Browse Results

Showing 54,476 through 54,500 of 54,505 results

Culture and Computing: 12th International Conference, C&C 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 29 – July 4, 2024, Proceedings (Lecture Notes in Computer Science #14717)

by Matthias Rauterberg

This LNCS 14717 constitutes the thoroughly refereed proceedings of the 12th International Conference, Culture and Computing 2024, C&C 2024, held as part of the 26th International Conference on Human-Computer Interaction, HCI International 2024 (HCII 2024), was held as a hybrid event in Washington DC, USA, during June/July 2024. The total of 1271 papers and 309 posters included in the HCII 2023 proceedings was carefully reviewed and selected from 5108 submissions. The C&C 2024 conference focuses on topics related to User Experience Design for Seamless Cultural Experiences, Technology, Art, and Culture, Innovations in Digital Cultural Representation, and Biemodernism and Cultural Computing.

Mathematische Grundlagen der Informatik: Mathematisches Denken und Beweisen - Eine Einführung

by Christoph Meinel Martin Mundhenk

Die mathematischen Grundlagen der Informatik werden anhand von Definitionen und Beispielen anschaulich eingeführt. Ziel des Buches, nun in einer korrigierten und aktualisierten Fassung, ist es, systematisch die für die Informatik typischen und grundlegenden mathematischen Denkweisen vorzustellen – ohne dabei auf besondere, die übliche Schulmathematik übersteigende Vorkenntnisse aufzubauen.

Pervasive Computing Technologies for Healthcare: 17th EAI International Conference, PervasiveHealth 2023, Malmö, Sweden, November 27-29, 2023, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #572)

by Pieter Van Gorp Dario Salvi Syed Ahmar Shah

This book constitutes the refereed proceedings of the 17th EAI International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2023, held in Malmö, Sweden, during November 27-29, 2023. The 29 full papers and 6 short papers were selected from 90 submissions and are organized in thematic sessions as follows: Pervasive Mental Health; Privacy, Ethics and Regulations; Datasets and Big data Processing; Pervasive health for Carers; Pervasive Health in Clinical Practice; Remote Monitoring; Patient and User Aspects; Motion and rehabilitation; Workshop on the Internet of Things in Health Research; Posters and demos (non indexed annex).

Attacks, Defenses and Testing for Deep Learning

by Jinyin Chen Ximin Zhang Haibin Zheng

This book provides a systematic study on the security of deep learning. With its powerful learning ability, deep learning is widely used in CV, FL, GNN, RL, and other scenarios. However, during the process of application, researchers have revealed that deep learning is vulnerable to malicious attacks, which will lead to unpredictable consequences. Take autonomous driving as an example, there were more than 12 serious autonomous driving accidents in the world in 2018, including Uber, Tesla and other high technological enterprises. Drawing on the reviewed literature, we need to discover vulnerabilities in deep learning through attacks, reinforce its defense, and test model performance to ensure its robustness. Attacks can be divided into adversarial attacks and poisoning attacks. Adversarial attacks occur during the model testing phase, where the attacker obtains adversarial examples by adding small perturbations. Poisoning attacks occur during the model training phase, wherethe attacker injects poisoned examples into the training dataset, embedding a backdoor trigger in the trained deep learning model. An effective defense method is an important guarantee for the application of deep learning. The existing defense methods are divided into three types, including the data modification defense method, model modification defense method, and network add-on method. The data modification defense method performs adversarial defense by fine-tuning the input data. The model modification defense method adjusts the model framework to achieve the effect of defending against attacks. The network add-on method prevents the adversarial examples by training the adversarial example detector. Testing deep neural networks is an effective method to measure the security and robustness of deep learning models. Through test evaluation, security vulnerabilities and weaknesses in deep neural networks can be identified. By identifying and fixing these vulnerabilities, the security and robustness of the model can be improved. Our audience includes researchers in the field of deep learning security, as well as software development engineers specializing in deep learning.

