Browse Results

Showing 26 through 50 of 53,293 results

The Zero Trust Framework: Threat Hunting & Quantum Mechanics

by Ravindra Das

The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic, and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning. Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things. So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not they will participate. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA). In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.

Zero Trust and Third-Party Risk: Reduce the Blast Radius

by Gregory C. Rasner

Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you’ll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk. The author uses the story of a fictional organization—KC Enterprises—to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You’ll also find: Explanations of the processes, controls, and programs that make up the zero trust doctrine Descriptions of the five pillars of implementing zero trust with third-party vendors Numerous examples, use-cases, and stories that highlight the real-world utility of zero trustAn essential resource for board members, executives, managers, and other business leaders, Zero Trust and Third-Party Risk will also earn a place on the bookshelves of technical and cybersecurity practitioners, as well as compliance professionals seeking effective strategies to dramatically lower cyber risk.

Zero-trust – An Introduction (River Publishers Rapids Series in Digital Security and Forensics)

by Tom Madsen

The book provides you with information on how to implement and manage a zero-trust architecture across these different layers of an infrastructure. It is an introduction to the overall purpose of zero-trust and the benefits that zero-trust can bring to an infrastructure, across many different technologies: Cloud Networking Identity management Operational Technology (OT) 5G Zero-trust is not a product, but a way of thinking about design and architecture. Cisco and Microsoft are used as the technology vendors, but the steps and information are equally applicable to other technology vendors.

Zero to AI: A non-technical, hype-free guide to prospering in the AI era

by Gianluco Mauro Nicolo Valigi

Summary How can artificial intelligence transform your business? In Zero to AI, you&’ll explore a variety of practical AI applications you can use to improve customer experiences, optimize marketing, help you cut costs, and more. In this engaging guide written for business leaders and technology pros alike, authors and AI experts Nicolò Valigi and Gianluca Mauro use fascinating projects, hands-on activities, and real-world explanations to make it clear how your business can benefit from AI. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology There&’s no doubt that artificial intelligence has made some impressive headlines recently, from besting chess and Go grand masters to producing uncanny deep fakes that blur the lines of reality. But what can AI do for you? If you want to understand how AI will impact your business before you invest your time and money, this book is for you. About the book Zero to AI uses clear examples and jargon-free explanations to show the practical benefits of AI. Each chapter explores a real-world case study demonstrating how companies like Google and Netflix use AI to shape their industries. You begin at the beginning, with a primer on core AI concepts and realistic business outcomes. To help you prepare for the transition, the book breaks down a successful AI implementation, including advice on hiring the right team and making decisions about resources, risks, and costs. What's inside Identifying where AI can help your organization Designing an AI strategy Evaluating project scope and business impact Using AI to boost conversion rates, curate content, and analyze feedback Understanding how modern AI works and what it can/can&’t do About the reader For anyone who wants to gain an understanding of practical artificial intelligence and learn how to design and develop projects with high business impact. About the author Gianluca Mauro and Nicolò Valigi are the cofounders of AI Academy, a company specializing in AI trainings and consulting. Table of Contents: 1. An introduction to artificial intelligence PART 1 - UNDERSTANDING AI 2. Artificial intelligence for core business data 3. AI for sales and marketing 4. AI for media 5. AI for natural language 6. AI for content curation and community building PART 2 - BUILDING AI 7. Ready—finding AI opportunities 8. Set—preparing data, technology, and people 9. Go—AI implementation strategy 10. What lies ahead

Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits

by Andy Bogart Lillian Ablon

Zero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.

Zero Configuration Networking: The Definitive Guide

by Daniel H Steinberg Stuart Cheshire

It used to be that two laptops, sitting side by side, couldn't communicate with each other; they may as well have been a thousand miles apart. But that was then, before the advent of Zero Configuration Networking technology. This amazing cross-platform open source technology automatically connects electronic devices on a network, allowing them to interoperate seamlessly-without any user configuration. So now you don't have to lift a finger! Needless to say, it has completely changed the way people connect to devices and programs for printing, file sharing, and other activities. Zero Configuration Networking: The Definitive Guide walks you through this groundbreaking network technology, with a complete description of the protocols and ways to implement network-aware applications and devices. Written by two Zero Configuration Networking experts, including one of Apple's own computer scientists, the book covers more than just file sharing and printing. Zero Configuration Networking also enables activities such as music and photo sharing and automatic buddy discovery on Instant Messaging applications. In fact, Zero Configuration Networking can be used for virtually any device that can be controlled by a computer. And this handy guide has the inside scoop on all of its capabilities-and how you can easily apply them in your own environment. For the technically advanced, Zero Configuration Networking: The Definitive Guide examines the three core technologies that make up Zero Configuration Networking: Link-Local Addressing, Multicast DNS, and DNS Service Discovery. It also reviews a series of APIs, including C-API, Java API, CFNetServices, and Cocoa's NSNetServices. Whether you want to understand how iTunes works, or you want to network a series of laptops and other devices at your office for maximum efficiency, you'll find all the answers in this authoritative guide.

