Browse Results

Showing 53,651 through 53,675 of 54,097 results

AI-Oriented Competency Framework for Talent Management in the Digital Economy: Models, Technologies, Applications, and Implementation

by Alex Khang

In the digital-driven economy era, an AI-oriented competency framework (AIoCF) is a collection to identify AI-oriented knowledge, attributes, efforts, skills, and experiences (AKASE) that directly and positively affect the success of employees and the organization. The application of skills-based competency analytics and AI-equipped systems is gradually becoming accepted by business and production organizations as an effective tool for automating several managerial activities consistently and efficiently in developing and moving the capacity of a company up to a world-class level.AI-Oriented Competency Framework for Talent Management in the Digital Economy: Models, Technologies, Applications, and Implementation discusses all the points of an AIoCF, which includes predictive analytics, advisory services, predictive maintenance, and automated processes, which help to make the operations of project management, personnel management, or administration more efficient, profitable, and safe. The book includes the functionality of emerging career pathways, hybrid learning models, and learning paths related to the learning and development of employees in the production or delivery fields. It also presents the relationship between skills taxonomy and competency framework with interactive methods using datasets, processing workflow diagrams, and architectural diagrams for easy understanding of the application of intelligent functions in role-based competency systems. By also covering upcoming areas of AI and data science in many government and private organizations, the book not only focuses on managing big data and cloud resources of the talent management system but also provides cybersecurity techniques to ensure that systems and employee competency data are secure.This book targets a mixed audience of students, engineers, scholars, researchers, academics, and professionals who are learning, researching, and working in the field of workforce training, human resources, talent management systems, requirement, headhunting, outsourcing, and manpower consultant services from different cultures and industries in the era of digital economy.

Security Framework for The Internet of Things Applications (Computational Methods for Industrial Applications)

by Quan Z. Sheng Wei Emma Zhang Salma Abdalla Hamad

The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map security challenges. It further covers three security aspects including Internet of Things device identification and authentication, network traffic intrusion detection, and executable malware files detection.This book: Presents a security framework model design named Behavioral Network Traffic Identification and Novelty Anomaly Detection for the IoT Infrastructures Highlights recent advancements in machine learning, deep learning, and networking standards to boost Internet of Things security Builds a near real-time solution for identifying Internet of Things devices connecting to a network using their network traffic traces and providing them with sufficient access privileges Develops a robust framework for detecting IoT anomalous network traffic Covers an anti-malware solution for detecting malware targeting embedded devices It will serve as an ideal text for senior undergraduate and graduate students, and professionals in the fields of electrical engineering, electronics and communication engineering, computer engineering, and information technology.

Handbook of Digital Twins

by Zhihan Lyu

Over the last two decades, Digital Twins (DTs) have become the intelligent representation of future development in industrial production and daily life. Consisting of over 50 chapters by more than 100 contributors, this comprehensive handbook explains the concept, architecture, design specification and application scenarios of DTs.As a virtual model of a process, product or service to pair the virtual and physical worlds, DTs allow data analysis and system monitoring by using simulations. The fast-growing technology has been widely studied and developed in recent years. Featured with centralization, integrity and dynamics, it is cost-effective to drive innovation and performance. Many fields saw the adaptation and implementation across industrial production, healthcare, smart city, transportation and logistics. World-famous enterprises such as Siemens, Tesla, ANSYS and General Electric have built smart factories and pioneered digital production, heading towards Industry 4.0.This book aims to provide an in-depth understanding and reference of DTs to technical personnel in the field, students and scholars of related majors, and general readers interested in intelligent industrial manufacturing.

Application of the Metaverse in Education (Smart Computing and Intelligence)

by Ronghuai Huang Dejian Liu Ahmed Tlili Ahmed Hosny Saleh Metwally Emma Fan Lin

This book covers interesting topics of the metaverse in education. It introduces the metaverse as a new frontier for education and sheds light on broad views about education in the metaverse. It also highlights the design of metaverse world with showing examples of promising immersive environments. Therefore, this book can be of interest to a wide range of stakeholders, such as students, researchers, educators, instructional designers, school administrators, and educational technology specialists. This book demonstrates the research efforts and best practices for readers where immersive digital experiences meet the pedagogical landscape. It explores the ground-breaking impact of the metaverse on educational practices. The chapters focus on and answer the questions of how researchers and educators apply metaverse applications in education, what the challenges of adopting the metaverse in education are, and what are the future opportunities for promoting the metaverse in education.

