Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für CompTIA A+ Complete Review Guide

CompTIA A+ Complete Review Guide

A COMPREHENSIVE AND EFFICIENT WAY TO PREPARE FOR THE A+ EXAM AND SUCCEED AS A COMPUTER TECHNICIANThe newly revised Fifth Edition of the CompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 delivers essential and accessible exam prep material for the sought-after A+ certification. It offers full coverage of all of the A+ exam objectives covered on the latest Core 1 and Core 2 exams, ensuring you'll have the knowledge and skills you need to succeed on the test and in the real world. This book covers mobile devices, networking, hardware, virtualization and cloud computing, hardware and network troubleshooting, operating systems, security, software troubleshooting, and operational procedures. Its comprehensive discussions of all exam competencies will prepare you for your first role as a computer technician and let you hit the ground running. The book also offers:* Accessible and easy-to-follow organization perfect for quick review and reinforcement of key topics* Practical examples and insights drawn from the real-world experience of actual computer technicians* Access to the Sybex online test bank, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key termsIdeal for anyone preparing for the Core 1 and Core 2 A+ exams, CompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 is also perfect for all aspiring and early-career computer technicians who seek to improve their performance in the field. TROY MCMILLAN holds more than 30 IT certifications including A+ and Network+. He is a Product Developer and Technical Editor for CyberVista (formerly Kaplan IT), helping individuals and organizations train on technology and prepare for technology certifications. Troy is also a full-time trainer, teaching CompTIA, Cisco, Microsoft, and Wireless classes. He authored previous editions of CompTIA® A+® Complete Review Guide from Sybex.INTRODUCTION XXIIIPART I COMPTIA A+ CORE 1 EXAM 220- 1101 1CHAPTER 1 MOBILE DEVICES 31.1 Given a scenario, install and configure laptop hardware and components 5Hardware/device replacement 5Physical privacy and security components 9Exam essentials 101.2 Compare and contrast the display components of mobile devices 10Types 11Mobile display components 13Exam essentials 141.3 Given a scenario, set up and configure accessories and ports of mobile devices 14Connection methods 15Accessories 20Exam essentials 261.4 Given a scenario, configure basic mobile- device network connectivity and application support 26Wireless/cellular data network (enable/disable) 27Bluetooth 29Location services 32Mobile device management (MDM)/mobile application management (MAM) 32Mobile device synchronization 36Exam essentials 40Review Questions 41CHAPTER 2 NETWORKING 452.1 Compare and contrast Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports, protocols, and their purposes 50Ports and protocols 50TCP vs. UDP 53Exam essentials 542.2 Compare and contrast common networking hardware 54Routers 55Switches 55Access points 55Patch panel 56Firewall 56Power over Ethernet (PoE) 56Hub 58Cable modem 58Digital subscriber line (DSL) 58Optical network terminal (ONT) 59Network interface card (NIC) 59Software- defined networking (SDN) 60Exam essentials 612.3 Compare and contrast protocols for wireless networking 61Frequencies 61Channels 62Bluetooth 63802.11 63Long- range fixed wireless 64NFC 65Radio- frequency identification (RFID) 65Exam essentials 652.4 Summarize services provided by networked hosts 66Server roles 66Internet appliances 68Legacy/embedded systems 69Internet of Things (IoT) devices 70Exam essentials 702.5 Given a scenario, install and configure basic wired/wireless small office/home office (SOHO) networks 71Internet Protocol (IP) addressing 71Exam essentials 792.6 Compare and contrast common network configuration concepts 79DNS 79DHCP 81Virtual LAN (VLAN) 82Virtual private network (VPN) 83Exam essentials 832.7 Compare and contrast Internet connection types, network types, and their features 84Internet connection types 84Network types 85Exam essentials 872.8 Given a scenario, use