Résultats de recherche de titre
Articles 61 à 80 sur 2734
Pen Testing from Contract to Report
Par Alfred Basta, Nadine Basta, Waqar Anwar. 2024
Pen Testing from Contractto Report Protect your system or web application with this accessible guide Penetration tests, also known as…
‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable vulnerabilities in a computer system or web application, averting potential user data breaches, privacy violations, losses of system function, and more. With system security an increasingly fundamental part of a connected world, it has never been more important that cyber professionals understand the pen test and its potential applications. Pen Testing from Contract to Report offers a step-by-step overview of the subject. Built around a new concept called the Penetration Testing Life Cycle, it breaks the process into phases, guiding the reader through each phase and its potential to expose and address system vulnerabilities. The result is an essential tool in the ongoing fight against harmful system intrusions. In Pen Testing from Contract to Report readers will also find: Content mapped to certification exams such as the CompTIA PenTest+Detailed techniques for evading intrusion detection systems, firewalls, honeypots, and moreAccompanying software designed to enable the reader to practice the concepts outlined, as well as end-of-chapter questions and case studies Pen Testing from Contract to Report is ideal for any cyber security professional or advanced student of cyber security.Becoming SRE
Par David N. Blank-Edelman. 2024
Do you wish the existing books on site reliability engineering started at the beginning? Do you wish someone would walk…
you through how to become an SRE, how to think like an SRE, or how to build and grow a successful SRE function in your organization? Becoming SRE addresses all of these needs and more with three interconnected sections: the essential groundwork for understanding SRE and SRE culture, advice for individuals on becoming an SRE, and guidance for organizations on creating and developing a thriving SRE practice. Acting as your personal and personable guide, author David Blank-Edelman takes you through subjects like: SRE mindset, SRE culture, and SRE advocacyWhat you need to get started and hired in SRE and what the job will be like when you get thereWhat you need to bring SRE into an organization and what is required for a good organizational fit so it can thrive thereHow to work with your business folks and management around SREHow SRE can grow and mature in an organization over time Ready to become an SRE or introduce SRE into your organization? This book is here to help.Rogers v. Rogers: The Battle for Control of Canada's Telecom Empire
Par Alexandra Posadzki. 2024
A riveting, deeply reported account that takes us inside the dramatic battle for control of Canada&’s largest wireless carrier, and…
paints a broader picture of the cutthroat telecom industry, the labyrinth of regulatory and political systems that govern it, and the high-stakes corporate games played by the Canadian establishment. Alexandra Posadzki&’s ground-breaking coverage in the Globe and Mail exposed one of the most spectacular boardroom and family dramas in Canadian corporate history—one that has pitted the company&’s extraordinarily powerful chairman and controlling shareholder, Edward Rogers, against not only his own management team but also the wishes of his mother and two of his sisters. Hanging in the balance is no less than the pending $20 billion acquisition of Shaw Communications, a historic deal that promises to transform Rogers into the truly national telecom empire that its late founder, Ted Rogers, always envisioned. Based on deeply sourced, investigative reporting of the iconic $30 billion publicly traded telecom and media giant, Posadzki takes us inside a company that touches the lives of millions of Canadians, challenging what we thought we knew about corporate governance and who really holds the power. Rogers v. Rogers is also a story of family legacy and succession, of an old guard pushing back at the new guard, and of a company struggling to find its footing in the wake of its legendary founder&’s death. At the heart of it all is a dispute between warring factions of the family over how they each interpret the desires of the late patriarch and the very identity of the company that bears their name.The WhatsApp India Story: Inside the Digital Maya Sphere
Par Sunetra Sen Narayan, Shalini Narayanan. 2024
WhatsApp is used by over half a billion people in India today in all fields – in business, corporate and…
