Browse Results

Showing 36,501 through 36,525 of 54,501 results

Language and Automata Theory and Applications: 14th International Conference, LATA 2020, Milan, Italy, March 4–6, 2020, Proceedings (Lecture Notes in Computer Science #12038)

by Alberto Leporati Carlos Martín-Vide Dana Shapira Claudio Zandron

This book constitutes the proceedings of the 14th International Conference on Language and Automata Theory and Applications, LATA 2020, which was planned to be held in Milan, Italy, in March 2020. Due to the corona pandemic, the actual conference was postponed and will be held together with LATA 2021.The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. They were organized in topical sections named: algebraic structures; automata; complexity; grammars; languages; trees and graphs; and words and codes. The book also contains 6 invited papers in full-paper length.

The Language of Images: The Forms and the Forces (Lecture Notes in Morphogenesis)

by Maria Giulia Dondero

This book deals with two fundamental issues in the semiotics of the image. The first is the relationship between image and observer: how does one look at an image? To answer this question, this book sets out to transpose the theory of enunciation formulated in linguistics over to the visual field. It also aims to clarify the gains made in contemporary visual semiotics relative to the semiology of Roland Barthes and Emile Benveniste. The second issue addressed is the relation between the forces, forms and materiality of the images. How do different physical mediums (pictorial, photographic and digital) influence visual forms? How does materiality affect the generativity of forms? On the forces within the images, the book addresses the philosophical thought of Gilles Deleuze and René Thom as well as the experiment of Aby Warburg’s Atlas Mnemosyne. The theories discussed in the book are tested on a variety of corpora for analysis, including both paintings and photographs, taken from traditional as well as contemporary sources in a variety of social sectors (arts and sciences). Finally, semiotic methodology is contrasted with the computational analysis of large collections of images (Big Data), such as the “Media Visualization” analyses proposed by Lev Manovich and Cultural Analytics in the field of Computer Science to evaluate the impact of automatic analysis of visual forms on Digital Art History and more generally on the image sciences.

Languages, Design Methods, and Tools for Electronic System Design: Selected Contributions from FDL 2018 (Lecture Notes in Electrical Engineering #611)

by Tom J. Kazmierski Sebastian Steinhorst Daniel Große

This book brings together a selection of the best papers from the twenty-first edition of the Forum on specification and Design Languages Conference (FDL), which took place on September 10-12, 2018, in Munich, Germany. FDL is a well-established international forum devoted to dissemination of research results, practical experiences and new ideas in the application of specification, design and verification languages to the design, modeling and verification of integrated circuits, complex hardware/software embedded systems, and mixed-technology systems.Covers Assertion Based Design, Verification & Debug;Includes language-based modeling and design techniques for embedded systems;Covers design, modeling and verification of mixed physical domain and mixed signal systems that include significant analog parts in electrical and non-electrical domains;Includes formal and semi-formal system level design methods for complex embedded systems based on the Unified Modelling Language (UML) and Model Driven Engineering (MDE).

Large-Scale Disk Failure Prediction: PAKDD 2020 Competition and Workshop, AI Ops 2020, February 7 – May 15, 2020, Revised Selected Papers (Communications in Computer and Information Science #1261)

by Cheng He Mengling Feng Patrick P. C. Lee Pinghui Wang Shujie Han Yi Liu

This book constitutes the thoroughly refereed post-competition proceedings of the AI Ops Competition on Large-Scale Disk Failure Prediction, conducted between February 7th and May 15, 2020 on the Alibaba Cloud Tianchi Platform. A dedicated workshop, featuring the best performing teams of the competition, was held at the 24th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2020, in Singapore, in April 2019. Due to the COVID-19 pandemic, the workshop was hosted online. This book includes 13 selected contributions: an introduction to dataset, selected approaches of the competing teams and the competition summary, describing the competition task, practical challenges, evaluation metrics, etc.

