Filter
(found 6625 products)
Book cover image
This practically-oriented textbook introduces the fundamentals of designing digital surveillance systems powered by intelligent computing techniques. The text offers comprehensive coverage of each aspect of the system, from camera calibration and data capture, to the secure transmission of surveillance data, in addition to the detection and recognition of individual biometric ...
Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics
This practically-oriented textbook introduces the fundamentals of designing digital surveillance systems powered by intelligent computing techniques. The text offers comprehensive coverage of each aspect of the system, from camera calibration and data capture, to the secure transmission of surveillance data, in addition to the detection and recognition of individual biometric features and objects. The coverage concludes with the development of a complete system for the automated observation of the full lifecycle of a surveillance event, enhanced by the use of artificial intelligence and supercomputing technology. This updated third edition presents an expanded focus on human behavior analysis and privacy preservation, as well as deep learning methods. Topics and features: contains review questions and exercises in every chapter, together with a glossary; describes the essentials of implementing an intelligent surveillance system and analyzing surveillance data, including a range of biometric characteristics; examines the importance of network security and digital forensics in the communication of surveillance data, as well as issues of issues of privacy and ethics; discusses the Viola-Jones object detection method, and the HOG algorithm for pedestrian and human behavior recognition; reviews the use of artificial intelligence for automated monitoring of surveillance events, and decision-making approaches to determine the need for human intervention; presents a case study on a system that triggers an alarm when a vehicle fails to stop at a red light, and identifies the vehicle's license plate number; investigates the use of cutting-edge supercomputing technologies for digital surveillance, such as FPGA, GPU and parallel computing. This concise and accessible work serves as a classroom-tested textbook for graduate-level courses on intelligent surveillance. Researchers and engineers interested in entering this area will also find the book suitable as a helpful self-study reference.
https://magrudy-assets.storage.googleapis.com/9783030107123.jpg
78.740000 USD

Introduction to Intelligent Surveillance: Surveillance Data Capture, Transmission, and Analytics

by Wei Qi Yan
Hardback
Book cover image
This book addresses what software architects and developers need to know in order to build applications based on blockchain technology, by offering an architectural view of software systems that make beneficial use of blockchains. It provides guidance on assessing the suitability of blockchain, on the roles blockchain can play in ...
Architecture for Blockchain Applications
This book addresses what software architects and developers need to know in order to build applications based on blockchain technology, by offering an architectural view of software systems that make beneficial use of blockchains. It provides guidance on assessing the suitability of blockchain, on the roles blockchain can play in an architecture, on designing blockchain applications, and on assessing different architecture designs and tradeoffs. It also serves as a reference on blockchain design patterns and design analysis, and refers to practical examples of blockchain-based applications. The book is divided into four parts: Part I provides a general introduction to the topic and to existing blockchain platforms including Bitcoin, Ethereum, and Hyperledger Fabric, and offers examples of blockchain-based applications. Part II focuses on the functional aspects of software architecture, describing the main roles blockchain can play in an architecture, as well as its potential suitability and design process. It includes a catalogue of 15 design patterns and details how to use model-driven engineering to build blockchain-based applications. Part III covers the non-functional aspects of blockchain applications, which are cross-cutting concerns including cost, performance, security, and availability. Part IV then presents three detailed real-world use cases, offering additional insights from a practical perspective. An epilogue summarizes the book and speculates on the role blockchain and its applications can play in the future. This book focusses on the bigger picture for blockchain, covering the concepts and technical considerations in the design of blockchain-based applications. The use of mathematical formulas is limited to where they are critical. This book is primarily intended for developers, software architects and chief information officers who need to understand the basic technology, tools and methodologies to build blockchain applications. It also provides students and researchers new to this field an introduction to this hot topic.
https://magrudy-assets.storage.googleapis.com/9783030030346.jpg
89.240000 USD

