Résultats de recherche de titre
Articles 1 à 20 sur 2560
Building a cyber risk management program: Evolving security for the digital age
Par Brian Allen. 2024
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for…
designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for. You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance. This book helps you: understand the transformational changes digitalization is introducing, and new cyber risks that come with it; learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises; gain a complete understanding of four components that make up a formal cyber risk management program; and implement or provide guidance for a cyber risk management program within your enterpriseWordPress All-in-One For Dummies
Par Lisa Sabin-Wilson. 2024
The no-nonsense guide to building your own WordPress site With the help of WordPress All-in-One For Dummies, you can get…
your first WordPress blog or website set up in no time. Fully updated for the latest WordPress releases, this 8-books-in-1 guide walks you through all the features of this powerful web builder. You’ll discover how to choose and customize a theme, pick the perfect web host and URL, and manage multiple websites with multiple authors. Use WordPress as a content management software (CMS) platform, work with multimedia formats, and add plugins to your site. With state-of-the-art features, WordPress has become the go-to platform for website owners and bloggers who want to be noticed. This beginner-friendly Dummies guide gives you the know-how to make WordPress work for you. Build a website or blog with WordPress, the leading open-source web builder Discover the powerful, customizable features of the latest versions of WordPress Allow multiple people to contribute to your site and keep your content organized Easily make changes and modifications with the WordPress interface Both WordPress novices and more experienced users looking to dive into new features will love the easy-to-follow instructions and tips in WordPress All-in-One For Dummies.In his bestselling first book, Eric Siegel explained how machine learning works. Now, in The AI Playbook, he shows how…
to capitalize on it.&“Eric Siegel delivers a robust primer on machine learning, the key mechanism in AI. A forward-looking, practical book and a must-read for anyone in the information economy.&” —Scott Galloway, NYU Stern Professor of Marketing; bestselling author of The Four &“An antidote to today&’s relentless AI hype—why some AI initiatives thrive while others fail and what it takes for companies and people to succeed.&”—Charles Duhigg, author of bestsellers The Power of Habit and Smarter Faster BetterThe greatest tool is the hardest to use. Machine learning is the world&’s most important general-purpose technology—but it&’s notoriously difficult to launch. Outside Big Tech and a handful of other leading companies, machine learning initiatives routinely fail to deploy, never realizing value. What&’s missing? A specialized business practice suitable for wide adoption. In The AI Playbook, bestselling author Eric Siegel presents the gold-standard, six-step practice for ushering machine learning projects from conception to deployment. He illustrates the practice with stories of success and of failure, including revealing case studies from UPS, FICO, and prominent dot-coms. This disciplined approach serves both sides: It empowers business professionals, and it establishes a sorely needed strategic framework for data professionals. Beyond detailing the practice, this book also upskills business professionals—painlessly. It delivers a vital yet friendly dose of semi-technical background knowledge that all stakeholders need to lead or participate in machine learning projects, end to end. This puts business and data professionals on the same page so that they can collaborate deeply, jointly establishing precisely what machine learning is called upon to predict, how well it predicts, and how its predictions are acted upon to improve operations. These essentials make or break each initiative—getting them right paves the way for machine learning&’s value-driven deployment.What kind of AI does this book cover? The buzzword AI can mean many things, but this book is about machine learning, which is a central basis for—and what many mean by—AI. To be specific, this book covers the most vital use cases of machine learning, those designed to improve a wide range of business operations.An Introduction to Cyberpsychology (BPS Core Textbooks Series)
Par Gráinne Kirwan, Irene Connolly, Hannah Barton, and Marion Palmer. 2024
An Introduction to Cyberpsychology provides a comprehensive introduction to this rapidly growing discipline. Fully updated in its second edition, the…
