Filter
(found 6510 products)
Book cover image
Architect scalable, reliable, and maintainable applications for enterprises with Python Key Features Explore various Python design patterns used for enterprise software development Apply best practices for testing and performance optimization to build stable applications Learn about different attacking strategies used on enterprise applications and how to avoid them Book DescriptionDynamically ...
Hands-On Enterprise Application Development with Python: Design data-intensive Application with Python 3
Architect scalable, reliable, and maintainable applications for enterprises with Python Key Features Explore various Python design patterns used for enterprise software development Apply best practices for testing and performance optimization to build stable applications Learn about different attacking strategies used on enterprise applications and how to avoid them Book DescriptionDynamically typed languages like Python are continuously improving. With the addition of exciting new features and a wide selection of modern libraries and frameworks, Python has emerged as an ideal language for developing enterprise applications. Hands-On Enterprise Application Development with Python will show you how to build effective applications that are stable, secure, and easily scalable. The book is a detailed guide to building an end-to-end enterprise-grade application in Python. You will learn how to effectively implement Python features and design patterns that will positively impact your application lifecycle. The book also covers advanced concurrency techniques that will help you build a RESTful application with an optimized frontend. Given that security and stability are the foundation for an enterprise application, you'll be trained on effective testing, performance analysis, and security practices, and understand how to embed them in your codebase during the initial phase. You'll also be guided in how to move on from a monolithic architecture to one that is service oriented, leveraging microservices and serverless deployment techniques. By the end of the book, you will have become proficient at building efficient enterprise applications in Python. What you will learn Understand the purpose of design patterns and their impact on application lifecycle Build applications that can handle large amounts of data-intensive operations Uncover advanced concurrency techniques and discover how to handle a large number of requests in production Optimize frontends to improve the client-side experience of your application Effective testing and performance profiling techniques to detect issues in applications early in the development cycle Build applications with a focus on security Implement large applications as microservices to improve scalability Who this book is forIf you're a developer who wants to build enterprise-grade applications, this book is for you. Basic to intermediate-level of programming experience with Python and database systems is required to understand the concepts covered in this book.
https://magrudy-assets.storage.googleapis.com/9781789532364.jpg
52.490000 USD

Hands-On Enterprise Application Development with Python: Design data-intensive Application with Python 3

by Saurabh Badhwar
Paperback / softback
Book cover image
The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers the basics of digital watermarking, its types, domain in which it is implemented and the application of machine learning algorithms onto digital watermarking Reviews hardware implementation of watermarking Discusses optimization problems and solutions ...
Digital Image Watermarking: Theoretical and Computational Advances
The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers the basics of digital watermarking, its types, domain in which it is implemented and the application of machine learning algorithms onto digital watermarking Reviews hardware implementation of watermarking Discusses optimization problems and solutions in watermarking with a special focus on bio-inspired algorithms Includes a case study along with its MATLAB code and simulation results
https://magrudy-assets.storage.googleapis.com/9781138390638.jpg
92.14 USD

Digital Image Watermarking: Theoretical and Computational Advances

by Nilanjan Dey, Rohit Thanki, Surekha Borra
Hardback
Book cover image
This book gathers selected papers from the Second International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in Chengdu, China on August 23-25, 2017. The symposium provided a platform of technical exchange and experience sharing for a broad range of experts, scholars ...
Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: The Second International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant
This book gathers selected papers from the Second International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in Chengdu, China on August 23-25, 2017. The symposium provided a platform of technical exchange and experience sharing for a broad range of experts, scholars and nuclear power practitioners. The book reflects the state of the art and latest trends in nuclear instrumentation and control system technologies, as well as China's growing influence in this area. It offers a valuable resource for both practitioners and academics working in the field of nuclear instrumentation, control systems and other safety-critical systems, as well as nuclear power plant managers, public officials and regulatory authorities.
https://magrudy-assets.storage.googleapis.com/9789811356308.jpg
262.490000 USD

Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems: The Second International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 10th International Conference on Ad Hoc Networks, ADHOCNETS 2018, held in Cairns, Australia, in September 2018. The 27 full papers were selected from 50 submissions and cover a variety of network paradigms including mobile ad hoc networks, sensor networks, vehicular networks, underwater ...
Ad Hoc Networks: 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings
This book constitutes the refereed proceedings of the 10th International Conference on Ad Hoc Networks, ADHOCNETS 2018, held in Cairns, Australia, in September 2018. The 27 full papers were selected from 50 submissions and cover a variety of network paradigms including mobile ad hoc networks, sensor networks, vehicular networks, underwater networks, airborne networks, underground networks, personal area networks, device-to-device (D2D) communications in 5G cellular networks, and home networks. The papers present a wide range of applications in civilian, commercial, and military areas.
https://magrudy-assets.storage.googleapis.com/9783030058876.jpg
75.600000 USD

Ad Hoc Networks: 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the Second EAI International Conference on Smart Grid and Internet of Things, SGIoT 2018, held in Niagara Falls, Canada, Ontario, in July 2018. The 14 papers presented were carefully reviewed and selected from 25 submissions and present research results on how to achieve ...
Smart Grid and Internet of Things: Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedings
This book constitutes the refereed proceedings of the Second EAI International Conference on Smart Grid and Internet of Things, SGIoT 2018, held in Niagara Falls, Canada, Ontario, in July 2018. The 14 papers presented were carefully reviewed and selected from 25 submissions and present research results on how to achieve more efficient use of resources based largely on IoT-based machine-to-machine interactions in the smart grit communication networks. The smart grid also encompasses IoT technologies, which monitor transmission lines, manage substations, integrate renewable energy generation (e.g., solar or wind), and utilize hybrid vehicle batteries. Through these technologies, the authorities can smartly identify outage problems, and intelligently schedule the power generation and delivery to the customers
https://magrudy-assets.storage.googleapis.com/9783030059279.jpg
63.000000 USD

Smart Grid and Internet of Things: Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the proceedings of the 8th Enterprise Engineering Working Conference, EEWC 2018, held in Luxembourg, Luxembourg, in May/June 2018. EEWC aims at addressing the challenges that modern and complex enterprises are facing in a rapidly changing world. The participants of the working conference share a belief that dealing ...
Advances in Enterprise Engineering XII: 8th Enterprise Engineering Working Conference, EEWC 2018, Luxembourg, Luxembourg, May 28 - June 1, 2018, Proceedings
This book constitutes the proceedings of the 8th Enterprise Engineering Working Conference, EEWC 2018, held in Luxembourg, Luxembourg, in May/June 2018. EEWC aims at addressing the challenges that modern and complex enterprises are facing in a rapidly changing world. The participants of the working conference share a belief that dealing with these challenges requires rigorous and scientific solutions, focusing on the design and engineering of enterprises. The goal of EEWC is to stimulate interaction between the different stakeholders, scientists as well as practitioners, interested in making Enterprise Engineering a reality. The 9 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 24 submissions. They were organized in topical sections named: on architecture; on security and blockchain; on DEMO; and on teaching.
https://magrudy-assets.storage.googleapis.com/9783030060961.jpg
62.990000 USD

Advances in Enterprise Engineering XII: 8th Enterprise Engineering Working Conference, EEWC 2018, Luxembourg, Luxembourg, May 28 - June 1, 2018, Proceedings

Paperback / softback
Book cover image
The book comprises selected papers presented at the International Conference on Advanced Computing, Networking and Informatics (ICANI 2018), organized by Medi-Caps University, India. It includes novel and original research work on advanced computing, networking and informatics, and discusses a wide variety of industrial, engineering and scientific applications of the emerging ...
International Conference on Advanced Computing Networking and Informatics: ICANI-2018
The book comprises selected papers presented at the International Conference on Advanced Computing, Networking and Informatics (ICANI 2018), organized by Medi-Caps University, India. It includes novel and original research work on advanced computing, networking and informatics, and discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques in the field of computing and networking.
https://magrudy-assets.storage.googleapis.com/9789811326721.jpg
230.990000 USD

