Browse Results

Showing 28,876 through 28,900 of 54,466 results

Practical Computer Vision: Extract Insightful Information From Images Using Tensorflow, Keras, And Opencv

by Abhinav Dadhich

Computer Vision is a broadly used term associated with acquiring, processing, and analyzing images. This book will show you how you can perform various Computer Vision techniques in the most practical way possible. Right from capturing images from various sources, you will learn how to perform image filtering/manipulation and detect features in your images. As you go through the chapters, you'll work with increasingly complex algorithms to develop complex Computer Vision applications

Practical Computer Vision: Extract insightful information from images using TensorFlow, Keras, and OpenCV

by Abhinav Dadhich

A practical guide designed to get you from basics to current state of art in computer vision systems. Key Features Master the different tasks associated with Computer Vision and develop your own Computer Vision applications with ease Leverage the power of Python, Tensorflow, Keras, and OpenCV to perform image processing, object detection, feature detection and more With real-world datasets and fully functional code, this book is your one-stop guide to understanding Computer Vision Book Description In this book, you will find several recently proposed methods in various domains of computer vision. You will start by setting up the proper Python environment to work on practical applications. This includes setting up libraries such as OpenCV, TensorFlow, and Keras using Anaconda. Using these libraries, you'll start to understand the concepts of image transformation and filtering. You will find a detailed explanation of feature detectors such as FAST and ORB; you'll use them to find similar-looking objects. With an introduction to convolutional neural nets, you will learn how to build a deep neural net using Keras and how to use it to classify the Fashion-MNIST dataset. With regard to object detection, you will learn the implementation of a simple face detector as well as the workings of complex deep-learning-based object detectors such as Faster R-CNN and SSD using TensorFlow. You'll get started with semantic segmentation using FCN models and track objects with Deep SORT. Not only this, you will also use Visual SLAM techniques such as ORB-SLAM on a standard dataset. By the end of this book, you will have a firm understanding of the different computer vision techniques and how to apply them in your applications. What you will learn Learn the basics of image manipulation with OpenCV Implement and visualize image filters such as smoothing, dilation, histogram equalization, and more Set up various libraries and platforms, such as OpenCV, Keras, and Tensorflow, in order to start using computer vision, along with appropriate datasets for each chapter, such as MSCOCO, MOT, and Fashion-MNIST Understand image transformation and downsampling with practical implementations. Explore neural networks for computer vision and convolutional neural networks using Keras Understand working on deep-learning-based object detection such as Faster- R-CNN, SSD, and more Explore deep-learning-based object tracking in action Understand Visual SLAM techniques such as ORB-SLAMWho this book is for This book is for machine learning practitioners and deep learning enthusiasts who want to understand and implement various tasks associated with Computer Vision and image processing in the most practical manner possible. Some programming experience would be beneficial while knowing Python would be an added bonus.

Practical Computer Vision Applications Using Deep Learning with CNNs: With Detailed Examples in Python Using TensorFlow and Kivy

by Ahmed Fawzy Gad

Deploy deep learning applications into production across multiple platforms. You will work on computer vision applications that use the convolutional neural network (CNN) deep learning model and Python. This book starts by explaining the traditional machine-learning pipeline, where you will analyze an image dataset. Along the way you will cover artificial neural networks (ANNs), building one from scratch in Python, before optimizing it using genetic algorithms. For automating the process, the book highlights the limitations of traditional hand-crafted features for computer vision and why the CNN deep-learning model is the state-of-art solution. CNNs are discussed from scratch to demonstrate how they are different and more efficient than the fully connected ANN (FCNN). You will implement a CNN in Python to give you a full understanding of the model.After consolidating the basics, you will use TensorFlow to build a practical image-recognition model that you will deploy to a web server using Flask, making it accessible over the Internet. Using Kivy and NumPy, you will create cross-platform data science applications with low overheads.This book will help you apply deep learning and computer vision concepts from scratch, step-by-step from conception to production. What You Will Learn Understand how ANNs and CNNs work Create computer vision applications and CNNs from scratch using PythonFollow a deep learning project from conception to production using TensorFlowUse NumPy with Kivy to build cross-platform data science applicationsWho This Book Is ForData scientists, machine learning and deep learning engineers, software developers.