networking tools 87Crimper 87Cable stripper 87WiFi analyzer 87Toner probe 88Punchdown tool 88Cable tester 88Loopback plug 89Network tap 89Exam essentials 89Review Questions 90CHAPTER 3 HARDWARE 953.1 Explain basic cable types and their connectors, features, and purposes 102Network cables 102Peripheral cables 107Video cables 108Hard drive cables 111Adapters 117Connector types 119Exam essentials 1243.2 Given a scenario, install the appropriate RAM 124RAM types 124Single- channel/Dual- channel 127Triple Channel 127Quad- channel 128Exam essentials 1283.3 Given a scenario, select and install storage devices 129Hard drives 129SSDs 131Drive configurations 132Removable storage 134Exam essentials 1393.4 Given a scenario, install and configure motherboards, central processing units (CPUs), and add- on cards 139Motherboard form factor 139Motherboard connector types 142Motherboard compatibility 148Basic Input/Output System (BIOS)/Unified Extensible Firmware Interface (UEFI) settings 153Encryption 155CPU architecture 155Expansion cards 156Cooling 159Exam essentials 1603.5 Given a scenario, install or replace the appropriate power supply 160Input 115V vs. 220V 161Output 3.3V vs. 5V vs. 12V 16120- PIN TO 24- PIN MOTHERBOARD ADAPTER 161Redundant power supply 162Modular power supply 162Wattage rating 162Exam essentials 1633.6 Given a scenario, deploy and configure multifunction devices/printers and settings 163Properly unboxing a device – setup location considerations 163Use appropriate drivers for a given OS 164Device connectivity 164Public/shared devices 165Configuration settings 167Security 168Network scan services 169Automatic document feeder (ADF)/flatbed scanner 169Exam essentials 1703.7 Given a scenario, install and replace printer consumables 170Laser 170Inkjet 181Thermal 184Impact 186Exam essentials 188Review Questions 190CHAPTER 4 VIRTUALIZATION AND CLOUD COMPUTING 1974.1 Summarize cloud computing concepts 199Common cloud models 199Cloud characteristics 200Desktop virtualization 201Exam essentials 2014.2 Summarize aspects of client- side virtualization 202Purpose of virtual machines 202Exam essentials 205Review Questions 206CHAPTER 5 HARDWARE AND NETWORK TROUBLESHOOTING 2095.1 Given a scenario, apply the best practice methodology to resolve problems 213Always consider corporate policies, procedures, and impacts before implementing changes 2131. Identify the problem 2142. Establish a theory of probable cause (question the obvious) 2143. Test the theory to determine cause 2154. Establish a plan of action to resolve the problem and implement the solution 2155. Verify full system functionality and, if applicable, implement preventive measures 2166. Document the findings, actions, and outcomes 216Exam essentials 2165.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPU, and power 216Common symptoms 217Exam essentials 2245.3 Given a scenario, troubleshoot and diagnose problems with storage drives and RAID arrays 225Common symptoms 225Exam essentials 2285.4 Given a scenario, troubleshoot video, projector, and display issues 229Common symptoms 229Exam essentials 2325.5 Given a scenario, troubleshoot common issues with mobile devices 232Common symptoms 233Exam essentials 2375.6 Given a scenario, troubleshoot and resolve printer issues 238Common symptoms 238Exam essentials 2445.7 Given a scenario, troubleshoot problems with wired and wireless networks 244Common symptoms 244Exam essentials 247Review Questions 248PART II COMPTIA A+ CORE 2 EXAM 220- 1102 251CHAPTER 6 OPERATING SYSTEMS 2531.1 Identify basic features of Microsoft Windows editions 263Windows 10 editions 263Windows 11 264Feature differences 264Upgrade paths 266Exam essentials 2671.2 Given a scenario, use the appropriate Microsoft command- line tool 268Navigation 268Command- line tools 271Exam essentials 2901.3 Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS) 290Task Manager 291Microsoft Management Console (MMC) snap- in 296Additional tools 312Exam essentials 3201.4 Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility 320Internet Options 320Devices and Printers 327Programs and Features 329Network and Sharing Center 331System 331Windows Defender