Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für The AI Act Handbook

The AI Act Handbook

THE AI ACT HANDBOOK // - Detailed overview of the AI Act - Impact of the AI Act on various areas (including fi nance, employment law, advertising and administration) - Related areas of law (data protection, IP and IT law) - Practical overview of AI governance, risk and compliance in companies - Information on standards, norms and certifications By experts for practitioners – with this handbook, you can prepare yourself for the requirements of the European AI Act in a practical and compliant manner. Get comprehensive information on the effects on the various application fields of artificial intelligence in the private and public sectors. After a brief introduction to the history and technology of AI, you will receive a detailed subsumption of the content of the AI Act based on the various risk categories. Subsequently, areas of law closely related to the use of AI, in particular data protection, IP and IT law, will be dealt with in detail. By providing case studies, the book shares insights about the impact of the AI Act on various areas such as autonomous driving, work, critical infrastructure, medicine, insurance, etc. The correlation with the areas of law relevant to these areas will also be considered. A practical overview of the topic of AI governance, risk and compliance (GRC) in companies, tips on the application of guidelines and governance frameworks, implementation ideas for trustworthy AI as well as standards, norms and certifications complement the book. The TEAM OF AUTHORS consists of lawyers specializing in IT and data protection law and the use of AI. It includes, among others, one of Austria's representative in the AI Act negotiations at EU Council level and the founder of the Austrian association Women in AI. FROM THE CONTENTS // - What Is AI and How Do Data Science and Data Analytics Differ? - Geopolitics of Artificial Intelligence - AI Act: Rights and Obligations - Data Protection - Intellectual Property - AI and IT Contract Law - Private Sector - Public Sector - Ethics - Governance in the Company

Regulärer Preis: 119,99 €
Produktbild für Mobile Systeme

Mobile Systeme

Konzeption, Entwicklung und Betrieb mobiler Systeme. In Erstauflage aus dem Juni 2025.- Erklärt, wie mobile Systeme von Anfang bis Ende entwickelt und genutzt werden.- Vermittelt fundiert die Grundlagen und bietet praktische Einblicke für Studium und Beruf.- Zeigt Strategien und bewährte Methoden, um erfolgreiche und nachhaltige mobile Systeme zu entwickeln.- Stellt neue Entwicklungen, Trends und Technologien vor, die die mobile Welt in Zukunft verändern werden.„Mobile Systeme – Konzeption, Entwicklung und Betrieb“ ist ein umfassendes Grundlagenwerk, das fundiertes Wissen über mobile Technologien, deren Entwicklung und praktischen Einsatz vermittelt. Es erklärt die technischen Grundlagen ebenso wie fortgeschrittene Anwendungsbereiche und deckt den gesamten Lebenszyklus mobiler Systeme ab. Dabei geht es um Themen wie User Experience Design, Entwicklungsstrategien, Application Management, Green IT, XR-Technologien, Mobile Security und Zukunftsthemen wie das Mobile Metaverse. Das Ziel ist es, Studierende der Informatik, Wirtschaftsinformatik und Medieninformatik sowie IT-Manager:innen mit den Besonderheiten, Chancen und Herausforderungen mobiler Ökosysteme vertraut zu machen. Sie sollen lernen, wie man mobile Technologien gezielt und nachhaltig einsetzt. Das Buch bereitet sie auf die Umsetzung innovativer mobiler Projekte in verschiedenen Branchen vor.AUS DEM INHALT- Mobile Systeme: Komponenten und Basistechnologien- Mobile Geräte: Klassen, Technik und Infrastruktur- Mobile Entwicklungsframeworks: Nativ, Cross-Plattform, Hybrid- Mobile User Experience (UX)- Mobile Application Life Cycle Management (ALM), Mobile Application Management (MAM)- Mobile Security: Risiken und Prävention- Mobile KI- Mobile Business: Geschäftsmodelle und globaler Markt- Mobile XR und Mobile Metaverse- Green IT und Green Coding- Technikfolgenabschätzung und soziokulturelle Implikationen

Regulärer Preis: 49,99 €
Produktbild für Samba 4 (3. Auflage)

Samba 4 (3. Auflage)

Das Handbuch für Administratoren in 3. Auflage aus Juli 2025.- Ein Buch für alle, die Samba 4 in ihrem Netzwerk einsetzen wollen – sei es als Active Directory Domaincontroller, als Fileserver oder als Cluster.- Es begleitet von Anfang bis Ende den Aufbau einer kompletten Samba-4-Umgebung, aber für bestimmte Dienste erhalten Sie auch Informationen in einzelnen Kapiteln.- In einem neuen Kapitel wird besonders auf das Thema Sicherheit eingegangen. Hier werden die Möglichkeiten des Function Level 2016 besprochen.Dieses Buch gibt Ihnen eine umfangreiche Anleitung für die Einrichtung und den Betrieb einer Samba-4-Umgebung. Ein Schwerpunkt liegt auf der Verwendung von Samba 4 als Active Directory-Domaincontroller.Dabei werden alle Schritte zu deren Verwaltung beschrieben bis hin zur Behebung eines Ausfalls von Domaincontrollern.Ein weiterer Schwerpunkt ist die Verwaltung von Fileservern in einer Netzwerkumgebung, sei es als einzelner Server oder als Cluster. Bei der Einrichtung des Clusters wird dabei komplett auf Open-Source-Software gesetzt. Auch die Einbindung von Clients – von Windows, Linux und macOS – kommt nicht zu kurz.Die Einrichtung von zwei DHCP-Servern für die ausfallsichere DDNS-Umgebung wird mit allen Schritten und Skripten beschrieben. CTDB wird um die Funktion NFS-Server hochverfügbar bereitstellen erweitert. Gerade als Linux-Administrator ist man es gewohnt, alles möglichst über Skripte auf der Kommandozeile durchführen zu können. Deshalb gibt es zu diesem Bereich ein eigenes Kapitel.Auch wird in dieser Auflage das Thema Sicherheit genauer beleuchtet. Dabei geht es um neue Techniken und die Möglichkeiten, die sich daraus ergeben.AUS DEM INHALT- Installation von Domaincontrollern und Fileservern- Einrichten und Testen von Domaincontrollern- Benutzerverwaltung- Grundlagen zu Gruppenrichtlinien- Einrichtung servergespeicherter Profi le und Ordnerumleitung via GPOs- Einrichtung von RODC (Read Only Domain Controller)- Ausfallsichere DDNS-Infrastruktur- Fileserver in der Domäne- Freigaben einrichten und verwalten- Einrichtung des Virusfilters- Clients in der Domäne- Cluster mit CTDB und GlusterFS- Schemaerweiterung- Einrichten von Vertrauensstellungen- Sicherheit- Hilfe zur Fehlersuche- CTDB und NFS als Cluster