Erweiterte virtuelle Prototypen für heterogene Systeme

by Rolf Drechsler Daniel Große Muhammad Hassan

Dieses Buch beschreibt eine umfassende Kombination von Methoden, die den modernen Virtual Prototype (VP)-basierten Verifikationsfluss für heterogene Systems-on-Chip (SOCs) stark verbessern. Insbesondere kombiniert das Buch Verifikations- und Analyseaspekte über verschiedene Stufen des VP-basierten Verifikationsflusses hinweg und bietet eine neue Perspektive auf die Verifikation, indem es fortschrittliche Techniken wie metamorphes Testen, Datenfluss-Testen und Informationsfluss-Testen einsetzt. Darüber hinaus legt das Buch einen starken Schwerpunkt auf fortschrittliche, abdeckungsorientierte Methoden zur Verifizierung des funktionalen Verhaltens des SOC sowie zur Gewährleistung seiner Sicherheit.Bietet eine umfassende Einführung in den modernen VP-basierten Verifikationsablauf für heterogene SOCs;Stellt eine neuartige metamorphe Testtechnik für heterogene SOCs vor, die keine Referenzmodelle erfordert;Enthält automatisierte, fortschrittliche, auf Datenflussabdeckung basierende Methoden, die auf SystemC/AMS-basierte VP zugeschnitten sind;Beschreibt erweiterte funktionale abdeckungsgesteuerte Methoden zur Verifizierung verschiedener funktionaler Verhaltensweisen von RF-Verstärkern.

Grundwissen Elektrotechnik und Elektronik: Eine leicht verständliche Einführung

by Martin Poppe Leonhard Stiny

Das Buch vermittelt die Grundlagen der Elektrotechnik und Elektronik in einer Form, die auch für den Anfänger ohne Kenntnisse in höherer Mathematik oder komplexer Physik geeignet ist. Fortgeschrittene finden ferner mathematisch anspruchsvollere Abschnitte zur Vertiefung. Ein großer Vorteil des Buches liegt in der äußerst logischen inhaltlichen Gliederung und in einer klaren Sprache. Es wird stets vom Einfachen zum Schwierigeren fortgeschritten und darauf geachtet, dass Fachbegriffe nicht als bekannt vorausgesetzt werden. Am Anfang wird von einfachen mechanischen Modellvorstellungen mit bildhaften Vergleichen zur Elektrizität ausgegangen. Später folgt ein Übergang zu formalen physikalischen Betrachtungen, die durch mathematische Zusammenhänge beschrieben werden. Zahlreiche Übungsaufgaben mit ausführlichen Lösungen ermöglichen ein Selbststudium. Durch die Berechnung eines gleichen Sachverhaltes mit unterschiedlichen Analyseverfahren werden mögliche Vorgehensweisen geübt.

Alibaba's World: How a Remarkable Chinese Company Is Changing the Face of Global Business

by Porter Erisman

In September 2014, a Chinese company that most Americans had never heard of held the largest IPO in history – bigger than Google, Facebook and Twitter combined. Alibaba, now the world's largest e-commerce company, mostly escaped Western notice for over ten years, while building a customer base more than twice the size of Amazon's, and handling the bulk of e-commerce transactions in China. How did it happen? And what was it like to be along for such a revolutionary ride?In Alibaba's World, author Porter Erisman, one of Alibaba's first Western employees and its head of international marketing from 2000 to 2008, shows how Jack Ma, a Chinese schoolteacher who twice failed his college entrance exams, rose from obscurity to found Alibaba and lead it from struggling startup to the world's most dominant e-commerce player. He shares stories of weathering the dotcom crash, facing down eBay and Google, negotiating with the unpredictable Chinese government, and enduring the misguided advice of foreign experts, all to build the behemoth that's poised to sweep the ecommerce world today. And he analyzes Alibaba's role as a harbinger of the new global business landscape—with its focus on the East rather than the West, emerging markets over developed ones, and the nimble entrepreneur over the industry titan. As we face this near future, the story of Alibaba—and its inevitable descendants—is both essential and instructive.