Large-scale Graph Analysis: System, Algorithm and Optimization (Big Data Management)

by Yingxia Shao Bin Cui Lei Chen

This book introduces readers to a workload-aware methodology for large-scale graph algorithm optimization in graph-computing systems, and proposes several optimization techniques that can enable these systems to handle advanced graph algorithms efficiently. More concretely, it proposes a workload-aware cost model to guide the development of high-performance algorithms. On the basis of the cost model, the book subsequently presents a system-level optimization resulting in a partition-aware graph-computing engine, PAGE. In addition, it presents three efficient and scalable advanced graph algorithms – the subgraph enumeration, cohesive subgraph detection, and graph extraction algorithms. This book offers a valuable reference guide for junior researchers, covering the latest advances in large-scale graph analysis; and for senior researchers, sharing state-of-the-art solutions based on advanced graph algorithms. In addition, all readers will find a workload-aware methodology for designing efficient large-scale graph algorithms.

Large-Scale Scientific Computing: 12th International Conference, LSSC 2019, Sozopol, Bulgaria, June 10–14, 2019, Revised Selected Papers (Lecture Notes in Computer Science #11958)

by Ivan Lirkov Svetozar Margenov

This book constitutes revised papers from the 12th International Conference on Large-Scale Scientific Computing, LSSC 2019, held in Sozopol, Bulgaria, in June 2019. The 70 papers presented in this volume were carefully reviewed and selected from 81 submissions. The book also contains two invited talks. The papers were organized in topical sections named as follows: control and optimization of dynamical systems; meshfree and particle methods; fractional diffusion problems: numerical methods, algorithms and applications; pore scale flow and transport simulation; tensors based algorithms and structures in optimization and applications; HPC and big data: algorithms and applications; large-scale models: numerical methods, parallel computations and applications; monte carlo algorithms: innovative applications in conjunctions with other methods; application of metaheuristics to large-scale problems; large scale machine learning: multiscale algorithms and performance guarantees; and contributed papers.

LATIN 2020: 14th Latin American Symposium, São Paulo, Brazil, January 5-8, 2021, Proceedings (Lecture Notes in Computer Science #12118)

by Yoshiharu Kohayakawa Flávio Keidi Miyazawa

This book constitutes the refereed proceedings of the 14th Latin American Symposium on Theoretical Informatics, LATIN 2020, held in Sao Paulo, Brazil, in January 2021. The 50 full papers presented in this book were carefully reviewed and selected from 136 submissions. The papers are grouped into these topics: approximation algorithms; parameterized algorithms; algorithms and data structures; computational geometry; complexity theory; quantum computing; neural networks and biologically inspired computing; randomization; combinatorics; analytic and enumerative combinatorics; graph theory.Due to the Corona pandemic the event was postponed from May 2020 to January 2021.

Lattice-Based Cryptosystems: A Design Perspective

by Jiang Zhang Zhenfeng Zhang

This book focuses on lattice-based cryptosystems, widely considered to be one of the most promising post-quantum cryptosystems and provides fundamental insights into how to construct provably secure cryptosystems from hard lattice problems. The concept of provable security is used to inform the choice of lattice tool for designing cryptosystems, including public-key encryption, identity-based encryption, attribute-based encryption, key change and digital signatures. Given its depth of coverage, the book especially appeals to graduate students and young researchers who plan to enter this research area.

Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)

by Sujoy Sinha Roy Ingrid Verbauwhede

This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.

Law 3.0: Rules, Regulation, and Technology

by Roger Brownsword

Putting technology front and centre in our thinking about law, this book introduces Law 3.0: the future of the legal landscape. Technology not only disrupts the traditional idea of what it is ‘to think like a lawyer,’ as per Law 1.0; it presents major challenges to regulators who are reasoning in a Law 2.0 mode. As this book demonstrates, the latest developments in technology offer regulators the possibility of employing a technical fix rather than just relying on rules – thus, we are introducing Law 3.0. Law 3.0 represents, so to speak, the state we are in and the conversation that we now need to have, and this book identifies some of the key points for discussion in that conversation. Thinking like a lawyer might continue to be associated with Law 1.0, but from 2020 onward, Law 3.0 is the conversation that we all need to join. And, as this book argues, law and the evolution of legal reasoning cannot be adequately understood unless we grasp the significance of technology in shaping both legal doctrine and our regulatory thinking. This is a book for those studying, or about to study, law – as well as others with interests in the legal, political, and social impact of technology.