Zero Comments: Blogging and Critical Internet Culture (Kultur- Und Medientheorie Ser.)

by Geert Lovink

In Zero Comments, internationally renowned media theorist and 'net critic' Geert Lovink revitalizes worn out concepts about the Internet and interrogates the latest hype surrounding blogs and social network sites. In this third volume of his studies into critical Internet culture, following the influential Dark Fiber and My First Recession, Lovink develops a 'general theory of blogging.' He unpacks the ways that blogs exhibit a 'nihilist impulse' to empty out established meaning structures. Blogs, Lovink argues, are bringing about the decay of traditional broadcast media, and they are driven by an in-crowd dynamic in which social ranking is a primary concern. The lowest rung of the new Internet hierarchy are those blogs and sites that receive no user feedback or 'zero comments'. Zero Comments also explores other important changes to Internet culture, as well, including the silent globalization of the Net in which the West is no longer the main influence behind new media culture, as countries like India, China and Brazil expand their influence and looks forward to speculate on the Net impact of organized networks, free cooperation and distributed aesthetics.

The Zephyr Conspiracy (Level Up)

by Israel Keats

In a virtual reality treasure hunt game, a gamer named Gadget is a steampunk pirate looking for her captain's lost treasure—a mysterious mechanical device. If she can find the scattered pieces that make up the device, she'll be released from the game. But the further she gets into it, the more Gadget worries she's in over her head. In a game where it's hard to know who's a real person and who's a non-player character, can Gadget trust anyone?

Zenoss Core Network and System Monitoring

by Michael Badger

The book starts by covering installation and configuration, before moving onto administration and dashboard usage.The book contains step-by-step instructions for setting up and using a working, capable Zenoss system. From small business to a large enterprise, this books helps organizations collect data, monitor, and report on their IT assets. Zenoss Core offers a feature-rich, accessible solution to organizations that lack the financial resources to purchase a proprietary monitoring solution or the technical resources. This book makes no distinction about your existing systems management knowledge or lack; thereof and assumes everyone is new to Zenoss Core. The emphasis is on configuring and administering a monitoring environment from the comforts of a graphical web interface.

Zenoss Core 3.x Network and System Monitoring

by Michael Badger

The book starts by covering installation and configuration, before moving on to administration and dashboard usage. It contains step-by-step instructions for setting up and using a working, capable Zenoss system. This book is written primarily for network and systems administrators who are monitoring their IT assets with Zenoss Core or who plan to monitor them. In reality, this book will benefit anyone, regardless of job title, who recognizes the importance of proactively monitoring the servers, routers, computers, websites, and devices that connect companies to customers.

Zenobia July

by Lisa Bunker

The critically acclaimed author of Felix Yz crafts a bold, heartfelt story about a trans girl solving a cyber mystery and coming into her own. <P><P>Zenobia July is starting a new life. She used to live in Arizona with her father; now she's in Maine with her aunts. She used to spend most of her time behind a computer screen, improving her impressive coding and hacking skills; now she's coming out of her shell and discovering a community of friends at Monarch Middle School. People used to tell her she was a boy; now she's able to live openly as the girl she always knew she was. <P><P>When someone anonymously posts hateful memes on her school's website, Zenobia knows she's the one with the abilities to solve the mystery, all while wrestling with the challenges of a new school, a new family, and coming to grips with presenting her true gender for the first time. Timely and touching, Zenobia July is, at its heart, a story about finding home.