book encourages students to critically evaluate the psychology of online interactions and to develop appropriate research methodologies to complete their own work in this field.The book examines cyberpsychology and online research methodologies, social psychology in an online context, practical applications of cyberpsychology, and the psychological aspects of other technologies. This new edition has been carefully updated to include additional coverage of: Expanded content relating to major developments in the field and new content on gaming and screentime A new chapter examining the relationship between older adults and technology Cyberpsychology in focus feature boxes in each chapter that examine topics in depth Interviews with professionals working in fields relating to cyberpsychology Each chapter includes key terms and a glossary, content summaries, discussion questions, and recommended reading to guide further study.Supported by extensive online resources for students and instructors, this authoritative book is an essential core text for undergraduate modules in cyberpsychology, and an ideal primer for students of postgraduate programs in cyberpsychology.To view the additional student and instructor resources for this book, please visit bpscoretextbooks.routledge.comAzure Security
Par Bojan Magusic. 2024
Secure your Azure applications the right way. The expert DevSecOps techniques you'll learn in this essential handbook make it easy…
to keep your data safe.As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure. In Azure Security you&’ll learn vital security skills, including how to: Set up secure access through Conditional Access policiesImplement Azure WAF on Application Gateway and Front Door Deploy Azure Firewall Premium for monitoring network activities Enable Microsoft Defender for Cloud to assess workload configurations Utilize Microsoft Sentinel for threat detection and analytics Establish Azure Policy for compliance with business rules Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Each stage is made clear and easy to follow with step-by-step instructions, complemented by helpful screenshots and diagrams. About the technology Securing cloud-hosted applications requires a mix of tools, techniques, and platform-specific services. The Azure platform provides built-in security tools to keep your systems safe, but proper implementation requires a foundational strategy and tactical guidance. About the book Azure Security details best practices for configuring and deploying Azure&’s native security services—from a zero-trust foundation to defense in depth (DiD). Learn from a Microsoft security insider how to establish a DevSecOps program using Microsoft Defender for Cloud. Realistic scenarios and hands-on examples help demystify tricky security concepts, while clever exercises help reinforce what you&’ve learned. What's inside Set up secure access policies Implement a Web Application Firewall Deploy MS Sentinel for monitoring and threat detection Establish compliance with business rules About the reader For software and security engineers building and securing Azure applications. About the author Bojan Magusic is a Product Manager with Microsoft on the Security Customer Experience Engineering Team. Table of Contents PART 1 FIRST STEPS 1 About Azure security 2 Securing identities in Azure: The four pillars of identity and Azure Active Directory PART 2 SECURING AZURE RESOURCES 3 Implementing network security in Azure: Firewall, WAF, and DDoS protection 4 Securing compute resources in Azure: Azure Bastion, Kubernetes, and Azure App Service 5 Securing data in Azure Storage accounts: Azure Key Vault 6 Implementing good security hygiene: Microsoft Defender for Cloud and Defender CSPM 7 Security monitoring for Azure resources: Microsoft Defender for Cloud plans PART 3 GOING FURTHER 8 Security operations and response: Microsoft Sentinel 9 Audit and log data: Azure Monitor 10 Importance of governance: Azure Policy and Azure Blueprints 11 DevSecOps: Microsoft Defender for DevOpsIntermediate C Programming
Par Yung-Hsiang Lu, George K. Thiruvathukal. 2024
Revised for a new second edition, Intermediate C Programming provides a stepping-stone for intermediate-level students to go from writing short…
programs to writing real programs well. It shows students how to identify and eliminate bugs, write clean code, share code with others, and use standard Linux-based tools, such as ddd and valgrind. This second edition provides expanded coverage of these topics with new material focused on software engineering, including version control and unit testing. The text enhances their programming skills by explaining programming concepts and comparing common mistakes with correct programs. It also discusses how to use debuggers and the strategies for debugging as well as studies the connection between programming and discrete mathematics. Including additional student and instructor resources available online, this book is particularly appealing as a classroom resource.Dashboard Design (River Publishers Series in Computing and Information Science and Technology)
Par Michael Burch, Marco Schmid. 2023
Interactive visualization and visual analytics tools have been designed and developed in the past and will be developed in the…