Law, Technology and Cognition: The Human Element in Online Copyright Infringement (Routledge Research in Intellectual Property)

by Hayleigh Bosher

This book considers a new approach to online copyright infringement. Rather than looking at the subject within a purely technological context, it provides legal analysis from a human perspective. This book highlights that there are three key instances in which the capacity of a human mind intersects with the development of copyright regulation: (1) the development of copyright statutory law; (2) the interpretation of the copyright statutory law the judiciary; and (3) human interaction with new technology. Using a novel framework for constructing digital perspectives, the author, Dr Hayleigh Bosher, analyses the laws relating to online copyright infringement. She provides insights into why the law appears as it does, shedding light on the circumstances of how it came to pass and demonstrates a clear malfunction in the interpretation and application of copyright law to online activities that derives from the disconnect between the technological and the human perspectives. The book proposes putting the human element back into copyright analysis to enable the return of reason where it has been lost, and provide a clearer, more consistent and fair legal regulation of online copyright infringement. Law, Technology and Cognition: The Human Element in Online Copyright Infringement will be of interest to students, academics, researchers, as well as practitioners.

Laws of UX: Using Psychology to Design Better Products & Services

by Jon Yablonski

An understanding of psychology—specifically the psychology behind how users behave and interact with digital interfaces—is perhaps the single most valuable nondesign skill a designer can have. The most elegant design can fail if it forces users to conform to the design rather than working within the “blueprint” of how humans perceive and process the world around them. This practical guide explains how you can apply key principles in psychology to build products and experiences that are more intuitive and human-centered. Author Jon Yablonski deconstructs familiar apps and experiences to provide clear examples of how UX designers can build experiences that adapt to how users perceive and process digital interfaces.You’ll learn:How aesthetically pleasing design creates positive responsesThe principles from psychology most useful for designersHow these psychology principles relate to UX heuristicsPredictive models including Fitts’s law, Jakob’s law, and Hick’s lawEthical implications of using psychology in designA framework for applying these principles

Le Kindle Fire HD 8 & 10 Guide 2019 Mise À Jour: Moyens faciles et rapides pour comprendre votre Kindle Fire HD et solution aux problèmes courants

by Smith Anthony

THE KINDLE FIRE HD 8 & 10 GUIDE 2019 MISE À JOUR Les guides de ce manuel sont principalement destinés aux utilisateurs de KINDLE Fire qui n'ont rien appris de nouveau sur la façon de maximiser votre Kindle Fire HD 8 et 10. Vous obtiendrez de nouveaux trucs et astuces cachés qui vous permettront de maîtriser votre appareil. Ce manuel vous guidera pas à pas vers les fonctions avancées des processus Kindle Fire HD 8 et 10 sur la configuration initiale, les fonctions de base, les paramètres avancés et bien plus encore. D'autres informations importantes que vous obtiendrez de ce livre incluent ; Raison du Kindle Fire HD 8 et 10 Comment mettre en place Kindle feu HD 8 et 10 La meilleure façon de charger votre Kindle Fire HD 8 et 10 À L'AIDE D'UN ORDINATEUR À L'AIDE D'UN ADAPTATEUR MURAL Navigation sur l'écran de votre terminal Magasiner sur Amazon Fonctionnalité des trois boutons de l'écran de votre appareil Magasiner sur Amazon COMMENT FAIRE UN MIROIR DE VOTRE FEU ALLUMÉ HD À VOTRE TÉLÉVISEUR À L'AIDE D'UN BÂTON DE FEU Comment accélérer votre feu lent HD Mon feu allumé ne s'allume pas. Votre feu allumé HD ne se charge pas Mon feu allumé n'a pas de son Comment maximiser Alexa sur un feu HD Comprimé Possibilité de pouvoir changer la couleur du clavier Possibilité de changer le texte à la voix de la parole Arrêt automatique pour le Wi-Fi Possibilité d'avoir des émojis ou des émoticônes sur le clavier Possibilité de changer le comportement d'autocorrection Comment retrouver votre tablette perdue à l'aide du GPS Fonds d'écran Capacité de refléter votre feu de Kindle Ne tergiversez pas davantage, naviguez vers le haut et cliquez sur le bouton "ACHETER" pour obtenir ce manuel afin de maîtriser votre appareil et devenir un expert en K

