcoin and the blockchain technology it created. But where the first web iterations were relatively straightforward to understand, the inner workings of Web 3.0 remain more opaque and shrouded in mystique. Current voices on Bitcoin and the blockchain revolution fall squarely into one of two camps; either technological ¿experts¿ who are all also invariably personally invested in the success of Bitcoin and the blockchain or ¿critics¿ who are typically deeply invested in the status quo and the failure of Bitcoin and blockchain. It seems like there is a need for a middle ground to provide the public with a more unbiased view of this important technology. This book therefore aims to unveil some of the mystique and show how to unlock the potential of the blockchain revolution in a manner that does not dismiss out of hand even radical and outlandish ideas nor jumps on the bandwagon of hailing Bitcoin and the blockchain as the answer to all problems.What yoüll learnThe nature of blockchain technology, how it works and what it does.The history of the technological developments that lead to the blockchain.A historical analysis of who the likely creator of Bitcoin is.How bitcoin and cryptocurrencies fit in the history of human exchange.The nature and history of electronic money.How blockchain technology solves problems in a novel way and what it cannot be used for.What web 3.0 could be.Who This Book Is ForThis book is for a general non-technical audience trying to understand the difficult and complex nature of blockchain and cryptocurrencies and the contours of the Web 3.0 revolution.
Learn blockchain in a simple, non-tech way and explore the different emerging technologies that open a world of opportunities in the space of tourism and hospitality. This book showcases examples of blockchain-based solutions implemented in different industries and connects them to use cases in hospitality and tourism (disintermediation, payments, loyalty programs, supply chain management, identity management etc.). Blockchain is one of the disruptive technologies that lays foundations for Web3.0, NFTs, Metaverse and other innovations. Despite many benefits, its adoption in the hospitality industry is very slow. Lack of awareness and connection to clear return-on-investment, coupled with many misconceptions and general perception of complexity is one of the main reasons why hospitality managers are reluctant to embark on the blockchain train.Blockchain for Hospitality and Tourism serves as a practical guide to the world of innovations, from the basics of blockchain to ¿how to start a project¿ with brief explanations of different technologies and capabilities. You'll review NFTs and Metaverse, along with current developments, tools, and platforms. After reading this book, you'll be equipped with enough knowledge to make strategic business decisions and able to discuss these topics within your organization and with vendors and suppliers in a comfortable way. As blockchain enters the next phase of its evolution, with more user-friendly interfaces and interoperability, see how it opens a world of opportunities in the space of tourism and hospitality. What You'll LearnBlockchain-based innovations ¿ cryptocurrencies and digital asset management, NFTs, Web3.0, Metaverse)Review applications of blockchain in selected industries Start a blockchain project Who This Book is ForHospitality professionals, including hotel managers and general managers, revenue management directors, operations directors, hotel IT managers, asset managers, brand strategy managers, marketing managers. Hospitality students will benefit as well. ·
Crypto is going to change the world, and for those tired of confusing financial jargon and complicated technical terminology, look no further. This book demystifies the world of cryptocurrencies and blockchain technology and explains in accessible language how it will affect your daily life. In The Quiet Crypto Revolution, Klaas Jung dives beneath the surface of Bitcoin to explore the engine that powers it - blockchain. Far surpassing the confines of cryptocurrencies, blockchain's potential for wide-ranging applications is enormous. It's crucial to understand that cryptocurrencies are merely a single manifestation of blockchain's capabilities. This book casts light on the broader spectrum of blockchain applications and the exciting future of this groundbreaking technology. With a focus on real-world applications, you'll gain a deeper understanding of the key concepts behind the innovative technology of blockchain, equipping you to make informed decisions. Whether you're a tech-savvy individual or a complete newcomer to the world of crypto and finance, this book will arm you with the knowledge and insights you need to understand the impact cryptocurrency and blockchain will have on your future.You WillLook at the future of blockchain technologyReview potential use cases for blockchain beyond cryptocurrencyStudy security strategies to avoid scams in the crypto spaceWho This Book Is ForBeginners who would like to gain a better understanding of cryptocurrency and the technology that supports it.
This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.