New Frontiers in Artificial Intelligence: JSAI-isAI 2023 International Workshops, JURISIN, SCIDOCA, EmSemi and AI-Biz, Kumamoto, Japan, June 4-6, 2023, Revised Selected Papers (Lecture Notes in Computer Science #14644)

by Ken Satoh Setsuya Kurahashi Yasufumi Takama Le-Minh Nguyen Mayumi Bono

This LNAI volume 14644 constitutes the revised selected papers of JSAI-isAI 2023 International Workshops, JURISIN, SCIDOCA, EmSemi and AI-Biz, in Kumamoto, in Japan, held in June 2023. The 15 full papers included in this volume were carefully reviewed and selected from 52 submissions. JSAI-isAI 2023 hosted four workshops (JURISIN 2023, SCIDOCA 2023, EmSemi2023, and AI-Biz 2023): The 17th International Workshop on Juris-informatics (JURISIN 2023) details legal issues from the perspective of information science. It covers various topics, including models of legal reasoning, argumentation agents, legal ontologies, legal knowledge bases, computerized legal education, AI legal problems, legal document analysis, natural language processing for law. The 7th International Workshop on Scientific Document Analysis (SCIDOCA2023) is an annual international workshop focusing on various aspects and perspectives of scientific document analysis for their effcient use and exploration. The first International Workshop on Embodied Semiotics (EmSemi2023) focuses on developing a ”multimodal semiotic” approach to the existing semiotics discussed in the fields of linguistics and philosophy of language, focusing on the phenomena such as gestures and signs in language interactions, which have not yet been clearly characterized as symbols. The International Workshop on Artificial Intelligence of and for Business (AI-Biz 2023) focuses on the vast business and AI technology fields. It covers various topics, including investment strategy, Stock market, mergers and acquisitions, online advertisement, knowledge extraction, power market, collaborative multi-agent, visualization, COVID-19 infections, classification, fake news, wide and deep learning.

Introduction to Python Network Automation Volume I - Laying the Groundwork: The Essential Skills for Growth

by Brendan Choi

Welcome to Introduction to Python Network Automation Volume I: Laying the Groundwork. In this first part of our comprehensive guide, you'll embark on a transformative journey into the world of network automation. Whether you're new to the IT field or seeking to strengthen your existing skills, this book serves as your roadmap to mastering the foundational skills essential for success in network automation. You'll begin your exploration by delving into the fundamentals of Python network automation, laying a solid foundation for your learning journey. Equipped with essential Python skills, you'll leverage them for network administration tasks, particularly on the Windows platform. Reinforce your understanding through targeted exercises designed to enhance your proficiency and navigate the complexities of VMware Workstation as you master virtualization techniques crucial for setting up your network automation environment. You’ll then venture into Linux fundamentals, learning to set up and configure server environments tailored for network automation tasks while gaining a deep understanding of file systems and TCP/IP services in Linux. Explore the power of regular expressions as you streamline network automation tasks with precision and efficiency. Discover GNS3, a vital tool for network emulation, enabling you to test and validate network designs and put your skills to the test by tackling real-world network challenges in a comprehensive lab scenario. This book provides the essential knowledge and practical experience needed to thrive in the rapidly evolving field of network automation. Whether you're new to network automation or seeking to strengthen your existing skills, this book will unlock the vast potential of network automation and empower you to excel in this exciting field. What You'll Learn Learn Python fundamentals and effective network automation strategies. Use Python for various network administration tasks, improving efficiency. Understand Linux basics and IP service installation techniques. Apply regular expressions in Python for data processing. Create a network automation lab with VMware Workstation for hands-on practice. Who This Book Is For IT engineers and developers, network managers and students, who would like to learn network automation using Python.

The Influential Project Manager: Winning Over Team Members and Stakeholders (Best Practices in Portfolio, Program, and Project Management)

by Alfonso Bucero MSc PMP PMI-RMP PMI F

All best practice recommendations and key success criteria point to the importance of developing soft skills as a project manager, but few sources exist about how to develop the power of influence for achieving better project and business results. Filling this need, this book supplies readers with guidance on how to improve their influence skills to achieve better business results. It explains how to set and meet ambitious goals for you, your team, and your stakeholders. It describes how to listen actively to influence people and how to build partnerships that can pay dividends for a lifetime.

Trade Secret Theft, Industrial Espionage, and the China Threat

by Carl Roper

This book provides an overview of economic espionage as practiced by a range of nations from around the world focusing on the mass scale in which information is being taken for China's growth and development. It supplies an understanding of how the economy of a nation can prosper or suffer, depending on whether that nation is protecting its intellectual property, or whether it is stealing such property for its own use. The text concludes by outlining specific measures that corporations and their employees can practice to protect information and assets, both at home and abroad.