future as well. In each application domain in which data is measured, generated, and recorded we see a potential candidate for an interactive visualization tool with the goal to find insights and knowledge in the data. This knowledge can be found either visually by humans’ interventions or algorithmically by the machine, in the best case by applying both concepts in combination as in visual analytics. One of the easiest ways to get an interactive visualization tool running is by means of dashboards, typically implemented as webpages that can run in a web browser and are accessible online, creating some kind of web-based solution. This book describes ways to design and implement dashboards based on the programming language Python, the graphics library Plotly, and Dash. The readers can use the provided dashboard codes as a starting point and extend the functionality and features on their desire. Technical topics discussed in the book include: Design in visualization Interaction principles in information visualization User interface design Linking Python, Dash, and Plotly Coding in Python Dashboard examples with Python code.R-Calculus, V: Description Logics (Perspectives in Formal Induction, Revision and Evolution)
Par Wei Li, Yuefei Sui. 2024
This book series consists of two parts, decidable description logics and undecidable description logics. It gives the R-calculi for description logics. This book…
offers a rich blend of theory and practice. It is suitable for students, researchers and practitioners in the field of logic.Applications of Blockchain Technology: An Industry Focus
Par Anita Ravani, Sashi Edupuganti, Jeannette Pugh, Sooraj Sushama. 2023
Blockchain technology is a disruptive technology that affords businesspeople an opportunity to correct problems of dishonesty, corruption, and poor decision-making.…
This book crafts blockchain technology for the non-technical expert, to interpret the various applications of blockchain technology through the lens of various industries and creates opportunities for professionals using practical applications and case studies. Blockchain technology is an important platform for businesses to consider as it provides a consensus based, trusted, and transparent system for businesses to operate various critical functions. As such, this book is a first of its kind to take a deep dive into the application of blockchain technology in different sectors. Applications of blockchain technology is explored through understanding of implementation and configuring the use of blockchain technology in real business application. The book provides access to disseminate blockchain technology and its application in a clear and structured manner by assimilating real-world-cases by providing valuable information for business audiences for all business sectors.Google's PageRank and Beyond: The Science of Search Engine Rankings
Par Amy N. Langville, Carl D. Meyer. 2006
Why doesn't your home page appear on the first page of search results, even when you query your own name?…
How do other web pages always appear at the top? What creates these powerful rankings? And how? The first book ever about the science of web page rankings, Google's PageRank and Beyond supplies the answers to these and other questions and more. The book serves two very different audiences: the curious science reader and the technical computational reader. The chapters build in mathematical sophistication, so that the first five are accessible to the general academic reader. While other chapters are much more mathematical in nature, each one contains something for both audiences. For example, the authors include entertaining asides such as how search engines make money and how the Great Firewall of China influences research. The book includes an extensive background chapter designed to help readers learn more about the mathematics of search engines, and it contains several MATLAB codes and links to sample web data sets. The philosophy throughout is to encourage readers to experiment with the ideas and algorithms in the text. Any business seriously interested in improving its rankings in the major search engines can benefit from the clear examples, sample code, and list of resources provided. Many illustrative examples and entertaining asides MATLAB code Accessible and informal style Complete and self-contained section for mathematics reviewNumerical Algorithms for Personalized Search in Self-organizing Information Networks
Par Sep Kamvar. 2011
This book lays out the theoretical groundwork for personalized search and reputation management, both on the Web and in peer-to-peer…