Machine Learning for Materials Discovery: Numerical Recipes and Practical Applications (Machine Intelligence for Materials Science)

by Hariprasad Kodamana Ravinder Bhattoo N. M. Krishnan

Focusing on the fundamentals of machine learning, this book covers broad areas of data-driven modeling, ranging from simple regression to advanced machine learning and optimization methods for applications in materials modeling and discovery. The book explains complex mathematical concepts in a lucid manner to ensure that readers from different materials domains are able to use these techniques successfully. A unique feature of this book is its hands-on aspect—each method presented herein is accompanied by a code that implements the method in open-source platforms such as Python. This book is thus aimed at graduate students, researchers, and engineers to enable the use of data-driven methods for understanding and accelerating the discovery of novel materials.

Creating Content With Your Tablet

by Susan J. Brooks-Young

Transform students from content consumers to content creators! This comprehensive guide gets to the heart of effective mobile technology use in today’s classroom. Internationally recognized education expert Susan Brooks-Young provides manageable, research-based strategies to help teachers and administrators: Confidently plan and manage mobile technology activities across grade levels Explore new uses and applications for multiple devices Use rubrics and checklists to evaluate appropriate, cross-platform educational apps Manage content-specific tablet use in learning centers or small groups Tap student ingenuity and improve critical thinking skills Time-saving tips cover a wide range of apps to help busy teachers easily incorporate tablets into daily classroom use. Includes step-by-step instructions across content areas for digital photography, video, ePublishing, QR codes and more. Transform students from content consumers to content creators with this must-have resource! "Creating Content With Your Tablet provides educators with simple, easy steps to implement tablet technology with the Common Core Standards. I am encouraged to try the apps in this book. It makes the connection between modern technology and what teachers are already doing in the classroom seem seamless." —Michelle Strom, Language Arts Teacher Fort Riley Middle School, KS "Very practical. The discussion questions at the end of each chapter are excellent for a book study or district that is moving towards tablet implementation." —David Fife, Vice Principal Tweedsmuir Public School, London, Ontario, Canada

Creating Content With Your Tablet

by Susan J. Brooks-Young

Transform students from content consumers to content creators! This comprehensive guide gets to the heart of effective mobile technology use in today’s classroom. Internationally recognized education expert Susan Brooks-Young provides manageable, research-based strategies to help teachers and administrators: Confidently plan and manage mobile technology activities across grade levels Explore new uses and applications for multiple devices Use rubrics and checklists to evaluate appropriate, cross-platform educational apps Manage content-specific tablet use in learning centers or small groups Tap student ingenuity and improve critical thinking skills Time-saving tips cover a wide range of apps to help busy teachers easily incorporate tablets into daily classroom use. Includes step-by-step instructions across content areas for digital photography, video, ePublishing, QR codes and more. Transform students from content consumers to content creators with this must-have resource! "Creating Content With Your Tablet provides educators with simple, easy steps to implement tablet technology with the Common Core Standards. I am encouraged to try the apps in this book. It makes the connection between modern technology and what teachers are already doing in the classroom seem seamless." —Michelle Strom, Language Arts Teacher Fort Riley Middle School, KS "Very practical. The discussion questions at the end of each chapter are excellent for a book study or district that is moving towards tablet implementation." —David Fife, Vice Principal Tweedsmuir Public School, London, Ontario, Canada

Web and Big Data. APWeb-WAIM 2023 International Workshops: KGMA 2023 and SemiBDMA 2023, Wuhan, China, October 6–8, 2023, Proceedings (Communications in Computer and Information Science #2094)

by Jianxin Li Geyong Min Xiangyu Song Ruyi Feng Yunliang Chen

This proceedings constitutes selected papers from the Workshops KGMA and SemiBDMA which were held in conjunction with APWeb-WAIM 2023 which took place in Wuhan, China, during October 6-8, 2023. The 7 full papers included in this book were carefully reviewed and selected from 15 papers submitted to these workshops. They focus on new research approaches on the theory, design, and implementation of data management systems.