Architecture for Blockchain Applications

by Mark Staples, Ingo Weber, Xiwei Xu
Hardback
Book cover image
The three-volume set LNAI 11439, 11440, and 11441 constitutes the thoroughly refereed proceedings of the 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2019, held in Macau, China, in April 2019. The 137 full papers presented were carefully reviewed and selected from 542 submissions. The papers present new ...
Advances in Knowledge Discovery and Data Mining: 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part I
The three-volume set LNAI 11439, 11440, and 11441 constitutes the thoroughly refereed proceedings of the 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2019, held in Macau, China, in April 2019. The 137 full papers presented were carefully reviewed and selected from 542 submissions. The papers present new ideas, original research results, and practical development experiences from all KDD related areas, including data mining, data warehousing, machine learning, artificial intelligence, databases, statistics, knowledge engineering, visualization, decision-making systems, and the emerging applications. They are organized in the following topical sections: classification and supervised learning; text and opinion mining; spatio-temporal and stream data mining; factor and tensor analysis; healthcare, bioinformatics and related topics; clustering and anomaly detection; deep learning models and applications; sequential pattern mining; weakly supervised learning; recommender system; social network and graph mining; data pre-processing and feature selection; representation learning and embedding; mining unstructured and semi-structured data; behavioral data mining; visual data mining; and knowledge graph and interpretable data mining.
https://magrudy-assets.storage.googleapis.com/9783030161477.jpg
104.990000 USD

Advances in Knowledge Discovery and Data Mining: 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part I

Paperback / softback
Book cover image
This book constitutes the workshop proceedings of the 24th International Conference on Database Systems for Advanced Applications, DASFAA 2019, held in Chiang Mai, Thailand, in April 2019. The 14 full papers presented were carefully selected and reviewed from 26 submissions to the three following workshops: the 6th International Workshop on ...
Database Systems for Advanced Applications: DASFAA 2019 International Workshops: BDMS, BDQM, and GDMA, Chiang Mai, Thailand, April 22-25, 2019, Proceedings
This book constitutes the workshop proceedings of the 24th International Conference on Database Systems for Advanced Applications, DASFAA 2019, held in Chiang Mai, Thailand, in April 2019. The 14 full papers presented were carefully selected and reviewed from 26 submissions to the three following workshops: the 6th International Workshop on Big Data Management and Service, BDMS 2019; the 4th International Workshop on Big Data Quality Management, BDQM 2019; and the Third International Workshop on Graph Data Management and Analysis, GDMA 2019. This volume also includes the short papers, demo papers, and tutorial papers of the main conference DASFAA 2019.
https://magrudy-assets.storage.googleapis.com/9783030185893.jpg
104.990000 USD

Database Systems for Advanced Applications: DASFAA 2019 International Workshops: BDMS, BDQM, and GDMA, Chiang Mai, Thailand, April 22-25, 2019, Proceedings

Paperback / softback
Book cover image
This book provides solutions for securing important data stored in something as nebulous sounding as a cloud. A primer on the concepts behind security and the cloud, it explains where and how to store data and what should be avoided at all costs. It presents the views and insight of ...
Securing the Cloud: Security Strategies for the Ubiquitous Data Center
This book provides solutions for securing important data stored in something as nebulous sounding as a cloud. A primer on the concepts behind security and the cloud, it explains where and how to store data and what should be avoided at all costs. It presents the views and insight of the leading experts on the state of cloud computing security and its future. It also provides no-nonsense info on cloud security technologies and models. Securing the Cloud: Security Strategies for the Ubiquitous Data Center takes the position that cloud security is an extension of recognized, established security principles into cloud-based deployments. It explores how those principles can be put into practice to protect cloud-based infrastructure and data, traditional infrastructure, and hybrid architectures combining cloud and on-premises infrastructure. Cloud computing is evolving so rapidly that regulations and technology have not necessarily been able to keep pace. IT professionals are frequently left to force fit pre-existing solutions onto new infrastructure and architectures for which they may be very poor fits. This book looks at how those square peg/round hole solutions are implemented and explains ways in which the pegs, the holes, or both may be adjusted for a more perfect fit.
https://magrudy-assets.storage.googleapis.com/9781466569201.jpg
105.78 USD