and social networks. Representing much of the foundational research in this field, the book develops scalable algorithms that exploit the graphlike properties underlying personalized search and reputation management, and delves into realistic scenarios regarding Web-scale data.Sep Kamvar focuses on eigenvector-based techniques in Web search, introducing a personalized variant of Google's PageRank algorithm, and he outlines algorithms--such as the now-famous quadratic extrapolation technique--that speed up computation, making personalized PageRank feasible. Kamvar suggests that Power Method-related techniques ultimately should be the basis for improving the PageRank algorithm, and he presents algorithms that exploit the convergence behavior of individual components of the PageRank vector. Kamvar then extends the ideas of reputation management and personalized search to distributed networks like peer-to-peer and social networks. He highlights locality and computational considerations related to the structure of the network, and considers such unique issues as malicious peers. He describes the EigenTrust algorithm and applies various PageRank concepts to P2P settings. Discussion chapters summarizing results conclude the book's two main sections.Clear and thorough, this book provides an authoritative look at central innovations in search for all of those interested in the subject.More stimulating mathematics puzzles from bestselling author Paul NahinHow do technicians repair broken communications cables at the bottom of the…
ocean without actually seeing them? What's the likelihood of plucking a needle out of a haystack the size of the Earth? And is it possible to use computers to create a universal library of everything ever written or every photo ever taken? These are just some of the intriguing questions that best-selling popular math writer Paul Nahin tackles in Number-Crunching. Through brilliant math ideas and entertaining stories, Nahin demonstrates how odd and unusual math problems can be solved by bringing together basic physics ideas and today's powerful computers. Some of the outcomes discussed are so counterintuitive they will leave readers astonished.Nahin looks at how the art of number-crunching has changed since the advent of computers, and how high-speed technology helps to solve fascinating conundrums such as the three-body, Monte Carlo, leapfrog, and gambler's ruin problems. Along the way, Nahin traverses topics that include algebra, trigonometry, geometry, calculus, number theory, differential equations, Fourier series, electronics, and computers in science fiction. He gives historical background for the problems presented, offers many examples and numerous challenges, supplies MATLAB codes for all the theories discussed, and includes detailed and complete solutions.Exploring the intimate relationship between mathematics, physics, and the tremendous power of modern computers, Number-Crunching will appeal to anyone interested in understanding how these three important fields join forces to solve today's thorniest puzzles.Computational Economics
Par David A. Kendrick, P. Ruben Mercado, Hans M. Amman. 2006
The ability to conceptualize an economic problem verbally, to formulate it as a mathematical model, and then represent the mathematics…
in software so that the model can be solved on a computer is a crucial skill for economists. Computational Economics contains well-known models--and some brand-new ones--designed to help students move from verbal to mathematical to computational representations in economic modeling. The authors' focus, however, is not just on solving the models, but also on developing the ability to modify them to reflect one's interest and point of view. The result is a book that enables students to be creative in developing models that are relevant to the economic problems of their times. Unlike other computational economics textbooks, this book is organized around economic topics, among them macroeconomics, microeconomics, and finance. The authors employ various software systems--including MATLAB, Mathematica, GAMS, the nonlinear programming solver in Excel, and the database systems in Access--to enable students to use the most advantageous system. The book progresses from relatively simple models to more complex ones, and includes appendices on the ins and outs of running each program. The book is intended for use by advanced undergraduates and professional economists and even, as a first exposure to computational economics, by graduate students. Organized by economic topics Progresses from simple to more complex models Includes instructions on numerous software systems Encourages customization and creativityThe Silicon Jungle: A Novel of Deception, Power, and Internet Intrigue
Par Shumeet Baluja. 2011
A suspenseful story about the dangers of unknowingly revealing our most intimate thoughts and actions onlineWhat happens when a naive…
