Udvidet returret til d. 31. januar 2025
Filter
Filter
Sorter efterSorter Populære
  • af Jagannath Samanta, Biplab Sikdar, Santi Prasad Maity & mfl.
    2.808,95 kr.

    This book provides insights into the 3rd International Conference on Communication, Devices and Computing (ICCDC 2021), which was held in Haldia, India, on August 16-18, 2021. It covers new ideas, applications, and the experiences of research engineers, scientists, industrialists, scholars, and students from around the globe. The proceedings highlight cutting-edge research on communication, electronic devices, and computing and address diverse areas such as 5G communication, spread spectrum systems, wireless sensor networks, and signal processing for secure communication, error control coding, printed antennas, analysis of wireless networks, antenna array systems, analog and digital signal processing for communication systems, frequency selective surfaces, radar communication, and substrate integrated waveguide and microwave passive components, which are key to state-of-the-art innovations in communication technologies.

  • af Debasish Das, Ponnuthurai Nagaratnam Suganthan, Kedar Nath Das & mfl.
    2.808,95 kr.

    This book presents the collection of the accepted research papers presented in the 1st 'International Conference on Computational Intelligence and Sustainable Technologies (ICoCIST-2021)'. This edited book contains the articles related to the themes on artificial intelligence in machine learning, big data analysis, soft computing techniques, pattern recognitions, sustainable infrastructural development, sustainable grid computing and innovative technology for societal development, renewable energy, and innovations in Internet of Things (IoT).

  • af Osama Mustafa
    487,95 kr.

    Gain a thorough understanding of DevOps concepts and learn to deploy AWS DevOps services in an organization. This book covers AWS DevOps deployment and building applications and services for enhanced performance.A Complete Guide to DevOps with AWS will show you how to use AWS DevOps to launch and scale services using AWS tools. It demonstrates how to handle infrastructure as code such as AWS CodeCommit, AWS CodeBuild, and AWS CodeArtifact, and how to adapt your software with familiar tools such as terraform and cloud formation. This practice also helps in the continuous integration and deployment of pipelines such as AWS CodeDeploy and AWS CodePipeline with different deployment strategies. You will also learn how to find bugs quicker, enhance software quality, reduce your time to market, and how to build, test, and prepare for a release with frequent code changes. You will also see how to scale your applications to provide maximum performance for users with high traffic. The book also covers monitoring and logging applications, giving an overall picture of the ecosystem of product development. It also explains Kubernetes in depth with AWS EKS. It concludes by walking you through how to build projects with AWS DevOps tools and technologies. After completing this book, you will have gained a solid understanding of the concepts of AWS DevOps through examples, including building projects with integration of software tools. What You Will LearnAutomate processes with AWS toolsUnderstand AWS Services for Continuous deployment, and how to use themUse infrastructure as code with AWS in different formatsIntegrate AWS security into DevOpsWho This Book Is ForDevOps professionals and cloud engineers.

  • af Arthur B. Cooper Jr.
    481,95 kr.

    This book is your go-to reference on how to achieve PCI compliance. With more than 400 PCI requirements, the updated PCI Data Security Standard (PCI DSS) v4.0 does not detail the specific documentation that a PCI auditor¿known as a Qualified Security Assessor (QSA)¿needs to know. This book is the first reference to detail the specific documentation needed for every PCI requirement. The authors provide real-world examples of complying with the 12 main PCI requirements and clarify many of the gray areas within the PCI DSS.Any merchant or service provider that stores, processes, or transmits credit card data must comply with the PCI Data Security Standard. PCI DSS 1.0 was first published in 2004, yet many of those tasked with PCI compliance still encounter difficulties when trying to make sense of it. PCI DSS version 4 was published in March 2022, and at 360 pages, it has numerous additional requirements, leaving many people struggling to know what they need to do to comply.PCI DSS v4.0 has a transition period in which PCI DSS version 3.2.1 will remain active for two years from the v4.0 publication date. Although the transition period ends on March 31, 2024, and may seem far away, those tasked with PCI compliance will need every bit of the time to acquaint themselves with the many news updates, templates, forms, and more, that PCI v4.0 brings to their world.What Yoüll LearnKnow what it takes to be PCI compliantUnderstand and implement what is in the PCI DSSGet rid of cardholder dataEverything you need to know about segmenting your cardholder data networkKnow what documentation is needed for your PCI compliance effortsLeverage real-world experience to assist PCI compliance workWho This Book Is For Compliance managers and those tasked with PCI compliance, information security managers, internal auditors, chief security officers, chief technology officers, and chief information officers. Readers should have a basic understanding of how credit card payment networks operate, in addition to basic security concepts.