Zend Framework in Action

by Steven K. Brown Nick Lo Rob Allen

From rather humble beginnings as the Personal Home Page scripting language, PHP has found its way into almost every server, corporation, and dev shop in the world. On an average day, somewhere between 500,000 and 2 million coders do something in PHP. Even when you use a well-understood language like PHP, building a modern web application requires tools that decrease development time and cost while improving code quality. Frameworks such as Ruby-on-Rails and Django have been getting a lot of attention as a result.For PHP coders, the Zend Framework offers that same promise without the need to move away from PHP. This powerful collection of components can be used in part or as a whole to speed up the development process. Zend Framework has the backing of Zend Technologies; the driving force behind the PHP programming language in which it is written. The first production release of the Zend Framework became available in July of 2007.Zend Framework in Action is a comprehensive tutorial that shows how to use the Zend Framework to create web-based applications and web services. This book takes you on an over-the-shoulder tour of the components of the Zend Framework as you build a high quality, real-world web application. This book is organized around the techniques you'll use every day as a web developer "data handling, forms, authentication, and so forth. As you follow the running example, you'll learn to build interactive Ajax-driven features into your application without sacrificing nuts-and-bolts considerations like security and performance.This book is aimed at the competent PHP developer who wants to master framework-driven web development. Zend Framework in Action goes beyond the docs but still provides quick access to the most common topics encountered in the development of web applications. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.

Zend Framework 2 Cookbook

by Josephus Callaars

This book is written in a practical, cookbook style with numerous examples and recipes. This style allows you to go both directly to your topic of interest or follow topics throughout a chapter to gain an in-depth knowledge of certain areas.'Zend Framework 2 Cookbook" is for PHP developers who are fairly advanced in programming in PHP. It will also be useful for developers who have a keen interest in expanding their knowledge outside the boundaries of simply scripting pages together. As unit testing and MVC will be discussed, it is beneficial for the reader to know what these technologies are, although experience with developing applications is not necessarily essential.

Zend Framework 2 Application Development

by Christopher Valles

The book is really pragmatic, focusing on the key aspects you usually need to create an application. We skip the boring theory and jump straight to the action. Also, the examples don't try to be perfect, they just show the topic in question or the tool/components we are using. Here the focus is on the framework itself not on how to architect applications. The book will spend a lot of time reviewing the examples and each chapter is created around the example used to explain the topics so the example is first, then the explanation.This book is great for you if you are new to Zend Framework 2 and are looking to get a practical approach in how to use the framework. This book will be also really helpful if you are a Zend Framework 1 user but you want to adapt you knowledge to the new version of the framework. It's assumed that you will have good experience using PHP and specially with the Object Oriented programming paradigm.

Zend Framework 2.0 by Example: Beginner’s Guide

by Krishna Shasankar V

Zend Framework 2.0 by Example: Beginner's Guide is a step-by-step guide that aims to empower you to build web applications packed with some really exciting features using Zend Framework 2.0.If you are a PHP Developer who is new to Zend Framework, but you want to get hands-on with the product quickly, this book is for you. Basic knowledge of object oriented programming with PHP is expected.

Zend Framework 1.8 Web Application Development

by Keith Pope

This book is an example-driven tutorial that takes you through the process of building Model-View-Controller-based web applications. You will create and develop a storefront application. It also covers common mistakes and best practices that will be helpful for developers. This book is for PHP web developers who want to get started with Zend Framework. If you are already using this framework, you will learn how to use it in the best way and produce better applications. Basic knowledge of Object Oriented design will be helpful.

The Zen of Social Media Marketing: An Easier Way to Build Credibility, Generate Buzz, and Increase Revenue

by Chris Brogan Shama Hyder

Freshly Updated Edition of the Ultimate Primer and How-To Guide for Social Media MarketingFive years ago, the first edition of The Zen of Social Media Marketing became a global bestseller. Three years after that, the updated edition helped even more marketers and executives navigate the sometimes-stressful world of social media. Now, this new, up-to-date edition offers timely insight to the ways social media has changed and how best to market in it.Whether you use social media now or not, people are already talking about your company online. By becoming part of the conversation in a more meaningful way, you can start connecting directly to your customers and clients and finding new ones right away with ease and efficiency.Social media marketing isn't like traditional marketing-and treating it that way only leads to frustration and failure. In The Zen of Social Media Marketing, Shama Hyder, social media expert and president of The Marketing Zen Group (MarketingZen.com), teaches you the "Zen" of using social media tools to find your own marketing nirvana.With a foreword by New York Times bestselling author Chris Brogan and new and updated content on content marketing, email marketing, the importance of mobile, social advertising, and more, the newest edition of The Zen of Social Media Marketing gives you:A comprehensive overview of why social media works and how to use it to drive traffic to your website and fan pageA proven process to attract followers and fans and convert them into customers and clientsThe latest social media trends and step-by-step guidelines for sites and apps such as Instagram, Pinterest, Snapchat, Imgur, LINE, and more All new information on why, when, and how to use online advertisingInnovative tips for mobile designEssential advice on content marketing and targeted tactics to enhance your SEOWhy self-expression is the true driver of social media use and how to leverage it for your businessInsights from dozens of leading online marketers and entrepreneurs, with strategies for success