Regulärer Preis: 59,99 €
Produktbild für Human Capital Analytics

Human Capital Analytics

THE BOOK EQUIPS READERS WITH ESSENTIAL INSIGHTS AND STRATEGIES FOR LEVERAGING CUTTING-EDGE TECHNOLOGY AND HUMAN CAPITAL ANALYTICS, ENSURING ORGANIZATIONS THRIVE IN THE ERA OF HUMAN-ROBOT COLLABORATION AND SUSTAINABLE WORKFORCE DEVELOPMENT.Human Capital Analytics: Exploring the HR Spectrum in Industry 5.0 provides a comprehensive investigation into the ever-changing junction of human capital and cutting-edge technology in the context of the Fifth Industrial Revolution. This volume emphasizes the revolutionary role that human capital analytics plays in changing workforce management, talent development, and HR strategies. This position is particularly relevant as organizations transition into Industry 5.0, where human-robot collaboration is the norm. The purpose of this book is to provide a forward-looking perspective on how data-driven human resource strategies will become vital for boosting worker potential and driving organizational success. This is accomplished by integrating developing technologies such as artificial intelligence, machine learning, and robots. Readers will find that this book:* Explores the transformative role of human-robot collaboration, emerging technologies, and strategic HR planning in the context of the Fifth Industrial Revolution;* Provides a comprehensive overview of how predictive analytics and human capital analytics can enhance workforce management, employee engagement, and performance measurement;* Focuses on how HR 5.0 contributes to advancing the United Nations Sustainable Development Goals, driving both social and business impact;* Includes empirical studies, case studies, and real-world examples of implementing Industry 5.0 in organizations;* Provides actionable strategies for HR professionals to navigate the digital transformation of human resource management, incorporating AI, robotics, and data-driven approaches.AUDIENCEHuman resource developers, analysts, professionals, business executives, data scientists, consultants, professors, academics, and students exploring ways to leverage technology for Industry 5.0. DEEPA GUPTA, PHD is a distinguished academician with over 24 years of experience in management studies, currently serving as Dean at GL Bajaj Institute of Management. Her expertise extends to organizational development, corporate relations, and international collaboration. MUKUL GUPTA, PHD is a professor at GL Bajaj Institute of Management with over 25 years of experience in teaching and the corporate sector. His research and expertise in consumer behavior are invaluable for understanding the human-centric aspects of Human Capital Analytics, offering insights into user behavior, adoption, and interaction with AI-driven systems and services. PAWAN BUDHWAR, PHD is a professor of International Human Resource Management and the Associate Deputy Vice Chancellor International at Aston Business School. His research interests include personnel and human resource management, organizational performance, and artificial intelligence. JIM WESTERMAN, PHD is a professor in the Department of Management at Appalachian State University, Boone, North Carolina, USA. His areas of expertise include human resource management, organizational behavior, leadership, sustainable business, and business ethics. RAJESH KUMAR DHANARAJ, PHD is a professor at Symbiosis International University. His research in areas such as machine learning, cyber-physical systems, and wireless sensor networks is directly relevant to the core technologies underpinning computational intelligence in HR. BALAMURUGAN BALUSAMY, PHD is an Associate Dean of Students at Shiv Nadar University with 12 years of teaching experience. He has published over 200 papers and over 80 books in collaboration with professors worldwide. His research interests include engineering education, blockchain, and data sciences.

Regulärer Preis: 183,99 €
Produktbild für Blockchain Technology for the Engineering and Service Sectors

Blockchain Technology for the Engineering and Service Sectors

BLOCKCHAIN TECHNOLOGY FOR THE ENGINEERING AND SERVICE SECTORS IS ESSENTIAL FOR ANYONE LOOKING TO UNDERSTAND HOW TO HARNESS BLOCKCHAIN TECHNOLOGY, DRIVING INNOVATION AND EFFICIENCY ACROSS VARIOUS SECTORSBlockchain technology stands as one of the most transformative innovations of the 21st century, significantly impacting sectors including finance, manufacturing, and the service industry. Despite its relatively recent emergence, blockchain has the potential to revolutionize a wide array of industries, including tourism, agriculture, healthcare, and automobiles. With the growing interest in decentralized finance, governments and businesses are increasingly investing in research and development to enhance blockchain’s capabilities. As the technology continues to evolve, we can expect even more ground-breaking advancements in the near future. Blockchain Technology for the Engineering and Service Sectors is designed to provide a comprehensive exploration of blockchain technology, divided into two key areas of study. The first section delves into the history and technical evolution of blockchain, tracing its development from the inception of Bitcoin to its integration with other advanced technologies like the Internet of Things. The second section focuses on the frameworks and applications of blockchain, examining its use across various industries, including supply chain management, tourism, banking, healthcare, and automation. Additionally, the book addresses current challenges, emerging trends, and the future potential of blockchain technology. Through a detailed and structured presentation of these topics, readers will gain a deep understanding and expertise in the field of blockchain technology. AUDIENCEResearchers, engineers, and industry professionals working in research and development to explore the possibilities of blockchain.

Regulärer Preis: 183,99 €
Produktbild für Artificial Intelligence and Machine Learning for Industry 4.0

Artificial Intelligence and Machine Learning for Industry 4.0

THIS BOOK IS ESSENTIAL FOR ANY LEADER SEEKING TO UNDERSTAND HOW TO LEVERAGE INTELLIGENT AUTOMATION AND PREDICTIVE MAINTENANCE TO DRIVE INNOVATION, ENHANCE PRODUCTIVITY, AND MINIMIZE DOWNTIME IN THEIR MANUFACTURING PROCESSES.Intelligent automation is widely considered to have the greatest potential for Industry 4.0 innovations for corporations. Industrial machinery is increasingly being upgraded to intelligent machines that can perceive, act, evolve, and interact in an industrial environment. The innovative technologies featured in this machinery include the Internet of Things, cyber-physical systems, and artificial intelligence. Artificial intelligence enables computer systems to learn from experience, adapt to new input data, and perform intelligent tasks. The significance of AI is not found in its computational models, but in how humans can use them. Consistently observing equipment to keep it from malfunctioning is the procedure of predictive maintenance. Predictive maintenance includes a periodic maintenance schedule and anticipates equipment failure rather than responding to equipment problems. Currently, the industry is struggling to adopt a viable and trustworthy predictive maintenance plan for machinery. The goal of predictive maintenance is to reduce the amount of unanticipated downtime that a machine experiences due to a failure in a highly automated manufacturing line. In recent years, manufacturing across the globe has increasingly embraced the Industry 4.0 concept. Greater solutions than those offered by conventional maintenance are promised by machine learning, revealing precisely how AI and machine learning-based models are growing more prevalent in numerous industries for intelligent performance and greater productivity. This book emphasizes technological developments that could have great influence on an industrial revolution and introduces the fundamental technologies responsible for directing the development of innovative firms. Decision-making requires a vast intake of data and customization in the manufacturing process, which managers and machines both deal with on a regular basis. One of the biggest issues in this field is the capacity to foresee when maintenance of assets is necessary. Leaders in the sector will have to make careful decisions about how, when, and where to employ these technologies. Artificial Intelligence and Machine Learning for Industry 4.0offers contemporary technological advancements in AI and machine learning from an Industry 4.0 perspective, looking at their prospects, obstacles, and potential applications. M. THIRUNAVUKKARASAN, PHD is an assistant professor in the School of Computer Science and Engineering at the Vellore Institute of Technology with over 15 years of research and teaching experience. He has published papers in several international conferences and journals and given keynote speeches at many international conferences. His research interests include Internet of Things (IoT), wireless sensor networks, wireless communication, cloud computing, artificial intelligence, and machine learning. S.A. SAHAAYA ARUL MARY, PHD is a professor in the School of Computer Science and Engineering, Vellore Institute of Technology with over 29 years of teaching and over 15 years of research experience. She has over 70 publications in various reputed journals and conferences and reviewed over 35 papers in addition to mentoring aspiring PhD students. Her research includes software engineering, data mining, machine learning, and artificial intelligence. SATHIYARAJ R., PHD is an assistant professor in the Department of Computer Science and Engineering at Gandhi Institute of Technology and Management University in Bangalore, India. He has contributed to two books, served as lead editor for an additional two books, and published five patents and over 20 articles in various international journals and conferences. His research interests include machine learning, big data analytics, and intelligent systems. G.S. PRADEEP GHANTASALA, PHD is a professor in the Department of Computer Science and Engineering, at Alliance University with over 16 years of academic experience. He has contributed to internationally published books, chapters, patents, and numerous papers in journals and conferences. He also serves as an editor and reviewer for several journals. His research interests include machine learning, deep learning, healthcare applications, and software engineering applications. MUDASSIR KHAN, PHD is an assistant professor in the Department of Computer Science at King Khalid University with over ten years of teaching experience. He has published over 25 papers in international journals and conferences and one patent. He is a member of various technical and professional societies including the Institute for Electrical and Electronics Engineers and Computer Science Teachers Association. His research interests include big data, deep learning, machine learning, eLearning, fuzzy logic, image processing, and cyber security. Preface xiii1 Industry 4.0 and the AI/ML Era: Revolutionizing Manufacturing 1Balusamy Nachiappan, C. Viji, N. Rajkumar, A. Mohanraj, N. Karthikeyan, Judeson Antony Kovilpillai J. and Pellakuri Vidyullatha2 Business Intelligence and Big Data Analytics for Industry 4.0 29N. Rajkumar, C. Viji, Balusamy Nachiappan, A. Mohanraj, N. Karthikeyan, Judeson Antony Kovilpillai J. and Sathiyaraj. R3 "AI-Powered Mental Health Innovations": Handling the Effects of Industry 4.0 on Health 55U Ananthanagu and Pooja Agarwal4 AI ML Empowered Smart Buildings and Factories 87Akey Sungheetha, Rajesh Sharma R., R. Chinnaiyan and G. S. Pradeep Ghantasala5 Applications of Artificial Intelligence and Machine Learning in Industry 4.0 107Tina Babu, Rekha R. Nair and Kishore S.6 Application of Machine Learning in Moisture Content Prediction of Coffee Drying Process 145Tuan M. Le, Thuy T. Tran, Hieu M. Tran and Son V.T. Dao7 Survivable AI for Defense Strategies in Industry 4.0 169Anuradha Reddy, G. S. Pradeep Ghantasala, Ochin Sharma, Mamatha Kurra, Kumar Dilip and Pellakuri Vidyullatha8 Industry 4.0 Based Turbofan Performance Prediction 197M. Sai Narayan, Prajakta P. Nandanwar, Annabathini Lokesh, Bathula Lakshmi Narayana, Varun Revadigar, Judeson Antony Kovilpillai J., Neelapala Anil Kumar and D.M. Deepak Raj9 Industrial Predictive Maintenance for Sustainable Manufacturing 223Mohammed Rihan, Ethiswar Muchherla, Shwejit Shri, Kushagra Jasoria, Judeson Antony Kovilpillai J. and G. S. Pradeep Ghantasala10 Enhanced Security Framework with Blockchain for Industry 4.0 Cyber-Physical Systems, Exploring IoT Integration Challenges and Applications 247P. Vijayalakshmi, B. Selvalakshmi, K. Subashini, Sudhakar G., Kavin Francis Xavier and Pradeepa K.11 Integrating Artificial Intelligence and@Machine Learning for Enhanced Cyber Security in Industry 4.0: Designing a Smart Factory with IoT and CPS 267Kavin Francis Xavier, Subashini K., Vijayalakshmi P., Selvalakshmi B., Sudhakar G. and Pradeepa K.12 Application of AI and ML in Industry 4.0 287V. Vinaya Kumari, G. S. Pradeep Ghantasala, S. A. Sahaaya Arul Mary, M. Thirunavukkarasan and Sathiyaraj. RReferences 303About the Editors 307Index 309