Securing the Cloud: Security Strategies for the Ubiquitous Data Center

by Brian Chee, Curtis Franklin, Jr.
Hardback
Book cover image
The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers ...
Advances in Cryptology - EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part II
The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.
https://magrudy-assets.storage.googleapis.com/9783030176556.jpg
125.990000 USD

Advances in Cryptology - EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part II

Paperback / softback
Book cover image
The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers ...
Advances in Cryptology - EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part III
The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.
https://magrudy-assets.storage.googleapis.com/9783030176587.jpg
125.990000 USD

Advances in Cryptology - EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part III

Paperback / softback
Book cover image
Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear centrifuges and power grids-concerns about cyberwar have been mounting, rising to a fever pitch after the alleged Russian hacking of the U.S. ...
Cyberwar and Revolution: Digital Subterfuge in Global Capitalism
Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear centrifuges and power grids-concerns about cyberwar have been mounting, rising to a fever pitch after the alleged Russian hacking of the U.S. presidential election and the Cambridge Analytica scandal. Although cyberwar is widely discussed, few accounts undertake a deep, critical view of its roots and consequences. Analyzing the new militarization of the internet, Cyberwar and Revolution argues that digital warfare is not a bug in the logic of global capitalism but rather a feature of its chaotic, disorderly unconscious. Urgently confronting the concept of cyberwar through the lens of both Marxist critical theory and psychoanalysis, Nick Dyer-Witheford and Svitlana Matviyenko provide a wide-ranging examination of the class conflicts and geopolitical dynamics propelling war across digital networks. Investigating the subjectivities that cyberwar mobilizes, exploits, and bewilders, and revealing how it permeates the fabric of everyday life and implicates us all in its design, this book also highlights the critical importance of the emergent resistance to this digital militarism-hacktivism, digital worker dissent, and off-the-grid activism-for effecting different, better futures.
https://magrudy-assets.storage.googleapis.com/9781517904111.jpg
26.200000 USD

Cyberwar and Revolution: Digital Subterfuge in Global Capitalism

by Svitlana Matviyenko, Nick Dyer-Witheford
Paperback / softback
Book cover image
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Up-to-date coverage of every topic on the CEH v10 exam Thoroughly updated for CEH v10 exam objectives, this integrated self-study system offers complete ...
CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Up-to-date coverage of every topic on the CEH v10 exam Thoroughly updated for CEH v10 exam objectives, this integrated self-study system offers complete coverage of the EC-Council's Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the exam. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this comprehensive resource also serves as an essential on-the-job reference. Covers all exam topics, including: *Ethical hacking fundamentals*Reconnaissance and footprinting*Scanning and enumeration*Sniffing and evasion*Attacking a system*Hacking web servers and applications*Wireless network hacking*Security in cloud computing*Trojans and other attacks*Cryptography*Social engineering and physical security*Penetration testing Digital content includes: *300 practice exam questions*Test engine that provides full-length practice exams and customized quizzes by chapter
https://magrudy-assets.storage.googleapis.com/9781260454550.jpg
52.500000 USD

CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition

by Matt Walker
Paperback / softback
Book cover image
This book offers a broad survey of all information made public - from 1993 until today - on keystream sequence generators based on irregular decimation, which are referred to as shrinking generators. Starting with an overview of cryptography, it describes each type of generator - shrinking, self-shrinking, modified self-shrinking, generalized ...
Cryptography with Shrinking Generators: Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation
This book offers a broad survey of all information made public - from 1993 until today - on keystream sequence generators based on irregular decimation, which are referred to as shrinking generators. Starting with an overview of cryptography, it describes each type of generator - shrinking, self-shrinking, modified self-shrinking, generalized self-shrinking and the DECIM algorithm - with examples and references. Further, the book discusses several attacks on these generators and applications. It concludes by demonstrating how the output sequences can be modeled by means of different families of one-dimensional cellular automata, rendering the generators vulnerable to attacks. Intended for researchers and graduate students, the book will hopefully inspire them to search for more details on this family of generators and to address the open problems in this field.
https://magrudy-assets.storage.googleapis.com/9783030128494.jpg
62.990000 USD