Materials Data Science: Introduction to Data Mining, Machine Learning, and Data-Driven Predictions for Materials Science and Engineering (The Materials Research Society Series)

by Stefan Sandfeld

This text covers all of the data science, machine learning, and deep learning topics relevant to materials science and engineering, accompanied by numerous examples and applications. Almost all methods and algorithms introduced are implemented “from scratch” using Python and NumPy. The book starts with an introduction to statistics and probabilities, explaining important concepts such as random variables and probability distributions, Bayes’ theorem and correlations, sampling techniques, and exploratory data analysis, and puts them in the context of materials science and engineering. Therefore, it serves as a valuable primer for both undergraduate and graduate students, as well as a review for research scientists and practicing engineers. The second part provides an in-depth introduction of (statistical) machine learning. It begins with outlining fundamental concepts and proceeds to explore a variety of supervised learning techniques for regression and classification, including advanced methods such as kernel regression and support vector machines. The section on unsupervised learning emphasizes principal component analysis, and also covers manifold learning (t-SNE and UMAP) and clustering techniques. Additionally, feature engineering, feature importance, and cross-validation are introduced. The final part on neural networks and deep learning aims to promote an understanding of these methods and dispel misconceptions that they are a “black box”. The complexity gradually increases until fully connected networks can be implemented. Advanced techniques and network architectures, including GANs, are implemented “from scratch” using Python and NumPy, which facilitates a comprehensive understanding of all the details and enables the user to conduct their own experiments in Deep Learning.

Multi-Omics Analysis of the Human Microbiome: From Technology to Clinical Applications

by Vijai Singh Indra Mani

This book introduces the rapidly evolving field of multi-omics in understanding the human microbiome. The book focuses on the technology used to generate multi-omics data, including advances in next-generation sequencing and other high-throughput methods. It also covers the application of artificial intelligence and machine learning algorithms to the analysis of multi-omics data, providing readers with an overview of the powerful computational tools that are driving innovation in this field. The chapter also explores the various bioinformatics databases and tools available for the analysis of multi-omics data. The book also delves into the application of multi-omics technology to the study of microbial diversity, including metagenomics, metatranscriptomics, and metaproteomics. The book also explores the use of these techniques to identify and characterize microbial communities in different environments, from the gut and oral microbiome to the skin microbiome and beyond. Towards theend, it focuses on the use of multi-omics in the study of microbial consortia, including mycology and the viral microbiome. The book also explores the potential of multi-omics to identify genes of biotechnological importance, providing readers with an understanding of the role that this technology could play in advancing biotech research. Finally, the book concludes with a discussion of the clinical applications of multi-omics technology, including its potential to identify disease biomarkers and develop personalized medicine approaches. Overall, this book provides readers with a comprehensive overview of this exciting field, highlighting the potential for multi-omics to transform our understanding of the microbial world.

HCI in Games: 6th International Conference, HCI-Games 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 29–July 4, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14731)

by Xiaowen Fang

This book constitutes the refereed proceedings of the 6th International Conference on HCI in Games, held as part of the 26th International Conference, HCI International 2024, which took place in Washington DC, USA, during June 29 - July 4, 2024. The total of 1271 papers and 309 posters included in the HCII 2024 proceedings was carefully reviewed and selected from 5108 submissions. The two volume set of HCI-Games 2024 proceedings were organized in the following topical sections: Volume 14730: Part I: Game Design and Gamification; Part II: Game-based Learning; Part III: Games and Artificial Intelligence. Volume 14731: Part I: Advancing Education Through Serious Games; Part II: Player Experience and Engagement.