Regulärer Preis: 168,99 €
Produktbild für Frictionless Data

Frictionless Data

YOU’VE HEARD THE PROMISES OF DATA: IF YOU JUST UNLOCK THE HIDDEN INSIGHTS, YOU CAN WIN AN UNFAIR GAME. BUT FOR PEOPLE AT MOST COMPANIES, FRICTION PREVENTS DATA FROM FLOWING EFFORTLESSLY INTO DECISIONS. Technology alone won’t make the connection for you. Neither will finding more data; you’ve already got plenty. To connect data with decisions, you’ll need to reverse the way data flows through all your systems and decisions.If you’re a business decision-maker – a CEO, CIO, or CxO – you’ll see the connection between a data strategy and the thousands of decisions people in your company make every day. If you’re a data worker, you’ll see how your work changes the direction of a company. And if you’re an analyst – someone who bridges the gap between top-level decision makers and what’s really happening in the business – you’ll find a new vision of how to use data to transform your job and your company.Instead of new technology offering tired promises to make your job easier, you’ll find management solutions for better, faster decisions. Unified data flowing through your company, to everyone at the same time, improving business decisions through alignment and visibility, trust and scale.That’s Frictionless Decision Data.

Regulärer Preis: 17,99 €
Produktbild für Integrating Neurocomputing with Artificial Intelligence

Integrating Neurocomputing with Artificial Intelligence

INTEGRATING NEUROCOMPUTING WITH ARTIFICIAL INTELLIGENCE PROVIDES UNPARALLELED INSIGHTS INTO THE CUTTING-EDGE CONVERGENCE OF NEUROSCIENCE AND COMPUTING, ENRICHED WITH REAL-WORLD CASE STUDIES AND EXPERT ANALYSES THAT HARNESS THE TRANSFORMATIVE POTENTIAL OF NEUROCOMPUTING IN VARIOUS DISCIPLINES.Integrating Neurocomputing with Artificial Intelligence is a comprehensive volume that delves into the forefront of the neurocomputing landscape, offering a rich tapestry of insights and cutting-edge innovations. This volume unfolds as a carefully curated collection of research, showcasing multidimensional perspectives on the intersection of neuroscience and computing. Readers can expect a deep exploration of fundamental theories, methodologies, and breakthrough applications that span the spectrum of neurocomputing. Throughout the book, readers will find a wealth of case studies and real-world examples that exemplify how neurocomputing is being harnessed to address complex challenges across different disciplines. Experts and researchers in the field contribute their expertise, presenting in-depth analyses, empirical findings, and forward-looking projections. Integrating Neurocomputing with Artificial Intelligence serves as a gateway to this fascinating domain, offering a comprehensive exploration of neurocomputing’s foundations, contemporary developments, ethical considerations, and future trajectories. It embodies a collective endeavor to drive progress and unlock the potential of neurocomputing, setting the stage for a future where artificial intelligence is not merely artificial, but profoundly inspired by the elegance and efficiency of the human brain. ABHISHEK KUMAR, PHD is a professor and Assistant Director in the Computer Science and Engineering Department at Chandigarh University, Punjab with over 13 years of teaching experience. He has published over 170 peer-reviewed papers, seven books, and one patent and edited over 50 volumes. His research interests include artificial intelligence, renewable energy systems, image processing, and data mining. PRAMOD SINGH RATHORE is an assistant professor in the Department of Computer and Communication Engineering at Manipal University with over 11 years of teaching experience. He has published over 55 papers in reputable national and international journals, books, and conferences. His research interests include NS2, computer networks, mining, and database management systems. SACHIN AHUJA, PHD is the Executive Director of Engineering at Chandigarh University with extensive research and academic experience. He has served in key academic positions at various reputed higher education institutes, guiding several master’s and doctoral scholars in areas including artificial intelligence, machine learning, and data mining. UMESH KUMAR LILHORE, PHD is affiliated with Galgotias University where he actively engages in academic leadership, research, and mentoring. He has published over 100 scholarly articles and is a senior member of the Institue for Electrical and Electronics Engineers. His areas of expertise include artificial intelligence, machine learning, Internet of Things (IoT), cloud computing, and cybersecurity.

Regulärer Preis: 168,99 €
Produktbild für Blockchain Technology for the Engineering and Service Sectors

Blockchain Technology for the Engineering and Service Sectors

BLOCKCHAIN TECHNOLOGY FOR THE ENGINEERING AND SERVICE SECTORS IS ESSENTIAL FOR ANYONE LOOKING TO UNDERSTAND HOW TO HARNESS BLOCKCHAIN TECHNOLOGY, DRIVING INNOVATION AND EFFICIENCY ACROSS VARIOUS SECTORSBlockchain technology stands as one of the most transformative innovations of the 21st century, significantly impacting sectors including finance, manufacturing, and the service industry. Despite its relatively recent emergence, blockchain has the potential to revolutionize a wide array of industries, including tourism, agriculture, healthcare, and automobiles. With the growing interest in decentralized finance, governments and businesses are increasingly investing in research and development to enhance blockchain’s capabilities. As the technology continues to evolve, we can expect even more ground-breaking advancements in the near future. Blockchain Technology for the Engineering and Service Sectors is designed to provide a comprehensive exploration of blockchain technology, divided into two key areas of study. The first section delves into the history and technical evolution of blockchain, tracing its development from the inception of Bitcoin to its integration with other advanced technologies like the Internet of Things. The second section focuses on the frameworks and applications of blockchain, examining its use across various industries, including supply chain management, tourism, banking, healthcare, and automation. Additionally, the book addresses current challenges, emerging trends, and the future potential of blockchain technology. Through a detailed and structured presentation of these topics, readers will gain a deep understanding and expertise in the field of blockchain technology. AUDIENCEResearchers, engineers, and industry professionals working in research and development to explore the possibilities of blockchain.