Cryptography with Shrinking Generators: Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation

by Amparo Fuster-Sabater, Sara Diaz Cardell
Paperback / softback
Book cover image
Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. ...
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You'll Learn Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes Who This Book Is For Offensive security assessors and those who want a working knowledge of the process, its challenges, and its benefits. Current professionals will gain tradecraft and operational insight and non-technical readers will gain a high-level perspective of what it means to provide and be a customer of red team assessments.
https://magrudy-assets.storage.googleapis.com/9781484243084.jpg
34.640000 USD

Professional Red Teaming: Conducting Successful Cybersecurity Engagements

by Jacob G. Oakley
Paperback / softback
Book cover image
This book constitutes revised selected papers from the 10th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, held in Darmstadt, Germany, in April 2019. The 14 papers presented together with one keynote and one invited talk in this volume were carefully reviewed and selected from 34 submissions. ...
Constructive Side-Channel Analysis and Secure Design: 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings
This book constitutes revised selected papers from the 10th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2019, held in Darmstadt, Germany, in April 2019. The 14 papers presented together with one keynote and one invited talk in this volume were carefully reviewed and selected from 34 submissions. They were organized in topical sections named: Side-Channel Attacks; Fault-Injection Attacks; White-Box Attacks; Side-Channel Analysis Methodologies; Security Aspects of Post-Quantum Schemes; and Countermeasures Against Implementation Attacks.
https://magrudy-assets.storage.googleapis.com/9783030163495.jpg
83.990000 USD

Constructive Side-Channel Analysis and Secure Design: 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings

Paperback / softback
Book cover image
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for ...
The Global Cyber-Vulnerability Report
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.
https://magrudy-assets.storage.googleapis.com/9783319798363.jpg
125.990000 USD

The Global Cyber-Vulnerability Report

by Aditya Prakash, Tudor Dumitras, Michael Ovelgonne, VS Subrahmanian
Paperback / softback
Book cover image
This book constitutes thoroughly reviewed, revised and selected papers from the 4th International Conference on Human Centered Computing, HCC 2018, held in Merida, Mexico, in December 2018. The 50 full and 18 short papers presented in this volume were carefully reviewed and selected from a total of 146 submissions. They ...
Human Centered Computing: 4th International Conference, HCC 2018, Merida, Mexico, December, 5-7, 2018, Revised Selected Papers
This book constitutes thoroughly reviewed, revised and selected papers from the 4th International Conference on Human Centered Computing, HCC 2018, held in Merida, Mexico, in December 2018. The 50 full and 18 short papers presented in this volume were carefully reviewed and selected from a total of 146 submissions. They focus on a hyper-connected world , dealing with new developments in artificial intelligence, deep learning, brain-computing, etc.
https://magrudy-assets.storage.googleapis.com/9783030151263.jpg
115.490000 USD

Human Centered Computing: 4th International Conference, HCC 2018, Merida, Mexico, December, 5-7, 2018, Revised Selected Papers

Paperback / softback
Book cover image
Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators. You will learn how to join PowerShell's robust set of commands and access to the internals of both the MS Windows desktop and ...
PowerShell and Python Together: Targeting Digital Investigations
Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators. You will learn how to join PowerShell's robust set of commands and access to the internals of both the MS Windows desktop and enterprise devices and Python's rich scripting environment allowing for the rapid development of new tools for investigation, automation, and deep analysis. PowerShell and Python Together takes a practical approach that provides an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate. What You'll Learn Leverage the internals of PowerShell for: digital investigation, incident response, and forensics Leverage Python to exploit already existing PowerShell CmdLets and aliases to build new automation and analysis capabilities Create combined PowerShell and Python applications that provide: rapid response capabilities to cybersecurity events, assistance in the precipitous collection of critical evidence (from the desktop and enterprise), and the ability to analyze, reason about, and respond to events and evidence collected across the enterprise Who This Book Is For System administrators, IT personnel, incident response teams, forensic investigators, professors teaching in undergraduate and graduate programs in cybersecurity, students in cybersecurity and computer science programs, and software developers and engineers developing new cybersecurity defenses
https://magrudy-assets.storage.googleapis.com/9781484245033.jpg
34.640000 USD