International Conference on Advanced Computing Networking and Informatics: ICANI-2018

Paperback / softback
Book cover image
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know ...
Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime. The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt. What You Will Learn Carry out basic scanning with NMAP Invoke NMAP from Python Use vulnerability scanning and reporting with OpenVAS Master common commands in Metasploit Who This Book Is For Readers new to penetration testing who would like to get a quick start on it.
https://magrudy-assets.storage.googleapis.com/9781484242698.jpg
34.640000 USD

Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit

by Sagar Rahalkar
Paperback / softback
Book cover image
Spring Framework has been making Java developers more productive and successful for over a dozen years, and it shows no signs of slowing down! Spring in Action, 5th Edition is the fully-updated revision of Manning's bestselling Spring in Action. This new edition includes all Spring 5.0 updates, along with new ...
Spring in Action, Fifth Edition
Spring Framework has been making Java developers more productive and successful for over a dozen years, and it shows no signs of slowing down! Spring in Action, 5th Edition is the fully-updated revision of Manning's bestselling Spring in Action. This new edition includes all Spring 5.0 updates, along with new examples on reactive programming, Spring WebFlux, and microservices. Readers will also find the latest Spring best practices, including Spring Boot for application setup and configuration. Key Features * Developing reactive applications with Spring * Building applications with Spring and Spring Boot * Spring MVC for web apps and RESTful web services * Writing Spring-enabled data repositories Audience Written for intermediate Java developers. Author Bio Craig Walls is a software developer at Pivotal. He's a popular author and frequent speaker at user groups and conferences.
https://magrudy-assets.storage.googleapis.com/9781617294945.jpg
64.83 USD

Spring in Action, Fifth Edition

by Craig Walls
Paperback / softback
Book cover image
This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today's rapidly-evolving computing technologies and ever-changing communication ecosystems. This ...
Ethical and Secure Computing: A Concise Module
This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today's rapidly-evolving computing technologies and ever-changing communication ecosystems. This updated second edition features new material on information security, intellectual property rights, the Internet of Things, and 5G technologies. Topics and features: introduces a philosophical framework and tools for understanding and analyzing computer ethics in personal, public, and professional spheres; describes the impact of computer technology on issues of security, privacy, anonymity, and civil liberties; examines intellectual property rights in the context of computing, including the risks and liabilities associated with software; discusses such key social issues in computing as the digital divide, employee monitoring in the workplace, and risks to physical and mental health; reviews the history of computer crime, and the threat of digitally facilitated bullying, harassment, and discrimination; considers the ethical challenges arising from online social networks, mobile telecommunications, virtual reality, the Internet of Things, and 5G technologies; includes learning objectives, discussion questions and exercises throughout the book. This concise and accessible work addresses the critical ethical and moral issues important to all designers and users of computer technologies. The text incorporates the latest curricula requirements for undergraduate courses in computer science, and offers invaluable insights into the social impact and legal challenges posed by the latest generation of computing devices and networks.
https://magrudy-assets.storage.googleapis.com/9783030039363.jpg
56.29 USD

Ethical and Secure Computing: A Concise Module

by Joseph Migga Kizza
Paperback / softback
Book cover image
This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including . Giving readers an in-depth introduction to different ...
Cryptographic and Information Security Approaches for Images and Videos
This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including . Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques.
https://magrudy-assets.storage.googleapis.com/9781138563841.jpg
189.40 USD