Elternratgeber: Sicher im Netz für Dummies (Für Dummies)

by Markus Widl

Sichere Mediennutzung begleiten Welche Apps und Dienste fördern und unterhalten Ihr Kind, wo lauert Gefahr? Mit diesem Buch richten Sie Smartphones, Tablets, PCs und Spielekonsolen altersgerecht ein und vermitteln Ihrem Kind fundiert den richtigen Umgang mit (Online-)Medien. Sie verstehen, wie bei Kindern und Jugendlichen verbreitete Apps oder Dienste auf allen gängigen Gerätetypen funktionieren und vernetzt sind. Und wie Sie die Zugriffsmöglichkeiten so steuern, wie Sie es für Ihr Kind für geeignet halten. So kann Ihr Kind sicher surfen, spielen oder soziale Netzwerke nutzen. Sie erfahren Wie Kinder digitale Medien nutzen Was erlaubt ist und was nicht Welche Einstellungen Sie kennen sollten Wie Sie sich und Ihre Kinder vor digitalen Angriffen schützen

Understanding Computer Organization: A Guide to Principles Across RISC-V, ARM Cortex, and Intel Architectures (Undergraduate Topics in Computer Science)

by Patricio Bulić

This textbook unlocks modern computer organizations' secrets, with real-world examples from RISC-V, ARM, and Intel-based computer systems. The guide provides a comprehensive yet accessible explanation of fundamental principles and components and serves as a gateway to mastering the interplay between hardware and software. It demystifies complex concepts and provides clear explanations and practical insights into their roles in computing systems. Topics and features: Provides comprehensive coverage of computer organization principles across three major architectures (RISC-V, ARM Cortex, and Intel), ensuring a broad understanding of modern computing Includes numerous practical explanations using real-world examples from each architecture, offering hands-on insights into memory-mapped I/O, interrupts, DMA, and various memory technologies Presents detailed exploration of diverse components such as interrupts and their usage, interrupt controllers, DMA transfers, and DMA controllers Offers exploration of DDRx SDRAM memory, SDRAM controllers, DIMM modules, caches, and virtual memory Concise and yet thorough, this useful textbook/guide equips readers with the knowledge and skills needed to navigate the complexities of computer organization, making it essential reading for students and professionals.

Big Data: 9th CCF Conference, BigData 2021, Guangzhou, China, January 8–10, 2022, Revised Selected Papers (Communications in Computer and Information Science #1496)

by Li Wang Yang Gao Wei Zhao Yinghuan Shi Nong Xiao Dan Huang Xiangke Liao Enhong Chen Changdong Wang

This book constitutes the proceedings of the 9th CCF Conference on Big Data, BigData 2021, held in Guangzhou, China, in January 2022. Due to the COVID-19 pandemic BigData 2021 was postponed to 2022. The 21 full papers presented in this volume were carefully reviewed and selected from 66 submissions. They present recent research on theoretical and technical aspects on big data, as well as on digital economy demands in big data applications.

Algorithmic Trading Systems and Strategies: Design, Build, and Maintain an Effective Strategy Search Mechanism

by Viktoria Dolzhenko

Design and develop a complex trading system from idea to operation. Old approaches were based on manually searching for strategy ideas. This book shows you how to create a system that will generate, optimize, and launch profitable strategies into a fully automatic mode. Imagine a system that only requires access to the Internet and electricity from a trader. This book describes the architecture and features of such a system and provides recommendations for further development. Most books cover only the implementation stage and overlook the design and maintenance of these systems. Here, you’ll walk through the entire process of creating a complex, scalable and easily supported system. For example, you’ll design an application based on microservice architecture and learn about development environments. You’ll also examine the advantages of horizontal scaling in the context of creating trading systems. Along the way, you’ll set up Kubernetes, connect the monitoring system. and understand the intricacies of continuous integration and continuous delivery. Testing and identifying only dozens of strategies is a thing of the past. Algorithmic Trading Systems and Strategies: A New Approach shows you how to analyze thousands in the same amount of time.