Leadership OS: The Operating System You Need to Succeed

by Nik Kinley Shlomo Ben-Hur

Based on years of original research, this book controversially counters almost every existing leadership model and approach.It shows how as leaders rise to senior levels, their roles become less about doing things that directly drive results and more about directing and supporting others to achieve objectives. Using case studies and research insights the authors reveal how leadership success is thus not so much about having the right core capabilities, but about creating the right environment.Using the analogy of a smartphone operating system (OS), the book presents a new way of thinking about leadership. The authors provide a clear and practical framework to follow and show how your leadership OS becomes the impact you have, the imprint you make and the foundation of your legacy as a leader.After reading it, you will learn:· How to diagnose the impact you have as a leader and understand the OS you create· How famous business and societal leaders have created effective – and sometimes ineffective – OSs· How to optimise your OS to produce the best results· How to get people working together effectively, and be a high-performing leaderProviding you with practical and easy to follow advice, this book will show you how leadership success is not about having the core capabilities, but about creating the right operating systems for your organisation.

Leading Lean: Ensuring Success and Developing a Framework for Leadership

by Jean Dahl

Companies from startups to corporate giants face massive amounts of disruption today. Now more than ever, organizations need nimble and responsive leaders who know how to exploit the opportunities that change brings. In this insightful book, Jean Dahl, a senior executive and expert in the Lean mindset and its methods, demonstrates why you need to embrace Modern Lean principles and thinking to redefine leadership in this age of digital disruption in order to continuously evolve the Lean enterprise.Drawing on nearly three decades of corporate and consulting experience, Ms. Dahl lays out a new holistic framework for developing Modern Lean leaders. Through personal experiences and compelling real-world case studies, she explains specific steps necessary for you and your company to proactively understand and respond to change. <li>Understand the leadership challenges <li>Lean leaders face in our 21st century global economy <li>Explore the six dimensions of the Modern Lean Framework™ <li>Learn and apply the nine steps necessary to become a Lean leader <li>Use Modern Lean methods to build a culture of continuous learning that can be sustained and maintained within your organization <li>Seize competitive advantage by embracing Modern Lean to tbuild an enterprise that understands how to respond to disruption

Lean AI: How Innovative Startups Use Artificial Intelligence to Grow

by Lomit Patel

How can startups successfully scale customer acquisition and revenue growth with a Lean team? Out-of-the-box acquisition solutions from Facebook, Google, and others provide a good start, but the companies that can tailor those solutions to meet their specific needs, objectives, and goals will come out winners. But that hasn’t been an easy task—until now.With this practical book, author Lomit Patel shows you how to use AI and automation to provide an operational layer atop those acquisition solutions to deliver amazing results for your company. You’ll learn how to adapt, customize, and personalize cross-channel user journeys to help your company attract and retain customers—to usher in the new age of Autonomous Marketing.Learn how AI and automation can support the customer acquisition efforts of a Lean startupDive into Customer Acquisition 3.0, an initiative for gaining and retaining customersExplore ways to use AI for marketing purposesUnderstand the key metrics for determining the growth of your startupDetermine the right strategy to foster user acquisition in your companyManage the increased complexity and risk inherent in AI projects

Learn Amazon SageMaker: A guide to building, training, and deploying machine learning models for developers and data scientists