Cryptographic and Information Security Approaches for Images and Videos

by S. Ramakrishnan
Hardback
Book cover image
Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, ...
CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers
Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program. CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the tough battle. Todd has also, for the first time, adapted the McKinsey 7S framework (strategy, structure, systems, shared values, staff, skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization, capable of industry/ peer award-winning recognition, enhance cybersecurity maturity, gain confidence by senior management, and avoid pitfalls. The book is a comprehensive, soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy, emerging trends and technologies, cybersecurity organization structure and reporting models, leveraging current incidents, security control frameworks, risk management, laws and regulations, data protection and privacy, meaningful policies and procedures, multi-generational workforce team dynamics, soft skills, and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity.
https://magrudy-assets.storage.googleapis.com/9781498740449.jpg
105.78 USD

CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

by Todd Fitzgerald
Hardback
Book cover image
This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. ...
Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings
This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,. This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It's also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.
https://magrudy-assets.storage.googleapis.com/9783030021092.jpg
89.240000 USD

Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings

by Cliff Wang, Kevin W. Hamlen, Jinpeng Wei, Ehab Al-Shaer
Hardback
Book cover image
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss ...
Cyber-Physical Systems Security
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.
https://magrudy-assets.storage.googleapis.com/9783319989341.jpg
167.990000 USD

Cyber-Physical Systems Security

Hardback
Book cover image
Get into the world of smart data security using machine learning algorithms and Python libraries Key Features Learn machine learning algorithms and cybersecurity fundamentals Automate your daily workflow by applying use cases to many facets of security Implement smart machine learning solutions to detect various cybersecurity problems Book DescriptionCyber threats ...
Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem
Get into the world of smart data security using machine learning algorithms and Python libraries Key Features Learn machine learning algorithms and cybersecurity fundamentals Automate your daily workflow by applying use cases to many facets of security Implement smart machine learning solutions to detect various cybersecurity problems Book DescriptionCyber threats today are one of the costliest losses that an organization can face. In this book, we use the most efficient tool to solve the big problems that exist in the cybersecurity domain. The book begins by giving you the basics of ML in cybersecurity using Python and its libraries. You will explore various ML domains (such as time series analysis and ensemble modeling) to get your foundations right. You will implement various examples such as building system to identify malicious URLs, and building a program to detect fraudulent emails and spam. Later, you will learn how to make effective use of K-means algorithm to develop a solution to detect and alert you to any malicious activity in the network. Also learn how to implement biometrics and fingerprint to validate whether the user is a legitimate user or not. Finally, you will see how we change the game with TensorFlow and learn how deep learning is effective for creating models and training systems What you will learn Use machine learning algorithms with complex datasets to implement cybersecurity concepts Implement machine learning algorithms such as clustering, k-means, and Naive Bayes to solve real-world problems Learn to speed up a system using Python libraries with NumPy, Scikit-learn, and CUDA Understand how to combat malware, detect spam, and fight financial fraud to mitigate cyber crimes Use TensorFlow in the cybersecurity domain and implement real-world examples Learn how machine learning and Python can be used in complex cyber issues Who this book is forThis book is for the data scientists, machine learning developers, security researchers, and anyone keen to apply machine learning to up-skill computer security. Having some working knowledge of Python and being familiar with the basics of machine learning and cybersecurity fundamentals will help to get the most out of the book
https://magrudy-assets.storage.googleapis.com/9781788992282.jpg
47.240000 USD

Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem

by Sinan Ozdemir, Soma Halder
Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions. The contributions are covering the following topics: deep neural networks ...
Digital Forensics and Watermarking: 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings
This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions. The contributions are covering the following topics: deep neural networks for digital forensics; steganalysis and identification; watermarking; reversible data hiding; steganographic algorithms; identification and security; deep generative models for forgery and its detection.
https://magrudy-assets.storage.googleapis.com/9783030113889.jpg
83.990000 USD

Digital Forensics and Watermarking: 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings

Paperback / softback
Book cover image
There's a lot of information about big data technologies, but splicing these technologies into an end-to-end enterprise data platform is a daunting task not widely covered. With this practical book, you'll learn how to build big data infrastructure both on-premises and in the cloud and successfully architect a modern data ...
Architecting Modern Data Platforms
There's a lot of information about big data technologies, but splicing these technologies into an end-to-end enterprise data platform is a daunting task not widely covered. With this practical book, you'll learn how to build big data infrastructure both on-premises and in the cloud and successfully architect a modern data platform. Ideal for enterprise architects, IT managers, application architects, and data engineers, this book shows you how to overcome the many challenges that emerge during Hadoop projects. You'll explore the vast landscape of tools available in the Hadoop and big data realm in a thorough technical primer before diving into: Infrastructure: Look at all component layers in a modern data platform, from the server to the data center, to establish a solid foundation for data in your enterprise Platform: Understand aspects of deployment, operation, security, high availability, and disaster recovery, along with everything you need to know to integrate your platform with the rest of your enterprise IT Taking Hadoop to the cloud: Learn the important architectural aspects of running a big data platform in the cloud while maintaining enterprise security and high availability
https://magrudy-assets.storage.googleapis.com/9781491969274.jpg
122.84 USD

Architecting Modern Data Platforms

by Lars George
Paperback / softback
Book cover image
This book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on the Arithmetic of Finite Field, WAIFI 2018, held in Bergen, Norway, in June 2018. The 14 revised full papers and six invited talks presented were carefully reviewed and selected from 26 submissions. The papers are organized ...
Arithmetic of Finite Fields: 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers
This book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on the Arithmetic of Finite Field, WAIFI 2018, held in Bergen, Norway, in June 2018. The 14 revised full papers and six invited talks presented were carefully reviewed and selected from 26 submissions. The papers are organized in topical sections on invited talks; elliptic curves; hardware implementations; arithmetic and applications of finite fields and cryptography.
https://magrudy-assets.storage.googleapis.com/9783030051525.jpg
73.490000 USD

Arithmetic of Finite Fields: 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers

Paperback / softback
Book cover image
This book constitutes the proceedings of the First International Conference on Smart Multimedia, ICSM 2018, which was held in Toulon, France, in August 2018. The 39 papers presented were selected from about 100 submissions and are grouped in sections on social, affective and cognition analysis, person-centered smart multimedia: serving people ...
Smart Multimedia: First International Conference, ICSM 2018, Toulon, France, August 24-26, 2018, Revised Selected Papers
This book constitutes the proceedings of the First International Conference on Smart Multimedia, ICSM 2018, which was held in Toulon, France, in August 2018. The 39 papers presented were selected from about 100 submissions and are grouped in sections on social, affective and cognition analysis, person-centered smart multimedia: serving people with disabilities to the general population, haptic and robots for smart multimedia applications, MR, 3D, underwater image processing, smart signal processing meets smart sensing, visual behavior analysis: methods and applications, video analysis, learning, low-level vision, miscellaneous.
https://magrudy-assets.storage.googleapis.com/9783030043742.jpg
94.490000 USD

Smart Multimedia: First International Conference, ICSM 2018, Toulon, France, August 24-26, 2018, Revised Selected Papers