Practical Contiki-NG: Programming for Wireless Sensor Networks

by Agus Kurniawan

Explore how to develop and implement wireless server networks (WSN) using Contiki-NG, branded as the operating system for the IoT. The book explains Contiki-NG’s advantages in sensing, communication, and energy optimization and enables you to begin solving problems in automation with WSN.Practical Contiki-NG is a guide to getting started with Contiki-NG programming featuring projects that demonstrate a variety of applications. This book takes a practical and content-driven approach to the latest technologies, including Raspberry Pi, IoT and cloud servers. Readers will go through step-by-step guides and sample scenarios such as sensing, actuating, connectivity, building middleware, and utilizing IoT and cloud-based technologies.If you're looking to go from zero to hero in using Contiki-NG to build Wireless Sensor Network (WSN) applications then this is the book for you. What You’ll LearnPrepare and set up Contiki-NG developmentReview the basics of the Contiki-NG platform to build Wireless Sensor Networks (WSN)Develop your own Contiki-NG programPerform sensing and actuating on the Contiki-NG platformImplement a middleware for Contiki-NG motesBuild a simple IoT program using the Contiki-NG environmentWho This Book Is ForDevelopers, students, researchers and anyone who has an interest in Wireless Sensor Network (WSN).

Practical Convolutional Neural Networks: Implement advanced deep learning models using Python

by Md. Rezaul Karim Mohit Sewak Pradeep Pujari

One stop guide to implementing award-winning, and cutting-edge CNN architectures Key Features Fast-paced guide with use cases and real-world examples to get well versed with CNN techniques Implement CNN models on image classification, transfer learning, Object Detection, Instance Segmentation, GANs and more Implement powerful use-cases like image captioning, reinforcement learning for hard attention, and recurrent attention models Book Description Convolutional Neural Network (CNN) is revolutionizing several application domains such as visual recognition systems, self-driving cars, medical discoveries, innovative eCommerce and more.You will learn to create innovative solutions around image and video analytics to solve complex machine learning and computer vision related problems and implement real-life CNN models. This book starts with an overview of deep neural networkswith the example of image classification and walks you through building your first CNN for human face detector. We will learn to use concepts like transfer learning with CNN, and Auto-Encoders to build very powerful models, even when not much of supervised training data of labeled images is available. Later we build upon the learning achieved to build advanced vision related algorithms for object detection, instance segmentation, generative adversarial networks, image captioning, attention mechanisms for vision, and recurrent models for vision. By the end of this book, you should be ready to implement advanced, effective and efficient CNN models at your professional project or personal initiatives by working on complex image and video datasets. What you will learn -From CNN basic building blocks to advanced concepts understand practical areas they can be applied to -Build an image classifier CNN model to understand how different components interact with each other, and then learn how to optimize it -Learn different algorithms that can be applied to Object Detection, and Instance Segmentation - Learn advanced concepts like attention mechanisms for CNN to improve prediction accuracy -Understand transfer learning and implement award-winning CNN architectures like AlexNet, VGG, GoogLeNet, ResNet and more -Understand the working of generative adversarial networks and how it can create new, unseen images Who this book is for This book is for data scientists, machine learning and deep learning practitioners, Cognitive and Artificial Intelligence enthusiasts who want to move one step further in building Convolutional Neural Networks. Get hands-on experience with extreme datasets and different CNN architectures to build efficient and smart ConvNet models. Basic knowledge of deep learning concepts and Python programming language is expected.

Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents

by Wilson Bautista

Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.Key FeaturesIntelligence processes and procedures for response mechanismsMaster F3EAD to drive processes based on intelligenceThreat modeling and intelligent frameworksCase studies and how to go about building intelligent teamsBook DescriptionCyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book kicks off with the need for cyber intelligence and why it is required in terms of a defensive framework.Moving forward, the book provides a practical explanation of the F3EAD protocol with the help of examples. Furthermore, we learn how to go about threat models and intelligence products/frameworks and apply them to real-life scenarios. Based on the discussion with the prospective author I would also love to explore the induction of a tool to enhance the marketing feature and functionality of the book.By the end of this book, you will be able to boot up an intelligence program in your organization based on the operation and tactical/strategic spheres of Cyber defense intelligence.What you will learn Learn about the Observe-Orient-Decide-Act (OODA) loop and it's applicability to security Understand tactical view of Active defense concepts and their application in today's threat landscape Get acquainted with an operational view of the F3EAD process to drive decision making within an organization Create a Framework and Capability Maturity Model that integrates inputs and outputs from key functions in an information security organization Understand the idea of communicating with the Potential for Exploitability based on cyber intelligenceWho this book is forThis book targets incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts; experience in, or knowledge of, security operations, incident responses or investigations is desirable so you can make the most of the subjects presented.