by Julien Simon Francesco Pochetti

Quickly build and deploy machine learning models without managing infrastructure, and improve productivity using Amazon SageMaker's capabilities such as Amazon SageMaker Studio, Autopilot, Experiments, Debugger, and Model Monitor Key Features Build, train, and deploy machine learning models quickly using Amazon SageMaker Analyze, detect, and receive alerts relating to various business problems using machine learning algorithms and techniques Improve productivity by training and fine-tuning machine learning models in production Book Description Amazon SageMaker enables you to quickly build, train, and deploy machine learning (ML) models at scale, without managing any infrastructure. It helps you focus on the ML problem at hand and deploy high-quality models by removing the heavy lifting typically involved in each step of the ML process. This book is a comprehensive guide for data scientists and ML developers who want to learn the ins and outs of Amazon SageMaker. You'll understand how to use various modules of SageMaker as a single toolset to solve the challenges faced in ML. As you progress, you'll cover features such as AutoML, built-in algorithms and frameworks, and the option for writing your own code and algorithms to build ML models. Later, the book will show you how to integrate Amazon SageMaker with popular deep learning libraries such as TensorFlow and PyTorch to increase the capabilities of existing models. You'll also learn to get the models to production faster with minimum effort and at a lower cost. Finally, you'll explore how to use Amazon SageMaker Debugger to analyze, detect, and highlight problems to understand the current model state and improve model accuracy. By the end of this Amazon book, you'll be able to use Amazon SageMaker on the full spectrum of ML workflows, from experimentation, training, and monitoring to scaling, deployment, and automation. What you will learn Create and automate end-to-end machine learning workflows on Amazon Web Services (AWS) Become well-versed with data annotation and preparation techniques Use AutoML features to build and train machine learning models with AutoPilot Create models using built-in algorithms and frameworks and your own code Train computer vision and NLP models using real-world examples Cover training techniques for scaling, model optimization, model debugging, and cost optimization Automate deployment tasks in a variety of configurations using SDK and several automation tools Who this book is for This book is for software engineers, machine learning developers, data scientists, and AWS users who are new to using Amazon SageMaker and want to build high-quality machine learning models without worrying about infrastructure. Knowledge of AWS basics is required to grasp the concepts covered in this book more effectively. Some understanding of machine learning concepts and the Python programming language will also be beneficial.

Learn Android Studio 4: Efficient Java-Based Android Apps Development

by Ted Hagos

Build and deploy your Java-based Android apps using the popular and efficient Android Studio 4 suite of tools, an integrated development environment (IDE) for today's Android developers. With this book, you’ll learn the latest and most productive tools in the Android tools ecosystem, ensuring quick Android app development and minimal effort on your part. Among these tools, you'll use the new Android Studio 4 features, including an upgraded CPU profiler UI, a new build speed window, the multi-preview feature, and the live layout inspector. After reading and using this book, you'll be able to efficiently build complete Java-based Android apps that run on any Android smartphone, tablet, smart watch and more. You’ll also be able to publish those apps and sell them online and in the Google Play store. What You Will Learn Use Android Studio 4 to quickly and confidently build your first Android apps Build an Android user interface using activities and layouts, event handling, images, menus, and the action bar Work with new tools in Android Studio 4: Jetpack compose support, a smart editor for ProGuard rules, a new motion layout editor, a new Android Gradle plugin, and a fragment wizard with new fragment templates Integrate data with data persistence Access the cloud Who This Book Is For Those who may be new to Android Studio 4 or Android Studio in general. You may or may not be new to Android development. Some prior experience with Java is recommended.

Learn Azure Administration: Solve your cloud administration issues relating to networking, storage, and identity management speedily and efficiently

by Kamil Mrzyglod

Enhance your Azure administration and Azure DevOps skills and get up and running with networking, security, automation, and effective cost managementKey FeaturesExplore a variety of administration patterns used for different cloud architecturesDiscover best practices for administering various IT systems hosted in AzureAdminister, automate, and manage your Azure cloud environment effectivelyBook DescriptionMicrosoft Azure is one of the upcoming cloud platforms that provide cost-effective solutions and services to help businesses overcome complex infrastructure-related challenges. This book will help you scale your cloud administration skills with Microsoft Azure.Learn Azure Administration starts with an introduction to the management of Azure subscriptions, and then takes you through Azure resource management. Next, you'll configure and manage virtual networks and find out how to integrate them with a set of Azure services. You'll then handle the identity and security for users with the help of Azure Active Directory, and manage access from a single place using policies and defined roles. As you advance, you'll get to grips with receipts to manage a virtual machine. The next set of chapters will teach you how to solve advanced problems such as DDoS protection, load balancing, and networking for containers. You'll also learn how to set up file servers, along with managing and storing backups. Later, you'll review monitoring solutions and backup plans for a host of services. The last set of chapters will help you to integrate different services with Azure Event Grid, Azure Automation, and Azure Logic Apps, and teach you how to manage Azure DevOps.By the end of this Azure book, you'll be proficient enough to easily administer your Azure-based cloud environment.What you will learnExplore different Azure services and understand the correlation between themSecure and integrate different Azure componentsWork with a variety of identity and access management (IAM) modelsFind out how to set up monitoring and logging solutionsBuild a complete skill set of Azure administration activities with Azure DevOpsDiscover efficient scaling patterns for small and large workloadsWho this book is forThis book is for cloud administrators, system administrators, and IT professionals who want to scale up their skillset and enter the world of cloud computing. IT professionals and engineers who are already familiar with the basics of the Azure services and are looking for a step-by-step guide to solving the most common Azure problems will also find this book useful. Basic understanding of cloud concepts such as IaaS, PaaS, virtualization, networking, and common Azure services is required.