Privacy Technologies and Policy: 11th Annual Privacy Forum, APF 2023, Lyon, France, June 1–2, 2023, Proceedings (Lecture Notes in Computer Science #13888)

by Kai Rannenberg Prokopios Drogkaris Cédric Lauradoux

This book constitutes the refereed conference proceedings of the 11th Annual Privacy Forum, APF 2023 in Lyon, France in June 2023. The 8 full papers were carefully reviewed and selected from 37 submissions. The papers are organized in the following topical sections: Emerging Technologies and Protection of Personal Data, Data Protection Principles and Data Subject Rights, Modelling Data Protection and Privacy, and Modelling Perceptions of Privacy.

Quanten-Zufallszahlengenerierung: Theorie und Praxis

by Stefan Rass Stefan Schauer Christian Kollmitzer Benjamin Rainer

Dieses Buch bietet einen Überblick über die neuesten Implementierungen von Quanten-Zufallszahlengeneratoren (QRNGs) und untersucht insbesondere deren Beziehung zu klassischen statistischen Zufallsmodellen und numerischen Techniken zur Berechnung von Zufallszahlen. Der Leser - der idealerweise einen Hintergrund in klassischer Statistik, Informatik oder Kryptographie hat - wird Schritt für Schritt in die Welt der Quantenbits eingeführt, und es werden explizite Beziehungen zwischen QRNGs und ihren klassischen Gegenstücken aufgezeigt. Die Erzeugung von Zufallszahlen ist eine wichtige Säule der Kryptographie. Die Nutzung des Zufalls, der Quantenphänomenen innewohnt, ist ein sich rasch entwickelnder Zweig der Quantenkryptografie mit unzähligen Anwendungen für die Zukunft. Der Wert der Quantenzufälligkeit für kryptografische Zwecke wird empirisch durch statistische Auswertungen der Leistung von QRNGs im Vergleich zu klassischen Techniken zur Erzeugung echter und pseudozufälliger Zahlen nachgewiesen. Das Buch bietet dann einen Überblick über die technischen Implementierungen von QRNGs, bevor eine abschließende Diskussion über die wichtigsten Errungenschaften und verbleibenden Hindernisse auf diesem Gebiet die Berichterstattung abrundet und gleichzeitig die Tür für zukünftige Forschungsrichtungen öffnet.

Data Driven: Truckers, Technology, and the New Workplace Surveillance

by Karen Levy

A behind-the-scenes look at how digital surveillance is affecting the trucking way of lifeLong-haul truckers are the backbone of the American economy, transporting goods under grueling conditions and immense economic pressure. Truckers have long valued the day-to-day independence of their work, sharing a strong occupational identity rooted in a tradition of autonomy. Yet these workers increasingly find themselves under many watchful eyes. Data Driven examines how digital surveillance is upending life and work on the open road, and raises crucial questions about the role of data collection in broader systems of social control.Karen Levy takes readers inside a world few ever see, painting a bracing portrait of one of the last great American frontiers. Federal regulations now require truckers to buy and install digital monitors that capture data about their locations and behaviors. Intended to address the pervasive problem of trucker fatigue by regulating the number of hours driven each day, these devices support additional surveillance by trucking firms and other companies. Traveling from industry trade shows to law offices and truck-stop bars, Levy reveals how these invasive technologies are reconfiguring industry relationships and providing new tools for managerial and legal control—and how truckers are challenging and resisting them.Data Driven contributes to an emerging conversation about how technology affects our work, institutions, and personal lives, and helps to guide our thinking about how to protect public interests and safeguard human dignity in the digital age.

Sync Problems Collection: Synchronization and Time Distribution in Telecommunications

by Nickolay Biriukov Nataliya Triska

This textbook clarifies synchronization issues in telecommunications in an easy-to-follow way, focusing less on theory and more on practical aspects. The book is intended for a wide range of readers interested in the basic synchronization concepts in their wide application for development, maintenance, and conformity assessment of telecommunications equipment and networks. The authors show how, though synchronization in telecommunications has experienced rapid development, the foundational theory and the basic definitions, mathematical tools, and well-developed “classical” technologies have remained. The authors have studied the ITU-T, ETSI, IEEE standards, and extracted practical topics of synchronization. The collection of numerous training problems, practical examples, and case studies help the readers not only to find the answers to their current questions but also to get a common view of synchronization’s role in the modern telecommunications. The book is geared towards students of telecommunications but can also be useful for telecom engineers and for training/workshops for telecom engineers concerning synchronization topics.