Practical Data Science

by Andreas François Vermeulen

Learn how to build a data science technology stack and perform good data science with repeatable methods. You will learn how to turn data lakes into business assets.The data science technology stack demonstrated in Practical Data Science is built from components in general use in the industry. Data scientist Andreas Vermeulen demonstrates in detail how to build and provision a technology stack to yield repeatable results. He shows you how to apply practical methods to extract actionable business knowledge from data lakes consisting of data from a polyglot of data types and dimensions.What You'll LearnBecome fluent in the essential concepts and terminology of data science and data engineering Build and use a technology stack that meets industry criteriaMaster the methods for retrieving actionable business knowledgeCoordinate the handling of polyglot data types in a data lake for repeatable resultsWho This Book Is ForData scientists and data engineers who are required to convert data from a data lake into actionable knowledge for their business, and students who aspire to be data scientists and data engineers

Practical DevOps, Second Edition: Implement DevOps in your organization by effectively building, deploying, testing, and monitoring code, 2nd Edition

by Joakim Verona

Understand the benefits of DevOps and continuous delivery and see how they support the agile software development processKey FeaturesLearn how DevOps can accelerate your entire software development life cycleImprove your organization's performance to ensure the smooth production of software and servicesGet hands-on experience in using efficient DevOps tools to better effectBook DescriptionDevOps is a practical field that focuses on delivering business value as efficiently as possible. DevOps encompasses all code workflows from testing environments to production environments. It stresses cooperation between different roles, and how they can work together more closely, as the roots of the word imply—Development and Operations.Practical DevOps begins with a quick refresher on DevOps and continuous delivery and quickly moves on to show you how DevOps affects software architectures. You'll create a sample enterprise Java application that you’'ll continue to work with through the remaining chapters. Following this, you will explore various code storage and build server options. You will then learn how to test your code with a few tools and deploy your test successfully. In addition to this, you will also see how to monitor code for any anomalies and make sure that it runs as expected. Finally, you will discover how to handle logs and keep track of the issues that affect different processes.By the end of the book, you will be familiar with all the tools needed to deploy, integrate, and deliver efficiently with DevOps.What you will learnUnderstand how all deployment systems fit together to form a larger systemSet up and familiarize yourself with all the tools you need to be efficient with DevOpsDesign an application suitable for continuous deployment systems with DevOps in mindStore and manage your code effectively using Git, Gerrit, Gitlab, and moreConfigure a job to build a sample CRUD applicationTest your code using automated regression testing with Jenkins SeleniumDeploy your code using tools such as Puppet, Ansible, Palletops, Chef, and VagrantWho this book is forIf you're a developer or system administrator looking to take on larger responsibilities and understand how the infrastructure that builds today's enterprises works, this is the book for you. This book will also help you greatly if you're an operations worker who would like to better support developers. You do not need any previous knowledge of DevOps to understand the concepts in this book.

Practical Docker with Python: Build, Release And Distribute Your Python App With Docker

by Sathyajith Bhat

Learn the key differences between containers and virtual machines. Adopting a project based approach, this book introduces you to a simple Python application to be developed and containerized with Docker.After an introduction to Containers and Docker you'll be guided through Docker installation and configuration. You'll also learn basic functions and commands used in Docker by running a simple container using Docker commands. The book then moves on to developing a Python based Messaging Bot using required libraries and virtual environment where you'll add Docker Volumes to your project, ensuring your container data is safe. You'll create a database container and link your project to it and finally, bring up the Bot-associated database all at once with Docker Compose. What You'll LearnBuild, run, and distribute Docker containersDevelop a Python App and containerize itUse Dockerfile to run the Python AppDefine and run multi-container applications with Docker Compose Work with persisting data generated by and used by Docker containersWho This Book Is ForIntermediate developers/DevOps practitioners who are looking to improve their build and release workflow by containerizing applications

Practical Enterprise Data Lake Insights: Handle Data-Driven Challenges in an Enterprise Big Data Lake

by Saurabh Gupta Venkata Giri

Use this practical guide to successfully handle the challenges encountered when designing an enterprise data lake and learn industry best practices to resolve issues.When designing an enterprise data lake you often hit a roadblock when you must leave the comfort of the relational world and learn the nuances of handling non-relational data. Starting from sourcing data into the Hadoop ecosystem, you will go through stages that can bring up tough questions such as data processing, data querying, and security. Concepts such as change data capture and data streaming are covered. The book takes an end-to-end solution approach in a data lake environment that includes data security, high availability, data processing, data streaming, and more.Each chapter includes application of a concept, code snippets, and use case demonstrations to provide you with a practical approach. You will learn the concept, scope, application, and starting point.What You'll LearnGet to know data lake architecture and design principlesImplement data capture and streaming strategiesImplement data processing strategies in HadoopUnderstand the data lake security framework and availability modelWho This Book Is ForBig data architects and solution architects