  • af Mary Walker
    648,95 kr.

    Social comparison theory (Festinger, 1954) suggests that individuals determine their worth and status in different areas of their lives based upon how they compare with 9 others. Positive and negative comparisons and self-evaluations can lead to individuals experiencing themselves either positively or negatively. Festinger was interested in the role and impact of social comparisons made with peers in social groups (Festinger, 1954; Buunk & Gibbons, 2007). Since then, over the past 20 years, studies have drawn from social comparison theory to understand the impact of exposure to different media platforms on psychological outcomes (Heinberg & Thompson, 1999). Studies have considered different media types as additional platforms for comparison, suggesting that TV exposure, advertising and magazines all allow opportunity for social comparison processes and related impacts (All Party Parliamentary Group, 2012; Heinberg & Thompson, 1999; Cattarin, Thompson, Thomas & Williams, 2000; Bessenhoff, 2006). Studies exploring the impact of these platforms have suggested that where there is negative social comparison with idealised content and images, individuals can experience negative impacts such as lower mood and self-esteem, increased anxiety and decreased body image satisfaction (Heinberg & Thompson, 1999; Cattarin et al., 2000; Tiggemann & McGill, 2004; Bessenhoff, 2006). Interventions have attempted to mitigate the impact of social comparison via different media platforms. For example, media literacy interventions introduced in schools have aimed to improve body image (All Party Parliamentary Group, 2012). These have encouraged individuals to critically evaluate images shown in the media to reduce the impacts of comparison (Alleva, Sheeran, Webb, Martijn & Miles, 2015)

  • af Anshul Kumar & Anurag Upadhyay
    686,95 kr.

  • af Paolo Mori
    614,95 kr.

    This volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, held in Copenhagen, Denmark, on September 30, 2022, co-located with ESORICS 2022.The revised 8 full papers presented together with one invited paper were carefully reviewed and selected from 10 submissions. They cover topics such as: new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including the smart home environment.

  • af Angel Rodríguez-Vázquez, Jorge Fernández-Berni & Delia Velasco-Montero
    1.393,95 kr.

  • af Maurizio Martellini & Stanislav Abaimov
    1.010,95 kr.

  • af Tobias Schneider
    725,95 kr.

    This book constitutes the proceedings of the 21st International Conference on Smart Card Research and Advanced Applications, CARDIS 2022, which took place in November 2022. The conference took place in Birmingham, United Kingdom. The 15 full papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections named: physical attacks; physical countermeasures; protecting AES; evaluation methodologies; attacking NTRU; next-generation cryptography.

  • af ¿Árka Ho¿ková-Mayerová
    1.998,95 kr.

    This book aims to inform about the current empirical results of the work of experts in the field security and emergency management and risk management in connecting science, theory and practice in various fields related to security management and emergency management. The chapters present research work and case studies from international, state as well as regional levels. The book is divided into five sections, which deal with Safety and Security Science, Security and Emergency managment, Threats and Risks, Cyber Risks and Extraordinary Event, Preparation and Solutions.The book is intended primarily for scientific communities established in security sciences, theorists and experts working in various positions and levels of security organizations, universities with specializations in security studies, but also for the expert public interested in security issues or entities directly responsible for security and emergency management.

  • af Miguel Botto-Tobar, Benjamin Durakovic, Marcelo Zambrano Vizuete, mfl.
    1.027,95 - 1.238,95 kr.

  • af Nigel Thomas
    718,95 kr.

    This book constitutes the refereed proceedings of the 18th European Workshop on Computer Performance Engineering, EPEW 2022, held in Santa Pola, Spain, in September 2022.The 14 papers presented in this volume together with one invited talk were carefully reviewed and selected from 14 submissions. The papers presented at the workshop reflect the diversity of modern performance engineering. The sessions covered a wide range of topics including robustness analysis, machine learning, edge and cloud computing, as well as more traditional topics on stochastic modelling, techniques and tools.

  • af Wei Wei, Tasos Dagiuklas, Honghao Gao & mfl.
    1.134,95 - 1.136,95 kr.

  • af Dongdai Lin & Shweta Agrawal
    1.144,95 - 1.354,95 kr.

  • af Ernesto Damiani, Kim-Kwang Raymond Choo, Jie Wu & mfl.
    1.136,95 kr.

    This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28-31, 2022.The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.