Learn Azure in a Month of Lunches

by Iain Foulds

Learn Azure in a Month of Lunches, Second Edition, is a tutorial on writing, deploying, and running applications in Azure. In it, you&’ll work through 21 short lessons that give you real-world experience. Each lesson includes a hands-on lab so you can try out and lock in your new skills.Summary You can be incredibly productive with Azure without mastering every feature, function, and service. Learn Azure in a Month of Lunches, Second Edition gets you up and running quickly, teaching you the most important concepts and tasks in 21 practical bite-sized lessons. As you explore the examples, exercises, and labs, you'll pick up valuable skills immediately and take your first steps to Azure mastery! This fully revised new edition covers core changes to the Azure UI, new Azure features, Azure containers, and the upgraded Azure Kubernetes Service. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Microsoft Azure is vast and powerful, offering virtual servers, application templates, and prebuilt services for everything from data storage to AI. To navigate it all, you need a trustworthy guide. In this book, Microsoft engineer and Azure trainer Iain Foulds focuses on core skills for creating cloud-based applications. About the book Learn Azure in a Month of Lunches, Second Edition, is a tutorial on writing, deploying, and running applications in Azure. In it, you&’ll work through 21 short lessons that give you real-world experience. Each lesson includes a hands-on lab so you can try out and lock in your new skills. What's inside Understanding Azure beyond point-and-click Securing applications and data Automating your environment Azure services for machine learning, containers, and more About the reader This book is for readers who can write and deploy simple web or client/server applications. About the author Iain Foulds is an engineer and senior content developer with Microsoft. Table of Contents PART 1 - AZURE CORE SERVICES 1 Before you begin 2 Creating a virtual machine 3 Azure Web Apps 4 Introduction to Azure Storage 5 Azure Networking basics PART 2 - HIGH AVAILABILITY AND SCALE 6 Azure Resource Manager 7 High availability and redundancy 8 Load-balancing applications 9 Applications that scale 10 Global databases with Cosmos DB 11 Managing network traffic and routing 12 Monitoring and troubleshooting PART 3 - SECURE BY DEFAULT 13 Backup, recovery, and replication 14 Data encryption 15 Securing information with Azure Key Vault 16 Azure Security Center and updates PART 4 - THE COOL STUFF 17 Machine learning and artificial intelligence 18 Azure Automation 19 Azure containers 20 Azure and the Internet of Things 21 Serverless computing

Learn Azure Sentinel: Integrate Azure security with artificial intelligence to build secure cloud systems