intern is granted unfettered access to people's most private thoughts and actions? Stephen Thorpe lands a coveted internship at Ubatoo, an Internet empire that provides its users with popular online services, from a search engine and e-mail, to social networking. When Stephen’s boss asks him to work on a project with the American Coalition for Civil Liberties, Stephen innocently obliges, believing he is mining Ubatoo’s vast databases to protect people unfairly targeted in the name of national security. But nothing is as it seems. Suspicious individuals surface, doing all they can to access Ubatoo’s wealth of confidential information. This need not require technical wizardry—simply knowing how to manipulate a well-intentioned intern may be enough.The Silicon Jungle is a cautionary fictional tale of data mining’s promise and peril. Baluja raises ethical questions about contemporary technological innovations, and how minute details can be routinely pieced together into rich profiles that reveal our habits, goals, and secret desires—all ready to be exploited.Trapped in the Net: The Unanticipated Consequences of Computerization
Par Gene I. Rochlin. 1998
Voice mail. E-mail. Bar codes. Desktops. Laptops. Networks. The Web. In this exciting book, Gene Rochlin takes a closer look…
at how these familiar and pervasive productions of computerization have become embedded in all our lives, forcing us to narrow the scope of our choices, our modes of control, and our experiences with the real world. Drawing on fascinating narratives from fields that range from military command, air traffic control, and international fund transfers to library cataloging and supermarket checkouts, Rochlin shows that we are rapidly making irreversible and at times harmful changes in our business, social, and personal lives to comply with the formalities and restrictions of information systems. The threat is not the direct one once framed by the idea of insane robots or runaway mainframes usurping human functions for their own purposes, but the gradual loss of control over hardware, software, and function through networks of interconnection and dependence. What Rochlin calls the computer trap has four parts: the lure, the snare, the costs, and the long-term consequences. The lure is obvious: the promise of ever more powerful and adaptable tools with simpler and more human-centered interfaces. The snare is what usually ensues. Once heavily invested in the use of computers to perform central tasks, organizations and individuals alike are committed to new capacities and potentials, whether they eventually find them rewarding or not. The varied costs include a dependency on the manufacturers of hardware and software--and a seemingly pathological scramble to keep up with an incredible rate of sometimes unnecessary technological change. Finally, a lack of redundancy and an incredible speed of response make human intervention or control difficult at best when (and not if) something goes wrong. As Rochlin points out, this is particularly true for those systems whose interconnections and mechanisms are so deeply concealed in the computers that no human being fully understands them.Discrete and Computational Geometry
Par Satyan L. Devadoss, Joseph O'Rourke. 2011
An essential introduction to discrete and computational geometryDiscrete geometry is a relatively new development in pure mathematics, while computational geometry…
is an emerging area in applications-driven computer science. Their intermingling has yielded exciting advances in recent years, yet what has been lacking until now is an undergraduate textbook that bridges the gap between the two. Discrete and Computational Geometry offers a comprehensive yet accessible introduction to this cutting-edge frontier of mathematics and computer science.This book covers traditional topics such as convex hulls, triangulations, and Voronoi diagrams, as well as more recent subjects like pseudotriangulations, curve reconstruction, and locked chains. It also touches on more advanced material, including Dehn invariants, associahedra, quasigeodesics, Morse theory, and the recent resolution of the Poincaré conjecture. Connections to real-world applications are made throughout, and algorithms are presented independently of any programming language. This richly illustrated textbook also features numerous exercises and unsolved problems.The essential introduction to discrete and computational geometryCovers traditional topics as well as new and advanced materialFeatures numerous full-color illustrations, exercises, and unsolved problemsSuitable for sophomores in mathematics, computer science, engineering, or physicsRigorous but accessibleAn online solutions manual is available (for teachers only).Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2023 (Algorithms for Intelligent Systems)
Par I. Jeena Jacob, Selwyn Piramuthu, Przemyslaw Falkowski-Gilski. 2024
The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and…
Cognitive Informatics (ICDICI 2023), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during June 27–28, 2023. This book discusses new cognitive informatics tools, algorithms and methods that mimic the mechanisms of the human brain which lead to an impending revolution in understating a large amount of data generated by various smart applications. The book includes novel work in data intelligence domain which combines with the increasing efforts of artificial intelligence, machine learning, deep learning and cognitive science to study and develop a deeper understanding of the information processing systems.This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator,…
