Résultats de recherche de titre
Articles 1 à 20 sur 2693
Building a cyber risk management program: Evolving security for the digital age
Par Brian Allen. 2024
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for…
designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for. You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance. This book helps you: understand the transformational changes digitalization is introducing, and new cyber risks that come with it; learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises; gain a complete understanding of four components that make up a formal cyber risk management program; and implement or provide guidance for a cyber risk management program within your enterpriseHacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun…
reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT (advanced package tool) to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. This book from Kim Crawley (8 Steps to Better Security) is written in a conversational style and organized from A to Z. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones. This book will help you understand the relationship between hacker culture and cybersecurity; get to know the ideas behind the hacker ethos, like "knowledge should be free"; explore topics and publications central to hacker culture, from 2600 Magazine to Cult of the Dead Cow; appreciate the history of cybersecurity; learn about key figures in the history of hacker culture; and understand the difference between hackers and cybercriminalsPen Testing from Contract to Report
Par Alfred Basta, Nadine Basta, Waqar Anwar. 2024
Pen Testing from Contractto Report Protect your system or web application with this accessible guide Penetration tests, also known as…
‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable vulnerabilities in a computer system or web application, averting potential user data breaches, privacy violations, losses of system function, and more. With system security an increasingly fundamental part of a connected world, it has never been more important that cyber professionals understand the pen test and its potential applications. Pen Testing from Contract to Report offers a step-by-step overview of the subject. Built around a new concept called the Penetration Testing Life Cycle, it breaks the process into phases, guiding the reader through each phase and its potential to expose and address system vulnerabilities. The result is an essential tool in the ongoing fight against harmful system intrusions. In Pen Testing from Contract to Report readers will also find: Content mapped to certification exams such as the CompTIA PenTest+Detailed techniques for evading intrusion detection systems, firewalls, honeypots, and moreAccompanying software designed to enable the reader to practice the concepts outlined, as well as end-of-chapter questions and case studies Pen Testing from Contract to Report is ideal for any cyber security professional or advanced student of cyber security.Becoming SRE
Par David N. Blank-Edelman. 2024
Do you wish the existing books on site reliability engineering started at the beginning? Do you wish someone would walk…
you through how to become an SRE, how to think like an SRE, or how to build and grow a successful SRE function in your organization? Becoming SRE addresses all of these needs and more with three interconnected sections: the essential groundwork for understanding SRE and SRE culture, advice for individuals on becoming an SRE, and guidance for organizations on creating and developing a thriving SRE practice. Acting as your personal and personable guide, author David Blank-Edelman takes you through subjects like: SRE mindset, SRE culture, and SRE advocacyWhat you need to get started and hired in SRE and what the job will be like when you get thereWhat you need to bring SRE into an organization and what is required for a good organizational fit so it can thrive thereHow to work with your business folks and management around SREHow SRE can grow and mature in an organization over time Ready to become an SRE or introduce SRE into your organization? This book is here to help.Cryptography: Algorithms, Protocols, and Standards for Computer Security
Par Zoubir Z. Mammeri. 2024
Cryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important aspects…
of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is wholly reliant on secure algorithms and protocols for establishing identity, protecting user data, and more. Groundbreaking recent developments in network communication and a changing digital landscape have been accompanied by similar advances in cryptography, which is more central to digital life than ever before. This book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics. The result is an indispensable introduction to the protocols and systems which should define cryptography for decades to come. Readers will also find: Over 450 problems with accompanying solutions to reinforce key concepts and test retention Detailed discussion of topics including symmetric and asymmetric algorithms, random number generation, user authentication, and many more Over 200 figures and tables that provide rich detail to the content Cryptography: Algorithms, Protocols, and Standards for Computer Security is ideal for undergraduate and graduate students in cryptography and information technology subjects, as well as for researchers looking for a working reference on existing cryptographic algorithms and protocols.Web Scraping with Python: Collecting More Data From The Modern Web
Par Ryan Mitchell. 2018
If programming is magic, then web scraping is surely a form of wizardry. By writing a simple automated program, you…