informal sectors, in government, for education and among friends, families and acquaintances. This book critically explores the social messaging app’s rapid expansion in India and its growing influence and looks at whether, as a form of horizontal communication, it poses a challenge to more traditional structures of communication. The book examines WhatsApp’s spread in the personal and professional lives of Indians and the myriad ways in which people in India are using the app in social and business interactions, including among people living with disabilities. Using case studies, interviews, surveys and in-depth research, it analyses key aspects of WhatsApp’s massive popularity and its impact on how people communicate. It also explores its impact on the psycho-social dynamics in India, including the dissemination of fake news and politically motivated content, and the consequent need for media regulation in the country. One of the first books to analyse the pervasiveness of WhatsApp and social media apps in different areas of Indian society, this book will be of interest to scholars and students of media studies, communication studies, digital media, cultural studies, cyberculture studies, sociology and social policy and media law.Acing the System Design Interview
Par Zhiyong Tan. 2024
The system design interview is one of the hardest challenges you&’ll face in the software engineering hiring process. This practical…
book gives you the insights, the skills, and the hands-on practice you need to ace the toughest system design interview questions and land the job and salary you want.In Acing the System Design Interview you will master a structured and organized approach to present system design ideas like: Scaling applications to support heavy traffic Distributed transactions techniques to ensure data consistency Services for functional partitioning such as API gateway and service mesh Common API paradigms including REST, RPC, and GraphQL Caching strategies, including their tradeoffs Logging, monitoring, and alerting concepts that are critical in any system design Communication skills that demonstrate your engineering maturity Don&’t be daunted by the complex, open-ended nature of system design interviews! In this in-depth guide, author Zhiyong Tan shares what he&’s learned on both sides of the interview table. You&’ll dive deep into the common technical topics that arise during interviews and learn how to apply them to mentally perfect different kinds of systems. Foreword by Anthony Asta, Michael D. Elder. About the technology The system design interview is daunting even for seasoned software engineers. Fortunately, with a little careful prep work you can turn those open-ended questions and whiteboard sessions into your competitive advantage! In this powerful book, Zhiyong Tan reveals practical interview techniques and insights about system design that have earned developers job offers from Amazon, Apple, ByteDance, PayPal, and Uber. About the book Acing the System Design Interview is a masterclass in how to confidently nail your next interview. Following these easy-to-remember techniques, you&’ll learn to quickly assess a question, identify an advantageous approach, and then communicate your ideas clearly to an interviewer. As you work through this book, you&’ll gain not only the skills to successfully interview, but also to do the actual work of great system design. What's inside Insights on scaling, transactions, logging, and more Practice questions for core system design concepts How to demonstrate your engineering maturity Great questions to ask your interviewer About the reader For software engineers, software architects, and engineering managers looking to advance their careers. About the author Zhiyong Tan is a manager at PayPal. He has worked at Uber, Teradata, and at small startups. Over the years, he has been in many system design interviews, on both sides of the table. The technical editor on this book was Mohit Kumar. Table of Contents PART 1 1 A walkthrough of system design concepts 2 A typical system design interview flow 3 Non-functional requirements 4 Scaling databases 5 Distributed transactions 6 Common services for functional partitioning PART 2 7 Design Craigslist 8 Design a rate-limiting service 9 Design a notification/alerting service 10 Design a database batch auditing service 11 Autocomplete/typeahead 12 Design Flickr 13 Design a Content Distribution Network (CDN) 14 Design a text messaging app 15 Design Airbnb 16 Design a news feed 17 Design a dashboard of top 10 products on Amazon by sales volume Appendix A Monoliths vs. microservices Appendix B OAuth 2.0 authorization and OpenID Connect authentication Appendix C C4 Model Appendix D Two-phase commit (2PC)Blockchain Intelligent Systems: Protocols, Application and Approaches for Future Generation Computing
Par E. Golden Julie, Y. Harold Robinson, J. Jesu Vedha Nayahi, Thavavel Vaiyapuri. 2022
Blockchain provides an environment where technologies converge to provide numerous benefits. However, there are still many problems ahead, and changes…
are required at all levels - technology, algorithms, and human-computer interaction for widespread acceptance of blockchain intelligence systems. This book reviews blockchain technology and the current developments in research and business applications. It explores the real-time applications and issues that will bring the synergy needed to materialize the goal of blockchain intelligence. Researchers in various fields such as Blockchain, Data Analysis, IoT, Data Science, Crypto currencies will find this book useful. Students and professionals working on Blockchain in artificial intelligence, IoT, Healthcare, Robotics, Soft computing, and Data science will also benefit from this. It offers a realistic and thorough introduction that supports programmers, students and researchers in other disciplines. The book comprises chapters dealing with various issues, to provide readers with greater readability, versatility and adaptability.Dynamic Logic. New Trends and Applications: 5th International Workshop, DaLí 2023, Tbilisi, Georgia, September 15–16, 2023, Revised Selected Papers (Lecture Notes in Computer Science #14401)