Practical ES6

by Aurelio De Rosa Kyle Pennell Nilson Jacques Craig Buckler Byron Houwens Jeff Mott Sandeep Panda Graham Cox Ludovico Fischer James Wright

There's no doubt that the JavaScript ecosystem changes fast. Not only are new tools and frameworks introduced and developed at a rapid rate, the language itself has undergone big changes with the introduction of ES2015 (aka ES6). Understandably, many articles have been written complaining about how difficult it is to learn modern JavaScript development these days. We're aiming to minimize that confusion with this set of books on modern JavaScript. This book provides an introduction to many of the powerful new JavaScript language features that were introduced in ECMAScript 2015, as well as features introduced in ECMAScript 2016 and 2017. It also takes a look at the features planned for ECMAScript 2018 in this rapidly evolving language. It contains: New Keywords: let and const by Aurelio de RosaUsing Map, Set, WeakMap, WeakSet by Kyle PennellNew Array.* and Array.prototype.* Methods by Aurelio de RosaNew String Methods by Aurelio de RosaNew Number Methods by Aurelio de RosaES6 Arrow Functions: Fat and Concise Syntax in JavaScript by Kyle PennellSymbols and Their Uses by Nilson JacquesHow to Use Proxies by Craig BucklerDestructuring Assignment by Craig BucklerES6 Generators and Iterators: a Developer' Guide by Byron HouwensObject-oriented JavaScript: A Deep Dive into ES6 Classes by Jeff MottUnderstanding ES6 Modules by Craig BucklerAn Overview of JavaScript Promises by Sandeep PandaJavaScript Decorators: What They Are and When to Use Them by Graham CoxEnhanced Object Literals by Craig BucklerIntroduction to the Fetch API by Ludovico FischerES6 (ES2015) and Beyond: Understanding JavaScript Versioning by James WrightWhat's New in ES2017: Async Functions, Improved Objects, and More by Craig BucklerWhat's New in ES2018 by Craig Buckler This book is for all front-end developers who wish to improve their JavaScript skills. You'll need to be familiar with HTML and CSS and have a reasonable level of understanding of JavaScript in order to follow the discussion.

Practical Free Alternatives to Commercial Software

by Grace Oualline Steve Oualline

Get all the things done you're used to doing with pricey software at a fraction of the cost. There are hundreds of free programs out there that work just as well as the commercial programs people pay hundreds of dollars for. This book tells you how to find and use the most popular and useful of these.The Open Source movement is a system where programmers can share code and collectively improve programs. As a result they can produce programs that are just as good, if not better than their commercial alternatives. For example, LibreOffice comes with a database, Microsoft Office does not. This book shows you where to get and how to use the best Open Source programs giving you not only access to high quality software, but saving you money as well. Add Practical Free Alternatives to Commercial Software to your library today.What You'll Learn Use the free spreadsheet program Libreoffice-calc to balance your checkbook, do an expense account, and other tasks Perform presentations with Libreoffice-impress instead of Powerpoint Photo edit with The Gimp, a high powered image editor Edit videos with Openshot Create video DVDs with DVDStyler Who This Book Is For Home or small business PC users who want to save money on software

Practical Game Design: Learn the art of game design through applicable skills and cutting-edge insights