a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years later, it’s time to leverage your ECRM program and cybersecurity strategy in the same way. The main topics covered include the case for action with specific coverage on the topic of cybersecurity as a value creator, including how the courts, legislators, and regulators are raising the bar for C-suite executives and board members. The book covers how the board’s three primary responsibilities (talent management, strategy, and risk management) intersect with their ECRM responsibilities.ECRM was once solely focused on managing the downside of risk by defending the organization from adversarial, accidental, structural, and environmental threat sources. Author Bob Chaput presents the view that we must focus equally on managing the upside of cyber strengths to increase customer trust and brand loyalty, improving social responsibility, driving revenue growth, lowering the cost of capital, attracting higher quality investments, creating competitive advantage, attracting and retaining talent, and facilitating M&A work. He focuses on the C-suite and board role in the first part and provides guidance on their roles and responsibilities, the most important decision about ECRM they must facilitate, and how to think differently about ECRM funding. You will learn how to the pivot from cost-center thinking to value-center thinking.Having built the case for action, in the second part, the book details the steps that organizations must take to develop and document their ECRM program and cybersecurity strategy. The book first covers how ECRM must be integrated into business strategy. The remainder of that part presents a sample table of contents for an ECRM Program and Cybersecurity Strategy document and works through each section to facilitate development of your own program and strategy. With all the content and ideas presented, you will be able to establish, implement, and mature your program and strategy.What You Will LearnRead new information and treat ECRM and cybersecurity as a value creatorReceive updates on legal cases, legislative actions, and regulations that are raising the stakes for organizations, their C-suites, and boardsThink differently about funding ECRM and cybersecurity initiativesUnderstand the most critical ECRM decision that boards must facilitate in their organizationsUse practical, tangible, actionable content to develop and document your ECRM program and cybersecurity strategy“This book should be mandatory reading for C-suite executives and board members. It shows you how to move from viewing cybersecurity as a risk to avoid, and a cost center that does not add value and is overhead, to seeing cybersecurity as an enabler and part of your core strategy to transform your business and earn customer and stakeholder trust.” —Paul Connelly, First CISO at the White House and HCA Healthcare Who This Book Is ForThe primary audience includes Chief Information Security Officers, Chief Risk Officers, and Chief Compliance Officers. The secondary audience includes C-suite executives and board members. The tertiary audience includes any stakeholder responsible for privacy, security, compliance, and cyber risk management or students of these topics.Advances in Communication and Applications: Proceedings of ERCICA 2023, Volume 2 (Lecture Notes in Electrical Engineering #1105)
Par N. R. Shetty, N. H. Prasad, H. C. Nagaraj. 2024
This book presents the proceedings of the International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA) 2023.…
The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators and technologists to discuss, debate and promote research and technology in the upcoming areas of computing, information, communication and their applications. Some of the topics include the Internet of Things (IoT), wireless communications, image and video processing, parallel and distributed computing, and smart grid applications, among others. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike.Computational Diffusion MRI: 14th International Workshop, CDMRI 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, October 8, 2023, Proceedings (Lecture Notes in Computer Science #14328)
Par Muge Karaman, Remika Mito, Elizabeth Powell, Francois Rheault, Stefan Winzeck. 2023
This book constitutes the proceedings of the 14th International Workshop, CDMRI 2023, held in conjunction with MICCAI 2023, the 26th…
International Conference on Medical Image Computing and Computer-Assisted Intervention. The conference took place in Vancouver, BC, Canada, on October 8, 2023. The 17regular papers presented in this book were carefully reviewed and selected from 19 submissions. These contributions cover various aspects, including preprocessing, signal modeling, tractography, bundle segmentation, and clinical applications. Many of these studies employ novel machine learning implementations, highlighting the evolving landscape of techniques beyond the more traditional physics-based algorithms.