Firewall 335Mail 335Sound 336User Accounts 337Device Manager 339Indexing Options 340Administrative Tools 340File Explorer Options 342Power Options 346Ease of Access 348Exam essentials 3491.5 Given a scenario, use the appropriate Windows settings 349Time and Language 350Update and Security 351Personalization 352Apps 355Privacy 356System 357Devices 357Network and Internet 359Gaming 361Accounts 362Exam essentials 3621.6 Given a scenario, configure Microsoft Windows networking features on a client/desktop 364Workgroup vs. domain setup 364Local OS firewall settings 368Client network configuration 369Establish network connections 370Proxy settings 371Exam essentials 3731.7 Given a scenario, apply application installation and configuration concepts 374System requirements for applications 374OS requirements for applications 375Distribution methods 376Other considerations for new applications 377Exam essentials 3781.8 Explain common OS types and their purposes 378Workstation OSs 378Cell phone/tablet OSs 379Various filesystem types 380Vendor life- cycle limitations 381Compatibility concerns between OSs 381Exam essentials 3821.9 Given a scenario, perform OS installations and upgrades in a diverse OS environment 382Boot methods 382Types of installations 384Partitioning 388Drive format 389Upgrade considerations 390Feature updates 390Exam essentials 3911.10 Identify common features and tools of the macOS/desktop OS 391Installation and uninstallation of applications 391Apple ID and corporate restrictions 392Best practices 393System Preferences 394Features 398Disk Utility 401FileVault 402Terminal 402Force Quit 403Exam essentials 4041.11 Identify common features and tools of the Linux client/desktop OS 404Common commands 404Best practices 411Tools 414Exam essentials 415Review Questions 416CHAPTER 7 SECURITY 4192.1 Summarize various security measures and their purposes 427Physical security 427Physical security for staff 432Logical security 435Mobile device management (MDM) 436Active Directory 437Exam essentials 4392.2 Compare and contrast wireless security protocols and authentication methods 439Protocols and encryption 439Authentication 441Exam essentials 4422.3 Given a scenario, detect, remove, and prevent malware using the appropriate tools and methods 443Malware 443Tools and methods 449Exam essentials 4522.4 Explain common social- engineering attacks, threats, and vulnerabilities 452Social engineering 452Threats 455Vulnerabilities 458Exam essentials 4592.5 Given a scenario, manage and configure basic security settings in the Microsoft Windows OS 459Defender Antivirus 459Firewall 461Users and Groups 462Login OS Options 463NTFS vs. share permissions 464Shared files and folders 467Run as administrator vs. standard user 468BitLocker 470BitLocker To Go 470Encrypting File System (EFS) 470Exam essentials 4712.6 Given a scenario, configure a workstation to meet best practices for security 471Data- at- rest encryption 472Password best practices 472End- user best practices 473Account management 474Change default administrator’s user account/password 475Disable AutoRun 475Disable Autoplay 476Exam essentials 4762.7 Explain common methods for securing mobile and embedded devices 476Screen locks 477Remote wipes 478Locator applications 478OS updates 478Device encryption 479Remote backup applications 479Failed login attempts restrictions 479Antivirus/anti- malware 479Firewalls 480Policies and procedures 480Internet of Things (IoT) 480Exam essentials 4802.8 Given a scenario, use common data destruction and disposal methods 481Physical destruction 481Recycling or repurposing best practices 482Outsourcing concepts 484Exam essentials 4842.9 Given a scenario, configure appropriate security settings on small office/home office (SOHO) wireless and wired networks 485Home router settings 485Wireless specific 488Firewall settings 491Exam essentials 4912.10 Given a scenario, install and configure browsers and relevant security settings 492Browser download/installation 492Extensions and plug- ins 492Password managers 493Secure connections/sites – valid certificates 493Settings 493Exam essentials 496Review Questions 497CHAPTER 8 SOFTWARE