PowerShell and Python Together: Targeting Digital Investigations

by Chet Hosmer
Paperback / softback
Book cover image
This book constitutes the revised selected papers of the scientific satellite events that were held in conjunction with the 16th International Conference on Service-Oriented Computing, ICSOC 2018, held in Hangzhou, China, in November 2018. The ICSOC 2018 workshop track consisted of six workshops on a wide range of topics that ...
Service-Oriented Computing - ICSOC 2018 Workshops: ADMS, ASOCA, ISYyCC, CloTS, DDBS, and NLS4IoT, Hangzhou, China, November 12-15, 2018, Revised Selected Papers
This book constitutes the revised selected papers of the scientific satellite events that were held in conjunction with the 16th International Conference on Service-Oriented Computing, ICSOC 2018, held in Hangzhou, China, in November 2018. The ICSOC 2018 workshop track consisted of six workshops on a wide range of topics that fall into the general area of service computing. A special focus this year was on Internet of Things, Data Analytics, and Smart Services: First International Workshop on Data-Driven Business Services (DDBS)First International Workshop on Networked Learning Systems for Secured IoT Services and Its Applications (NLS4IoT)8th International Workshop on Context-Aware and IoT Services (CIoTS)Third International Workshop on Adaptive Service-oriented and Cloud Applications (ASOCA2018)Third International Workshop on IoT Systems for Context-aware Computing (ISyCC)First International Workshop on AI and Data Mining for Services (ADMS)
https://magrudy-assets.storage.googleapis.com/9783030176419.jpg
94.490000 USD

Service-Oriented Computing - ICSOC 2018 Workshops: ADMS, ASOCA, ISYyCC, CloTS, DDBS, and NLS4IoT, Hangzhou, China, November 12-15, 2018, Revised Selected Papers

Paperback / softback
Book cover image
This book constitutes the proceedings of the 13th International Conference on Green, Pervasive, and Cloud Computing, GPC 2018, held in Hangzhou, China, in May 2018. The 35 full papers included in this volume were carefully reviewed and selected from 101 initial submissions. They are organized in the following topical sections: ...
Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers
This book constitutes the proceedings of the 13th International Conference on Green, Pervasive, and Cloud Computing, GPC 2018, held in Hangzhou, China, in May 2018. The 35 full papers included in this volume were carefully reviewed and selected from 101 initial submissions. They are organized in the following topical sections: network security, and privacy-preserving; pervasive sensing and analysis; cloud computing, mobile computing, and crowd sensing; social and urban computing; parallel and distributed systems, optimization; pervasive applications; and data mining and knowledge mining.
https://magrudy-assets.storage.googleapis.com/9783030150921.jpg
94.490000 USD

Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers

Paperback / softback
Book cover image
The three-volume set LNAI 11439, 11440, and 11441 constitutes the thoroughly refereed proceedings of the 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2019, held in Macau, China, in April 2019. The 137 full papers presented were carefully reviewed and selected from 542 submissions. The papers present new ...
Advances in Knowledge Discovery and Data Mining: 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part II
The three-volume set LNAI 11439, 11440, and 11441 constitutes the thoroughly refereed proceedings of the 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2019, held in Macau, China, in April 2019. The 137 full papers presented were carefully reviewed and selected from 542 submissions. The papers present new ideas, original research results, and practical development experiences from all KDD related areas, including data mining, data warehousing, machine learning, artificial intelligence, databases, statistics, knowledge engineering, visualization, decision-making systems, and the emerging applications. They are organized in the following topical sections: classification and supervised learning; text and opinion mining; spatio-temporal and stream data mining; factor and tensor analysis; healthcare, bioinformatics and related topics; clustering and anomaly detection; deep learning models and applications; sequential pattern mining; weakly supervised learning; recommender system; social network and graph mining; data pre-processing and featureselection; representation learning and embedding; mining unstructured and semi-structured data; behavioral data mining; visual data mining; and knowledge graph and interpretable data mining.
https://magrudy-assets.storage.googleapis.com/9783030161446.jpg
104.990000 USD

