Browse Results

Showing 35,626 through 35,650 of 53,433 results

Beginning C# Hands-On - The Core Language

by Tom Owsiak

A C# beginners guide to the core parts of the C# language! About This Book • Learn C#, Visual Studio, and Object Oriented Programming • See practical examples of all the core C# language features so that you can easily master them yourself • Use the C# programming language to work with code and data, which can be applied to other programming languages as well • Complete a variety of programming assignments for hands-on practice, as you move through the course Who This Book Is For This book will appeal to anyone who is interested in learning how to program in C#. Previous programming experience will help you get through the initial sections with ease, although, it's not mandatory to possess any experience at all. What You Will Learn • Learn C#, Visual Studio, and object-oriented programming • Learn all the core C# language syntax with hands-on working examples • Learn everything from basic variable assignments to complex multidimensional arrays • Go through practical examples of all the core C# language features so that you can easily master them yourself • Use the C# programming language to work with code and data, which can be applied to other programming languages as well In Detail Beginning C# Hands-On - The Core Language teaches you core C# language and syntax in a working Visual Studio environment. This book covers everything from core language through to more advanced features such as object-oriented programming techniques. This book is for C# beginners who need a practical reference to core C# language features. You'll also gain a view of C# through web programming with web forms, so you'll learn HTML, basic CSS, and how to use a variety of controls, such as buttons and drop-down lists. You'll start with the fundamentals of C# and Visual Studio, including defining variables, interacting with users, and understanding data types, data conversions, and constants. You'll move on to checking conditions using if/else blocks, and see how to use loops to do things such as repeat blocks of code. After covering various operators to evaluate and assign control structures, you'll see how to use arrays to store collections of data. By the time you've finished the book, you'll know how to program the vital elements of the core C# language. These are the building blocks that you can then combine to build complex C# programs. Style and approach A comprehensive book that blends theory with just the right amount of practical code implementations, to help you get up and running with the C# programming language. You'll also get to work with other tools and technologies that complement C# programming. Each core part of the C# language is coded as you learn, and code output is tested every time to verify the syntax is working as expected, so it's easy for you to learn directly from the working code examples.

The Mixing Engineer's Handbook (2nd edition)

by Bobby Owsinski

Appropriate for both novice and experienced recording engineers, this guide walks through the six elements of a mix--balance, panorama, frequency range, dimension, dynamics, and interest--and provides interviews with 22 professional mixers working in different genres. The second edition adds sections on gating, hypercompression, MP3 encoding, and surround sound mixing.

Data Analysis in Bi-partial Perspective: Clustering and Beyond (Studies in Computational Intelligence #818)

by Jan W. Owsiński

This book presents the bi-partial approach to data analysis, which is both uniquely general and enables the development of techniques for many data analysis problems, including related models and algorithms. It is based on adequate representation of the essential clustering problem: to group together the similar, and to separate the dissimilar. This leads to a general objective function and subsequently to a broad class of concrete implementations. Using this basis, a suboptimising procedure can be developed, together with a variety of implementations.This procedure has a striking affinity with the classical hierarchical merger algorithms, while also incorporating the stopping rule, based on the objective function. The approach resolves the cluster number issue, as the solutions obtained include both the content and the number of clusters. Further, it is demonstrated how the bi-partial principle can be effectively applied to a wide variety of problems in data analysis.The book offers a valuable resource for all data scientists who wish to broaden their perspective on basic approaches and essential problems, and to thus find answers to questions that are often overlooked or have yet to be solved convincingly. It is also intended for graduate students in the computer and data sciences, and will complement their knowledge and skills with fresh insights on problems that are otherwise treated in the standard “academic” manner.

Reverse Clustering: Formulation, Interpretation and Case Studies (Studies in Computational Intelligence #957)

by Jan W. Owsiński Jarosław Stańczak Karol Opara Sławomir Zadrożny Janusz Kacprzyk

This book presents a new perspective on and a new approach to a wide spectrum of situations, related to data analysis, actually, a kind of a new paradigm. Namely, for a given data set and its partition, whose origins may be of any kind, the authors try to reconstruct this partition on the basis of the data set given, using very broadly conceived clustering procedure. The main advantages of this new paradigm concern the substantive aspects of the particular cases considered, mainly in view of the variety of interpretations, which can be assumed in the framework of the paradigm. Due to the novel problem formulation and the flexibility in the interpretations of this problem and its components, the domains, which are encompassed (or at least affected) by the potential use of the paradigm, include cluster analysis, classification, outlier detection, feature selection, and even factor analysis as well as geometry of the data set. The book is useful for all those who look for new, nonconventional approaches to their data analysis problems.