can query web servers, request data, and parse it to extract the information you need. This thoroughly updated third edition not only introduces you to web scraping but also serves as a comprehensive guide to scraping almost every type of data from the modern web.Part I focuses on web scraping mechanics: using Python to request information from a web server, performing basic handling of the server's response, and interacting with sites in an automated fashion. Part II explores a variety of more specific tools and applications to fit any web scraping scenario you're likely to encounter.Parse complicated HTML pagesDevelop crawlers with the Scrapy frameworkLearn methods to store the data you scrapeRead and extract data from documentsClean and normalize badly formatted dataRead and write natural languagesCrawl through forms and loginsScrape JavaScript and crawl through APIsUse and write image-to-text softwareAvoid scraping traps and bot blockersUse scrapers to test your websiteSmart Grid Security: An End-to-End View of Security in the New Electrical Grid
Par Gilbert N. Sorebo, Michael C. Echols. 2012
The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital…
concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid exReal-Life Decision-Making
Par Mats Danielson, Love Ekenberg. 2024
Have you ever experienced a decision situation that was hard to come to grips with? Did you ever feel a…
need to improve your decision-making skills? Is this something where you feel that you have not learned enough practical and useful methods? In that case, you are not alone! Even though decision-making is both considered and actually is a very important skill in modern work-life as well as in private life, these skills are not to any reasonable extent taught in schools at any level. No wonder many people do indeed feel the need to improve but have a hard time finding out how. This book is an attempt to remedy this shortcoming of our educational systems and possibly also of our common, partly intuition-based, decision culture. Intuition is not at all bad, quite the contrary, but it has to co-exist with rationality. We will show you how.Methods for decision-making should be of prime concern to any individual or organisation, even if the decision processes are not always explicitly or even consciously formulated. All kinds of organisations, as well as individuals, must continuously make decisions of the most varied nature in order to prosper and attain their objectives. A large part of the time spent in any organisation, not least at management levels, is spent gathering, processing, and compiling information for the purpose of making decisions supported by that information. The same interest has hitherto not been shown for individual decision-making, even though large gains would also be obtained at a personal level if important personal decisions were better deliberated. This book aims at changing that and thus attends to both categories of decision-makers.This book will take you through a journey starting with some history of decision-making and analysis and then go through easy-to-learn ways of structuring decision information and methods for analysing the decision situations, beginning with simple decision situations and then moving on to progressively harder ones, but never losing sight of the overarching goal that the reader should be able to follow the progression and being able to carry out similar decision analyses in real-life situations.The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.Organizational Crisis Management: The Human Factor
Par Gerald Lewis. 2006
Organizational Crisis Management: The Human Factor offers theoretical background and practical strategies for responding to workplace crises. Responding to a…
paradigm that focuses on the operational aspects of continuity to the detriment of human factors, this volume provides a comprehensive understanding of the unavoidable yet often complex reactiCriminal Investigation for the Professional Investigator (Professional Investigators Series)
Par Sonne Bcpi Cli, Sonne Bcpi Cli. 2006
Aimed at the busy professional who aspires to become certified in the field, Criminal Investigation for the Professional Investigator details…
essential techniques a trained investigator will be called upon to perform during the course of a career. The book is authored by a veteran of the NYPD who went on to launch and operate two successful private investigation agencies. It covers crime scenes, death investigations, the art of interrogation, and specific criminal investigations. It also provides important strategies for making arrests and testifying in courtrooms, details the most effective investigative tools to use, and explains the role of criminal defense investigators.Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings
Par Glenn P. McGovern. 2010
Drawn from case examples of incidents from around the world, Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract…
Killings, and Kidnappings is the most complete resource of information on the attack methodologies, tactics used, and groups responsible for targeted killings and kidnappings. The author, a former SWAT andInvestigating Computer-Related Crime
Par Peter Stephenson, Keith Gilbert. 2013
Since the last edition of this book was written more than a decade ago, cybercrime has evolved. Motives have not…
changed, but new means and opportunities have arisen with the advancement of the digital age. Investigating Computer-Related Crime: Second Edition incorporates the results of research and practice in a variety of venues, growth in the fiData Storytelling with Google Looker Studio: A hands-on guide to using Looker Studio for building compelling and effective dashboards
Par Sireesha Pulipati, Nicholas Kelly. 2022
Apply data storytelling concepts and analytical thinking to create dashboards and reports in Looker Studio to aid data-driven decision makingKey…