Advances in Knowledge Discovery and Data Mining: 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part II

Paperback / softback
Book cover image
This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented ...
Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings
This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security and trust, including on new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems.
https://magrudy-assets.storage.googleapis.com/9783030171377.jpg
62.990000 USD

Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings

Paperback / softback
Book cover image
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized ...
Public-Key Cryptography - PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.
https://magrudy-assets.storage.googleapis.com/9783030172589.jpg
115.490000 USD

Public-Key Cryptography - PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II

Paperback / softback
Book cover image
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional ...
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean Tanner's wide array of experience from teaching at a University to working for the Department of Defense, the Cybersecurity Blue Team Toolkit strikes the perfect balance of substantive and accessible, making it equally useful to those in IT or management positions across a variety of industries. This handy guide takes a simple and strategic look at best practices and tools available to both cybersecurity management and hands-on professionals, whether they be new to the field or looking to expand their expertise. Tanner gives comprehensive coverage to such crucial topics as security assessment and configuration, strategies for protection and defense, offensive measures, and remediation while aligning the concept with the right tool using the CIS Controls version 7 as a guide. Readers will learn why and how to use fundamental open source and free tools such as ping, tracert, PuTTY, pathping, sysinternals, NMAP, OpenVAS, Nexpose Community, OSSEC, Hamachi, InSSIDer, Nexpose Community, Wireshark, Solarwinds Kiwi Syslog Server, Metasploit, Burp, Clonezilla and many more. Up-to-date and practical cybersecurity instruction, applicable to both management and technical positions - Straightforward explanations of the theory behind cybersecurity best practices - Designed to be an easily navigated tool for daily use - Includes training appendix on Linux, how to build a virtual lab and glossary of key terms The Cybersecurity Blue Team Toolkit is an excellent resource for anyone working in digital policy as well as IT security professionals, technical analysts, program managers, and Chief Information and Technology Officers. This is one handbook that won't gather dust on the shelf, but remain a valuable reference at any career level, from student to executive.
https://magrudy-assets.storage.googleapis.com/9781119552932.jpg
42.000000 USD

Cybersecurity Blue Team Toolkit

by Nadean H. Tanner
Paperback / softback
Book cover image
This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, ...
Cyber Security: 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14-16, 2018, Revised Selected Papers
This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence analysis, vulnerability, artificial intelligence security, IPv6 risk research, cybersecurity policy and regulation research, big data analysis and industrial security.
https://magrudy-assets.storage.googleapis.com/9789811366208.jpg
62.990000 USD

Cyber Security: 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14-16, 2018, Revised Selected Papers

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the First International Conference on Intelligent Technologies and Applications, INTAP 2018, held in Bahawalpur, Pakistan, in October 2018. The 68 revised full papers and 6 revised short papers presented were carefully reviewed and selected from 251 submissions. The papers of this volume are ...
Intelligent Technologies and Applications: First International Conference, INTAP 2018, Bahawalpur, Pakistan, October 23-25, 2018, Revised Selected Papers
This book constitutes the refereed proceedings of the First International Conference on Intelligent Technologies and Applications, INTAP 2018, held in Bahawalpur, Pakistan, in October 2018. The 68 revised full papers and 6 revised short papers presented were carefully reviewed and selected from 251 submissions. The papers of this volume are organized in topical sections on AI and health; sentiment analysis; intelligent applications; social media analytics; business intelligence;Natural Language Processing; information extraction; machine learning; smart systems; semantic web; decision support systems; image analysis; automated software engineering.
https://magrudy-assets.storage.googleapis.com/9789811360510.jpg
146.990000 USD

Intelligent Technologies and Applications: First International Conference, INTAP 2018, Bahawalpur, Pakistan, October 23-25, 2018, Revised Selected Papers