3C Customized Cascaded Cryptography for Mobile Application" is an authoritative and comprehensive guide that explores the innovative approach of 3C customized cascaded cryptography for securing mobile applications. Authored by experts in the field of cryptography and mobile security, this book serves as a valuable resource for researchers, mobile app developers, and security professionals interested in enhancing the security of mobile applications using advanced cryptographic techniques.In this book, the authors introduce the concept of 3C customized cascaded cryptography, which combines three fundamental cryptographic components-encryption, hashing, and digital signatures-to provide a robust and tailored security solution for mobile applications. They present a detailed analysis of the architecture, algorithms, and implementation strategies for 3C cryptography, offering practical insights into its benefits and applications.Key topics covered in this book include:Introduction to mobile application security: The authors provide an overview of the security challenges faced by mobile applications, including data breaches, unauthorized access, and malicious activities. They discuss the importance of robust cryptographic techniques in ensuring the confidentiality, integrity, and authenticity of mobile app data.Fundamentals of cryptography: The book explores the fundamental cryptographic components of encryption, hashing, and digital signatures. It explains their purpose, algorithms, and their roles in securing mobile application data.Customized cascaded cryptography: The authors introduce the concept of customized cascaded cryptography, which involves combining the three cryptographic components in a tailored manner to suit the specific security requirements of mobile applications. They outline the advantages of this approach and its ability to provide strong and adaptable security measures.Architecture and implementation strategies: The book presents the architectural framework for integrating 3C cryptography into mobile applications. It discusses the design considerations, key management techniques, and implementation strategies for ensuring seamless integration and efficient performance.Security analysis and evaluation: The authors provide a comprehensive security analysis of 3C cryptography, examining its resistance against various attacks and vulnerabilities. They discuss the strengths and limitations of the approach, offering insights into its effectiveness in protecting mobile application data.Real-world applications and case studies: The book includes practical examples and case studies that demonstrate the application of 3C customized cascaded cryptography in different mobile application scenarios. It covers areas such as mobile banking, secure messaging, e-commerce, and data sharing, showcasing the versatility and effectiveness of the approach.Future directions and emerging trends: The authors discuss the future directions and emerging trends in mobile application security and customized cryptography. They explore areas such as post-quantum cryptography, blockchain integration, and secure decentralized applications, providing insights into the evolving landscape of mobile security.Throughout the book, the authors provide theoretical explanations, algorithmic details, and practical implementation guidelines to facilitate the understanding and adoption of 3C customized cascaded cryptography for mobile applications. By leveraging this innovative approach, "3C Customized Cascaded Cryptography for Mobile Application" enables readers to enhance the security posture of their mobile applications and protect sensitive data in an increasingly connected and vulnerable digital environment.
This book explains the evolution of techniques and strategies in quantum computing, discussing the digital transition towards the quantum computing application in various sectors. The book provides a comprehensive insight into the quantum mechanics and quantum computing techniques and tools and how they have evolved and the impacted in supporting and flourishing business during the quantum computing era. This book includes chapters that discuss the most primitive quantum schemes to the most recent use of Internet, finance and radar technology, thus leveraging greater use of new technologies like security and Internet and others. The content is relevant for an audience that is involved in the research and development of advanced quantum systems. It gives the industry, researchers, and students interested in learning the various quantum computing sectors with the necessary information and tools that can be used to research, design and develop advanced quantum computing systems and techniques.
Are you tired of hearing only about Bitcoin when it comes to cryptocurrency? Do you want to understand the complex world of altcoins and their impact on the crypto landscape? Look no further than "Beyond the Coin: The Untold Stories of Altcoins and Their Impact on the Crypto Landscape."This book takes you on a journey through the rise and fall of altcoins, exploring their impact on the crypto industry and what the future holds for them. You'll learn about the different types of altcoins, their advantages and disadvantages, and how they have evolved over time.But "Beyond the Coin" is more than just a history book. It's a guide to understanding the risks and rewards of investing in altcoins. You'll gain valuable insights into the mistakes made by early altcoin investors, and the lessons learned from their failures. You'll also get an in-depth look at the relationship between altcoins and Bitcoin, and what it means for the future of cryptocurrency.Whether you're a seasoned investor or just getting started in the world of crypto, "Beyond the Coin" is a must-read. With clear and concise explanations, you'll come away with a deep understanding of the complex world of altcoins and their impact on the crypto landscape.Don't let fear or uncertainty hold you back from investing in altcoins. With "Beyond the Coin" as your guide, you'll have the knowledge and confidence to make informed decisions about your investments. Order your copy today and join the ranks of successful altcoin investors.