by Richard Diver Gary Bushey Jason S. Rader

Understand how to set up, configure, and use Azure Sentinel to provide security incident and event management services for your environment Key Features Secure your network, infrastructure, data, and applications on Microsoft Azure effectively Integrate artificial intelligence, threat analysis, and automation for optimal security solutions Investigate possible security breaches and gather forensic evidence to prevent modern cyber threats Book Description Azure Sentinel is a Security Information and Event Management (SIEM) tool developed by Microsoft to integrate cloud security and artificial intelligence (AI). Azure Sentinel not only helps clients identify security issues in their environment, but also uses automation to help resolve these issues. With this book, you'll implement Azure Sentinel and understand how it can help find security incidents in your environment with integrated artificial intelligence, threat analysis, and built-in and community-driven logic. This book starts with an introduction to Azure Sentinel and Log Analytics. You'll get to grips with data collection and management, before learning how to create effective Azure Sentinel queries to detect anomalous behaviors and patterns of activity. As you make progress, you'll understand how to develop solutions that automate the responses required to handle security incidents. Finally, you'll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this book, you'll have learned how to implement Azure Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues. What you will learn Understand how to design and build a security operations center Discover the key components of a cloud security architecture Manage and investigate Azure Sentinel incidents Use playbooks to automate incident responses Understand how to set up Azure Monitor Log Analytics and Azure Sentinel Ingest data into Azure Sentinel from the cloud and on-premises devices Perform threat hunting in Azure Sentinel Who this book is for This book is for solution architects and system administrators who are responsible for implementing new solutions in their infrastructure. Security analysts who need to monitor and provide immediate security solutions or threat hunters looking to learn how to use Azure Sentinel to investigate possible security breaches and gather forensic evidence will also benefit from this book. Prior experience with cloud security, particularly Azure, is necessary.

Learn Blockchain by Building One: A Concise Path to Understanding Cryptocurrencies

by Daniel van Flymen

As crytpocurrencies and their underlying data structure, blockchains, become further intertwined in our daily lives, a full understanding of them is essential to anyone who wants to keep up and remain informed of the future of finance. There is no better learning method than a hands-on one, and Learn Blockchain by Building One offers just that.Develop your own blockchain using Python with step-by-step instructions from author Daniel van Flyman, an expert in the field. You will come away with a confident working knowledge of popular cryptocurrencies such as Bitcoin and Ethereum and which foundations make them work. Through helpful exercises and real-world examples, you will understand the core concepts of peer-to-peer networking, Proof of Work, hashing, encryption, and digital signatures.Learn Blockchain by Building One gives you timely, real-world lessons in blockchain and cryptocurrencies that you will need as our modern society becomes increasingly digitally sophisticated. The lasting implications of such technology, such as the security of personal transactions and the role of government regulation, are not to be underestimated. Stay ahead of the curve and become a confident blockchain builder now!What You Will LearnDevelop a fully-fledged blockchain in PythonObtain a ground-up understanding of of Proof of WorkGrasp core cryptographic concepts, such as hashing, encryption, and digital signaturesUnderstand how gossip protocols and peer-to-peer networking works by implementing a TCP client-serverRealize the differences and trade-offs between popular blockchains such as Bitcoin and Ethereum Who This Book Is For This book is aimed at intermediate programmers in any area from finance to academia. Readers should be comfortable reading and writing basic Python.

Learn C# Programming: A guide to building a solid foundation in C# language for writing efficient programs

by Marius Bancila Raffaele Rialdi Ankit Sharma Dino Esposito

Get started with C# and strengthen your knowledge of core programming concepts such as procedural, object-oriented, generic, functional, and asynchronous programming along with the latest features of C# 8 Key Features Learn the fundamentals of C# with the help of easy-to-follow examples and explanations Leverage the latest features of C# 8, including nullable reference types, pattern matching enhancements, and asynchronous streams Explore object-oriented programming, functional programming, and multithreading concepts Book Description The C# programming language is often developers' primary choice for creating a wide range of applications for desktop, cloud, and mobile. In nearly two decades of its existence, C# has evolved from a general-purpose, object-oriented language to a multi-paradigm language with impressive features. This book will take you through C# from the ground up in a step-by-step manner. You'll start with the building blocks of C#, which include basic data types, variables, strings, arrays, operators, control statements, and loops. Once comfortable with the basics, you'll then progress to learning object-oriented programming concepts such as classes and structures, objects, interfaces, and abstraction. Generics, functional programming, dynamic, and asynchronous programming are covered in detail. This book also takes you through regular expressions, reflection, memory management, pattern matching, exceptions, and many other advanced topics. As you advance, you'll explore the .NET Core 3 framework and learn how to use the dotnet command-line interface (CLI), consume NuGet packages, develop for Linux, and migrate apps built with .NET Framework. Finally, you'll understand how to run unit tests with the Microsoft unit testing frameworks available in Visual Studio. By the end of this book, you'll be well-versed with the essentials of the C# language and be ready to start creating apps with it. What you will learn Get to grips with all the new features of C# 8 Discover how to use attributes and reflection to build extendable applications Utilize LINQ to uniformly query various sources of data Use files and streams and serialize data to JSON and XML Write asynchronous code with the async-await pattern Employ .NET Core tools to create, compile, and publish your applications Create unit tests with Visual Studio and the Microsoft unit testing frameworks Who this book is for If you have little experience in coding or C# and want to learn the essentials of C# programming to develop powerful programming techniques, this book is for you. It will also help aspiring programmers to write scripts or programs to accomplish specific tasks.