The Zen of Social Media Marketing

by Shama Kabani

The Ultimate Primer and How-To Guide for Social Media MarketingIn the two years since the first edition became a global bestseller, the world of social media has grown and changed enough to require an updated guide.Whether you use social media now or not, people are already talking about your company online. By becoming part of the conversation in a more meaningful way, you can start connecting directly to your customers and clients and finding new ones right away with ease and efficiency.Social media marketing isn't like traditional marketing--and treating it that way only leads to frustration and failure. In The Zen of Social Media Marketing, Shama Kabani, social media expert and president of The Marketing Zen Group (MarketingZen.com), teaches you the "Zen" of using social media tools to find your own marketing nirvana.With a foreword by New York Times bestselling author Chris Brogan and updated content on Google+, online advertising, SEO, and more, the newest edition of The Zen of Social Media Marketing gives you:* A comprehensive overview of why social media works and how to use it to drive traffic to your website and fan page* A proven process to attract followers and fans and convert them into customers and clients* The latest updates and step-by-step guidelines for Facebook, Twitter, LinkedIn, Google+, and group-buying sites such as Groupon and LivingSocial* Tips on why, when, and how to use online advertising* Essential advice on content marketing and targeted tactics to enhance your SEO* New information on why self-expression is the true driver of social media use and how to leverage it for your business* Insights from dozens of leading online marketers and entrepreneurs, with strategies for success

Zen of Postproduction: Stress-Free Photography Workflow and Editing

by Mark Fitzgerald

Breathe deep and relax - this book takes the stress out of photography post-production While capturing the perfect photograph is a welcome creative challenge for photographers, post-production can often be a headache. Downloading, sorting, tagging, editing, and distributing your digital images - especially the enormous quantities produced in today's image-happy world - can be overwhelming. Time to take a deep breath and sit down with a copy of this calming book. Digital worksflow teacher and author Mark Fitzgerald offers low-stress, post-production photography workflows and editing solutions that will make your life easier. Walking you through the latest photography software, especially Adobe Lightroom and Adobe Photoshop, Mark offers sensible advice and answers all your post-production questions, whether you're a professional photographer, serious amateur, or motivated novice. Takes the stress out of photography post-production by offering effective, timesaving, no-hassle solutions for overworked digital photographers Helps you streamline and simplify such post-production tasks as downloading, sorting, tagging, editing, and distributing digital images Explores the latest photography software, with special emphasis on Adobe Lightroom and Adobe Photoshop Offers straightforward advice for professional photographers and serious amateurs Includes practical, real-world examples, so you can immediately apply what you're learning Get into a better, more relaxing place with your photography post-production workflows and tasks with Zen of Post Production: Stress-Free Photography Workflow and Editing.

Zen of Cloud: Learning Cloud Computing by Examples, Second Edition

by Haishi Bai

This book provides a comprehensive review of cloud philosophy, design principals, development trends as well as practical patterns to guide readers to understand, design and implement successful cloud-based solutions. This book provides both "hows" and "whys." It peers behind the buzz words such as machine learning, containers, and blockchains to help readers understand how to put those technologies into practical use. This unique book covers a broad spectrum of technologies of cloud computing.

Zen Cart: E-commerce Application Development

by Suhreed Sarkar

This is a highly practical book that can act as a reference material to which you will want to return again and again. The discussion in the book is right up-to-the point and it is filled with ample practical examples. This book is primarily for professional developers interested in building, enhancing, or extending Zen Cart sites for customers. It is also a useful reference for those who have got Zen Cart running on their own store, and want to improve it. It will also benefit those who want to migrate from osCommerce or other engines to Zen Cart.