Regulärer Preis: 183,99 €
Produktbild für Integrating Neurocomputing with Artificial Intelligence

Integrating Neurocomputing with Artificial Intelligence

INTEGRATING NEUROCOMPUTING WITH ARTIFICIAL INTELLIGENCE PROVIDES UNPARALLELED INSIGHTS INTO THE CUTTING-EDGE CONVERGENCE OF NEUROSCIENCE AND COMPUTING, ENRICHED WITH REAL-WORLD CASE STUDIES AND EXPERT ANALYSES THAT HARNESS THE TRANSFORMATIVE POTENTIAL OF NEUROCOMPUTING IN VARIOUS DISCIPLINES.Integrating Neurocomputing with Artificial Intelligence is a comprehensive volume that delves into the forefront of the neurocomputing landscape, offering a rich tapestry of insights and cutting-edge innovations. This volume unfolds as a carefully curated collection of research, showcasing multidimensional perspectives on the intersection of neuroscience and computing. Readers can expect a deep exploration of fundamental theories, methodologies, and breakthrough applications that span the spectrum of neurocomputing. Throughout the book, readers will find a wealth of case studies and real-world examples that exemplify how neurocomputing is being harnessed to address complex challenges across different disciplines. Experts and researchers in the field contribute their expertise, presenting in-depth analyses, empirical findings, and forward-looking projections. Integrating Neurocomputing with Artificial Intelligence serves as a gateway to this fascinating domain, offering a comprehensive exploration of neurocomputing’s foundations, contemporary developments, ethical considerations, and future trajectories. It embodies a collective endeavor to drive progress and unlock the potential of neurocomputing, setting the stage for a future where artificial intelligence is not merely artificial, but profoundly inspired by the elegance and efficiency of the human brain. ABHISHEK KUMAR, PHD is a professor and Assistant Director in the Computer Science and Engineering Department at Chandigarh University, Punjab with over 13 years of teaching experience. He has published over 170 peer-reviewed papers, seven books, and one patent and edited over 50 volumes. His research interests include artificial intelligence, renewable energy systems, image processing, and data mining. PRAMOD SINGH RATHORE is an assistant professor in the Department of Computer and Communication Engineering at Manipal University with over 11 years of teaching experience. He has published over 55 papers in reputable national and international journals, books, and conferences. His research interests include NS2, computer networks, mining, and database management systems. SACHIN AHUJA, PHD is the Executive Director of Engineering at Chandigarh University with extensive research and academic experience. He has served in key academic positions at various reputed higher education institutes, guiding several master’s and doctoral scholars in areas including artificial intelligence, machine learning, and data mining. UMESH KUMAR LILHORE, PHD is affiliated with Galgotias University where he actively engages in academic leadership, research, and mentoring. He has published over 100 scholarly articles and is a senior member of the Institue for Electrical and Electronics Engineers. His areas of expertise include artificial intelligence, machine learning, Internet of Things (IoT), cloud computing, and cybersecurity.

Regulärer Preis: 168,99 €
Produktbild für Penetrationstests erfolgreich umsetzen

Penetrationstests erfolgreich umsetzen

Dieses Buch ist ein Praxisleitfaden für Verantwortliche in Unternehmen, die Pentests erfolgreich umsetzen wollen. Dabei werden aktuelle regulatorische Anforderungen und Herausforderungen ebenso beleuchtet wie die unterstützende Wirkung der KI.Professionelle Dienstleister decken durch Pentests Schwachstellen in Komponenten auf, damit Betroffene diese proaktiv beheben können. Dabei werden Vorgehen und Methoden echter Angreifer angewendet.Die Autoren geben praxisnahe Tipps zum Vorgehen, beginnend bei der Planung erster Pentests bis zur Nachbereitung. Es wird in sämtlichen Phasen aufgezeigt, wie für alle Seiten ein optimaler Nutzen aus Pentest-Projekten gezogen wird, bei gleichzeitig rechtlich sicheren Rahmenbedingungen.NINA WAGNER hat nach ihrem Mathe-Studium die IT-Sicherheitsbranche fasziniert, besonders das proaktive Aufdecken von Schwachstellen. Vor der Gründung ihrer eigenen Firma, der MindBytes GmbH, hat sie bereits mehrere Jahre als Pentesterin und Red Teamerin gearbeitet.HORST SPEICHERT ist Partner der Kanzlei esb Rechtsanwälte und seit mehr als 25 Jahren als Rechtsanwalt spezialisiert auf IT-Recht, Datenschutz und Informationssicherheit.DR. STEPHEN FEDTKE ist Wirtschaftsingenieur der Elektrotechnik (TH Darmstadt, Regelungstechnik), Autor und Herausgeber im Springer Verlag, und CTO des Sicherheits- und Compliance-Lösungsanbieters Enterprise-IT-Security.com.BERNHARD C. WITT berät seit 1998 zu Informationssicherheit und ist als Principal on Cybersecurity and Critical Entities Protection bei der SITS Deutschland GmbH beschäftigt. Er ist ein ausgewiesener Experte zur neuen Regulierung zur Cybersicherheit und hat zahlreiche Prüfungen kritischer Infrastrukturen nach § 8a Abs. 3 BSIG durchgeführt oder begleitet.Einleitung.- Testgegenstände.- Anbieterauswahl.- Ablauf eines Pentests.- Pentests rechtssicher umsetzen.- Woher kommen Pflichten für Pentests.- Erste Pentests umsetzen.- Pentests und künstliche Intelligenz.- Anhang.

Regulärer Preis: 36,99 €
Produktbild für Metaversum

Metaversum

Die Entwicklung des Internets, insbesondere des WWW, stößt aktuell an ihre Grenzen – sowohl technisch als auch sozio-kulturell und ökonomisch. Als Lösung wird ein neues Internet versprochen, das die Grenzen der realen und der virtuellen Welt überwinden und Realität und Digitalität verschmelzen soll – das Metaversum. Technische, semantische und organisatorische Details greifen hierzu eng ineinander. Was aber bedeutet dies bei genauerer Betrachtung? Welche technisch-technologischen Herausforderungen müssen bewältigt werden, um ein solches Verschmelzen zu erreichen? Welche ökonomischen Möglichkeiten eröffnen sich– und welche verbieten sich möglicherweise? Wie kann erreicht werden, dass ein offenes und für jeden benutzbares Metaversum entsteht? Und wie kann vermieden werden, dass auch in diesem neuen Metaversum wenige große Anbieter ihre proprietären Ideen durchsetzen? Für diese Fragen soll dieses Buch Antworten aufzeigen. In der vorliegenden Auflage wurden zudem aktuelle Trends sowie der Beitrag der künstlichen Intelligenz zum Metaversum ergänzt.DR. PETER HOFFMANN, einerseits Hochschullehrer für Wirtschaftsinformatik, andererseits Medieninformatiker mit Herz und Seele, beschäftigt sich seit mittlerweile mehr als 20 Jahren mit den Fragen danach, was „digitale Medien“ und „virtuelle Welten“ eigentlich sind und wie der Benutzer mit ihnen interagieren kann.Metaversum?.- Woher … wohin … oder: was überhaupt.- Das Verschmelzen von Welten und …versen.- Eine andere Dimension: Ökonomisches Verschmelzen.- Was nicht fehlen darf: Kritik.- Die wirkliche Vision.- Jetzt ist die Zeit zum Bauen!.- Nachtrag 1 - Weil es so aktuell ist: Künstliche Intelligenz im Metaversum?.