Learn C Programming: A beginner's guide to learning C programming the easy and disciplined way

by Jeff Szuhay

Get started with writing simple programs in C while learning the skills that will help you work with practically any programming language Key Features Learn essential C concepts such as variables, data structures, functions, loops, and pointers Get to grips with the core programming aspects that form the base of many modern programming languages Explore the expressiveness and versatility of the C language with the help of sample programs Book Description C is a powerful general-purpose programming language that is excellent for beginners to learn. This book will introduce you to computer programming and software development using C. If you're an experienced developer, this book will help you to become familiar with the C programming language. This C programming book takes you through basic programming concepts and shows you how to implement them in C. Throughout the book, you'll create and run programs that make use of one or more C concepts, such as program structure with functions, data types, and conditional statements. You'll also see how to use looping and iteration, arrays, pointers, and strings. As you make progress, you'll cover code documentation, testing and validation methods, basic input/output, and how to write complete programs in C. By the end of the book, you'll have developed basic programming skills in C, that you can apply to other programming languages and will develop a solid foundation for you to advance as a programmer. What you will learn Understand fundamental programming concepts and implement them in C Write working programs with an emphasis on code indentation and readability Break existing programs intentionally and learn how to debug code Adopt good coding practices and develop a clean coding style Explore general programming concepts that are applicable to more advanced projects Discover how you can use building blocks to make more complex and interesting programs Use C Standard Library functions and understand why doing this is desirable Who this book is for This book is written for two very diverse audiences. If you're an absolute beginner who only has basic familiarity with operating a computer, this book will help you learn the most fundamental concepts and practices you need to know to become a successful C programmer. If you're an experienced programmer, you'll find the full range of C syntax as well as common C idioms. You can skim through the explanations and focus primarily on the source code provided.

Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence

by William Oettinger

Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedings Key Features Learn the core techniques of computer forensics to acquire and secure digital evidence skillfully Conduct a digital forensic examination and document the digital evidence collected Analyze security systems and overcome complex challenges with a variety of forensic investigations Book Description A computer forensics investigator must possess a variety of skills, including the ability to answer legal questions, gather and document evidence, and prepare for an investigation. This book will help you get up and running with using digital forensic tools and techniques to investigate cybercrimes successfully. Starting with an overview of forensics and all the open source and commercial tools needed to get the job done, you'll learn core forensic practices for searching databases and analyzing data over networks, personal devices, and web applications. You'll then learn how to acquire valuable information from different places, such as filesystems, e-mails, browser histories, and search queries, and capture data remotely. As you advance, this book will guide you through implementing forensic techniques on multiple platforms, such as Windows, Linux, and macOS, to demonstrate how to recover valuable information as evidence. Finally, you'll get to grips with presenting your findings efficiently in judicial or administrative proceedings. By the end of this book, you'll have developed a clear understanding of how to acquire, analyze, and present digital evidence like a proficient computer forensics investigator. What you will learn Understand investigative processes, the rules of evidence, and ethical guidelines Recognize and document different types of computer hardware Understand the boot process covering BIOS, UEFI, and the boot sequence Validate forensic hardware and software Discover the locations of common Windows artifacts Document your findings using technically correct terminology Who this book is for If you're an IT beginner, student, or an investigator in the public or private sector this book is for you.This book will also help professionals and investigators who are new to incident response and digital forensics and interested in making a career in the cybersecurity domain.

Refine Search

Showing 36,501 through 36,525 of 54,501 results