by Adam Kramarzewski Ennio De Nucci

Design accessible and creative games across genres, platforms, and development realitiesKey FeaturesImplement the skills and techniques required to work in a professional studioAce the core principles and processes of level design, world building, and storytellingDesign interactive characters that animate the gaming worldBook DescriptionIf you are looking for an up-to-date and highly applicable guide to game design, then you have come to the right place! Immerse yourself in the fundamentals of game design with this book, written by two highly experienced industry professionals to share their profound insights as well as give valuable advice on creating games across genres and development platforms.Practical Game Design covers the basics of game design one piece at a time. Starting with learning how to conceptualize a game idea and present it to the development team, you will gradually move on to devising a design plan for the whole project and adapting solutions from other games. You will also discover how to produce original game mechanics without relying on existing reference material, and test and eliminate anticipated design risks. You will then design elements that compose the playtime of a game, followed by making game mechanics, content, and interface accessible to all players. You will also find out how to simultaneously ensure that the gameplay mechanics and content are working as intended.As the book reaches its final chapters, you will learn to wrap up a game ahead of its release date, work through the different challenges of designing free-to-play games, and understand how to significantly improve their quality through iteration, polishing and playtesting.What you will learnDefine the scope and structure of a game projectConceptualize a game idea and present it to othersDesign gameplay systems and communicate them clearly and thoroughlyBuild and validate engaging game mechanicsDesign successful business models and prepare your games for live operationsMaster the principles behind level design, worldbuilding and storytellingImprove the quality of a game by playtesting and polishing itWho this book is forWhether you are a student eager to design a game or a junior game designer looking for your first role as a professional, this book will help you with the fundamentals of game design. By focusing on best practices and a pragmatic approach, Practical Game Design provides insights into the arts and crafts from two senior game designers that will interest more seasoned professionals in the game industry.

Practical GameMaker Projects: Build Games with GameMaker Studio 2

by Ben Tyers

Make ten simple, casual games, and learn a ton of GML coding along the way. Each of these games is the kind you can play when you have a minute or two free, and are great for playing on your PC, or exported to HTML5 or Android.Each game in Practical GameMaker Projects has its own chapter that explains the process of making each game, along with sketches, screenshots, coding, explanations, and tips. For each game there is a YYZ project file of the completed game that is ready to load and play. Also, all resources are available so you can make the game as you follow along in the book.Each chapter has an introduction that explains what the aim of the game is, followed by a design and coding section which will cover the coding of the game. You’re free to re-use code in your own projects, both free and paid. At the end of each chapter there is a things-to-try page that gives you five things to add to the game to improve its playability or appearance – pushing you a little to improve your planning and GML skills. What You'll LearnBuild ten game applications using GameMaker Studio 2Use the GameMaker Markup Language along the wayMaster the concepts behind each of the ten game apps Design and code for each of the ten game examplesTry some add-ons for each of the ten gamesWho This Book Is ForGame developers with at least some prior game development experience. GameMaker Studio experience recommended, but not required.

Practical Guide for Oracle SQL, T-SQL and MySQL

by Preston Zhang

SQL is a widely used to access most databases, therefore database developers and system administrators should be familiar with it. This hands-on SQL book will help beginner and intermediate users to write queries that apply complex conditions on a table. The book's unique side by side approach makes it easy for the reader to learn three major query languages in the IT industry. The author has over 20 years of experience in database design. KEY FEATURES: Contains numerous practical screenshots of Oracle SQL, T-SQL, MySQL statements and results. Shows the differences between Oracle SQL, T-SQL and MySQL side by side. Gives a real world experience for SQL developers and database administrators. Sample data is available to work on (available on our website).

A Practical Guide to Database Design (Second Edition)

by Rex Hogan

Fully updated and expanded from the previous edition, A Practical Guide to Database Design, Second Edition, is intended for those involved in the design or development of a database system or application. It begins by focusing on how to create a logical data model where data is stored "where it belongs." Next, data usage is reviewed to transform the logical model into a physical data model that will satisfy user performance requirements. Finally, it describes how to use various software tools to create user interfaces to review and update data in a database. Organized into 11 chapters, the book begins with an overview of the functionality of database management systems and how they guarantee the accuracy and availability of data. It then describes how to define and normalize data requirements to create a logical data model, then map them into an initial solution for a physical database. The book next presents how to use an industry-leading data modeling tool to define and manage logical and physical data models. After that, it describes how to implement a physical database using either Microsoft Access or SQL Server and how to use Microsoft Access to create windows interfaces to query or update data in tables. The last part of the book reviews software tools and explores the design and implementation of a database using as an example a much more complex data environment for a University. The book ends with a description of how to use PHP to build a web-based interface to review and update data in a database.