Screening by International Aid Organizations Operating in the Global South: Mitigating Risks of Generosity

by Beata Paragi

Aid organizations usually embrace the idea of digitalization, both in terms of using diverse technologies and processing data digitally for improving their services, making their operations more efficient and even mitigating various risks. While digital fundraising, the use of biometric ID systems or digitalized cash and voucher assistance enjoys widespread attention both in academic and practitioner circles, it is less known how aid organizations navigate between counterterrorism legislations and data protection laws in technical terms. Limiting the discussion to the EU General Data Protection Regulation and by conceptualizing screening — commonly used to prevent the use of donor money for illicit purposes, money-laundering, terrorism finance or corruption — as a data processing operation conducted by larger international aid organizations operating in the Global South, this book focuses on the matter of ‘transparency’ and ‘right to information’ being at the nexus ofsurveillance studies and privacy studies. By means of legal and social science methods, it simultaneously explores screening in light of classic surveillance and analyses whether opacity around screening by NGOs (data controllers) is in line with the spirit of European Union data protection regime from the perspective of individuals (data subjects). In so doing, Paragi also contributes to the discussion on the politics of transparency and highlights the dilemmas and challenges aid organizations operating in authoritarian regimes or conflict settings may face.

Computational Science – ICCS 2023: 23rd International Conference, Prague, Czech Republic, July 3–5, 2023, Proceedings, Part III (Lecture Notes in Computer Science #10475)

by Valeria V. Krzhizhanovskaya Jack J. Dongarra Peter M. A. Sloot Maciej Paszynski Clélia De Mulatier Jiří Mikyška

The five-volume set LNCS 14073-14077 constitutes the proceedings of the 23rd International Conference on Computational Science, ICCS 2023, held in Prague, Czech Republic, during July 3-5, 2023. The total of 188 full papers and 94 short papers presented in this book set were carefully reviewed and selected from 530 submissions. 54 full and 37 short papers were accepted to the main track; 134 full and 57 short papers were accepted to the workshops/thematic tracks. The theme for 2023, "Computation at the Cutting Edge of Science", highlights the role of Computational Science in assisting multidisciplinary research. This conference was a unique event focusing on recent developments in scalable scientific algorithms, advanced software tools; computational grids; advanced numerical methods; and novel application areas. These innovative novel models, algorithms, and tools drive new science through efficient application in physical systems, computational and systems biology, environmental systems, finance, and others.

Cloud-Native DevOps: Building Scalable and Reliable Applications

by Mohammed Ilyas Ahmed

This book delivers cloud-based applications that are both scalable and reliable, aligning with the evolving needs of the present user base. This innovative approach blends the agility of cloud computing with the efficiency of contemporary DevOps methodologies. The book starts by providing valuable insights into the ever-evolving software landscape of Cloud-native DevOps. It delves into strategies for crafting scalable and dependable applications and illustrates the art of leveraging open-source tools to enhance collaboration. It navigates through the integral role of microservices in contemporary software development and imparts the know-how to integrate them with DevOps practices. The book simplifies container technology, with a focus on Docker and Kubernetes. It further elucidates the process of streamlining software delivery through Continuous Integration and Continuous Deployment (CI/CD). As you progress, you will explore open-source tools, including Argo, Kubeflow Pipelines, and AWS Step Functions. The concluding section covers real-world case studies and best practices for implementing Cloud-native DevOps. The book reviews the core concepts covered throughout and provides an exciting glimpse into the future of Cloud-native DevOps. Upon completing this book, you will be well-versed in the principles and practices of Cloud-native DevOps, understand real-world applications, and recognize the critical importance of security in cloud computing. What You Will Learn Create cloud-based applications that can scale with the changing needs of today's user base Combine the flexibility of cloud computing with the efficiency of modern DevOps methodologies Understand the core concepts and principles of Cloud-native DevOps Understand microservices, containers, and continuous integration and continuous deployment (CI/CD) Who This Book Is For DevOps engineers, cloud architects, software developers, system administrators, IT managers, team leads, and business decision makers