Zeitenwende: Wie die IT unsere Welt verändert

by Jürgen Müller

Die moderne Informationstechnologie durchdringt und verändert unsere Welt – weit mehr und intensiver, als die meisten von uns ahnen. Das Buch beschreibt ihre Entstehung, ihre Geschichte, ihre wesentlichen Treiber und welche herausragende Bedeutung die neue Weltmacht IT für unser soziales, wirtschaftliches und politisches Leben erlangt hat. Es bietet dem Leser auf interessante, allgemeinverständliche und ausgewogene Weise Orientierung zu einem komplexen Thema, das unsere Gegenwart und Zukunft wesentlich prägt. Es zeigt die großen Entwicklungslinien und erklärt dabei auch, was es etwa mit Künstlicher Intelligenz, Algorithmen oder Blockchains auf sich hat.

Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs

by Ryan Soper Nestor N Torres Ahmed Almoailu

Dive into security testing and web app scanning with ZAP, a powerful OWASP security toolPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesMaster ZAP to protect your systems from different cyber attacksLearn cybersecurity best practices using this step-by-step guide packed with practical examplesImplement advanced testing techniques, such as XXE attacks and Java deserialization, on web applicationsBook DescriptionMaintaining your cybersecurity posture in the ever-changing, fast-paced security landscape requires constant attention and advancements. This book will help you safeguard your organization using the free and open source OWASP Zed Attack Proxy (ZAP) tool, which allows you to test for vulnerabilities and exploits with the same functionality as a licensed tool. Zed Attack Proxy Cookbook contains a vast array of practical recipes to help you set up, configure, and use ZAP to protect your vital systems from various adversaries. If you're interested in cybersecurity or working as a cybersecurity professional, this book will help you master ZAP. You'll start with an overview of ZAP and understand how to set up a basic lab environment for hands-on activities over the course of the book. As you progress, you'll go through a myriad of step-by-step recipes detailing various types of exploits and vulnerabilities in web applications, along with advanced techniques such as Java deserialization. By the end of this ZAP book, you'll be able to install and deploy ZAP, conduct basic to advanced web application penetration attacks, use the tool for API testing, deploy an integrated BOAST server, and build ZAP into a continuous integration and continuous delivery (CI/CD) pipeline.What you will learnInstall ZAP on different operating systems or environmentsExplore how to crawl, passively scan, and actively scan web appsDiscover authentication and authorization exploitsConduct client-side testing by examining business logic flawsUse the BOAST server to conduct out-of-band attacksUnderstand the integration of ZAP into the final stages of a CI/CD pipelineWho this book is forThis book is for cybersecurity professionals, ethical hackers, application security engineers, DevSecOps engineers, students interested in web security, cybersecurity enthusiasts, and anyone from the open source cybersecurity community looking to gain expertise in ZAP. Familiarity with basic cybersecurity concepts will be helpful to get the most out of this book.

ZBrush Professional Tips and Techniques

by Rick Baker Paul Gaboury

Learn to work effectively and creatively with all versions of ZBrush!ZBrush is used by top artists in Hollywood to model and sculpt characters in such films as Avatar, Iron Man, and Pirates of the Caribbean. In addition, this amazing technology is also used in jewelry design, forensic science, aerospace, video games, toy creation, and the medical field. Written by Pixologic's in-house ZBrush expert Paul Gaboury, this full-color, beautifully illustrated guide provides you with the ultimate tips and tricks to maximize your use of all versions of ZBrush. Reveals numerous little-known tips and tricks that exist within ZBrush, but often go unexploitedShares an abundance of helpful techniques and insights that the author has acquired from years of helping professional artists in various industriesOffers dozens of version-neutral solutions and shortcuts in areas such as sculpting, texturing, posing, rendering, and moreFeatures "Artist Spotlights" from several ZBrush experts, offering their how-to's for using the feature-rich software in today's studiosImprove your productivity and quality of work with this helpful, easy-to-understand resource.

ZBrush Digital Sculpting Human Anatomy

by Scott Spencer

Taking into account that many of today's digital artists -- particularly 3D character animators -- lack foundational artistic instruction, this book teaches anatomy in a coherent and succinct style. A clear writing style explains how to sculpt an accurate human figure, starting with the skeleton and working out to muscle, fat, and skin. Insightful explanations enable you to quickly and easily create and design characters that can be used in film, game, or print, and allows you to gain a strong understanding of the foundational artistic concepts. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Refine Search

Showing 26 through 50 of 53,293 results