Role of Explainable Artificial Intelligence in E-Commerce (Studies in Computational Intelligence #1094)

by Ajith Abraham Loveleen Gaur

The technological boom has provided consumers with endless choices, removing the hindrance of time and place. Understanding the dynamic and competitive business environment, marketers know they need to reinforce indestructible customer experience with the support of algorithmic configurations to minimize human intrusion. World Wide Web (WWW) and online marketing have changed the way of conducting business; with artificial intelligence (AI), business houses can furnish a customized experience to fulfil the perceived expectation of the customer.Artificial intelligence bridges the gap between business and prospective clients, provides enormous amounts of information, prompts grievance redressal system, and further complements the client’s preference. The opportunities online marketing offers with the blend of artificial intelligence tools like chatbots, recommenders, virtual assistance, and interactive voice recognition create improved brand awareness, better customer relationshipmarketing, and personalized product modification.Explainable AI provides the subsequent arena of human–machine collaboration, which will complement and support marketers and people so that they can make better, faster, and more accurate decisions. According to PwC’s report on Explainable AI(XAI), AI will have $15.7 trillion of opportunity by 2030. However, as AI tools become more advanced, more computations are done in a “black box” that humans can hardly comprehend. But the rise of AI in business for actionable insights also poses the following questions: How can marketers know and trust the reasoning behind why an AI system is making recommendations for action? What are the root causes and steering factors? Thus, transparency, trust, and a good understanding of expected business outcomes are increasingly demanded.

The Road to Outsourcing 4.0: Next-Generation Supply Chain

by Mohammadreza Akbari

This book provides valuable insights and guidance for firms looking to improve their operations in the face of disruption and uncertainty. It contributes to the body of knowledge in logistics and supply chain disciplines which will be useful to both industry practitioners and academics. With this, the book first emphasizes the road to outsourcing 4.0 by providing updated information and perspectives on these trends, given that outsourcing has evolved significantly over the years and new technologies, such as artificial intelligence (AI), cloud computing, Internet of Things (IoT), and machine learning are changing the way outsourcing is done. In addition, the book also explores new models such as third-party logistics (3PL) providers and crowdsourcing which have changed the landscape of outsourcing. Lastly, the book includes updated best practices for outsourcing, including how to choose outsourcing partners, manage outsourcing relationships, and minimize risks in the post-COVID-19 recovery period. Each chapter in the book goes through concepts, development histories, benefits, risks and challenges, and includes recent case studies

Simulation Tools and Techniques: 15th EAI International Conference, SIMUtools 2023, Seville, Spain, December 14-15, 2023, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #519)

by Agustín Riscos-Núñez José-Luis Guisado-Lizar María-José Morón-Fernández Gabriel Wainer

This proceedings constitutes the refereed post-conference proceedings of the 15th International Conference on Simulation Tools and Techniques, SIMUTools 2023, held in Seville, Spain, in December 2023. The 23 revised full papers were carefully selected from 58 submissions. The papers focus on various areas such as Simulation Tools and Methods; Artificial Intelligence and Simulation; Transportation and Logistics; Medical Sciences; and Network Simulations.

The Biggest Ideas in the Universe 2: Quanta and Fields

by Sean Carroll

THE NEW YORK TIMES BESTSELLER &‘Neat, and extremely simple: only a deep thinker such as Sean Carroll could introduce the complexity of Einstein&’s general relativity in such a luminous and straightforward manner.&’ Carlo Rovelli, author of Seven Brief Lessons on Physics Immense, strange and infinite, the world of modern physics often feels impenetrable to the undiscerning eye – a jumble of muons, gluons and quarks, impossible to explain without several degrees and a research position at CERN. But it doesn&’t have to be this way! Allow world-renowned theoretical physicist and bestselling author Sean Carroll to guide you through the biggest ideas in the universe. Elegant and simple, Carroll unravels a web of theory to get to the heart of the truths they represent about the world around us. — In Quanta and Fields, the second in this landmark trilogy, Carroll delves into the baffling and beautiful world of quantum mechanics. From Schrödinger to Feynman, Carroll travels through the quantum revolution with the greatest minds of the twentieth century. Exploring how several decades of research overturned centuries of convention, Carroll provides a dazzling tour of the most exciting ideas in modern science.