In this comprehensive guide, you'll discover the power of Ripple and XRP, two game-changing forces that are revolutionizing the financial industry. As the world of finance continues to evolve, it's crucial to stay ahead of the curve, and this book is your roadmap to doing just that.You'll learn about the history of Ripple and XRP and their potential to transform the way we transact and transfer money. The book explores the benefits of using XRP over traditional banking methods, including faster transaction times, lower fees, and greater security.But it's not all sunshine and rainbows. "Beyond the Horizon" also dives into the criticisms of Ripple and XRP, such as their centralization, privacy concerns, and environmental impact. Understanding both the pros and cons of this revolutionary technology is key to making informed investment decisions.With its clear and concise language, "Beyond the Horizon" is perfect for anyone looking to get started with Ripple and XRP. You'll gain a deep understanding of how this technology works and what sets it apart from other cryptocurrencies on the market.But this book is not just for beginners. Even seasoned investors will benefit from the insights and analysis provided, as well as a glimpse into the future of Ripple and XRP. As the financial landscape continues to shift, understanding the potential of Ripple and XRP is more important than ever.So if you're looking to stay ahead of the curve and be part of the Ripple revolution, "Beyond the Horizon" is the must-read book of the year. Whether you're a seasoned investor or just getting started in the world of finance, this book will provide you with the knowledge and insights you need to succeed. Don't miss out on the opportunity to transform the financial landscape with Ripple and XRP. Get your copy of "Beyond the Horizon" today!
This book explores how digital technologies have proved to be a useful and necessary tool to help ensure that local and regional governments on the frontline of the emergency can continue to provide essential public services during the COVID-19 crisis. Indeed, as the demand for digital technologies grows, local and regional governments are increasingly committed to improving the lives of their citizens under the principles of privacy, freedom of expression and democracy.The Digital Revolution began between the late 1950s and 1970s and represents the evolution of technology from the mechanical and analog to the digital. The advent of digital technology has also changed how humans communicate - today using computers, smartphones and the internet. Further, the digital revolution has made a tremendous wealth of information accessible to virtually everyone. In turn, the book focuses on key challenges for local and regional governments concerning digital technologies during this crisis, e.g. the balance between privacy and security, the digital divide, and accessibility. Privacy is a challenge in the mitigation of COVID-19, as governments rely on digital technologies like contact-tracking apps and big data to help trace peoples' patterns and movements. While these methods are controversial and may infringe on rights to privacy, they also appear to be effective measures for rapidly controlling and limiting the spread of the virus. Next, the book discusses the 10 technology trends that can help build a resilient society, as well as their effects on how we do business, how we work, how we produce goods, how we learn, how we seek medical services and how we entertain ourselves. Lastly, the book addresses a range of diversified technologies, e.g. Online Shopping and Robot Deliveries, Digital and Contactless Payments, Remote Work, Distance Learning, Telehealth, Online Entertainment, Supply Chain 4.0, 3D Printing, Robotics and Drones, 5G, and Information and Communications Technology (ICT).
Dieses Buch beschreibt, unter welchen Bedingungen das in der DDR am weitesten verbreitete Fernschreibchiffriergerät sowie der dazugehörige Algorithmus vor etwa 50 Jahren zum Schutz von Staatsgeheimnissen entwickelt wurden. So können die damaligen Methoden und Ergebnisse mit den aktuellen Möglichkeiten der kryptologischen Analyse verglichen werden ¿ insbesondere unter dem Aspekt der heute zur Verfügung stehenden Computertechnik.Es wird herausgearbeitet, dass die konsequente Anwendung von Methoden der Gruppen- und Automatentheorie in der Analyse eine zentrale Rolle spielte. Dieser algebraische Analyseansatz aus der sowjetischen Schule wird bis heute unterschätzt ¿ die Betrachtungsweisen können auch für Nichtkryptologen von Nutzen sein. Darüber hinaus werden die Unterschiede dargestellt zwischen der Analyse des Chiffrieralgorithmus, der Sicherheitsanalyse des Geräts und der Chiffrierverfahren, in denen es zum Einsatz kommt.Die Ergänzungen in der zweiten Auflage beruhen auf Informationen früherer Mitarbeiter und auf Dokumenten aus den 80er Jahren, die erst nach Erscheinen der Erstauflage zugänglich wurden: Auf der Basis von Originaldokumenten wird nun die Historie der T-310-Entwicklung ausgehend vom Vorläuferalgorithmus SKS genauer dargestellt. Außerdem gelang es den Autoren, einige zuvor nicht lösbare Probleme mit der heute zur Verfügung stehenden Computertechnik zu bearbeiten ¿ daran wird deutlich, wie begrenzt die Rechenkapazität in den 70er und 80er Jahren war. Schließlich wird der letzte Einsatz der T-310 zur Realisierung von gesicherten Fernschreibverbindungen zwischen Ministerien der BRD und der DDR rekonstruiert.