  • af Jingjing Wang & Chunxiao Jiang
    1.404,95 kr.

    Relying on unmanned autonomous flight control programs, unmanned aerial vehicles (UAVs) equipped with radio communication devices have been actively developed around the world. Given their low cost, flexible maneuvering and unmanned operation, UAVs have been widely used in both civilian operations and military missions, including environmental monitoring, emergency communications, express distribution, even military surveillance and attacks, for example. Given that a range of standards and protocols used in terrestrial wireless networks are not applicable to UAV networks, and that some practical constraints such as battery power and no-fly zone hinder the maneuverability capability of a single UAV, we need to explore advanced communication and networking theories and methods for the sake of supporting future ultra-reliable and low-latency applications. Typically, the full potential of UAV network's functionalities can be tapped with the aid of the cooperation of multiple drones relying on their ad hoc networking, in-network communications and coordinated control. Furthermore, some swarm intelligence models and algorithms conceived for dynamic negotiation, path programming, formation flight and task assignment of multiple cooperative drones are also beneficial in terms of extending UAV's functionalities and coverage, as well as of increasing their efficiency. We call the networking and cooperation of multiple drones as the terminology 'flying ad hoc network (FANET)', and there indeed are numerous new challenges to be overcome before the idespread of so-called heterogeneous FANETs. In this book, we examine a range of technical issues in FANETs, from physical-layer channel modeling to MAC-layer resource allocation, while also introducing readers to UAV aided mobile edge computing techniques.

  • af Kunal Sehgal
    388,95 kr.

    Build a blue team for efficient cyber threat management in your organizationKey Features:Explore blue team operations and understand how to detect, prevent, and respond to threatsDive deep into the intricacies of risk assessment and threat managementLearn about governance, compliance, regulations, and other best practices for blue team implementationBook Description:We've reached a point where all organizational data is connected through some network. With advancements and connectivity comes ever-evolving cyber threats - compromising sensitive data and access to vulnerable systems. Cybersecurity Blue Team Strategies is a comprehensive guide that will help you extend your cybersecurity knowledge and teach you to implement blue teams in your organization from scratch.Through the course of this book, you'll learn defensive cybersecurity measures while thinking from an attacker's perspective. With this book, you'll be able to test and assess the effectiveness of your organization's cybersecurity posture. No matter the medium your organization has chosen- cloud, on-premises, or hybrid, this book will provide an in-depth understanding of how cyber attackers can penetrate your systems and gain access to sensitive information. Beginning with a brief overview of the importance of a blue team, you'll learn important techniques and best practices a cybersecurity operator or a blue team practitioner should be aware of. By understanding tools, processes, and operations, you'll be equipped with evolving solutions and strategies to overcome cybersecurity challenges and successfully manage cyber threats to avoid adversaries.By the end of this book, you'll have enough exposure to blue team operations and be able to successfully set up a blue team in your organization.What You Will Learn:Understand blue team operations and its role in safeguarding businessesExplore everyday blue team functions and tools used by themBecome acquainted with risk assessment and management from a blue team perspectiveDiscover the making of effective defense strategies and their operationsFind out what makes a good governance programBecome familiar with preventive and detective controls for minimizing riskWho this book is for:This book is for cybersecurity professionals involved in defending an organization's systems and assets against attacks. Penetration testers, cybersecurity analysts, security leaders, security strategists, and blue team members will find this book helpful. Chief Information Security Officers (CISOs) looking at securing their organizations from adversaries will also benefit from this book. To get the most out of this book, basic knowledge of IT security is recommended.

  • - Skills for the Next-Generation Network Engineer
    af Jason Edelman, Scott S. Lowe & Matt Oswalt
    474,95 kr.

    Like sysadmins before them, network engineers are finding that they cannot do their work manually anymore. As the field faces new protocols, technologies, delivery models, and a pressing need for businesses to be more agile and flexible, network automation is becoming essential. This practical guide shows network engineers how to use a range of technologies and toolsincluding Linux, Python, JSON, and XMLto automate their systems through code.Network programming and automation will help you simplify tasks involved in configuring, managing, and operating network equipment, topologies, services, and connectivity. Through the course of the book, youll learn the basic skills and tools you need to make this critical transition.This book covers:Python programming basics: data types, conditionals, loops, functions, classes, and modulesLinux fundamentals to provide the foundation you need on your network automation journeyData formats and models: JSON, XML, YAML, and YANG for networkingJinja templating and its applicability for creating network device configurationsThe role of application programming interfaces (APIs) in network automationSource control with Git to manage code changes during the automation processHow Ansible, Salt, and StackStorm open source automation tools can be used to automate network devicesKey tools and technologies required for a Continuous Integration (CI) pipeline in network operations

  • af Roland Huss & Bilgin Ibyram
    524,95 kr.