When You Find Out the World Is Against You: And Other Funny Memories About Awful Moments

by Kelly Oxford

“Kelly is part geek, part freak. When You Find Out The World Is Against You shows us ourselves: our sensitivities, our awkward moments, our strange desires. She takes us through summer camp, dating, rape culture, Trump, death . . . Kelly Oxford c’est moi.” — James Franco“Two things I’m grateful for: how imperfect Kelly Oxford is at life and decision-making, and how terrific she is at writing about what a goddamn mess she is.” — Patton Oswalt“Kelly Oxford’s writing is hilarious and fearless. She’s the badass Canadian sister I never had.” — Mindy Kaling“I have worshipped the mind of Kelly Oxford for eons. Kelly Oxford’s concise, whip-smart observations feel eerily universal. When You Find Out the World is Against You shows that there is something to be learned from even the most absurd or devastating moments of life.” — Jill Soloway“Kelly Oxford is a beautiful writer. She finds beauty in the mundane and humor in everyday eccentricities. She is our present-day, funny Joan Didion.” — Gia Coppola

Node.js in Action

by Tim Oxley Nathan Rajlich TJ Holowaychuk Alex Young

SummaryNode.js in Action, Second Edition is a thoroughly revised book based on the best-selling first edition. It starts at square one and guides you through all the features, techniques, and concepts you'll need to build production-quality Node applications. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyYou already know JavaScript. The trick to mastering Node.js is learning how to build applications that fully exploit its powerful asynchronous event handling and non-blocking I/O features. The Node server radically simplifies event-driven real-time apps like chat, games, and live data analytics, and with its incredibly rich ecosystem of modules, tools, and libraries, it's hard to beat!About the BookBased on the bestselling first edition, Node.js in Action, Second Edition is a completely new book. Packed with practical examples, it teaches you how to create high-performance web servers using JavaScript and Node. You'll master key design concepts such as asynchronous programming, state management, and event-driven programming. And you'll learn to put together MVC servers using Express and Connect, design web APIs, and set up the perfect production environment to build, lint, and test.What's InsideMastering non-blocking I/OThe Node event loopTesting and deployingWeb application templatingAbout the ReaderWritten for web developers with intermediate JavaScript skills. About the AuthorsThe Second Edition author team includes Node masters Alex Young, Bradley Meck, Mike Cantelon, and Tim Oxley, along with original authors Marc Harter, T.J. Holowaychuk, and Nathan Rajlich.Table of contentsPART 1 - WELCOME TO NODEWelcome to Node.js Node programming fundamentals What is a Node web application? PART 2 - WEB DEVELOPMENT WITH NODE Front-end build systems Server-side frameworks Connect and Express in depth Web application templatingStoring application data Testing Node applications Deploying Node applications and maintaining uptime PART 3 - BEYOND WEB DEVELOPMENT Writing command-line applications Conquering the desktop with Electron

Tracking and Mapping of Spatiotemporal Quantities Using Unicellular Swarm Intelligence

by John Oluwagbemiga Oyekan

The book discusses new algorithms capable ofsearching for, tracking, mapping and providing a visualization of invisiblesubstances. It reports on the realization of a bacterium-inspired roboticcontroller that can be used by an agent to search for any environmental spatialfunction such as temperature or pollution. Using the parameters of amathematical model, the book shows that it is possible to control theexploration, exploitation and sensitivity of the agent. This feature sets thework apart from the usual method of applying the bacterium behavior to roboticagents. The book also discusses how a computationally tractable multi-agentrobotic controller was developed and used to track as well as provide a visualmap of a spatio-temporal distribution of a substance. On the one hand, thisbook provides biologists and ecologists with a basis to perform simulationsrelated to how individual organisms respond to spatio-temporal factors in theirenvironment as well as predict and analyze the behavior of organisms at apopulation level. On the other hand, it offers robotic engineers practical andfresh insights into the development of computationally tractable algorithms forspatial exploratory and mapping robots. It also allows a more general audienceto gain an understanding of the design of computational intelligence algorithmsfor autonomous physical systems.