Paperback / softback
Book cover image
Get hands-on experience on concepts of Bug Bounty Hunting Key Features Get well-versed with the fundamentals of Bug Bounty Hunting Hands-on experience on using different tools for bug hunting Learn to write a bug bounty report according to the different vulnerabilities and its analysis Book DescriptionBug bounty programs are the ...
Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty programs
Get hands-on experience on concepts of Bug Bounty Hunting Key Features Get well-versed with the fundamentals of Bug Bounty Hunting Hands-on experience on using different tools for bug hunting Learn to write a bug bounty report according to the different vulnerabilities and its analysis Book DescriptionBug bounty programs are the deals offered by prominent companies where-in any white-hat hacker can find bugs in the applications and they will have a recognition for the same. The number of prominent organizations having this program has increased gradually leading to a lot of opportunity for Ethical Hackers. This book will initially start with introducing you to the concept of Bug Bounty hunting. Then we will dig deeper into concepts of vulnerabilities and analysis such as HTML injection, CRLF injection and so on. Towards the end of the book, we will get hands-on experience working with different tools used for bug hunting and various blogs and communities to be followed. This book will get you started with bug bounty hunting and its fundamentals. What you will learn Learn the basics of bug bounty hunting Hunt bugs in web applications Hunt bugs in Android applications Analyze the top 300 bug reports Discover bug bounty hunting research methodologies Explore different tools used for Bug Hunting Who this book is forThis book is targeted towards white-hat hackers, or anyone who wants to understand the concept behind bug bounty hunting and understand this brilliant way of penetration testing. This book does not require any knowledge on bug bounty hunting.
https://magrudy-assets.storage.googleapis.com/9781788626897.jpg
41.990000 USD

Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty programs

by Shahmeer Amir, Carlos A. Lozano
Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 14th International Joint Conference on E-Business and Telecommunications, ICETE 2017, held in Madrid, Spain, in July 2017. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, ...
E-Business and Telecommunications: 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper
This book constitutes the refereed proceedings of the 14th International Joint Conference on E-Business and Telecommunications, ICETE 2017, held in Madrid, Spain, in July 2017. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS. The 17 full papers presented were carefully reviewed and selected from 195 submissions. The papers cover the following key areas of information and communication technologies, including data communication and networking, e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless networks and mobile systems.
https://magrudy-assets.storage.googleapis.com/9783030110383.jpg
104.990000 USD

E-Business and Telecommunications: 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper

Paperback / softback
Book cover image
This book constitutes the thoroughly refereed post-workshop proceedings of the 26th International Workshop on Security Protocols, held in Cambridge, UK, in March 2018. The volume consists of 17 thoroughly revised invited papers presented together with the respective transcripts of discussions. The theme of this year's workshop was fail-safe and fail-deadly ...
Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers
This book constitutes the thoroughly refereed post-workshop proceedings of the 26th International Workshop on Security Protocols, held in Cambridge, UK, in March 2018. The volume consists of 17 thoroughly revised invited papers presented together with the respective transcripts of discussions. The theme of this year's workshop was fail-safe and fail-deadly concepts in protocol design. The topics covered included failures and attacks; novel protocols; threat models and incentives; cryptomoney; and the interplay of cryptography and dissent.
https://magrudy-assets.storage.googleapis.com/9783030032500.jpg
83.990000 USD

Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers

Paperback / softback
Book cover image
This book constitutes the proceedings of the 15th International Conference on Distributed Computing and Internet Technology, ICDCIT 2019, held in Bhubaneswar, India, in January 2019. The 18 full papers and 14 short papers presented together with 5 invited papers were carefully reviewed and selected from 115 submissions. The papers present ...
Distributed Computing and Internet Technology: 15th International Conference, ICDCIT 2019, Bhubaneswar, India, January 10-13, 2019, Proceedings
This book constitutes the proceedings of the 15th International Conference on Distributed Computing and Internet Technology, ICDCIT 2019, held in Bhubaneswar, India, in January 2019. The 18 full papers and 14 short papers presented together with 5 invited papers were carefully reviewed and selected from 115 submissions. The papers present research in three areas: distributed computing, Internet technologies, and societal applications.
https://magrudy-assets.storage.googleapis.com/9783030053659.jpg
94.490000 USD

Distributed Computing and Internet Technology: 15th International Conference, ICDCIT 2019, Bhubaneswar, India, January 10-13, 2019, Proceedings

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 6th International Symposium on Security in Computing and Communications, SSCC 2018, held in Bangalore, India, in September 2018. The 34 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 94 submissions. The papers cover wide research ...
Security in Computing and Communications: 6th International Symposium, SSCC 2018, Bangalore, India, September 19-22, 2018, Revised Selected Papers
This book constitutes the refereed proceedings of the 6th International Symposium on Security in Computing and Communications, SSCC 2018, held in Bangalore, India, in September 2018. The 34 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 94 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.
https://magrudy-assets.storage.googleapis.com/9789811358258.jpg
136.490000 USD