TROUBLESHOOTING 5013.1 Given a scenario, troubleshoot common Windows OS problems 505Common symptoms 505Common troubleshooting steps 510Exam essentials 5143.2 Given a scenario, troubleshoot common personal computer (PC) security issues 514Common symptoms 514Browser- related symptoms 517Exam essentials 5183.3 Given a scenario, use best practice procedures for malware removal 5181. Investigate and verify malware symptoms 5182. Quarantine infected systems 5193. Disable System Restore in Windows 5194. Remediate infected systems 5195. Schedule scans and run updates 5196. Enable System Restore and create a restore point in Windows 5207. Educate the end user 520Exam essentials 5203.4 Given a scenario, troubleshoot common mobile OS and application issues 520Common symptoms 521Exam essentials 5243.5 Given a scenario, troubleshoot common mobile OS and application security issues 524Security concerns 524Common symptoms 526Exam essentials 527Review Questions 528CHAPTER 9 OPERATIONAL PROCEDURES 5314.1 Given a scenario, implement best practices associated with documentation and support systems information management 538Ticketing systems 538Asset management 540Types of documents 542Knowledge base/articles 545Exam essentials 5454.2 Explain basic change- management best practices 545Documented business processes 546Change management 546Exam essentials 5484.3 Given a scenario, implement workstation backup and recovery methods 548Backup and recovery 548Backup testing 550Backup rotation schemes 550Exam essentials 5514.4 Given a scenario, use common safety procedures 552Electrostatic discharge (ESD) straps 552ESD mats 553Equipment grounding 554Proper power handling 555Proper component handling and storage 555Antistatic bags 555Compliance with government regulations 555Personal safety 555Exam essentials 5574.5 Summarize environmental impacts and local environmental controls 557Material safety data sheet (MSDS)/documentation for handling and disposal 557Temperature, humidity- level awareness, and proper ventilation 559Power surges, brownouts, and blackouts 562Exam essentials 5644.6 Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts 565Incident response 565Licensing/digital rights management (DRM)/end- user license agreement (EULA) 567Regulated data 568Exam essentials 5694.7 Given a scenario, use proper communication techniques and professionalism 569Professional appearance and attire 570Use proper language and avoid jargon, acronyms, and slang, when applicable 570Maintain a positive attitude/project confidence 571Actively listen, take notes, and avoid interrupting the customer 571Be culturally sensitive 571Be on time (if late, contact the customer) 572Avoid distractions 572Dealing with difficult customers or situations 573Set and meet expectations/time line and communicate status with the customer 574Deal appropriately with customers’ confidential and private materials 575Exam essentials 5764.8 Identify the basics of scripting 576Script file types 576Use cases for scripting 577Other considerations when using scripts 578Exam essentials 5794.9 Given a scenario, use remote access technologies 579Methods/tools 579Security considerations of each access method 582Exam essentials 582Review Questions 583Appendix Answers to the Review Questions 587Chapter 1: Mobile Devices 588Chapter 2: Networking 589Chapter 3: Hardware 591Chapter 4: Virtualization and Cloud Computing 595Chapter 5: Hardware and Network Troubleshooting 596Chapter 6: Operating Systems 598Chapter 7: Security 599Chapter 8: Software Troubleshooting 602Chapter 9: Operational Procedures 603Index 607

Regulärer Preis: 20,99 €
Produktbild für Applied Deep Learning with TensorFlow 2

Applied Deep Learning with TensorFlow 2

