This three-volume set LNCS 11139-11141 constitutes the refereed proceedings of the 27th International Conference on Artificial Neural Networks, ICANN 2018, held in Rhodes, Greece, in October 2018.
Tools and technologies have long complemented and extended our physical abilities: from pre-historic spearheads to steam-propelled ploughs and high-tech prosthetics.
The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain.
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing.
Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization.
The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "e;Zero-Day"e; attack will appeal to every corner of the IT community.
Developers are used to working with Wizards, component-like products that allow them to create certain elements - like dialog buttons - quickly and easily while they are coding applications.
This book contains the proceedings of a non-profit conference with the objective of providing a platform for academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad to exchange their research and innovative ideas in the field of Artificial Intelligence and information technologies.
Intruder Alarms provides a definitive and fully up-to-date guide to the specification, systems design, integration, installation and maintenance of intruder alarm systems.
Conquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming.
Get to grips with essential concepts and step-by-step explanations to apply TDD practices to your Python projects while keeping your test suite under controlKey FeaturesBuild robust Python applications using TDD and BDD methodologiesTest Python web applications using WebTest and web frameworksLeverage PyTest to implement stringent testing mechanisms to ensure fault-tolerant applicationsBook DescriptionTest-driven development (TDD) is a set of best practices that helps developers to build more scalable software and is used to increase the robustness of software by using automatic tests.
This book is almost entirely concerned with stream ciphers, concentrating on a particular mathematical model for such ciphers which are called additive natural stream ciphers.
The financial sector is witnessing rapid technological innovations, leading to the emergence of Fintech (financial technologies), revolutionizing national and international financial landscapes.
Transformative Artificial Intelligence provides a comprehensive overview of the latest trends, challenges, applications, and opportunities in the field of Artificial Intelligence.
Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone.
Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release.
Learn how to use Ghidra to analyze your code for potential vulnerabilities and examine both malware and network threatsKey FeaturesMake the most of Ghidra on different platforms such as Linux, Windows, and macOSUnlock the potential of plug-ins and extensions for disassembly, assembly, decompilation, and scriptingLearn advanced concepts like binary diffing, debugging, unpacking real-world malware samples, and reverse engineering ransomwarePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionWritten by David Alvarez Perez, a senior malware analyst at Gen Digital Inc.
Insecure Digital Frontiers is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize.
Businesses have faced a variety of difficulties as a result of the global pandemic, and how they responded to this disruption has affected both their resilience and their ability to get through this crisis.
The history of computer-aided face recognition dates to the 1960s, yet the problem of automatic face recognition - a task that humans perform routinely and effortlessly in our daily lives - still poses great challenges, especially in unconstrained conditions.
Aligning information security to the goals and strategies of the business is paramount for ensuring risks are addressed, without an abundance of negative impacts to the company.
Insecure Digital Frontiers is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize.
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world.
This book contains selected papers on the language, applications, and environments of CafeOBJ, which is a state-of -the-art algebraic specification language.
In an effort to increase its marketshare and threat to Windows NT, Oracle8 was ported to Linux in late 1998, opening the popular database to an additional 10 million Linux users worldwide.
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure.
The CompTIA Linux+ Certification"e; book - the ultimate guide to mastering Linux system administration in preparation for the CompTIA Linux+ Certification.
In einer Welt, die zunehmend von digitalen Innovationen geprägt ist, gewinnen zwei Technologien besonders an Bedeutung: Non-Fungible Tokens (NFTs) und Künstliche Intelligenz (KI).
The classic book The Art of War (or as it is sometimes translated, The Art of Strategy) by Sun Tzu is often used to illustrate principles that can apply to the management of business environments.
This book will teach you the core concepts of blockchain technology in a concise manner through straightforward, concrete examples using a range of programming languages, including Python and Solidity.
This book critically assesses legal frameworks involving the bulk processing of personal data, initially collected by the private sector, to predict and prevent crime through advanced profiling technologies.
Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.
The book deals with the effective operation of the rules related to biomedical research and pays attention to the activities of the national legislatures of the 27 Member States in the field of scientific research.