Practical Guide to Salesforce Communities: Building, Enhancing, and Managing an Online Community with Salesforce Community Cloud

by Philip Weinmeister

Whether you are brand new to the world of Salesforce communities or you are looking to take your Community Cloud knowledge to the next level, this detailed guide will help you to build and manage a Salesforce community by leveraging the declarative power of the platform with clicks, not code.Each Salesforce community is a part of a widespread ecosystem, with thousands of communities and millions of users active today on Community Cloud. Through valuable social and business tools, this online platform enables companies to empower and equip their customers, partners, and employees in new, powerful ways. In this book, Philip Weinmeister, a Salesforce MVP and the first-ever recipient of the “Community Cloud MVP” Trailblazer award, leads you through the ins and outs of Salesforce communities and provides you with an array of best practices to deliver top-notch business portals on the Salesforce platform.Practical Guide to Salesforce Communities is the first book to comprehensively cover this next-generation offering from Salesforce, providing real, actionable guidance to help individuals build effective and engaging online communities. The book takes you through the entire process: from planning and designing a community to configuration/build, setup, and administration, all the way to deployment. Detailed explanations are provided of key components, templates, and features such as Community Builder, Audience Targeting, Lightning Bolts, and much more. Additionally, considerations and best practices are covered, including valuable tips and insights.What You’ll Learn Plan and design a communityConceptualize how employees, partners, and customers use and benefit from communitiesAssess available templates and make an informed selection decisionUse Community Builder and Lightning components within a Lightning community templateApply topics and knowledge articles to a community to increase value and adoptionInject process automation into a community using Workflow, Flow, and Process BuilderCreate dynamic and personalized user experiences with audience targetingBuild, export, and import unique templates with the Lightning Bolt solution frameworkProvide community data for members or community managers Who This Book Is For Salesforce administrators, Salesforce developers, Salesforce functional architects, Salesforce business analysts, and Salesforce community managers

Practical Industrial Internet of Things Security: A practitioner's guide to securing connected industries

by Sravani Bhattacharjee

Skillfully navigate through the complex realm of implementing scalable, trustworthy industrial systems and architectures in a hyper-connected business world.Key FeaturesGain practical insight into security concepts in the Industrial Internet of Things (IIoT) architectureDemystify complex topics such as cryptography and blockchainComprehensive references to industry standards and security frameworks when developing IIoT blueprintsBook DescriptionSecuring connected industries and autonomous systems is a top concern for the Industrial Internet of Things (IIoT) community. Unlike cybersecurity, cyber-physical security is an intricate discipline that directly ties to system reliability as well as human and environmental safety. Practical Industrial Internet of Things Security enables you to develop a comprehensive understanding of the entire spectrum of securing connected industries, from the edge to the cloud.This book establishes the foundational concepts and tenets of IIoT security by presenting real-world case studies, threat models, and reference architectures. You’ll work with practical tools to design risk-based security controls for industrial use cases and gain practical know-how on the multi-layered defense techniques including Identity and Access Management (IAM), endpoint security, and communication infrastructure. Stakeholders, including developers, architects, and business leaders, can gain practical insights in securing IIoT lifecycle processes, standardization, governance and assess the applicability of emerging technologies, such as blockchain, Artificial Intelligence, and Machine Learning, to design and implement resilient connected systems and harness significant industrial opportunities.What you will learnUnderstand the crucial concepts of a multi-layered IIoT security frameworkGain insight on securing identity, access, and configuration management for large-scale IIoT deploymentsSecure your machine-to-machine (M2M) and machine-to-cloud (M2C) connectivityBuild a concrete security program for your IIoT deploymentExplore techniques from case studies on industrial IoT threat modeling and mitigation approachesLearn risk management and mitigation planningWho this book is forPractical Industrial Internet of Things Security is for the IIoT community, which includes IIoT researchers, security professionals, architects, developers, and business stakeholders. Anyone who needs to have a comprehensive understanding of the unique safety and security challenges of connected industries and practical methodologies to secure industrial assets will find this book immensely helpful. This book is uniquely designed to benefit professionals from both IT and industrial operations backgrounds.

Practical Information Security: A Competency-based Education Course

by Ahmed Aleroud Izzat Alsmadi Robert Burdwell Abdallah Wahbeh Mahmoud Ali Al-Qudah Ahmad Al-Omari

This textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching. The content and ancillary assessment methods explicitly measure student progress in the three core categories: Knowledge, Skills, and Experience, giving students a balance between background knowledge, context, and skills they can put to work. Students will learn both the foundations and applications of information systems security; safeguarding from malicious attacks, threats, and vulnerabilities; auditing, testing, and monitoring; risk, response, and recovery; networks and telecommunications security; source code security; information security standards; and compliance laws. The book can be used in introductory courses in security (information, cyber, network or computer security), including classes that don't specifically use the CBE method, as instructors can adjust methods and ancillaries based on their own preferences. The book content is also aligned with the Cybersecurity Competency Model, proposed by department of homeland security. The author is an active member of The National Initiative for Cybersecurity Education (NICE), which is led by the National Institute of Standards and Technology (NIST). NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.

Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem, 2nd Edition

by Brian Russell Drew Van Duren

A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldKey FeaturesLearn best practices to secure your data from the device to the cloudUse systems security engineering and privacy-by-design principles to design a secure IoT ecosystemA practical guide that will help you design and implement cyber security strategies for your organizationBook DescriptionWith the advent of the Internet of Things (IoT), businesses have to defend against new types of threat. The business ecosystem now includes the cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces. It therefore becomes critical to ensure that cybersecurity threats are contained to a minimum when implementing new IoT services and solutions.This book shows you how to implement cybersecurity solutions, IoT design best practices, and risk mitigation methodologies to address device and infrastructure threats to IoT solutions.In this second edition, you will go through some typical and unique vulnerabilities seen within various layers of the IoT technology stack and also learn new ways in which IT and physical threats interact. You will then explore the different engineering approaches a developer/manufacturer might take to securely design and deploy IoT devices. Furthermore, you will securely develop your own custom additions for an enterprise IoT implementation. You will also be provided with actionable guidance through setting up a cryptographic infrastructure for your IoT implementations. You will then be guided on the selection and configuration of Identity and Access Management solutions for an IoT implementation. In conclusion, you will explore cloud security architectures and security best practices for operating and managing cross-organizational, multi-domain IoT deployments.What you will learnDiscuss the need for separate security requirements and apply security engineering principles on IoT devicesMaster the operational aspects of planning, deploying, managing, monitoring, and detecting the remediation and disposal of IoT systemsUse Blockchain solutions for IoT authenticity and integrityExplore additional privacy features emerging in the IoT industry, such as anonymity, tracking issues, and countermeasuresDesign a fog computing architecture to support IoT edge analyticsDetect and respond to IoT security incidents and compromisesWho this book is forThis book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure the security of their organization's data when connected through the IoT. Business analysts and managers will also find this book useful.

Practical Issues of Intelligent Innovations (Studies in Systems, Decision and Control #140)

by Vassil Sgurev Vladimir Jotsov Janusz Kacprzyk

This book presents recent advances in the field of intelligent systems. Composed of fourteen selected chapters, it covers a wide range of research that varies from applications in industrial data science to those in applied science. Today the word INNOVATION is more and more connected with the words INTELLIGENT and SECURITY, as such the book discusses the theory and applications of hot topics such as big data, education applications of robots with different levels of autonomy, knowledge-based modeling and control of complex dynamical systems, sign-based synthesis of behavior, security issues with intelligent systems, innovative intelligent control design, neuromorphic computation, data-driven classification, intelligent modeling and measurement innovations, multisensor data association, personal education assistants, a modern production architecture, study of peer review and scientometrics, intelligent research on bug report data, and clustering non-Gaussian data. The broad and varied research discussed represents the mainstream of contemporary intelligent innovations that are slowly but surely changing the world.

Practical Java Machine Learning: Projects with Google Cloud Platform and Amazon Web Services

by Mark Wickham

Build machine learning (ML) solutions for Java development. This book shows you that when designing ML apps, data is the key driver and must be considered throughout all phases of the project life cycle. Practical Java Machine Learning helps you understand the importance of data and how to organize it for use within your ML project. You will be introduced to tools which can help you identify and manage your data including JSON, visualization, NoSQL databases, and cloud platforms including Google Cloud Platform and Amazon Web Services.Practical Java Machine Learning includes multiple projects, with particular focus on the Android mobile platform and features such as sensors, camera, and connectivity, each of which produce data that can power unique machine learning solutions. You will learn to build a variety of applications that demonstrate the capabilities of the Google Cloud Platform machine learning API, including data visualization for Java; document classification using the Weka ML environment; audio file classification for Android using ML with spectrogram voice data; and machine learning using device sensor data.After reading this book, you will come away with case study examples and projects that you can take away as templates for re-use and exploration for your own machine learning programming projects with Java.What You Will LearnIdentify, organize, and architect the data required for ML projectsDeploy ML solutions in conjunction with cloud providers such as Google and AmazonDetermine which algorithm is the most appropriate for a specific ML problemImplement Java ML solutions on Android mobile devicesCreate Java ML solutions to work with sensor dataBuild Java streaming based solutionsWho This Book Is ForExperienced Java developers who have not implemented machine learning techniques before.