Regulärer Preis: 34,99 €
Produktbild für Getting Started with .NET Aspire

Getting Started with .NET Aspire

Learn to master the brand-new .NET Aspire stack to simplify the creation of cloud-native and distributed applications. You will learn how .NET Aspire combines all the necessary tools, templates, and packages to minimize friction for applications that draw on a broad array of servers.Experienced software engineer Dave Rael explains how to leverage .NET Aspire. He begins by describing the motivations for .NET Aspire and how it improves upon current approaches for distributed applications. Then, he shows you how to use .NET Aspire and its associated tools and libraries in your projects, whether your project is completely from scratch or builds upon a previously existing solution.WHAT YOU WILL LEARN:* Gain a solid understanding of the .NET Aspire stack* Create rich and dynamic distributed apps using .NET Aspire* Test, deploy, and observe your cloud-native app* Leverage built-in tools to use unit testing and integration testing with your projectsWHO THIS BOOK IS FOR:This book is for both students and .NET developers who want to build cloud-native, distributed applications using the .NET Framework. A working knowledge of C# is recommended to follow the examples used in the book.DAVE RAEL is a father, husband, and seasoned software professional. He has worked as a software developer, analyst, tester, engineer, and architect in numerous verticals and industries over the course of more than 25 years. In 1999, he started in professional software development for a large telecom company working with C++, Visual Basic, .NET, and C#. He created and published the popular podcast _Developer On Fire_ from 2015-2019, in which he interviewed software professionals to gather stories from the world of software. The project of raising excellent offspring is his most important and most successful project to date.Chapter 1: Introducing .NET Aspire.- Chapter 2: Getting Started with .NET Aspire.- Chapter 3: .NET Aspire Project Types and Templates.- Chapter 4: System Architecture Considerations.- Chapter 5: Testing Your Systems.- Chapter 6: .NET Aspire Integrations.- Chapter 7: Deploying Your Aspire-Based System.- Chapter 8: System Observability with .NET Aspire.- Chapter 9: Greenfield: Implementing New Systems with .NET Aspire.- Chapter 10: Brownfield: Using .NET Aspire with Existing Systems.- Chapter 11: Wrapping Up.

Regulärer Preis: 56,99 €
Produktbild für Designing Websites with Publii and GitHub Pages

Designing Websites with Publii and GitHub Pages

Does getting online seem overwhelmingly difficult? Are you paying too much for your hosting solution? Have you always wanted to have a blog but don’t know where to start? Do you settle for a Facebook page for your business website but know you need more? The solution to these problems is choosing the right tools. This book will guide you through the process of setting up a Publii-based publishing platform and hosting your site for free on GitHub.Publii is a free, open source, desktop application that runs on Windows, Mac, and Linux and makes building the website or blog you dream of is a simple process. This book walks you through the process of installing and using Publii, setting up accounts on GitHub and hosting a static blog or website there. You will gain background insights on here to get no-cost imagery for website, how to leverage AI to generate ideas, outlines, and images. You’ll also review search engine optimization (SEO) best practices to ensure your site is searchable._Designing Websites with Publii and GitHub Pages_ is your roadmap to creating a website and understanding how the publishing workflow works.WHAT YOU WILL LEARN* Use text editors such as WYSIWYG, Block, and Markdown* Make a page from a post.* Work on advanced processes such as installing themes and plugins* Manage and back up your data* Explore GDRP and cooking banner considerationsWHO THIS BOOK IS FORThose with limited or no programming or compute skills who want to learn how to set up a website.BRAD MOORE is a technical writer and blogger based in Kentucky, USA. who has been involved in web development for 20 years. He has helped clients host sites with WordPress, Grav and Publii since 2023. Brad enjoys programming, electronics, microprocessors, and model trains. Brad is married and has three children.PART I.- 1: Introduction.- 2: Getting Started.- 3: Getting Publii Running.- 4: Getting Ready for Content.- 5: Adding Content.- 6: Page Building in Publii.- 7: Creating a GitHub Page.- 8: Configure Publii for Sync.- PART II.- 9: Backups and Sites.- 10: Themes.- 11: Single Page Sites.- 12: Gallery & Contacts.- 13: Internet Real Estate.- PART III.- 14: Plugins and Cookies.- 15: CSS Tricks.

Regulärer Preis: 46,99 €
Produktbild für Cybersecurity Threats and Attacks in the Gaming Industry

Cybersecurity Threats and Attacks in the Gaming Industry

Learn about the most common and known threats and attacks in the gaming industry. Cybersecurity is a critical concern in the gaming industry due to the significant financial investments, personal data, and intellectual property at stake. Game developers, publishers, and players all have a vested interest in maintaining a secure gaming environment.This pocketbook is about why cybersecurity in the gaming industry is essential to protect player data, maintain a secure gaming environment, and safeguard intellectual property. Both players and game developers need to remain vigilant, educate themselves about potential threats, and employ best practices to ensure a safe and enjoyable gaming experience. We will describe the most common type of targeted games facing cybersecurity attacks as well as some of the most common types of cyber threats faced by the gaming industry such as malware, distributed denial of service (DDoS) attacks, data breaches, etc.WHAT YOU WILL LEARN* Describes the importance cybersecurity in the gaming industry* Explains key aspects of cybersecurity in the gaming* Describes the common types of cyber threats faced by the gaming industryWHO IS THIS BOOK FORThe book assumes you have strong gaming development and security knowledge. The book will be written mainly for developers who want to learn how to choose the right tools, what are the best practice, the threats, and vulnerabilitiesMASSIMO NARDONE has more than 27 years of experience in information and cybersecurity for IT/OT/IoT/IIoT, web/mobile development, cloud, and IT architecture. His true IT passions are security and Android. He has been programming and teaching how to program with Android, Perl, PHP, Java, VB, Python, C/C++, and MySQL for more than 27 years. He holds an M.Sc. degree in computing science from the University of Salerno, Italy. Throughout his working career, he has held various positions starting as programming developer, then security teacher, PCI QSA, Auditor, Assessor, Lead IT/OT/SCADA/SCADA/Cloud Architect, CISO, BISO, Executive, Program Director, OT/IoT/IIoT Security Competence Leader, etc.In his last working engagement, he worked as a seasoned Cyber and Information Security Executive, CISO and OT, IoT and IIoT Security competence Leader helping many clients to develop and implement Cyber, Information, OT, IoT Security activities.His technical skills include Security, OT/IoT/IIoT, Android, Cloud, Java, MySQL, Drupal, Cobol, Perl, web and mobile development, MongoDB, D3, Joomla!, Couchbase, C/C++, WebGL, Python, Pro Rails, Django CMS, Jekyll, and Scratch. He has served as a visiting lecturer and supervisor for exercises at the Networking Laboratory of the Helsinki University of Technology (Aalto University).He stays current to industry and security trends, attending events, being part of a board such as the ISACA Finland Chapter Board, ISF, Nordic CISO Forum, Android Global Forum, etc.He holds four international patents (PKI, SIP, SAML, and Proxy areas). He currently works as a Cyber Security Freelancer for IT/OT and IoT. He has reviewed more than 55 IT books for different publishers and has coauthored _Pro Spring Security_ (Apress, 2023) _Pro JPA 2 in Java EE 8_ (Apress, 2018), _Beginning EJB in Java EE 8_ (Apress, 2018), and _Pro Android Games_ (Apress, 2015).Chapter 1: Introduction of Cybersecurity in the Gaming Industry.- Chapter 2: Key aspects of Cybersecurity in Gaming Industry.- Chapter 3: Games Target of Cybersecurity Attacks.- Chapter 4: Cybersecurity Threats & Attacks in Gaming Industry.