FeaturesGain a solid understanding of data visualization principles and learn to apply them effectivelyGet to grips with the concepts and features of Looker Studio to create powerful data storiesExplore the end-to-end process of building dashboards with the help of practical examplesBook DescriptionPresenting data visually makes it easier for organizations and individuals to interpret and analyze information. Looker Studio is an easy-to-use, collaborative tool that enables you to transform your data into engaging visualizations. This allows you to build and share dashboards that help monitor key performance indicators, identify patterns, and generate insights to ultimately drive decisions and actions. Data Storytelling with Looker Studio begins by laying out the foundational design principles and guidelines that are essential to creating accurate, effective, and compelling data visualizations. Next, you'll delve into features and capabilities of Looker Studio – from basic to advanced – and explore their application with examples. The subsequent chapters walk you through building dashboards with a structured three-stage process called the 3D approach using real-world examples that'll help you understand the various design and implementation considerations. This approach involves determining the objectives and needs of the dashboard, designing its key components and layout, and developing each element of the dashboard. By the end of this book, you will have a solid understanding of the storytelling approach and be able to create data stories of your own using Looker Studio.What you will learnUnderstand what storytelling with data means, and explore its various formsDiscover the 3D approach to building dashboards – determine, design, and developTest common data visualization pitfalls and learn how to mitigate themGet up and running with Looker Studio and leverage it to explore and visualize dataExplore the advanced features of Looker Studio with examplesBecome well-versed in the step-by-step process of the 3D approach using practical examplesMeasure and monitor the usage patterns of your Looker Studio reportsWho this book is forIf you are a beginner or an aspiring data analyst looking to understand the core concepts of data visualization and want to use Looker Studio for creating effective dashboards, this book is for you. No specific prior knowledge is needed to understand the concepts present in this book. Experienced data analysts and business intelligence developers will also find this book useful as a detailed guide to using Looker Studio as well as a refresher of core dashboarding concepts.Nine Black Robes: Inside the Supreme Court's Drive to the Right and Its Historic Consequences
Par Joan Biskupic. 2023
New York Times Editor's Choice"Biskupic, an accomplished and well-sourced journalist, knows the court as well as anyone now covering it...…
In her new book Biskupic has done something different and a good deal harder. She has written a group narrative that combines close accounts of the court's public business in the Trump years with a history of its private dramas and conflicts... The deeper message of 'Nine Black Robes' is that even with a new president in office we remain captive to the Age of Trump... A quiet urgency ripples through this informative, briskly paced and gracefully written book." —New York Times Book Review "Biskupic opens a window onto the opaque, insular world of the justices to show an institution sinking gradually into crisis . . . Biskupic is a longtime chronicler of the court, and "Nine Black Robes" puts on display her connections within its chambers." —Washington Post"[Biskupic] knows how to make news and illuminate the personalities atop the judicial org chart . . . The book reveals unseen sausage-making . . ." —Wall Street Journal"Fascinating and informative . . . [Biskupic's] long experience covering the court . . . has put her in an incomparable position to comment on its make-up, historical positions and direction. It has also made her privy to many significant, little-known secrets about Supreme Court personalities and their historical behaviors." —The National Book ReviewCNN Senior Supreme Court Analyst Joan Biskupic provides an urgent and inside look at the history-making era in the Supreme Court during the Trump and post-Trump years, from its seismic shift to the Right to its controversial decisions, including its reversal of Roe v. Wade, based on access to all the key players.Nine Black Robes displays the inner maneuverings among the Supreme Court justices that led to the seismic reversal of Roe v. Wade and a half century of women’s abortion rights. Biskupic details how rights are stripped away or, alternatively as in the case of gun owners, how rights are expanded. Today’s bench—with its conservative majority—is desperately ideological. The Court has been headed rightward and ensnared by its own intrigues for years, but the Trump appointments hastened the modern transformation. With unparalleled access to key players, Biskupic shows the tactics of each justice and reveals switched votes and internal pacts that typically never make the light of day, yet will have repercussions for generations to come.Nine Black Robes is the definitive narrative of the country’s highest court and its profound impact on all Americans.Modern Approaches in Machine Learning and Cognitive Science: Volume 4 (Studies in Computational Intelligence #1117)
Par Vinit Kumar Gunjan, Jacek M. Zurada, Ninni Singh. 2024
This book provides a systematic and comprehensive overview of cognitive intelligence and AI-enabled IoT ecosystem and machine learning, capable of…