Par Nina Gierasimczuk, Fernando R. Velázquez-Quesada. 2024
This book constitutes the revised selected papers of the 5th International Workshop on Dynamic Logic. New Trends and Applications, DaLí…
2023, held in Tbilisi, Georgia, during September 15–16, 2023. The 8 full papers in this book were carefully reviewed and selected from 10 submissions. They deal with new trends and applications in the area of Dynamic Logic.Adoption of Emerging Information and Communication Technology for Sustainability
Par Ewa Ziemba, Jarosław. 2024
This book represents an important voice in the discourse on the adoption of emerging ICT for sustainability. It focuses on…
how emerging ICT acts as a crucial enabler of sustainability, offering new forward-looking approaches to this field. The book explores how emerging ICT adoption drives sustainability efforts in business and public organizations, promoting ecological, economic, social, cultural, and political sustainability. The book's theoretical discussions, conceptual approaches, empirical studies, diverse perspectives, and views make it a valuable and comprehensive reference work. Appealing to both researchers and practitioners, this book provides significant areas for research and practice related to the contribution of emerging ICT adoption to sustainability. It also suggests vital considerations for programming and building sustainable development-driven emerging ICT adoption. Readers will find answers to important contemporary questions, such as: What are the concepts, frameworks, models, and approaches to enhance sustainable development through the adoption of emerging ICT? How does the adoption of emerging ICT influence sustainability? How can emerging ICT be adopted to enhance sustainability? What are the current practices and successful cases of emerging ICT adoption for sustainability? What factors influence emerging ICT adoption to enhance sustainability?Emerging Technologies in Electrical Engineering for Reliable Green Intelligence: Proceedings of ICSTACE 2023 (Lecture Notes in Electrical Engineering #1117)
Par Vasundhara Mahajan, Anandita Chowdhury, Sri Niwas Singh, Mohammad Shahidehpour. 2024
The book includes peer-reviewed papers from the International Conference on Sustainable Technology and Advanced Computing in Electrical Engineering (ICSTACE 2023).…
The main focus of the book is to provide the global perspective of sustainable research related to computer advancement in electrical engineering. This involves the areas related to sustainable development. This volume covers artificial intelligence, machine learning, the Internet of Things (IoT), cloud computing, big data analysis, blockchain, cyber security of the smart grid, etc. The book focuses on the areas related to sustainable development and includes research works from academicians and industry experts. The book discusses new challenges and provides solutions at the interface of technology, information, complex systems, and future research directions.Cryptocoding Based on Quasigroups (SpringerBriefs in Information Security and Cryptography)
Par Daniela Mechkaroska, Aleksandra Popovska-Mitrovikj, Verica Bakeva. 2024
This book presents the concept of cryptcoding which arises from the need to obtain secure and accurate transmission. Therefore, it…
is necessary to improve constantly existing and develop new algorithms that will ensure accurate and secure data transfer. This leads to the intensive development of coding theory and cryptography as scientific fields which solve these problems. To ensure efficient and secure data transmission at the same time, the concept of cryptcoding is developed such that the coding and encryption processes are merged into one process. Cryptcodes provide correction of a certain number of errors in the transmitted message and data confidentiality, using only one algorithm. The main research in this field is to define new algorithms for coding that detects and corrects errors, random codes, stream ciphers, block ciphers, pseudo-random generators, hash functions, etc. This monograph examines an application of quasigroups for designing error-correcting cryptcodes, called Random Codes Based on Quasigroups (RCBQ ). These codes are a combination of cryptographic algorithms and error-correcting codes and depend on several parameters. Some modifications (new coding/decoding algorithms) of RCBQ for improving their performances for transmission ordinary messages, images, and audio files trough a binary-symmetric channel, Gaussian channel, and burst channels are considered. Also, authors propose and analyze filter for visually enhance of the decoded images and improving the quality of decoded audio files.This book constitutes the refereed proceedings of the 19th International Conference on Formal Aspects of Component Software, FACS 2023, which took…