No Judgment: Essays

by Lauren Oyler

A Most Anticipated Book of 2024: Elle, The Millions, LitHub, Nylon, BookPage, PureWow, and moreFrom the national bestselling novelist and essayist, a groundbreaking collection of brand-new pieces about the role of cultural criticism in our ever-changing world.In her writing for Harper’s, the London Review of Books, The New Yorker, and elsewhere, Lauren Oyler has emerged as one of the most trenchant and influential critics of her generation, a talent whose judgments on works of literature—whether celebratory or scarily harsh—have become notorious. But what is the significance of being a critic and consumer of media in today’s fraught environment? How do we understand ourselves, and each other, as space between the individual and the world seems to get smaller and smaller, and our opinions on books and movies seem to represent something essential about our souls? And to put it bluntly, why should you care what she—or anyone—thinks?In this, her first collection of essays, Oyler writes with about topics like the role of gossip in our exponentially communicative society, the rise and proliferation of autofiction, why we’re all so “vulnerable” these days, and her own anxiety. In her singular prose—sharp yet addictive, expansive yet personal—she encapsulates the world we live and think in with precision and care, delivering a work of cultural criticism as only she can.Bringing to mind the works of such iconic writers as Susan Sontag, Pauline Kael, and Terry Castle, No Judgment is a testament to Lauren Oyler’s inimitable wit and her quest to understand how we shape the world through culture. It is a sparkling nonfiction debut from one of today’s most inventive thinkers.

'C' Programming in an Open Source Paradigm

by K. S. Oza S. R. Patil R. K. Kamat

Over the period of last few decades, the ‘C’ language has become an icon for computer programmers. The field of computer science has undergone tremendous change, and the rate of obsolescence of concepts, programming platforms, tools and utilities is extremely high. However, in spite of such vast changes, the only thing that has retained its stability is the ‘C’ language. Even today, millions of students, hobbyists and professional programmers enjoy the sturdiness, reliability and user friendliness of the ‘C’ language. Today ‘C’ enjoys the undisputable recognition in the computing paradigm for diversified applications, from the basic programming, microcontrollers, and spreadsheets to system programming. In this book, most of the usual theoretical features have been skipped, for these have been widely published in previous books. Rather than introducing the underpinning theory, the authors approach has been “learning-through-doing”, which is one that often appeals to programmers. Theory is followed by practical implementation, and in this way the book will cover programming aspects in a self-tutor manner providing an excellent overview, from basic to advance programming. Topics discussed include: • GCC interface• First time ‘C’ User• Decision and looping structures• Arrays and pointers• Functions, structures and union• Linear data structures

MySQL Management and Administration with Navicat

by Gökhan Ozar

Standard Mini. This book is written for MySQL Users, Developers, and admins who want to discover just how easy Navicat makes even normally arduous tasks.

Anisotropy Across Fields and Scales (Mathematics and Visualization)

by Evren Özarslan Thomas Schultz Eugene Zhang Andrea Fuster

This open access book focuses on processing, modeling, and visualization of anisotropy information, which are often addressed by employing sophisticated mathematical constructs such as tensors and other higher-order descriptors. It also discusses adaptations of such constructs to problems encountered in seemingly dissimilar areas of medical imaging, physical sciences, and engineering. Featuring original research contributions as well as insightful reviews for scientists interested in handling anisotropy information, it covers topics such as pertinent geometric and algebraic properties of tensors and tensor fields, challenges faced in processing and visualizing different types of data, statistical techniques for data processing, and specific applications like mapping white-matter fiber tracts in the brain.The book helps readers grasp the current challenges in the field and provides information on the techniques devised to address them. Further, it facilitates the transfer of knowledge between different disciplines in order to advance the research frontiers in these areas.This multidisciplinary book presents, in part, the outcomes of the seventh in a series of Dagstuhl seminars devoted to visualization and processing of tensor fields and higher-order descriptors, which was held in Dagstuhl, Germany, on October 28–November 2, 2018.