Paperback / softback
Book cover image
Plug the gaps in your network's infrastructure with resilient network security models Key Features Develop a cost-effective and end-to-end vulnerability management program Explore best practices for vulnerability scanning and risk assessment Understand and implement network enumeration with Nessus and Network Mapper (Nmap) Book DescriptionDigitization drives technology today, which is why ...
Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7
Plug the gaps in your network's infrastructure with resilient network security models Key Features Develop a cost-effective and end-to-end vulnerability management program Explore best practices for vulnerability scanning and risk assessment Understand and implement network enumeration with Nessus and Network Mapper (Nmap) Book DescriptionDigitization drives technology today, which is why it's so important for organizations to design security mechanisms for their network infrastructures. Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. This Learning Path begins by introducing you to the various concepts of network security assessment, workflows, and architectures. You will learn to employ open source tools to perform both active and passive network scanning and use these results to analyze and design a threat model for network security. With a firm understanding of the basics, you will then explore how to use Nessus and Nmap to scan your network for vulnerabilities and open ports and gain back door entry into a network. As you progress through the chapters, you will gain insights into how to carry out various key scanning tasks, including firewall detection, OS detection, and access management to detect vulnerabilities in your network. By the end of this Learning Path, you will be familiar with the tools you need for network scanning and techniques for vulnerability scanning and network protection. This Learning Path includes content from the following Packt books: Network Scanning Cookbook by Sairam Jetty Network Vulnerability Assessment by Sagar Rahalkar What you will learn Explore various standards and frameworks for vulnerability assessments and penetration testing Gain insight into vulnerability scoring and reporting Discover the importance of patching and security hardening Develop metrics to measure the success of a vulnerability management program Perform configuration audits for various platforms using Nessus Write custom Nessus and Nmap scripts on your own Install and configure Nmap and Nessus in your network infrastructure Perform host discovery to identify network devices Who this book is forThis Learning Path is designed for security analysts, threat analysts, and security professionals responsible for developing a network threat model for an organization. Professionals who want to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program will also find this Learning Path useful.
https://magrudy-assets.storage.googleapis.com/9781838642303.jpg
52.490000 USD

Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7

by Sagar Rahalkar, Sairam Jetty
Paperback / softback
Book cover image
This book presents the combined proceedings of the 7th International Conference on Computer Science and its Applications (CSA-15) and the International Conference on Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015. The aim of these two meetings was to promote discussion ...
Advances in Computer Science and Ubiquitous Computing: CSA & CUTE
This book presents the combined proceedings of the 7th International Conference on Computer Science and its Applications (CSA-15) and the International Conference on Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of computer science covering topics including mobile computing, security and trust management, multimedia systems and devices, networks and communications, databases and data mining, and ubiquitous computing technologies such as ubiquitous communication and networking, ubiquitous software technology, ubiquitous systems and applications, security and privacy. These proceedings reflect the state-of-the-art in the development of computational methods, numerical simulations, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to computer science.
https://magrudy-assets.storage.googleapis.com/9789811091216.jpg
209.990000 USD

Advances in Computer Science and Ubiquitous Computing: CSA & CUTE

Paperback / softback
Book cover image
The three-volume set LNAI 11439, 11440, and 11441 constitutes the thoroughly refereed proceedings of the 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2019, held in Macau, China, in April 2019. The 137 full papers presented were carefully reviewed and selected from 542 submissions. The papers present new ...
Advances in Knowledge Discovery and Data Mining: 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part III
The three-volume set LNAI 11439, 11440, and 11441 constitutes the thoroughly refereed proceedings of the 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2019, held in Macau, China, in April 2019. The 137 full papers presented were carefully reviewed and selected from 542 submissions. The papers present new ideas, original research results, and practical development experiences from all KDD related areas, including data mining, data warehousing, machine learning, artificial intelligence, databases, statistics, knowledge engineering, visualization, decision-making systems, and the emerging applications. They are organized in the following topical sections: classification and supervised learning; text and opinion mining; spatio-temporal and stream data mining; factor and tensor analysis; healthcare, bioinformatics and related topics; clustering and anomaly detection; deep learning models and applications; sequential pattern mining; weakly supervised learning; recommender system; social network and graph mining; data pre-processing and featureselection; representation learning and embedding; mining unstructured and semi-structured data; behavioral data mining; visual data mining; and knowledge graph and interpretable data mining.
https://magrudy-assets.storage.googleapis.com/9783030161415.jpg
104.990000 USD