recognizing the object pattern in complex and large data sets. A remarkable success has been experienced in the last decade by emulating the brain–computer interface. It presents the applied cognitive science methods and AI-enabled technologies that have played a vital role at the core of practical solutions for a wide scope of tasks between handheld apps and industrial process control, autonomous vehicles, IoT, intelligent learning environment, game theory, human computer interaction, environmental policies, life sciences, playing computer games, computational theory, and engineering development.The book contains contents highlighting artificial neural networks that are analogous to the networks of neurons that comprise the brain and have given computers the ability to distinguish an image of a cat from one of a coconut, to spot pedestrians with enough accuracy to direct a self-driving car, and to recognize and respond to the spoken word. The chapters in this book focus on audiences interested in artificial intelligence, machine learning, fuzzy, cognitive and neurofuzzy-inspired computational systems, their theories, mechanisms, and architecture, which underline human and animal behavior, and their application to conscious and intelligent systems. In the current version, it focuses on the successful implementation and step-by-step execution and explanation of practical applications of the domain. It also offers a wide range of inspiring and interesting cutting-edge contributions on applications of machine learning, artificial intelligence, and cognitive science such as healthcare products, AI-enabled IoT, gaming, medical, and engineering.Overall, this book provides valuable information on effective, cutting-edge techniques, and approaches for students, researchers, practitioners, and academics in the field of machine learning and cognitive science. Furthermore, the purpose of this book is to address the interests of a broad spectrum of practitioners, students, and researchers, who are interested in applying machine learning and cognitive science methods in their respective domains.This four-volume set constitutes the post-conference proceedings of the 9th EAI International Conference on e-Learning, e-Education, and Online Training, eLEOT…
2023, held in Yantai, China, during August 17-18, 2023.The 104 full papers presented were selected from 260 submissions. The papers reflect the evolving landscape of education in the digital age. They were organized in topical sections as follows: IT promoted teaching platforms and systems; AI based educational modes and methods; automatic educational resource processing; educational information evaluation.Proceedings of Data Analytics and Management: ICDAM 2023, Volume 1 (Lecture Notes in Networks and Systems #785)
Par Abhishek Swaroop, Zdzislaw Polkowski, Sérgio Duarte Correia, Bal Virdee. 2024
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at…
London Metropolitan University, London, UK, during June 2023. The book covers the topics in data analytics, data management, big data, computational intelligence, and communication networks. The book presents innovative work by leading academics, researchers, and experts from industry which is useful for young researchers and students. The book is divided into four volumes.This four-volume set constitutes the post-conference proceedings of the 9th EAI International Conference on e-Learning, e-Education, and Online Training, eLEOT…
2023, held in Yantai, China, during August 17-18, 2023.The 104 full papers presented were selected from 260 submissions. The papers reflect the evolving landscape of education in the digital age. They were organized in topical sections as follows: IT promoted teaching platforms and systems; AI based educational modes and methods; automatic educational resource processing; educational information evaluation.The Book of Chatbots: From ELIZA to ChatGPT
Par Robert Ciesla. 2024
Primitive software chatbots emerged in the 1960s, evolving swiftly through the decades and becoming able to provide engaging human-to-computer interactions…
sometime in the 1990s. Today, conversational technology is ubiquitous in many homes. Paired with web-searching abilities and neural networking, modern chatbots are capable of many tasks and are a major driving force behind machine learning and the quest for strong artificial intelligence, also known as artificial general intelligence (AGI).Sophisticated artificial intelligence is changing the online world as advanced software chatbots can provide customer service, research duties, and assist in healthcare. Modern chatbots have indeed numerous applications — including those of a malicious nature. They can write our essays, conduct autonomous scams, and potentially influence politics.The Book of Chatbots is both a retrospective and a review of current artificial intelligence-driven conversational solutions. It explores their appeal to businesses and individuals as well as their greater social aspects, including the impact on academia. The book explains all relevant concepts for readers with no previous knowledge in these topics. Unearthing the secrets of virtual assistants such as the (in)famous ChatGPT and many other exciting technologies, The Book of Chatbots is meant for anyone interested in the topic, laypeople and IT-enthusiasts alike.The book presents original contributions to the theories and practices of emerging internet, data, and web technologies and their applicability…
in businesses, engineering, and academia. As a key feature, it addresses advances in the life-cycle exploitation of data generated from the digital ecosystem data technologies that create value for the knowledge and businesses toward a collective intelligence approach.Internet has become the most proliferative platform for emerging large-scale computing paradigms. Among these, data and web technologies are two most prominent paradigms, in a variety of forms such as data centers, cloud computing, mobile cloud, and mobile web services. These technologies altogether create a digital ecosystem whose corner stone is the data cycle, from capturing to processing, analysis, and visualization. The investigation of various research and development issues in this digital ecosystem is boosted by the ever-increasing needs of real-life applications, which are based on storing and processing large amounts of data. Researchers, software developers, practitioners, and students interested in the field of data and web technologies will find this book useful and a reference for their activity.