Design and Deploy Microsoft Defender for IoT: Leveraging Cloud-based Analytics and Machine Learning Capabilities

by Puthiyavan Udayakumar Dr. R. Anandan

Microsoft Defender for IoT helps organizations identify and respond to threats aimed at IoT devices, increasingly becoming targets for cyberattacks. This book discusses planning, deploying, and managing your Defender for IoT system. The book is a comprehensive guide to IoT security, addressing the challenges and best practices for securing IoT ecosystems.The book starts with an introduction and overview of IoT in Azure. It then discusses IoT architecture and gives you an overview of Microsoft Defender. You also will learn how to plan and work with Microsoft Defender for IoT, followed by deploying OT Monitoring. You will go through air-gapped OT sensor management and enterprise IoT monitoring. You also will learn how to manage and monitor your Defender for IoT systems with network alerts and data. After reading this book, you will be able to enhance your skills with a broader understanding of IoT and Microsoft Defender for IoT-integrated best practices to design, deploy, and manage a secure enterprise IoT environment using Azure.What You Will LearnUnderstand Microsoft security services for IoTGet started with Microsoft Defender for IoTPlan and design a security operations strategy for the IoT environmentDeploy security operations for the IoT environmentManage and monitor your Defender for IoT SystemWho This Book Is ForCybersecurity architects and IoT engineers

Interdisciplinary Research in Technology and Management: Proceedings of the International Conference on Interdisciplinary Research in Technology and Management (IRTM, 2023), 30th March-1st April 2023, New Delhi, India

by Satyajit Chakrabarti Sanghamitra Poddar Malay Gangopadhyaya Ashiq A. Sakib Anupam Bhattacharya Souti Chattopadhyay

IRTM 2023We live in an inter-connected world. In the era of Industry 5.0, technology is getting embedded more and more in the way ‘we learn, live, work and play’.This progression is accelerating at a pace never seen before. Inter disciplinary and collaborative research across disciplines within the Technology domain and Management domain, and across the Technology — Management interface is opening up exciting new possibilities for solving problems whose solutions are beyond the scope of a single discipline, domain or practice, and helping to create a brave, new world. We are living in an incredible time of change.Our effort to hold such an interdisciplinary conference, in the virtual mode, apparently resonated across the academic community, as was evident from the huge response that the first ever conference on “Interdisciplinary Research in Technology and Management”, (IRTM) held in February 2021 had received from participants across many countries. This has encouraged the organizers to hold the next edition of the conference physically in Kolkata on a larger scale in the online mode.The pandemic unleashed by Covid 19 in the last two years has shaken the socio-economic foundations of countries and societies to a point where the world cannot be the same as before the pandemic. It has re-focused the world’s attention on the priority of healthcare, and healthcare infrastructure and its innovative management.Inevitably, questions have again been raised more vehemently on what kind of a world we want to live in. Environmental concerns are being pursued with renewed vigour, The urgency of developing new, robust infrastructure relevant for the new world is gaining wider consensus.By 2030, as reports suggest, cyber – physical systems, internet of things and wearable technology will be everywhere and in everything, renewable energy will power the world, and digital entertainment will take centre stage among other developments.The third edition of the conference on “Interdisciplinary Research in Technology and Management” attempts to spotlight the above concerns. The number of tracks on which papers are invited from scholars, researchers, consultants and practitioners to share their interdisciplinary research and consultative work has been enlarged. As before, the papers will be peer reviewed and authors of the selected papers will be invited to present their papers in the IRTM conference.The presentation of papers will be interspersed with Keynote Talks by eminent experts on the theme of the conference or individual domains.