Security in Computing and Communications: 6th International Symposium, SSCC 2018, Bangalore, India, September 19-22, 2018, Revised Selected Papers

Paperback / softback
Book cover image
This book constitutes revised selected papers from the workshops held at 24th International Conference on Parallel and Distributed Computing, Euro-Par 2018, which took place in Turin, Italy, in August 2018. The 64 full papers presented in this volume were carefully reviewed and selected from 109 submissions. Euro-Par is an annual, ...
Euro-Par 2018: Parallel Processing Workshops: Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papers
This book constitutes revised selected papers from the workshops held at 24th International Conference on Parallel and Distributed Computing, Euro-Par 2018, which took place in Turin, Italy, in August 2018. The 64 full papers presented in this volume were carefully reviewed and selected from 109 submissions. Euro-Par is an annual, international conference in Europe, covering all aspects of parallel and distributed processing. These range from theory to practice, from small to the largest parallel and distributed systems and infrastructures, from fundamental computational problems to full-edged applications, from architecture, compiler, language and interface design and implementation to tools, support infrastructures, and application performance aspects.
https://magrudy-assets.storage.googleapis.com/9783030105488.jpg
136.490000 USD

Euro-Par 2018: Parallel Processing Workshops: Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papers

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2017, held in Jeju Island, Republic of Korea, in October 2017. The 13 revised full papers along with a short paper presented were carefully reviewed and selected from 44 submissions. They are closely related ...
Mobile Internet Security: Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19-22, 2017, Revised Selected Papers
This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2017, held in Jeju Island, Republic of Korea, in October 2017. The 13 revised full papers along with a short paper presented were carefully reviewed and selected from 44 submissions. They are closely related to various theories and practical applications in mobility management to highlight the state-of-the-art research.
https://magrudy-assets.storage.googleapis.com/9789811337314.jpg
78.740000 USD

Mobile Internet Security: Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19-22, 2017, Revised Selected Papers

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology in India, INDOCRYPT 2018, held in New Delhi, India, in December 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The focus of the conference includes works on ...
Progress in Cryptology - INDOCRYPT 2018: 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology in India, INDOCRYPT 2018, held in New Delhi, India, in December 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The focus of the conference includes works on outsourced computation and searchable encryption; symmetric key cryptography and format preserving encryption; fault attacks and Hash functions; post quantum cryptography; asymmetric key cryptography and cryptanalysis; symmetric key cryptanalysis; theory; and secure computations and protocols.
https://magrudy-assets.storage.googleapis.com/9783030053772.jpg
83.990000 USD

Progress in Cryptology - INDOCRYPT 2018: 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings

Paperback / softback
Book cover image
This book paves the way for researchers working on the sustainable interdependent networks spread over the fields of computer science, electrical engineering, and smart infrastructures. It provides the readers with a comprehensive insight to understand an in-depth big picture of smart cities as a thorough example of interdependent large-scale networks ...
Sustainable Interdependent Networks II: From Smart Power Grids to Intelligent Transportation Networks
This book paves the way for researchers working on the sustainable interdependent networks spread over the fields of computer science, electrical engineering, and smart infrastructures. It provides the readers with a comprehensive insight to understand an in-depth big picture of smart cities as a thorough example of interdependent large-scale networks in both theory and application aspects. The contributors specify the importance and position of the interdependent networks in the context of developing the sustainable smart cities and provide a comprehensive investigation of recently developed optimization methods for large-scale networks. There has been an emerging concern regarding the optimal operation of power and transportation networks. In the second volume of Sustainable Interdependent Networks book, we focus on the interdependencies of these two networks, optimization methods to deal with the computational complexity of them, and their role in future smart cities. We further investigate other networks, such as communication networks, that indirectly affect the operation of power and transportation networks. Our reliance on these networks as global platforms for sustainable development has led to the need for developing novel means to deal with arising issues. The considerable scale of such networks, due to the large number of buses in smart power grids and the increasing number of electric vehicles in transportation networks, brings a large variety of computational complexity and optimization challenges. Although the independent optimization of these networks lead to locally optimum operation points, there is an exigent need to move towards obtaining the globally-optimum operation point of such networks while satisfying the constraints of each network properly. The book is suitable for senior undergraduate students, graduate students interested in research in multidisciplinary areas related to future sustainable networks, and the researchers working in the related areas. It also covers the application of interdependent networks which makes it a perfect source of study for audience out of academia to obtain a general insight of interdependent networks.
https://magrudy-assets.storage.googleapis.com/9783319989228.jpg
188.990000 USD