Are you curious about the future of money and the role of cryptocurrency in it? Look no further than "The Future of Money," an illuminating exploration of the world of Bitcoin and its impact on technology, culture, and social justice.From its humble beginnings as an alternative to traditional banking systems to its current status as a major player in the financial world, Bitcoin has captivated the imagination of entrepreneurs, developers, and thinkers around the globe. This book takes a deep dive into the evolution of Bitcoin, from its mysterious founder Satoshi Nakamoto to its potential to revolutionize the way we think about money and power.Through engaging and informative chapters, readers will learn about the technological innovations that make Bitcoin possible, the cultural significance of this decentralized currency, and the potential for social justice movements to utilize cryptocurrency to level the playing field.But the book doesn't stop there. "The Future of Money" also looks to the future, exploring emerging technologies in the world of crypto and the possibilities for decentralization and transparency. What will the financial world look like in 5, 10, or 20 years, and how will Bitcoin and other cryptocurrencies fit into that future?Whether you're an entrepreneur looking to invest in the next big thing or simply curious about the potential of this exciting new technology, "The Future of Money" is a must-read. With clear and accessible writing, in-depth research, and expert insights, this book is the definitive guide to the world of cryptocurrency and its impact on the future of money.So don't wait any longer. Invest in your knowledge and understanding of the world of money and cryptocurrency. Get your copy of "The Future of Money" today and be at the forefront of this exciting new frontier.
This monograph explores the potential of blockchain technology to facilitate the transition in the oil and gas (O&G) industry.As the world shifts towards a sustainable energy future, the oil and gas industry faces significant challenges and opportunities. Focusing on the development of a sustainable O&G industry, the book delves into the role of climate and financial markets in the energy sector, applications of blockchain in sustainable energy development, and the challenges of legal and regulatory issues in applying blockchain technology. It provides insight into how the energy industry is already working on reducing carbon emissions and paving the way to a sustainable future with detailed examples of reducing methane emissions, carbon credit markets, sustainable aviation fuels, and plastics. The book also examines how O&G companies could further their sustainability initiatives using blockchain technology for emission data monitoring, carbon capture, utilization, storage, and supply-chain management to develop clean products.
This book features selected papers from the 9th International Conference on Mathematics and Computing (ICMC 2023), organized at BITS Pilani K. K. Birla Goa Campus, India, during 6¿8 January 2023. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry in mathematics, statistics, cryptography, network security, cybersecurity, machine learning, data analytics, and blockchain technology in computer science and information technology.
Ihr Unternehmen hat sich für KI entschieden. Glückwunsch, was nun? Dieses praktische Buch bietet einen ganzheitlichen Plan für die Implementierung von KI aus der Perspektive der IT und des IT-Betriebs im Unternehmen. Sie erfahren etwas über die Fähigkeiten, das Potenzial, die Grenzen und die Herausforderungen von KI. In diesem Buch erfahren Sie, welche Rolle KI im Kontext etablierter Bereiche wie Design Thinking und DevOps, Governance und Change Management, Blockchain und Quantum Computing spielt, und diskutieren die Konvergenz von KI in diesen Schlüsselbereichen des Unternehmens.Deploying AI in the Enterprise bietet Anleitungen und Methoden zur effektiven Bereitstellung und Operationalisierung nachhaltiger KI-Lösungen. Sie lernen die Herausforderungen bei der Implementierung kennen, wie z. B. Probleme bei der KI-Operationalisierung und Hindernisse bei der Umsetzung von Erkenntnissen in umsetzbare Prognosen. Sie werden auch lernen, wie Sie die Schlüsselkomponenten der KI-Informationsarchitektur erkennen und welche Rolle sie für eine erfolgreiche und nachhaltige KI-Implementierung spielt. Und Sie werden verstehen, wie Sie KI effektiv einsetzen können, um die Nutzung von Kerninformationen in Master Data Management (MDM)-Lösungen zu verbessern.Was Sie lernen werdenVerstehen der wichtigsten KI-Konzepte, einschließlich maschinelles Lernen und Deep LearningBefolgen von Best Practices und Methoden zur erfolgreichen Bereitstellung und Operationalisierung von KI-LösungenErkennen der kritischen Komponenten der KI-Informationsarchitektur und der Bedeutung eines PlansIntegration von KI in bestehende Initiativen innerhalb einer OrganisationErkennen der aktuellen Grenzen von KI und wie sich dies auf Ihr Unternehmen auswirken könnteBewusstsein für wichtige und aktuelle KI-Forschung schaffenIhre Denkweise anpassen, um KI von einem ganzheitlichen Standpunkt aus zu betrachtenMachen Sie sich mit den Möglichkeiten von KI in verschiedenen Branchen vertraut.Für wen ist dieses Buch gedacht?IT-Profis, Datenwissenschaftler und Architekten, die sich mit den Herausforderungen bei der Implementierung und dem Betrieb von KI auseinandersetzen müssen und einen umfassenden Überblick darüber benötigen, wie sich KI auf andere geschäftskritische Bereiche auswirkt. Es ist keine Einführung, sondern richtet sich an Leser, die nach Beispielen für die Nutzung von Daten suchen, um daraus verwertbare Erkenntnisse und Vorhersagen abzuleiten, und die die aktuellen Risiken und Grenzen von KI verstehen und berücksichtigen müssen und wissen wollen, was dies in einem branchenrelevanten Kontext bedeutet.