Understand how neural networks work and learn how to implement them using TensorFlow 2.0 and Keras. This new edition focuses on the fundamental concepts and at the same time on practical aspects of implementing neural networks and deep learning for your research projects.This book is designed so that you can focus on the parts you are interested in. You will explore topics as regularization, optimizers, optimization, metric analysis, and hyper-parameter tuning. In addition, you will learn the fundamentals ideas behind autoencoders and generative adversarial networks.All the code presented in the book will be available in the form of Jupyter notebooks which would allow you to try out all examples and extend them in interesting ways. A companion online book is available with the complete code for all examples discussed in the book and additional material more related to TensorFlow and Keras. All the code will be available in Jupyter notebook format and can be opened directly in Google Colab (no need to install anything locally) or downloaded on your own machine and tested locally.You will:• Understand the fundamental concepts of how neural networks work• Learn the fundamental ideas behind autoencoders and generative adversarial networks• Be able to try all the examples with complete code examples that you can expand for your own projects• Have available a complete online companion book with examples and tutorials.This book is for:Readers with an intermediate understanding of machine learning, linear algebra, calculus, and basic Python programming.Umberto Michelucci is the founder and the chief AI scientist of TOELT – Advanced AI LAB LLC. He’s an expert in numerical simulation, statistics, data science, and machine learning. He has 15 years of practical experience in the fields of data warehouse, data science, and machine learning. His first book, Applied Deep Learning—A Case-Based Approach to Understanding Deep Neural Networks, was published in 2018. His second book, Convolutional and Recurrent Neural Networks Theory and Applications was published in 2019. He publishes his research regularly and gives lectures on machine learning and statistics at various universities. He holds a PhD in machine learning, and he is also a Google Developer Expert in Machine Learning based in Switzerland.Chapter 1 : Optimization and neural networksSubtopics:How to read the bookIntroduction to the bookChapter 2: Hands-on with One Single NeuronSubtopics:Overview of optimizationA definition of learningConstrained vs. unconstrained optimizationAbsolute and local minimaOptimization algorithms with focus on Gradient DescentVariations of Gradient Descent (mini-batch and stochastic)How to choose the right mini-batch sizeChapter 3: Feed Forward Neural NetworksSubtopics:A short introduction to matrix algebra Activation functions (identity, sigmoid, tanh, swish, etc.)Implementation of one neuron in KerasLinear regression with one neuronLogistic regression with one neuronChapter 4: RegularizationSubtopics:Matrix formalismSoftmax activation functionOverfitting and bias-variance discussionHow to implement a fully conneted network with KerasMulti-class classification with the Zalando dataset in KerasGradient descent variation in practice with a real datasetWeight initializationHow to compare the complexity of neural networksHow to estimate memory used by neural networks in KerasChapter 5: Advanced OptimizersSubtopics:An introduction to regularizationl_p norml_2 regularizationWeight decay when using regularizationDropoutEarly StoppingChapter 6Chapter Title: Hyper-Parameter tuningSubtopics:Exponentially weighted averagesMomentumRMSPropAdamComparison of optimizersChapter 7Chapter Title: Convolutional Neural NetworksSubtopics:Introduction to Hyper-parameter tuningBlack box optimizationGrid SearchRandom SearchCoarse to fine optimization Sampling on logarithmic scaleBayesian optimisationChapter 8Chapter Title: Brief Introduction to Recurrent Neural NetworksSubtopics:Theory of convolutionPooling and paddingBuilding blocks of a CNNImplementation of a CNN with KerasIntroduction to recurrent neural networksImplementation of a RNN with KerasChapter 9: AutoencodersSubtopics:Feed Forward AutoencodersLoss function in autoencodersReconstruction errorApplication of autoencoders: dimensionality reductionApplication of autoencoders: Classification with latent featuresCurse of dimensionalityDenoising autoencodersAutoencoders with CNNChapter 10: Metric AnalysisSubtopics:Human level performance and Bayes errorBiasMetric analysis diagramTraining set overfittingHow to split your datasetUnbalanced dataset: what can happenK-fold cross validationManual metric analysis: an exampleChapter 11Chapter Title: General Adversarial Networks (GANs)Subtopics:Introduction to GANsThe building blocks of GANsAn example of implementation of GANs in KerasAPPENDIX 1: Introduction to KerasSubtopics:Sequential modelKeras LayersFunctional APIsSpecifying loss functionsPutting all together and training a modelCallback functionsSave and load modelsAPPENDIX 2: Customizing KerasSubtopics:Custom callback functionsCustom training loopsCustom loss functionsAPPENDIX 3: Symbols and Abbreviations