Distributed Denial of Service Attacks: Real-world Detection and Mitigation

by İlker Özçelik Richard Brooks

Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.

Feature Engineering Bookcamp

by Sinan Ozdemir

Deliver huge improvements to your machine learning pipelines without spending hours fine-tuning parameters! This book&’s practical case-studies reveal feature engineering techniques that upgrade your data wrangling—and your ML results.In Feature Engineering Bookcamp you will learn how to: Identify and implement feature transformations for your data Build powerful machine learning pipelines with unstructured data like text and images Quantify and minimize bias in machine learning pipelines at the data level Use feature stores to build real-time feature engineering pipelines Enhance existing machine learning pipelines by manipulating the input data Use state-of-the-art deep learning models to extract hidden patterns in data Feature Engineering Bookcamp guides you through a collection of projects that give you hands-on practice with core feature engineering techniques. You&’ll work with feature engineering practices that speed up the time it takes to process data and deliver real improvements in your model&’s performance. This instantly-useful book skips the abstract mathematical theory and minutely-detailed formulas; instead you&’ll learn through interesting code-driven case studies, including tweet classification, COVID detection, recidivism prediction, stock price movement detection, and more. About the technology Get better output from machine learning pipelines by improving your training data! Use feature engineering, a machine learning technique for designing relevant input variables based on your existing data, to simplify training and enhance model performance. While fine-tuning hyperparameters or tweaking models may give you a minor performance bump, feature engineering delivers dramatic improvements by transforming your data pipeline. About the book Feature Engineering Bookcamp walks you through six hands-on projects where you&’ll learn to upgrade your training data using feature engineering. Each chapter explores a new code-driven case study, taken from real-world industries like finance and healthcare. You&’ll practice cleaning and transforming data, mitigating bias, and more. The book is full of performance-enhancing tips for all major ML subdomains—from natural language processing to time-series analysis. What's inside Identify and implement feature transformations Build machine learning pipelines with unstructured data Quantify and minimize bias in ML pipelines Use feature stores to build real-time feature engineering pipelines Enhance existing pipelines by manipulating input data About the reader For experienced machine learning engineers familiar with Python. About the author Sinan Ozdemir is the founder and CTO of Shiba, a former lecturer of Data Science at Johns Hopkins University, and the author of multiple textbooks on data science and machine learning. Table of Contents 1 Introduction to feature engineering 2 The basics of feature engineering 3 Healthcare: Diagnosing COVID-19 4 Bias and fairness: Modeling recidivism 5 Natural language processing: Classifying social media sentiment 6 Computer vision: Object recognition 7 Time series analysis: Day trading with machine learning 8 Feature stores 9 Putting it all together

Principles of Data Science

by Sinan Ozdemir

Learn the techniques and math you need to start making sense of your data About This Book • Enhance your knowledge of coding with data science theory for practical insight into data science and analysis • More than just a math class, learn how to perform real-world data science tasks with R and Python • Create actionable insights and transform raw data into tangible value Who This Book Is For You should be fairly well acquainted with basic algebra and should feel comfortable reading snippets of R/Python as well as pseudo code. You should have the urge to learn and apply the techniques put forth in this book on either your own data sets or those provided to you. If you have the basic math skills but want to apply them in data science or you have good programming skills but lack math, then this book is for you. What You Will Learn • Get to know the five most important steps of data science • Use your data intelligently and learn how to handle it with care • Bridge the gap between mathematics and programming • Learn about probability, calculus, and how to use statistical models to control and clean your data and drive actionable results • Build and evaluate baseline machine learning models • Explore the most effective metrics to determine the success of your machine learning models • Create data visualizations that communicate actionable insights • Read and apply machine learning concepts to your problems and make actual predictions In Detail Need to turn your skills at programming into effective data science skills? Principles of Data Science is created to help you join the dots between mathematics, programming, and business analysis. With this book, you'll feel confident about asking—and answering—complex and sophisticated questions of your data to move from abstract and raw statistics to actionable ideas. With a unique approach that bridges the gap between mathematics and computer science, this books takes you through the entire data science pipeline. Beginning with cleaning and preparing data, and effective data mining strategies and techniques, you'll move on to build a comprehensive picture of how every piece of the data science puzzle fits together. Learn the fundamentals of computational mathematics and statistics, as well as some pseudocode being used today by data scientists and analysts. You'll get to grips with machine learning, discover the statistical models that help you take control and navigate even the densest datasets, and find out how to create powerful visualizations that communicate what your data means. Style and approach This is an easy-to-understand and accessible tutorial. It is a step-by-step guide with use cases, examples, and illustrations to get you well-versed with the concepts of data science. Along with explaining the fundamentals, the book will also introduce you to slightly advanced concepts later on and will help you implement these techniques in the real world.

Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem

by Sinan Ozdemir Soma Halder

Get into the world of smart data security using machine learning algorithms and Python libraries Key Features Learn machine learning algorithms and cybersecurity fundamentals Automate your daily workflow by applying use cases to many facets of security Implement smart machine learning solutions to detect various cybersecurity problems Book Description Cyber threats today are one of the costliest losses that an organization can face. In this book, we use the most efficient tool to solve the big problems that exist in the cybersecurity domain. The book begins by giving you the basics of ML in cybersecurity using Python and its libraries. You will explore various ML domains (such as time series analysis and ensemble modeling) to get your foundations right. You will implement various examples such as building system to identify malicious URLs, and building a program to detect fraudulent emails and spam. Later, you will learn how to make effective use of K-means algorithm to develop a solution to detect and alert you to any malicious activity in the network. Also learn how to implement biometrics and fingerprint to validate whether the user is a legitimate user or not. Finally, you will see how we change the game with TensorFlow and learn how deep learning is effective for creating models and training systems What you will learn Use machine learning algorithms with complex datasets to implement cybersecurity concepts Implement machine learning algorithms such as clustering, k-means, and Naive Bayes to solve real-world problems Learn to speed up a system using Python libraries with NumPy, Scikit-learn, and CUDA Understand how to combat malware, detect spam, and fight financial fraud to mitigate cyber crimes Use TensorFlow in the cybersecurity domain and implement real-world examples Learn how machine learning and Python can be used in complex cyber issues Who this book is for This book is for the data scientists, machine learning developers, security researchers, and anyone keen to apply machine learning to up-skill computer security. Having some working knowledge of Python and being familiar with the basics of machine learning and cybersecurity fundamentals will help to get the most out of the book

Advances in Building Information Modeling: Second Eurasian BIM Forum, EBF 2021, Istanbul, Turkey, November 11–12, 2021, Revised Selected Papers (Communications in Computer and Information Science #1627)

by Ozan Önder Özener Salih Ofluoglu Umit Isikdag

This book constitutes the refereed proceedings of the Second Eurasian BIM Forum on Advances in Building Information Modeling, EBF 2021, held in Istanbul, Turkey, during November 11–12, 2021.The 12 full papers included in this book were carefully reviewed and selected from 22 submissions. They were organized in topical sections as follows: BIM adoption and design process; BIM for project and facilities management; BIM education; and novel viewpoints on BIM.

Cybersecurity: A comprehensive guide to getting started in cybersecurity

by Dr. Erdal Ozkaya

Understand the nitty-gritty of Cybersecurity with easeKey FeaturesAlign your security knowledge with industry leading concepts and toolsAcquire required skills and certifications to survive the ever changing market needsLearn from industry experts to analyse, implement, and maintain a robust environmentBook DescriptionIt's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time.This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications.By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field.What you will learnGet an overview of what cybersecurity is and learn about the various faces of cybersecurity as well as identify domain that suits you bestPlan your transition into cybersecurity in an efficient and effective wayLearn how to build upon your existing skills and experience in order to prepare for your career in cybersecurityWho this book is forThis book is targeted to any IT professional who is looking to venture in to the world cyber attacks and threats. Anyone with some understanding or IT infrastructure workflow will benefit from this book. Cybersecurity experts interested in enhancing their skill set will also find this book useful.

Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents

by Dr. Erdal Ozkaya

Learn to identify a security incident and build a series of best practices to stop a cyberattack before it creates serious consequencesKey FeaturesDiscover Incident Response (IR), from its evolution to implementationUnderstand cybersecurity essentials and IR best practices through real-world phishing incident scenariosExplore the current challenges in IR through the perspectives of leading figures in the cybersecurity communityBook DescriptionCybercriminals are always in search of new methods and ways to infiltrate systems. Quickly responding to an incident should help an organization minimize its losses, decrease vulnerabilities, and rebuild services and processes. In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book provides updated IR processes to address the associated security risks. The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply this conceptual toolkit, with discussions on incident alerting, handling, investigation, recovery, and reporting. Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence, and the procedures involved in IR in the cloud – the challenges, opportunities, and how to secure your cloud environments. Finally, the book concludes with an “Ask the Experts” section where industry experts have provided their perspective on diverse topics in the IR sphere. By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently. What you will learnUnderstand IR and its significanceOrganize an IR teamExplore best practices for managing attack situations with your IR teamForm, organize, and operate a product security team to deal with product vulnerabilities and assess their severityOrganize all the entities involved in product security responseRespond to a security vulnerability based on Keepnet Labs processes and practicesAdapt all the above learnings for the cloudWho this book is forThis book is aimed at first-time incident responders, cybersecurity enthusiasts who want to get into IR, and anyone who is responsible for maintaining business security. It will also interest CIOs, CISOs, and members of IR, SOC, and CSIRT teams. However, IR is not just about information technology (IT) or security teams, and anyone with a legal, HR, media, or other active business role would benefit from this book.The book assumes you have some admin experience. No prior DFIR experience is required. Some infosec knowledge will be a plus but isn't mandatory.

Cybersecurity Leadership Demystified: A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO

by Dr. Erdal Ozkaya Melih Abdulhayoglu

Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use casesKey FeaturesDiscover tips and expert advice from the leading CISO and author of many cybersecurity booksBecome well-versed with a CISO's day-to-day responsibilities and learn how to perform them with easeUnderstand real-world challenges faced by a CISO and find out the best way to solve themBook DescriptionThe chief information security officer (CISO) is responsible for an organization's information and data security. The CISO's role is challenging as it demands a solid technical foundation as well as effective communication skills. This book is for busy cybersecurity leaders and executives looking to gain deep insights into the domains important for becoming a competent cybersecurity leader.The book begins by introducing you to the CISO's role, where you'll learn key definitions, explore the responsibilities involved, and understand how you can become an efficient CISO. You'll then be taken through end-to-end security operations and compliance standards to help you get to grips with the security landscape. In order to be a good leader, you'll need a good team. This book guides you in building your dream team by familiarizing you with HR management, documentation, and stakeholder onboarding. Despite taking all that care, you might still fall prey to cyber attacks; this book will show you how to quickly respond to an incident to help your organization minimize losses, decrease vulnerabilities, and rebuild services and processes. Finally, you'll explore other key CISO skills that'll help you communicate at both senior and operational levels.By the end of this book, you'll have gained a complete understanding of the CISO's role and be ready to advance your career.What you will learnUnderstand the key requirements to become a successful CISOExplore the cybersecurity landscape and get to grips with end-to-end security operationsAssimilate compliance standards, governance, and security frameworksFind out how to hire the right talent and manage hiring procedures and budgetDocument the approaches and processes for HR, compliance, and related domainsFamiliarize yourself with incident response, disaster recovery, and business continuityGet the hang of tasks and skills other than hardcore security operationsWho this book is forThis book is for aspiring as well as existing CISOs. This book will also help cybersecurity leaders and security professionals understand leadership in this domain and motivate them to become leaders. A clear understanding of cybersecurity posture and a few years of experience as a cybersecurity professional will help you to get the most out of this book.

Hands-On Cyber Security for Finance: Identify Vulnerabilities And Secure Your Financial Services From Security Breaches

by Erdal Ozkaya

If you are a security architect, cyber risk manager,or pentester looking at securing your financial organization then, this book is for you. Some basic understanding of cybersecurity tools and practices would smoothen your journey.