This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the research progress. Practical use of blockchain technology is addressed as well as cybersecurity and cyber threat challenges and issues. This book also offers readers an excellent foundation on the fundamental concepts and principles of blockchain based cybersecurity for cyber-physical systems. It guides the reader through the core ideas with expert ease.Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology, and maybe more so in the future. This book covers various case studies and applications of blockchain in various cyber-physical fields, such as smart cities, IoT, healthcare, manufacturing, onlinefraud, etc.This book is one of the first reference books covering the application of blockchain technology for cybersecurity in cyber-physical systems (CPS). Researchers working in the cybersecurity field and advanced-level students studying this field will find this book useful as a reference. Decision-makers, managers and professionals also working in this field will want to purchase this book.
In today¿s digital transformation environments, a rigorous cybersecurity approach to effective risk management ¿ including contingency planning, outlining immediate actions, preparing post-breach responses ¿ is central to defending organizations¿ interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks.Specifically, cybersecurity technologies, processes, and practices need to be generalized and applied to intrusion detection and prevention measures. This entails analyzing profiles of cyber-attackers and building cyber-attack models for behavior simulation that can effectively counter such attacks. This comprehensive volume aims to cover all essential aspects of cybersecurity in digital transformation and to provide a framework for considering the many objectives and requirements involved. In addition to introducing theoretical foundations, the work also offers practical techniques for defending against malicious cybercriminals.Topics and features:Explores cybersecurity¿s impact on the dynamics of interconnected, complex cyber- and physical systems, infrastructure resources, and networksProvides numerous examples of applications and best practicesConsiders methods that organizations can use to assess their cybersecurity awareness and/or strategyDescribes anomaly intrusion detection, a key tool in thwarting both malware and theft (whether by insiders or external parties) of corporate dataAddresses cyber-attacker profiles, cyber-attack models and simulation, cybersecurity ontology, access-control mechanisms, and policies for handling ransomware attacksDiscusses the NIST Cybersecurity Framework, MITRE Adversarial Tactics, Techniques and Common Knowledge, CIS Critical Security Controls, and the ISA/IEC 62442 Cybersecurity StandardGathering all the relevant information, this practical guide is eminently suitable as a self-study resource for engineers, scientists, computer scientists, and chief information officers. Further, with its many examples of best practices, it can serve as an excellent text for graduate-level courses and research into cybersecurity.Dietmar P. F. Möller, a retired full professor, is affiliated with the Institute for Mathematics at Clausthal University of Technology, Germany. He was an author of several other Springer titles, including Guide to Automotive Connectivity and Cybersecurity.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2023, CT-RSA 2023, held in San Francisco, CA, USA, in April 2023.The 26 full papers presented in this volume were carefully reviewed and selected from 76 submissions. The conference presents papers on subjects such as Cryptographic Implementations, Quantum Cryptanalysis, Advanced Public-Key Encryption, Tools for Privacy-Enhancing Technologies, Symmetric Cryptanalysis, Multiparty Protocols, Digital Signatures, Fault Attacks and Side Channels, Heuristic Approaches, Symmetric-Key Constructions, and Key Agreement.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.