  • af Kenneth Hess
    633,95 kr.

    This guide covers all aspects of Linux system administration, from user maintenance, backups, filesystem housekeeping, storage management, and network setup to hardware and software troubleshooting and some application management. It's both a practical daily reference manual for sysadmins and IT pros and a handy study guide for those taking Linux certification exams.

  • af Luis Bathen, Gokay Saldamli, Alex J. Nelson, mfl.
    516,95 kr.

    This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17¿19, 2022.The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts; Remote Device Assessment.This is an open access book.

  • af Michael W. Lucas
    343,95 - 478,95 kr.

  • af Nadhem AlFardan
    488,95 kr.

    Cyber Threat Hunting teaches you how to identify potential breaches of your security. You will learn by exploring real-life scenarios drawn from author Nadhem AlFardan's twenty years in information security. Beginning with the fundamentals, you will build a practical hunting framework and discover good practices for optimising and improving expeditions. You will learn to employ advanced techniques that draw on machine learning and statistical analysis to help spot anomalies. Best of all, this practical book comes with downloadable datasets and scenario templates to practice and hone your threat-hunting techniques. About the reader For security, network, and systems professionals familiar with security tools and Python.

  • af Eric Chou
    548,95 kr.

    Get to grips with the latest container examples, Python 3 features, GitLab DevOps, network data analysis, and cloud networking to get the most out of Python for network engineering with the latest edition of this bestselling guidePurchase of the print or Kindle book includes a free eBook in PDF format.Key Features:Explore the power of the latest Python libraries and frameworks to tackle common and complex network problems efficiently and effectivelyUse Python and other open source tools for Network DevOps, automation, management, and monitoringUse Python 3 to implement advanced network-related featuresBook Description:Networks in your infrastructure set the foundation for how your application can be deployed, maintained, and serviced. Python is the ideal language for network engineers to explore tools that were previously available to systems engineers and application developers. In Mastering Python Networking, Fourth edition, you'll embark on a Python-based journey to transition from traditional network engineers to network developers ready for the next-generation of networks.This new edition is completely revised and updated to work with the latest Python features and DevOps frameworks. In addition to new chapters on introduction to Docker containers and Python 3 AsyncIO for network engineers, each chapter is updated with the latest libraries with working examples to ensure compatibility and understanding of the concepts.Starting with a basic overview of Python, the book teaches you how it can interact with both legacy and API-enabled network devices. You will learn to leverage high-level Python packages and frameworks to perform network automation tasks, monitoring, management, and enhanced network security, followed by AWS and Azure Cloud networking. You will use Git for code management, GitLab for continuous integration, and Python-based testing tools to verify your network.What You Will Learn:Use Python to interact with network devicesUnderstand Docker as a tool that you can use for the development and deploymentUse Python and various other tools to obtain information from the networkLearn how to use ELK for network data analysisUtilize Flask and construct high-level API to interact with in-house applicationsDiscover the new AsyncIO feature and its concepts in Python 3Explore Test-Driven Development concepts and use PyTest to drive code test coverageUnderstand how GitLab can be used with DevOps practices in networkingWho this book is for:Mastering Python Networking, Fourth edition is for network engineers, developers, and SREs who want to learn Python for network automation, programmability, monitoring, cloud, and data analysis. Network engineers who want to transition from manual to automation-based networks using the latest DevOps tools will also get a lot of useful information from this book.Basic familiarity with Python programming and networking-related concepts such as Transmission Control Protocol/Internet Protocol (TCP/IP) will be helpful in getting the most out of this book.

  • af Zhengchun Zhou
    874,95 kr.

    This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic of Finite Field, WAIFI 2022, held in Chengdu, China, in August ¿ September 2022.The 19 revised full papers and 3 invited talks presented were carefully reviewed and selected from 25 submissions. The papers are organized in topical sections: structures in finite fields; efficient finite field arithmetic; coding theory; cryptography; sequences.

  • af Jun Cai, Yuan Xu, Jin Li, mfl.
    1.142,95 - 1.147,95 kr.

  • af KC Santosh
    1.026,95 - 1.027,95 kr.

  • af Sridaran Rajagopal, Kalpesh Popat & Parvez Faruki
    871,95 - 1.031,95 kr.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.