Through the Grapevine: Socially Transmitted Information and Distorted Democracy (Chicago Studies in American Politics)

by Taylor N. Carlson

An enlightening examination of what it means when Americans rely on family and friends to stay on top of politics. Accurate information is at the heart of democratic functioning. For decades, researchers interested in how information is disseminated have focused on mass media, but the reality is that many Americans today do not learn about politics from direct engagement with the news. Rather, about one-third of Americans learn chiefly from information shared by their peers in conversation or on social media. How does this socially transmitted information differ from that communicated by traditional media? What are the consequences for political attitudes and behavior? Drawing on evidence from experiments, surveys, and social media, Taylor N. Carlson finds that, as information flows first from the media then person to person, it becomes sparse, more biased, less accurate, and more mobilizing. The result is what Carlson calls distorted democracy. Although socially transmitted information does not necessarily render democracy dysfunctional, Through the Grapevine shows how it contributes to a public that is at once underinformed, polarized, and engaged.

Maschinelles Lernen für die Ingenieurwissenschaften: Einführung in physikalisch informierte, erklärbare Lernverfahren für KI in technischen Anwendungen

by Marcus J Neuer

Maschinelles Lernen und künstliche Intelligenz sind omnipräsente Begriffe zur Verbesserung von technischen Prozessen. Die praktische Umsetzung an realen Problemen gestaltet sich aber oft schwierig und komplex. Dieses Lehrbuch erklärt Lernverfahren anhand von analytischen Konzepten im Zusammenspiel mit vollständigen Programmierbeispielen in Python und bezieht sich auf dabei stets auf reale technische Anwendungsszenarien. Es zeigt den Einsatz physikalisch-informierter Lernstrategien, die Einbeziehung von Unsicherheit in die Modellierung und den Aufbau von erklärbarer, vertrauenswürdiger künstlicher Intelligenz mit Hilfe spezialisierter Datenbanken.Dieses Lehrbuch richtet sich somit sowohl an Studierende der Ingenieurswissenschaften, Naturwissenschaft, Medizin und Betriebswirtschaft als auch an Anwender aus der Industrie (vor allem Data Scientists), Entwickler*innen von Expertendatenbanken und Softwareentwickler*innen.

Hands-on Signals and Systems Theory

by Kajetana Marta Snopek

This textbook presents the theory of continuous-time and discrete-time signals and systems and shows how it can be used to solve analytically different problems. The book is dedicated to engineering students who are interested in mathematical methods used to solve real technical problems connected with signals and systems. The book covers, both in continuous- and in discrete domains, analysis of signals in time domain; orthogonal signal representation including Fourier series; convolution and correlation of signals; analysis of signals in the frequency domain and signal sampling, including aliasing and stroboscopic effects, among others. The author also emphasizes the role of Fourier-, one-sided Laplace- and one-sided Z transformations in signals and systems. Chosen methods of analog and digital filter design and stability criteria of analog and digital filters are also described. The author presents the necessary theory in the form of a concise “lecture” accompanied with a number of solved original problems. Every chapter ends with examples of complete solutions with explanation and necessary graphical visualization (graphs, schemes etc.).

Producing Artificial Intelligent Systems: The Roles of Benchmarking, Standardisation and Certification (Studies in Computational Intelligence #1150)

by Maria Isabel Aldinhas Ferreira

The fast development of intelligent technologies in the previous years, their boost during the COVID crisis, and their huge acceleration with the proliferation of the Large Language Models has led industry, governance, legislators and regulators to race to achieve production control, striving to define regional and global regulatory frameworks, capable of guaranteeing their safe deployment.In an evolving and uneven regulatory context, balancing fast technological development and the safe and ethical use of these new disruptive technologies, with an expected total economic impact of 4.4 trillion dollars annually, becomes presently the biggest challenge. The present book addresses the fundamental role played by the three milestones- Benchmarking, Standardization, and Certification that are part of the developmental loop of all products in developed economies. The essential role played by these milestones and the importance of defining accurate general and specific metrics is addressed in this book with particular case studies in the domains of Robotics and AI-