Learn Social Engineering: Learn the art of human hacking with an internationally renowned expert

by Erdal Ozkaya

Improve information security by learning Social Engineering.Key FeaturesLearn to implement information security using social engineeringGet hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so onPractical approach towards learning social engineering, for IT securityBook DescriptionThis book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates.Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages they cause. It then sets up the lab environment to use different toolS and then perform social engineering steps such as information gathering. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware.By the end of the book, you will be in a position to protect yourself andyour systems from social engineering threats and attacks.All in all, the book covers social engineering from A to Z , along with excerpts from many world wide known security experts.What you will learnLearn to implement information security using social engineeringLearn social engineering for IT securityUnderstand the role of social media in social engineeringGet acquainted with Practical Human hacking skillsLearn to think like a social engineerLearn to beat a social engineerWho this book is forThis book targets security professionals, security analysts, penetration testers, or any stakeholder working with information security who wants to learn how to use social engineering techniques. Prior knowledge of Kali Linux is an added advantage

Inside the Dark Web

by Erdal Ozkaya Rafiqul Islam

Inside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. The book also analyzes the online underground economy and digital currencies and cybercrime on the dark web. The book further explores how dark web crimes are conducted on the surface web in new mediums, such as the Internet of Things (IoT) and peer-to-peer file sharing systems as well as dark web forensics and mitigating techniques. This book starts with the fundamentals of the dark web along with explaining its threat landscape. The book then introduces the Tor browser, which is used to access the dark web ecosystem. The book continues to take a deep dive into cybersecurity criminal activities in the dark net and analyzes the malpractices used to secure your system. Furthermore, the book digs deeper into the forensics of dark web, web content analysis, threat intelligence, IoT, crypto market, and cryptocurrencies. This book is a comprehensive guide for those who want to understand the dark web quickly. After reading Inside the Dark Web, you’ll understand The core concepts of the dark web. The different theoretical and cross-disciplinary approaches of the dark web and its evolution in the context of emerging crime threats. The forms of cybercriminal activity through the dark web and the technological and "social engineering" methods used to undertake such crimes. The behavior and role of offenders and victims in the dark web and analyze and assess the impact of cybercrime and the effectiveness of their mitigating techniques on the various domains. How to mitigate cyberattacks happening through the dark web. The dark web ecosystem with cutting edge areas like IoT, forensics, and threat intelligence and so on. The dark web-related research and applications and up-to-date on the latest technologies and research findings in this area. For all present and aspiring cybersecurity professionals who want to upgrade their skills by understanding the concepts of the dark web, Inside the Dark Web is their one-stop guide to understanding the dark web and building a cybersecurity plan.

Arduino Computer Vision Programming

by Özen Özkaya Giray Yillikci

If you are a consumer and hobbyist who has familiarity with the basics of Arduino and wish to learn computer vision programming with Arduino to create intelligent systems, then this book is for you. No knowledge of computer vision programming is required.

Data Acquisition and Process Control Using Personal Computers

by Ozkul

""Covers all areas of computer-based data acquisition--from basic concepts to the most recent technical developments--without the burden of long theoretical derivations and proofs. Offers practical, solution-oriented design examples and real-life case studies in each chapter and furnishes valuable selection guides for specific types of hardware.

Managing the Digital Workplace in the Post-Pandemic: A Companion for Study and Practice

by Fahri Özsungur

Managing the Digital Workplace in the Post-Pandemic provides a cutting-edge survey of digital organizational behaviour in the post-pandemic workplace, drawing from an international range of expertise. It introduces and guides students and practitioners through the current best practices, laboratory methods, policies and protocols in use during these times of rapid change to workplace practices. This book is essential reading for students, researchers and practitioners in business and management. The book draws on global expertise from its contributors while being suitable for class and educational use, with each chapter including further reading, chapter summaries and exercises. Tutors are supported with a set of instructor materials that include PowerPoint slides, a test bank and an instructor's manual. This text covers a wide range of themes in this fast-developing field, including: The effect of the pandemic on the digital workplace Gender and cyberbullying in the context of the digital workplace Digital ergonomics and productivity Digital conflict management

Refine Search

Showing 35,626 through 35,650 of 53,433 results