Regulärer Preis: 26,99 €
Produktbild für Exploring Blazor

Exploring Blazor

Build and develop web applications with Blazor in C#. This new edition not only covers the new structure for the Blazor environment, it also demonstrates the latest features, such as rendering, hosting types, improved security arrangements, and updates the syntax. Two new chapters on Forms and Validation along with Security in Blazor are also added. The code and project layout have been updated in .NET 9 for this new edition.The book starts with an introduction to Blazor, along with its various categories and its basics and syntax, including Razor syntax implementation. You will go through Blazor navigation and life cycle followed by its components. You will then learn features specific to each Blazor type. You will see how Blazor works with storage, files, and JavaScript, and you will create a Blazor code library. You will also create web applications in Blazor using practical implementations and real-life scenarios for both the server side and the client side.After reading this book, you will be able to build web applications with Blazor in C#11 and .NET Core 9.0.WHAT YOU WILL LEARN* Bind data and handle events in C# Blazor* Handle components and page navigation in Blazor* Connect Blazor front-end to APIs* Interact with files using Blazor* Understand the layout of Visual Studio Blazor project templates WHO THIS BOOK IS FORC# and .NET Core developers.TAURIUS LITVINAVICIUS is a businessman and technology expert based in Lithuania who has worked with organizations in building and implementing various projects in software development, sales, and other fields of business. He currently works on modern financial applications and consults companies on technology and cost-related issues. As with most of his projects, this book uses cutting-edge technologies, such as Blazor. Taurius is responsible for technological improvements, development of new features, and general management.Chapter 1: Introduction to Blazor.- Chapter 2: Razor Syntax and the Basics of Blazor.- Chapter 3: Blazor Components and Navigation.- Chapter 4: Blazor Components.- Chapter 5: Specifics of Different Types of Blazor.- Chapter 6: Forms in Blazor.- Chapter 7: General Blazor.- Chapter 8: Security in Blazor.- Chapter 9: Practice Tasks for Server rendering Blazor.- Chapter 10: Practice Tasks for Client (WebAssembly) Blazor.

Regulärer Preis: 56,99 €
Produktbild für Generative AI

Generative AI

THIS BOOK IS ESSENTIAL FOR ANYONE EAGER TO UNDERSTAND THE GROUNDBREAKING ADVANCEMENTS IN GENERATIVE AI AND ITS TRANSFORMATIVE EFFECTS ACROSS INDUSTRIES, MAKING IT A VALUABLE RESOURCE FOR BOTH PROFESSIONAL GROWTH AND CREATIVE INSPIRATION.Generative AI: Disruptive Technologies for Innovative Applications delves into the exciting and rapidly evolving world of generative artificial intelligence and its profound impact on various industries and domains. This comprehensive volume brings together leading experts and researchers to explore the cutting-edge advancements, applications, and implications of generative AI technologies. This volume provides an in-depth exploration of generative AI, which encompasses a range of techniques such as generative adversarial networks, recurrent neural networks, and transformer models like GPT-3. It examines how these technologies enable machines to generate content, including text, images, and audio, that closely mimics human creativity and intelligence. Readers will gain valuable insights into the fundamentals of generative AI, innovative applications, ethical and social considerations, interdisciplinary insights, and future directions of this invaluable emerging technology. Generative AI: Disruptive Technologies for Innovative Applications is an indispensable resource for researchers, practitioners, and anyone interested in the transformative potential of generative AI in revolutionizing industries, unleashing creativity, and pushing the boundaries of what’s possible in artificial intelligence. AUDIENCEAI researchers, industry professionals, data scientists, machine learning experts, students, policymakers, and entrepreneurs interested in the innovative field of generative AI. N. GAYATHRI, PHD, is an assistant professor in the Department of Computer Science and Engineering at the Ghandi Institute of Technology and Management, India. She has published several articles in international journals, edited many books, and serves as a guest editor and reviewer for several international journals. Her research interests include big data analytics, Internet of Things, and mobile networks, and sustainable computing. S RAKESH KUMAR, PHD, is an assistant professor in the Department of Computer Science and Engineering at the Ghandi Institute of Technology and Management, India. He has several publications in international journals, conference proceedings, and edited volumes. His research interests include artificial intelligence and machine learning. RAMESH CHANDRAN, PHD, is an associate professor in the Department of Computer Science and Engineering at the Vellore Institute of Technology, India, with over 19 years of combined teaching and industry experience. He has published over 20 articles in international journals and has presented papers in national and international conferences. His research interests include cloud computing, data mining, artificial intelligence, data analytics, and blockchain. PETHURU RAJ, PHD, is a chief architect at Reliance Jio Platforms Ltd., Bangalore, India with over 30 years of combined industry and research experience in information technology. He has been granted international research fellowships from organizations including the Japan Society for the Promotion of Science and the Japan Science and Technology Agency. His research interests include Internet of Things, artificial intelligence, model optimization techniques, blockchain, digital twins, and cloud computing. DANILO PELUSI, PHD, is an associate professor of Computer Science in the Department of Communication Sciences, University of Teramo, Italy. He is an editor for several internationally published books and journals and a member of Machine Intelligence Research Labs. His research interests include coding theory, artificial intelligence, signal processing, pattern recognition, fuzzy logic, neural networks, and genetic algorithms.

Regulärer Preis: 168,99 €
Produktbild für DDD 4 Developers

DDD 4 Developers

Neue, spannende Konzepte für DDD-Enthusiasten und Softwaremodellierer - Fokus auf Implementierungsdetails von DDD für komplexe Anwendungen - Praxisnahe Muster für die Umsetzung mit anschaulichen Beispielen - Behandlung realer Frage- und Problemstellungen in Softwareentwicklungsprojekten In den letzten Jahrzehnten hat sich Domain-Driven Design (DDD) als Technik der Wahl etabliert, um der enormen und zunehmenden Komplexität der Fachdomänen in der Softwaremodellierung zu begegnen. Christopher Rudoll zeigt, was die Prinzipien des Domain-Driven Design über die zentralen Tätigkeiten der Domänenmodellierung und des Prozessdesigns hinaus in der ganz konkreten Implementierungspraxis bedeuten und wie sie sich auf Fragestellungen in der täglichen Arbeit von Softwareentwicklern anwenden lassen. Dabei wird deutlich, dass DDD nicht nur mit Event Storming und der Identifikation von Bounded Contexts zu tun hat, sondern auch in Detailfragen der Implementierung sehr hilfreiche Leitlinien bieten kann. Solche Leitlinien werden in Form von Patterns und Antipatterns anhand von Code und UML-Beispielen ausführlich erläutert. Aus dem Inhalt: - Supple Design – Evansʼ Prinzipien - Ontologie – Abbildung der Welt in Software - Semantik – Abbildung sprachlicher Konzepte in Software - Konzeptuelle Räume – kognitive Grundlagen der Konzeptbildung - Die (lästige) Realität – Fallstricke und Stolpersteine Das Buch bietet sowohl für DDD-Enthusiasten und Softwaremodellierer als auch für Business-Analysten und Architekten neue, spannende Konzepte. Es erweitert den Werkzeugkasten eines jeden Entwicklers.