place virtually during October 19-20, 2023.The 11 full papers included in this book were carefully reviewed and selected from 23 submissions. They were organized in topical sections as follows: cloud computing, cyber-physical and critical systems, and the Internet of Things.The Mental Health of Gifted Intelligent Machines: AI and the Mirror of Human Psychology
Par John Senior, Éva Gyarmathy. 2024
The Mental Health of Gifted Intelligent Machines explores the increasingly sophisticated behaviours of developing AI and how we can ensure…
it will have emotional resilience, ethical strength and an ability to think in a new and enhanced way. Its primary aim is to change how we understand the world by investigating humanity as an intelligent being, examining and contrasting human and artificial intelligence. The book considers what we can learn from the likely mental health issues that will occur with increasingly sophisticated aspects of machine intelligence and how they will reflect the human condition. It asks questions about our identity in a deeply uncertain and disruptive ever-changing world; how we will improve and enhance our psychological intelligence to meet the increasing complications and demands of the future; and what we need to do, now, to be psychologically intelligent enough to live a full meaningful life in a new world evolving around us. The book argues that changes in our understanding of mental health, psychology and our view of intelligence will challenge huge aspects of our fundamental beliefs and assumptions and that it is essential we explore new arenas to further understand both our own human psychological issues and mental health as we develop gifted intelligent machines. It is a must read for all students, researchers and professionals involved with AI, gifted education, consciousness and mental health.Machine Intelligence for Research and Innovations: Proceedings of MAiTRI 2023, Volume 2 (Lecture Notes in Networks and Systems #831)
Par Om Prakash Verma, Lipo Wang, Rajesh Kumar, Anupam Yadav. 2024
The book is a collection of high-quality peer-reviewed research papers presented in the First International Conference on Machine Intelligence for…
Research and Innovations (MAiTRI 2023 Summit), held at Dr B R Ambedkar National Institute of Technology Jalandhar, Punjab, India during 1 – 3 September 2023. This book focuses on recent advancement in the theory and realization of machine intelligence (MI) and their tools and growing applications such as machine learning, deep learning, quantum machine learning, real-time computer vision, pattern recognition, natural language processing, statistical modelling, autonomous vehicles, human interfaces, computational intelligence, and robotics.Markov Decision Processes and Stochastic Positional Games: Optimal Control on Complex Networks (International Series in Operations Research & Management Science #349)
Par Dmitrii Lozovanu, Stefan Wolfgang Pickl. 2024
This book presents recent findings and results concerning the solutions of especially finite state-space Markov decision problems and determining Nash…
equilibria for related stochastic games with average and total expected discounted reward payoffs. In addition, it focuses on a new class of stochastic games: stochastic positional games that extend and generalize the classic deterministic positional games. It presents new algorithmic results on the suitable implementation of quasi-monotonic programming techniques. Moreover, the book presents applications of positional games within a class of multi-objective discrete control problems and hierarchical control problems on networks. Given its scope, the book will benefit all researchers and graduate students who are interested in Markov theory, control theory, optimization and games.Cryptography: Algorithms, Protocols, and Standards for Computer Security
Par Zoubir Z. Mammeri. 2024
Cryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important aspects…
of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is wholly reliant on secure algorithms and protocols for establishing identity, protecting user data, and more. Groundbreaking recent developments in network communication and a changing digital landscape have been accompanied by similar advances in cryptography, which is more central to digital life than ever before. This book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics. The result is an indispensable introduction to the protocols and systems which should define cryptography for decades to come. Readers will also find: Over 450 problems with accompanying solutions to reinforce key concepts and test retention Detailed discussion of topics including symmetric and asymmetric algorithms, random number generation, user authentication, and many more Over 200 figures and tables that provide rich detail to the content Cryptography: Algorithms, Protocols, and Standards for Computer Security is ideal for undergraduate and graduate students in cryptography and information technology subjects, as well as for researchers looking for a working reference on existing cryptographic algorithms and protocols.Web Scraping with Python: Collecting More Data From The Modern Web