Advances in Knowledge Discovery and Data Mining: 23rd Pacific-Asia Conference, PAKDD 2019, Macau, China, April 14-17, 2019, Proceedings, Part III

Paperback / softback
Book cover image
This timely and compelling book presents a broad study of all key cyber security issues of the highest interest to government and business as well as their implications. * Takes a broad approach to the problems of cyber security, covering every important issue related to the threats cyber security poses ...
Cyber Security: Threats and Responses for Government and Business
This timely and compelling book presents a broad study of all key cyber security issues of the highest interest to government and business as well as their implications. * Takes a broad approach to the problems of cyber security, covering every important issue related to the threats cyber security poses to government and business * Provides detailed coverage of the political, financial, data protection, privacy, and reputational problems caused by cyber attacks * Offers a forward-looking approach, discussing emerging trends that will bring new challenges to those charged with enhancing cyber security * Makes insightful suggestions into how nations and businesses can take steps to enhance their cyber security
https://magrudy-assets.storage.googleapis.com/9781440861734.jpg
63.000000 USD

Cyber Security: Threats and Responses for Government and Business

by Nigel Jones, Jack Caravelli
Hardback
Book cover image
This book constitutes revised selected papers from the 5th International Workshop on Graphical Models for Security, GraMSec 2018, held in Oxford, UK, in July 2018. The 7 full papers presented in this volume were carefully reviewed and selected from 21 submissions. The book also contains one invited talk. The contributions ...
Graphical Models for Security: 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers
This book constitutes revised selected papers from the 5th International Workshop on Graphical Models for Security, GraMSec 2018, held in Oxford, UK, in July 2018. The 7 full papers presented in this volume were carefully reviewed and selected from 21 submissions. The book also contains one invited talk. The contributions deal with the latest research and developments on graphical models for security.
https://magrudy-assets.storage.googleapis.com/9783030154646.jpg
62.990000 USD

Graphical Models for Security: 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers

Paperback / softback
Book cover image
In the past few years, with the evolution of advanced persistent threats and mutation techniques, sensitive and damaging information from a variety of sources have been exposed to possible corruption and hacking. Machine learning, artificial intelligence, predictive analytics, and similar disciplines of cognitive science applications have been found to have ...
Machine Learning and Cognitive Science Applications in Cyber Security
In the past few years, with the evolution of advanced persistent threats and mutation techniques, sensitive and damaging information from a variety of sources have been exposed to possible corruption and hacking. Machine learning, artificial intelligence, predictive analytics, and similar disciplines of cognitive science applications have been found to have significant applications in the domain of cyber security. Machine Learning and Cognitive Science Applications in Cyber Security examines different applications of cognition that can be used to detect threats and analyze data to capture malware. Highlighting such topics as anomaly detection, intelligent platforms, and triangle scheme, this publication is designed for IT specialists, computer engineers, researchers, academicians, and industry professionals interested in the impact of machine learning in cyber security and the methodologies that can help improve the performance and reliability of machine learning applications.
https://magrudy-assets.storage.googleapis.com/9781522581000.jpg
246.750000 USD

Machine Learning and Cognitive Science Applications in Cyber Security

Hardback
Book cover image
Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP is often charged with ...
Protecting Information Assets and IT Infrastructure in the Cloud
Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP is often charged with keeping virtual infrastructure secure, it is not safe to assume this. Back-up measures must be taken. This book explains how to guard against cyber-attacks by adding another layer of protection to the most valuable data in the Cloud: customer information and trade secrets.
https://magrudy-assets.storage.googleapis.com/9781138393325.jpg
105.78 USD

Protecting Information Assets and IT Infrastructure in the Cloud

by Preston de Guise, Ravi Das
Hardback
Page 1 of 40