Sustainable Interdependent Networks II: From Smart Power Grids to Intelligent Transportation Networks

Hardback
Book cover image
Cyber-risks are moving targets and societal responses to combat cyber-victimization are often met by the distrust of young people. Drawing on original research, this book explores how young people define, perceive, and experience cyber-risks, how they respond to both the messages they are receiving from society regarding their safety online, ...
Cyber-risk and Youth: Digital Citizenship, Privacy and Surveillance
Cyber-risks are moving targets and societal responses to combat cyber-victimization are often met by the distrust of young people. Drawing on original research, this book explores how young people define, perceive, and experience cyber-risks, how they respond to both the messages they are receiving from society regarding their safety online, and the various strategies and practices employed by society in regulating their online access and activities. This book complements existing quantitative examinations of cyberbullying assessing its extent and frequency, but also aims to critique and extend knowledge of how cyber-risks such as cyberbullying are perceived and responded to. Following a discussion of their methodology and their experiences of conducting research with teens, the authors discuss the social network services that teens are using and what they find appealing about them, and address teens' experiences with and views towards parental and school-based surveillance. The authors then turn directly to areas of concern expressed by their participants, such as relational aggression, cyberhacking, privacy, and privacy management, as well as sexting. The authors conclude by making recommendations for policy makers, educators and teens - not only by drawing from their own theoretical and sociological interpretations of their findings, but also from the responses and recommendations given by their participants about going online and tackling cyber-risk. One of the first texts to explore how young people respond to attempts to regulate online activity, this book will be key reading for those involved in research and study surrounding youth crime, cybercrime, youth culture, media and crime, and victimology - and will inform those interested in addressing youth safety online how to best approach what is often perceived as a sensitive and volatile social problem.
https://magrudy-assets.storage.googleapis.com/9781138067387.jpg
196.22 USD

Cyber-risk and Youth: Digital Citizenship, Privacy and Surveillance

by Rosemary Ricciardelli, Michael C. Adorjan
Hardback
Book cover image
This book constitutes revised selected papers from the 13th International Conference on Critical Information Infrastructures Security, CRITIS 2018, held in Kaunas, Lithuania, in September 2018.The 16 full papers and 3 short papers presented were carefully reviewed and selected from 61 submissions. They are grouped in the following topical sections: advanced ...
Critical Information Infrastructures Security: 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers
This book constitutes revised selected papers from the 13th International Conference on Critical Information Infrastructures Security, CRITIS 2018, held in Kaunas, Lithuania, in September 2018.The 16 full papers and 3 short papers presented were carefully reviewed and selected from 61 submissions. They are grouped in the following topical sections: advanced analysis of critical energy systems, strengthening urban resilience, securing internet of things and industrial control systems, need and tool sets for industrial control system security, and advancements in governance and resilience of critical infrastructures.
https://magrudy-assets.storage.googleapis.com/9783030058487.jpg
73.490000 USD

Critical Information Infrastructures Security: 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers

Paperback / softback
Page 1 of 40