Par Ryan Mitchell. 2018
If programming is magic, then web scraping is surely a form of wizardry. By writing a simple automated program, you…
can query web servers, request data, and parse it to extract the information you need. This thoroughly updated third edition not only introduces you to web scraping but also serves as a comprehensive guide to scraping almost every type of data from the modern web.Part I focuses on web scraping mechanics: using Python to request information from a web server, performing basic handling of the server's response, and interacting with sites in an automated fashion. Part II explores a variety of more specific tools and applications to fit any web scraping scenario you're likely to encounter.Parse complicated HTML pagesDevelop crawlers with the Scrapy frameworkLearn methods to store the data you scrapeRead and extract data from documentsClean and normalize badly formatted dataRead and write natural languagesCrawl through forms and loginsScrape JavaScript and crawl through APIsUse and write image-to-text softwareAvoid scraping traps and bot blockersUse scrapers to test your websiteSmart Grid Security: An End-to-End View of Security in the New Electrical Grid
Par Gilbert N. Sorebo, Michael C. Echols. 2012
The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital…
concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid exReal-Life Decision-Making
Par Mats Danielson, Love Ekenberg. 2024
Have you ever experienced a decision situation that was hard to come to grips with? Did you ever feel a…
need to improve your decision-making skills? Is this something where you feel that you have not learned enough practical and useful methods? In that case, you are not alone! Even though decision-making is both considered and actually is a very important skill in modern work-life as well as in private life, these skills are not to any reasonable extent taught in schools at any level. No wonder many people do indeed feel the need to improve but have a hard time finding out how. This book is an attempt to remedy this shortcoming of our educational systems and possibly also of our common, partly intuition-based, decision culture. Intuition is not at all bad, quite the contrary, but it has to co-exist with rationality. We will show you how.Methods for decision-making should be of prime concern to any individual or organisation, even if the decision processes are not always explicitly or even consciously formulated. All kinds of organisations, as well as individuals, must continuously make decisions of the most varied nature in order to prosper and attain their objectives. A large part of the time spent in any organisation, not least at management levels, is spent gathering, processing, and compiling information for the purpose of making decisions supported by that information. The same interest has hitherto not been shown for individual decision-making, even though large gains would also be obtained at a personal level if important personal decisions were better deliberated. This book aims at changing that and thus attends to both categories of decision-makers.This book will take you through a journey starting with some history of decision-making and analysis and then go through easy-to-learn ways of structuring decision information and methods for analysing the decision situations, beginning with simple decision situations and then moving on to progressively harder ones, but never losing sight of the overarching goal that the reader should be able to follow the progression and being able to carry out similar decision analyses in real-life situations.The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.Organizational Crisis Management: The Human Factor
Par Gerald Lewis. 2006
Organizational Crisis Management: The Human Factor offers theoretical background and practical strategies for responding to workplace crises. Responding to a…
paradigm that focuses on the operational aspects of continuity to the detriment of human factors, this volume provides a comprehensive understanding of the unavoidable yet often complex reactiCriminal Investigation for the Professional Investigator (Professional Investigators Series)
Par Sonne Bcpi Cli, Sonne Bcpi Cli. 2006
Aimed at the busy professional who aspires to become certified in the field, Criminal Investigation for the Professional Investigator details…
essential techniques a trained investigator will be called upon to perform during the course of a career. The book is authored by a veteran of the NYPD who went on to launch and operate two successful private investigation agencies. It covers crime scenes, death investigations, the art of interrogation, and specific criminal investigations. It also provides important strategies for making arrests and testifying in courtrooms, details the most effective investigative tools to use, and explains the role of criminal defense investigators.