Web3 Applications Security and New Security Landscape: Theories and Practices (Future of Business and Finance)

by Winston Ma Ken Huang Lisa Jy Tan Zhijun William Zhang Carlo Parisi

With the recent debacle surrounding the cryptocurrency exchange FTX and the crypto trading company Alameda Research, the importance of grasping the security and regulation of Web3, cryptocurrency, and blockchain projects has been magnified. To avoid similar economic and security failures in future Web3 projects, this book provides an essential guide and a comprehensive and systematic approach to addressing security concerns. Written by experts in tech and finance, it provides an objective, professional, and in-depth analysis of security and privacy issues associated with Web3 and blockchain projects. The book primarily focuses on Web3 applications and ecosystem components such as the stablecoin, decentralization exchange (DEX), decentralized finance (DeFi), non-fungible token (NFT), decentralized autonomous organization (DAO), and crypto exchange. It also discusses various security issues and their manifestation in Web3 such as ransomware, supply chain software attacks, AI security, and quantum security. Moreover, it provides valuable countermeasures and best practices for individual users as well as Web3 application development teams to consider when designing and implementing Web3 applications. This book is an excellent resource for a diverse range of readers and will particularly appeal to Web3 developers, architects, project owners, and cybersecurity professionals seeking to deepen their knowledge of Web3 security.

Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career

by Kim Nguyen Jonathan Helmus Dr. Gerald Auger Jaclyn “Jax” Scott

Start your Cybersecurity career with expert advice on how to get certified, find your first job, and progress Purchase of the print or Kindle book includes a free eBook in PDF formatKey FeaturesLearn how to follow your desired career path that results in a well-paid, rewarding job in cybersecurityExplore expert tips relating to career growth and certification optionsAccess informative content from a panel of experienced cybersecurity expertsBook DescriptionCybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started. This book is designed by leading industry experts to help you enter the world of cybersecurity with confidence, covering everything from gaining the right certification to tips and tools for finding your first job. The book starts by helping you gain a foundational understanding of cybersecurity, covering cyber law, cyber policy, and frameworks. Next, you’ll focus on how to choose the career field best suited to you from options such as security operations, penetration testing, and risk analysis. The book also guides you through the different certification options as well as the pros and cons of a formal college education versus formal certificate courses. Later, you’ll discover the importance of defining and understanding your brand. Finally, you’ll get up to speed with different career paths and learning opportunities. By the end of this cyber book, you will have gained the knowledge you need to clearly define your career path and develop goals relating to career progression.What you will learnGain an understanding of cybersecurity essentials, including the different frameworks and laws, and specialtiesFind out how to land your first job in the cybersecurity industryUnderstand the difference between college education and certificate coursesBuild goals and timelines to encourage a work/life balance while delivering value in your jobUnderstand the different types of cybersecurity jobs available and what it means to be entry-levelBuild affordable, practical labs to develop your technical skillsDiscover how to set goals and maintain momentum after landing your first cybersecurity jobWho this book is forThis book is for college graduates, military veterans transitioning from active service, individuals looking to make a mid-career switch, and aspiring IT professionals. Anyone who considers cybersecurity as a potential career field but feels intimidated, overwhelmed, or unsure of where to get started will also find this book useful. No experience or cybersecurity knowledge is needed to get started.

Agile-SOFL: Agile Formal Engineering Method

by Shaoying Liu

This book describes a specific solution, known as Agile-SOFL, for bridging agile and formal engineering and discusses its benefits for realistic software projects. In this book, the author argues that formal engineering methods and agile approaches are complementary in ensuring high productivity while enhancing reliability. Agile-SOFL offers a highly practical and systematic method that strikes a good balance of efforts for enhancing both software productivity and reliability. Specifically, Agile-SOFL is characterized by five features: (1) systematic approach to constructing hybrid specifications for requirements-related faults prevention, (2) specification-based incremental programming for quality implementation, (3) specification-based inspection and testing for system validation, (4) automatic testing-based formal verification for the correctness of code, and (5) effective project management for high effectiveness and efficiency in applying Agile-SOFL. The objective of this book is to help readers learn the latest effective Agile development concepts and techniques and to take them to the point where they can easily apply Agile-SOFL to develop their own software systems with a high productivity and reliability. The reader can also considerably benefit from this book by learning many newly developed concepts and principles in fault prevention, fault detection, verification of code correctness, and efficient project management.

Refine Search

Showing 54,476 through 54,500 of 54,505 results