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks

by Scott J. Shapiro

“Unsettling, absolutely riveting, and—for better or worse—necessary reading.” —Brian Christian, author of Algorithms to Live By and The Alignment ProblemAn entertaining account of the philosophy and technology of hacking—and why we all need to understand it.It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian “Dark Avenger,” who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton’s cell phone, the Russian intelligence officers who sought to take control of a US election, and others.In telling their stories, Shapiro exposes the hackers’ tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of Gödel, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime.Includes black-and-white images

Kubernetes and Cloud Native Associate (KCNA) Study Guide

by Jorge Valenzuela Jiménez Adrián González Sánchez

Learn how to prepare for—and pass—the Kubernetes and Cloud Native Associate (KCNA) certification exam. This practical guide serves as both a study guide and point of entry for practitioners looking to explore and adopt cloud native technologies. Adrián González Sánchez and Jorge Valenzuela Jiménez teach you not only the core technology fundamentals, but also the community and industry that KCNA serves.With the meteoric rise in cloud adoption, cloud native technologies such as Kubernetes have become the de facto industry standard. Other Kubernetes certifications—including KCSA, CKAD, CKA, and CKS—are all geared toward higher-level technical proficiency. The KCNA is the entry door to your cloud native journey, and the certification exam covers the cloud native environment generally as well as fundamental Kubernetes skills and knowledge.This guide helps you learn:How to best and most efficiently prepare for the KCNA examThe latest cloud native developments and their importanceThe fundamentals of Kubernetes, cloud native development, and related CNCF projectsThe core elements of Kubernetes applicationsThe crucial elements of modern cloud native developmentHow to differentiate and choose cloud native technologiesThe market value of passing the KCNA examInsights and testimonials from key cloud native industry experts

Artificial Intelligence for Risk Mitigation in the Financial Industry

by Narayan C. Debnath Archana Patel Purvi Pokhariyal Shweta Anand Ambrish Kumar Mishra

Artificial Intelligence for Risk Mitigation in the Financial Industry This book extensively explores the implementation of AI in the risk mitigation process and provides information for auditing, banking, and financial sectors on how to reduce risk and enhance effective reliability. The applications of the financial industry incorporate vast volumes of structured and unstructured data to gain insight into the financial and non-financial performance of companies. As a result of exponentially increasing data, auditors and management professionals need to enhance processing capabilities while maintaining the effectiveness and reliability of the risk mitigation process. The risk mitigation and audit procedures are processes involving the progression of activities to “transform inputs into output.” As AI systems continue to grow mainstream, it is difficult to imagine an aspect of risk mitigation in the financial industry that will not require AI-related assurance or AI-assisted advisory services. AI can be used as a strong tool in many ways, like the prevention of fraud, money laundering, and cybercrime, detection of risks and probability of NPAs at early stages, sound lending, etc. Audience This is an introductory book that provides insights into the advantages of risk mitigation by the adoption of AI in the financial industry. The subject is not only restricted to individuals like researchers, auditors, and management professionals, but also includes decision-making authorities like the government. This book is a valuable guide to the utilization of AI for risk mitigation and will serve as an important standalone reference for years to come.

The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet (Tech Today)

by David Senecal

A top-to-bottom discussion of website bot attacks and how to defend against them In The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the contemporary bot threat landscape and the latest defense strategies used by leading companies to protect themselves. The author uses plain language to lift the veil on bots and fraud, making a topic critical to your website's security easy to understand and even easier to implement. You'll learn how attackers think, what motivates them, how their strategies have evolved over time, and how website owners have changed their own behaviors to keep up with their adversaries. You'll also discover how you can best respond to patterns and incidents that pose a threat to your site, your business, and your customers. The book includes: A description of common bot detection techniques exploring the difference between positive and negative security strategies and other key concepts A method for assessing and analyzing bot activity, to evaluate the accuracy of the detection and understand the botnet sophistication A discussion about the challenge of data collection for the purpose of providing security and balancing the ever-present needs for user privacy Ideal for web security practitioners and website administrators, The Reign of Botnets is the perfect resource for anyone interested in learning more about web security. It's a can't-miss book for experienced professionals and total novices alike.

Refine Search

Showing 53,651 through 53,675 of 54,097 results