Regulärer Preis: 32,90 €
Produktbild für Datenvisualisierung im praktischen Einsatz

Datenvisualisierung im praktischen Einsatz

Datenvisualisierungen meisterhaft gestalten - Optimieren Sie Ihre Visualisierungen mit Farbtheorie und Typografie - Setzen Sie universelle Designprinzipien um - Erstellen Sie interaktive und überzeugende Visualisierungen Dieses Buch vermittelt zentrale Designkonzepte für die Erstellung klarer und ansprechender Datenvisualisierungen. Desirée Abbott konzentriert sich dabei auf die universelle Anwendung von Farbtheorie, Typografie und Interaktivität, ohne in technische Details oder Programmiersprachen abzutauchen. Sie lernen, wie Sie Visualisierungen für verschiedene Zielgruppen gestalten und sowohl Funktionalität als auch ästhetische Ansprüche berücksichtigen. Viele Praxisbeispiele sowie ein größeres, abschließendes Projekt helfen Ihnen, eigene Visualisierungen strukturiert umzusetzen. Grundlegende Designprinzipien stehen im Mittelpunkt und die Vorteile, klare und verständliche Visualisierungen zu priorisieren, werden immer wieder durch konkrete Beispiele veranschaulicht. Dabei legt die Autorin einen besonderen Fokus auf barrierefreie Designs. Sie lernen außerdem, wie Sie die Datenkommunikation verbessern, und profitieren von Desirée Abbotts Erfahrung und Ratschlägen aus ihrem Arbeitsalltag

Regulärer Preis: 29,90 €
Produktbild für The Road to the European Union's General Data Protection Regulation

The Road to the European Union's General Data Protection Regulation

This book offers a policy analysis of the emergence of the General Data Protection Regulation (GDPR) through the lens of John Kingdon’s Multiple Streams Framework. Drawing on 32 expert interviews with key stakeholders—including EU institution representatives (such as trilogue negotiators), member states, industry leaders, NGOs, and journalists—the author provides a deep dive into the decision-making process behind the regulation. Additionally, the study examines 462 position papers from the EU Commission’s consultation phases (2009–2011) to uncover the factors that shaped the adoption of the GDPR. At its core, this work explores the ‘window of opportunity’ that enabled the regulation's adoption.Introduction.- Theoretical Framework.- Methodology.- Tracing Data Protection: National, International, and EU Milestones.- The Road to the GDPR: The European Problem Stream.- The Road to the GDPR: The European Policy Stream.- The Road to the GDPR: The European Political Stream.- The Policy Entrepreneurs.- The Window of Opportunity.- Conclusions.

Regulärer Preis: 106,99 €
Produktbild für The Unit Testing Practice Cookbook

The Unit Testing Practice Cookbook

Master unit testing with the .NET framework by observing examples of best practices. After reading this book, you will feel confident and prepared to approach most situations that a developer will encounter on .NET and ASP.NET Core applications.Learn the best tools to practice effective unit testing, how to architect your code so that it is easily testable, and improve your code coverage. This book is packed with concrete case studies selected from the real-world experiences of a veteran developer, especially when it comes to legacy code.After reading _The Unit Testing Practice Cookbook_, you will be able to approach unit testing with confidence and make your .NET applications as reliable as possible.WHAT YOU WILL LEARN* Master unit testing practice* Architect your applications efficiently to make your code easily testable* Use the best tools for unit testing* Automate your unit testsWHO THIS BOOK IS FORThis book is intended for any developer level wishing to master unit tests with the Microsoft .NET Framework.ANTHONY GIRETTI is a passionate developer with twenty years of experience who loves to learn new technologies. He is an eight-time Microsoft MVP and became a certified MCSD in 2016. He is currently a senior full-stack developer at Marchex in Toronto, Canada. As a specialist in .NET, his expertise in IT and his passion for sharing his knowledge allows him to help developers excel at their web projects. He loves to deal with performance constraints, high availability, and optimization challenges.Chapter 1: Introducing Unit Testing Practice.- Chapter 2: Clean Code & Clean Architecture for Easy Unit Testing.- Chapter 3: Learning the Best Practices with the Best Tools.- Chapter 4: Unit Test .NET applications.- Chapter 5: Automating Unit Tests.- Chapter 6: Case Study.

Regulärer Preis: 52,99 €
Produktbild für Information Security and Privacy Quick Reference

Information Security and Privacy Quick Reference

A FAST, ACCURATE, AND UP-TO-DATE DESK REFERENCE FOR INFORMATION SECURITY AND PRIVACY PRACTITIONERS EVERYWHEREInformation security and privacy roles demand up-to-date knowledge coming from a seemingly countless number of sources, including several certifications—like the CISM, CIPP, and CISSP—legislation and regulations issued by state and national governments, guidance from local and industry organizations, and even international bodies, like the European Union. The Information Security and Privacy Quick Reference: The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer is an updated, convenient, and accurate desk reference for information privacy practitioners who need fast and easy access to the latest guidance, laws, and standards that apply in their field. This book is the most effective resource for information security professionals who need immediate and correct solutions to common and rarely encountered problems. An expert team of writers—Joe Shelley, James Michael Stewart, and the bestselling technical author, Mike Chapple—draw on decades of combined technology and education experience to deliver organized and accessible coverage of:* Security and Privacy Foundations * Governance, Risk Management, and Compliance* Security Architecture and Design* Identity and Access Management* Data Protection and Privacy Engineering* Security and Privacy Incident Management* Network Security and Privacy Protections* Security Assessment and Testing* Endpoint and Device Security* Application Security* Cryptography Essentials* Physical and Environmental Security* Legal and Ethical Considerations* Threat Intelligence and Cyber Defense* Business Continuity and Disaster RecoveryInformation Security and Privacy Quick Reference is a must-have resource for CISOs, CSOs, Chief Privacy Officers, and other information security and privacy professionals seeking a reliable, accurate, and fast way to answer the questions they encounter at work every single day. Introduction xiii1 SECURITY AND PRIVACY FOUNDATIONS 1Security 101 1Confidentiality, Integrity, and Availability (CIA) 3Disclosure, Alteration, and Destruction (DAD) 4Authentication, Authorization, and Accounting (AAA) 5Privacy in the Modern Era 6Foundational Privacy Principles 8Security and Privacy Frameworks 11Security and Privacy Policies: Creation and Enforcement 14Establishing Security Awareness Programs 16Security Strategies 192 GOVERNANCE, RISK MANAGEMENT, AND COMPLIANCE 23The Role of Governance in Security and Privacy 23Key Regulations and Standards 26Regulatory Compliance 29Building and Managing a Risk Management Framework 32Managing Third-Party Risks and Vendor Assessments 353 SECURITY ARCHITECTURE AND DESIGN 39Principles of Secure Design 39Security Operations Foundations 42Ensuring Confidentiality, Integrity, and Availability 44Understanding Security Models 46Implementing Personnel Security 49Applying Protection Mechanisms 52System Resilience and High Availability 544 IDENTITY AND ACCESS MANAGEMENT 57IAM Core Concepts and Principles 57Authentication Methods and Multifactor Authentication 60Role-Based Access Control Versus Attribute-Based Access Control 62Identity Federation and Single Sign-On 65Zero Trust Architecture for IAM 68Identity Governance Life Cycle 71Access Control Attacks 735 DATA PROTECTION AND PRIVACY ENGINEERING 77Data Classification and Labeling 77Data Masking, Tokenization, and Encryption 80Data Loss Prevention Strategies 82Privacy by Design 85Developing a Privacy Program 87Cross-Border Data Transfers and Legal Implications 90Data Subject Rights and Privacy Request Handling 93Data Retention, Archiving, and Secure Disposal 966 SECURITY AND PRIVACY INCIDENT MANAGEMENT 101Incident Response Planning 101Detection and Triage of Security and Privacy Incidents 104Investigating Incidents 106Communication Plans for Incident Response 110Post-Incident Review and Lessons Learned 113Privacy Breach Notifications and Regulatory Reporting 1177 NETWORK SECURITY AND PRIVACY PROTECTIONS 121Secure Network Components 121Network Segmentation 125System Hardening 128Firewalls and Intrusion Detection/Prevention Systems 130Virtual Private Networks and Secure Access Service Edge 133Secure Wireless Network Management 136Securing the Cloud 139Network Monitoring 1428 SECURITY ASSESSMENT AND TESTING 145Building a Security Assessment and Testing Program 145Vulnerability Management 147Understanding Security Vulnerabilities 150Penetration Testing 153Testing Software 155Training and Exercises 1589 ENDPOINT AND DEVICE SECURITY 163Endpoint Detection and Response 163Network Device Security 166Mobile Device Management 169Understanding Malware 173Malware Prevention 176Patching and Vulnerability Remediation 17810 APPLICATION SECURITY 183Secure Software Development Life Cycle 183DevSecOps and DevOps Integration 187Application Attacks 191Injection Vulnerabilities 192Authorization Vulnerabilities 194Web Application Attacks 196Application Security Controls 198Coding Best Practices 20111 CRYPTOGRAPHY ESSENTIALS 205Core Cryptography Concepts 205Symmetric Cryptography 208Asymmetric Cryptography 210Hash Functions 213Digital Signatures 216Public Key Infrastructure 218Key Management Best Practices 220Cryptographic Attacks 22212 PHYSICAL AND ENVIRONMENTAL SECURITY 227Security and Facility Design 227Physical Access Controls and Monitoring 229Security in Data Centers and Server Rooms 232Environmental Controls 234Implement and Manage Physical Security 23513 LEGAL AND ETHICAL CONSIDERATIONS 237Computer Crime 238Intellectual Property Laws 241Software Licensing Laws 243Import/Export Laws 244Privacy Laws 246Compliance 249Ethical Considerations 25014 THREAT INTELLIGENCE AND CYBER DEFENSE 253Threat Actors 253Threat Vectors 256Threat Intelligence 258Threat Feeds 259Threat Hunting 262Assessing Threat Intelligence 263Cyber Kill Chain and the MITRE ATT&CK 26515 BUSINESS CONTINUITY AND DISASTER RECOVERY 269Project Scope and Planning 270Conducting Business Impact Analysis 273Business Continuity Planning Essentials 277Recovery Planning Essentials 279Disaster Recovery Strategies and Solutions 282Testing and Simulation Exercises 284Index 289