Practical JSF in Java EE 8: Web Applications ​in Java for the Enterprise

by Michael Müller

Master the Java EE 8 and JSF (JavaServer Faces) APIs and web framework with this practical, projects-driven guide to web development. This book combines theoretical background with a practical approach by building four real-world applications. By developing these JSF web applications, you'll take a tour through the other Java EE technologies such as JPA, CDI, Security, WebSockets, and more.In Practical JSF in Java EE 8, you will learn to use the JavaServer Faces web framework in Java EE 8 to easily construct a web-based user interface from a set of reusable components. Next, you add JSF event handling and then link to a database, persist data, and add security and the other bells and whistles that the Java EE 8 platform has to offer.After reading this book you will have a good foundation in Java-based web development and will have increased your proficiency in sophisticated Java EE 8 web development using the JSF framework.What You Will Learn Use the Java EE 8 and the JavaServer Faces APIs to build Java-based web applications through four practical real-world case studies Process user input with JSF and the expression language by building a calculator application Persist data using JSF templating and Java Persistence to manage an inventory of books Create and manage an alumni database using JSF, Ajax, web services and Java EE 8's security features. Who This Book Is For Those new to Java EE 8 and JSF. Some prior experience with Java is recommended.

Practical Linux Security Cookbook: Secure your Linux environment from modern-day attacks with practical recipes, 2nd Edition

by Tajinder Kalsi

Enhance file system security and learn about network attack, security tools and different versions of Linux build.Key FeaturesHands-on recipes to create and administer a secure Linux systemEnhance file system security and local and remote user authenticationUse various security tools and different versions of Linux for different tasksBook DescriptionOver the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. However, the reality is that Linux has its share of security flaws, and these security flaws allow attackers to get into your system and modify or even destroy your important data. But there’s no need to panic, since there are various mechanisms by which these flaws can be removed, and this book will help you learn about different types of Linux security to create a more secure Linux system. With a step-by-step recipe approach, the book starts by introducing you to various threats to Linux systems. Then, this book will walk you through customizing the Linux kernel and securing local files. Next, you will move on to managing user authentication both locally and remotely and mitigating network attacks. Later, you will learn about application security and kernel vulnerabilities. You will also learn about patching Bash vulnerability, packet filtering, handling incidents, and monitoring system logs. Finally, you will learn about auditing using system services and performing vulnerability scanning on Linux.By the end of this book, you will be able to secure your Linux systems and create a robust environment.What you will learnLearn about vulnerabilities and exploits in relation to Linux systemsConfigure and build a secure kernel and test itLearn about file permissions and how to securely modify filesAuthenticate users remotely and securely copy files on remote systemsReview different network security methods and toolsPerform vulnerability scanning on Linux machines using toolsLearn about malware scanning and read through logsWho this book is forThis book is intended for all those Linux users who already have knowledge of Linux file systems and administration. You should be familiar with basic Linux commands. Understanding information security and its risks to a Linux system is also helpful in understanding the recipes more easily.

Practical LTE based security forces PMR networks

by Arnaud Henry-Labordère

Security forces PMR networks are moving from proprietary technologies for their Mission Critical Push-To-Talk basic service, and their data services which must provide large bandwidth real-time access, to the databases. LTE Based is adopted with backup access to public MNOs to complement their own radio coverage. Specific technologies such as multicasting of visio are required so the MCPTT works within a restricted bandwidth. The need to be able to change the main MNOs to provide resilient coverage requires specific choices of SIM cards, with OTAble security domains. Practical LTE Based Security Forces PMR Networks assumes that the reader has a basic knowledge of the 4G network architecture and services, and the book focusses on the specific features and choices required to fulfill the need of security forces PMR networks. These include tactical and centralized, including LTE based voice services VoLTE and IMS. It can be used as a reference or textbook, with many detailed call flows and traces being included. The author, who has also a long teaching career in Operations Research, provides mathematical models for the optimization of tactical network federations, multicast coverage and allocation of preemptive priorities to PMR group members. He is a pioneer in the area of Virtual Roaming, an application of graph theory and telecommunications to provide roaming without direct relations, having previously published books on SMS Hubs, SS7 Hubs, Diameter Hubs, GTP Hubs. The use of M2M (monitoring devices) for security forces with mobility is covered in detail in the book, including the new LoRa virtual roaming which goes beyond the scope of PMR.

Refine Search

Showing 28,876 through 28,900 of 54,466 results