Regulärer Preis: 23,99 €
Produktbild für Building Generative AI Agents

Building Generative AI Agents

The dawn of AI agents is upon us. Tech visionaries like Bill Gates, Andrew Ng, and Vinod Khosla have highlighted the monumental potential of this powerful technology. This book will provide the knowledge and tools necessary to build generative AI agents using the most popular frameworks, such as AutoGen, LangChain, LangGraph, CrewAI, and Haystack.Recent breakthroughs in large language models have opened up unprecedented possibilities. After years of gradual progress in machine learning and deep learning, we are now witnessing novel approaches capable of understanding, reasoning, and generating content in ways that promise to revolutionize nearly every industry. This platform shift is as significant as the advent of mainframes, PCs, cloud computing, mobile technology, and social media. It’s why the world’s largest technology companies – like Microsoft, Apple, Google, and Meta – are making enormous investments in this category.While chatbots like ChatGPT, Claude, and Gemini have demonstrated remarkable potential, the years ahead will see the rise of generative AI agents capable of executing complex tasks on behalf of users. These agents already exhibit capabilities such as running test suites, searching the web for documentation, writing software, answering questions based on vast organized information, and performing intricate web-based tasks across multiple domains. They can autonomously investigate cybersecurity incidents and address complex customer support needs. By integrating skills, knowledge bases, planning frameworks, memory, and feedback loops, these systems can handle many tasks and improve over time._Building Generative AI Agents_ serves as a high-quality guide for developers to understand when and where AI agents can be useful, their advantages and disadvantages, and practical advice on designing, building, deploying, and monitoring them.WHAT YOU WILL LEARN* The foundational concepts, capabilities, and potential of AI agents.* Recent innovations in large language models that have enabled the development of AI agents.* How to build AI agents for launching a product, creating a financial plan, handling customer service, and using Retrieval Augmented Generation (RAG).* Essential frameworks for building generative AI agents, including AutoGen, LangChain, LangGraph, CrewAI, and Haystack.* Step-by-step guidance on designing, building, and deploying AI agents.* Insights into the future of AI agents and their potential impact on various industries.WHO THIS BOOK IS FORExperienced software developersTOM TAULLI (@TTAULLI) is a consultant to various companies, such as Aisera, a venture-backed generative AI startup. He has written several books like AI Basics and Generative AI. Tom has also taught IT courses for UCLA, PluralSight and O’Reilly Media. For these, he has provided lessons in using Python to create deep learning and machine learning models. He has also taught on topics like NLP (Natural Language Processing).GAURAV DESHMUKH is a highly skilled technology leader with over a decade of experience driving transformative software engineering initiatives. Throughout his career, he has held pivotal technical roles at prominent companies such as Guidewire, Cigna, Home Depot, American Agricultural Laboratory (AmAgLab), Tata Exlsi, and Amdocs. Gaurav's expertise encompasses a range of cutting-edge technologies, including cloud computing, cybersecurity, software automation, data engineering, and full-stack development with various programming languages and web technology frameworks. He employs his vast knowledge to create innovative solutions that optimize workflows and drive business growth. Gaurav holds both an MBA and a Master's degree in Computer Science, with a focus on data warehousing and computer vision. He is dedicated to elevating the strategic role of software engineering in delivering business value. As a distinguished leader, Gaurav can be reached at gauravkdeshmukh89@gmail.com to explore transformative technical initiatives.Chapter 1: Introduction to Generative AI Agents.- Chapter 2: Generative AI Foundations.- Chapter 3: Types of Agents.- Chapter 4: Open AI GPT Agents and the Assistants API.- Chapter 5: Development Agents.- Chapter 6: Crew AI.- Chapter 7: AutoGen.- Chapter 8: LangChain.- Chapter 9: LangGraph.- Chapter 10: Haystack.- Chapter 11: Takeaways.

Regulärer Preis: 56,99 €
Produktbild für Informationssicherheit und Datenschutz - einfach und effektiv (2. Auflg.)

Informationssicherheit und Datenschutz - einfach und effektiv (2. Auflg.)

Informationssicherheit und Datenschutz – einfach und effektiv, in 2. Auflage aus dem Mai 2025.Die Bedrohungslage und somit die Herausforderungen für Informationssicherheit und Datenschutz nehmen immer weiter zu. Ein handhabbares wirksames und gleichzeitig entlastendes Instrumentarium ist deshalb für jedes Unternehmen unerlässlich. In diesem Buch werden Ihnen die Normen, gesetzlichen Anforderungen und Umsetzungsempfehlungen für Datenschutz und Informationssicherheit aufgezeigt und Sie erhalten Leitfäden und Hilfestellungen zum Aufbau Ihres Managementsystems.Die ISO 27001 gibt als internationale Norm für Informationssicherheit den Rahmen für das Managementsystem vor. Durch direkt nutzbare lean Best- Practices können Sie einfacher Ihre handhabbare Regulatorik ableiten, die sowohl ISO-27001-konform sind als auch den modernisierten IT-Grundschutz abdecken. Wichtig sind insbesondere die Integration mit dem Datenschutz (EU-DSGVO) sowie die Nutzbarkeit auch für andere Anforderungen und Umsetzungsempfehlungen, wie TISAX oder FAIT.Aus dem Inhalt:Anforderungen an Informationssicherheit und Datenschutz (u.a. ISO 27001, IT-Grundschutz und EU-DSGVO)Integriertes Managementsystem für Informationssicherheit und DatenschutzSchritt-für-Schritt-Leitfaden für den Aufbau des ManagementsystemsBest-Practices wie Schutzbedarfsfeststellung, Risikomanagement, Notfallmanagement, ISMS-Reporting und Sicherheits- und DatenschutzorganisationIntegration von Enterprise Architecture Management, IT-Servicemanagement und Informationssicherheit Vorbereiten für eine ISO-27001-ZertifizierungModernisierten IT-Grundschutz nutzenEnterprise Architecture Management und IT-Servicemanagement als Asset-Lieferant nutzenÜber den Autor Inge Hanschke hat in über 35 Berufsjahren als IT-Managerin bei Anwenderunternehmen, in einem ERP-Produkthaus und bei verschiedenen IT-Dienstleistern die IT strategisch und an den Geschäftsanforderungen ausgerichtet und das IT-Management professionalisiert. Die langjährigen Erfahrungen münden in die Methode zum Lean IT-Management (siehe www. Hanschke-Consulting.com).

Regulärer Preis: 49,99 €