Regulärer Preis: 66,99 €
Produktbild für Algorithms For Dummies

Algorithms For Dummies

YOUR SECRET WEAPON TO UNDERSTANDING—AND USING!—ONE OF THE MOST POWERFUL INFLUENCES IN THE WORLD TODAYFrom your Facebook News Feed to your most recent insurance premiums—even making toast!—algorithms play a role in virtually everything that happens in modern society and in your personal life. And while they can seem complicated from a distance, the reality is that, with a little help, anyone can understand—and even use—these powerful problem-solving tools!In Algorithms For Dummies, you'll discover the basics of algorithms, including what they are, how they work, where you can find them (spoiler alert: everywhere!), who invented the most important ones in use today (a Greek philosopher is involved), and how to create them yourself.You'll also find:* Dozens of graphs and charts that help you understand the inner workings of algorithms* Links to an online repository called GitHub for constant access to updated code* Step-by-step instructions on how to use Google Colaboratory, a zero-setup coding environment that runs right from your browserWhether you're a curious internet user wondering how Google seems to always know the right answer to your question or a beginning computer science student looking for a head start on your next class, Algorithms For Dummies is the can't-miss resource you've been waiting for.JOHN MUELLER has published more than 100 books on technology, data, and programming. John has a website and blog where he writes articles on technology and offers assistance alongside his published books.LUCA MASSARON is a data scientist specializing in insurance and finance. A Google Developer Expert in machine learning, he has been involved in quantitative analysis and algorithms since 2000. Introduction 1PART 1: GETTING STARTED WITH ALGORITHMS 7Chapter 1: Introducing Algorithms 9Chapter 2: Considering Algorithm Design 23Chapter 3: Working with Google Colab 41Chapter 4: Performing Essential Data Manipulations Using Python 59Chapter 5: Developing a Matrix Computation Class 79PART 2: UNDERSTANDING THE NEED TO SORT AND SEARCH 97Chapter 6: Structuring Data 99Chapter 7: Arranging and Searching Data 117PART 3: EXPLORING THE WORLD OF GRAPHS 139Chapter 8: Understanding Graph Basics 141Chapter 9: Reconnecting the Dots 161Chapter 10: Discovering Graph Secrets 195Chapter 11: Getting the Right Web page 207PART 4: WRANGLING BIG DATA 223Chapter 12: Managing Big Data 225Chapter 13: Parallelizing Operations 249Chapter 14: Compressing and Concealing Data 267PART 5: CHALLENGING DIFFICULT PROBLEMS 289Chapter 15: Working with Greedy Algorithms 291Chapter 16: Relying on Dynamic Programming 307Chapter 17: Using Randomized Algorithms 331Chapter 18: Performing Local Search 349Chapter 19: Employing Linear Programming 367Chapter 20: Considering Heuristics 381PART 6: THE PART OF TENS 401Chapter 21: Ten Algorithms That Are Changing the World 403Chapter 22: Ten Algorithmic Problems Yet to Solve 411Index 417ntroduction 1PART 1: GETTING STARTED WITH ALGORITHMS 7Chapter 1: Introducing Algorithms 9Chapter 2: Considering Algorithm Design 23Chapter 3: Working with Google Colab 41Chapter 4: Performing Essential Data Manipulations Using Python 59Chapter 5: Developing a Matrix Computation Class 79PART 2: UNDERSTANDING THE NEED TO SORT AND SEARCH 97Chapter 6: Structuring Data 99Chapter 7: Arranging and Searching Data 117PART 3: EXPLORING THE WORLD OF GRAPHS 139Chapter 8: Understanding Graph Basics 141Chapter 9: Reconnecting the Dots 161Chapter 10: Discovering Graph Secrets 195Chapter 11: Getting the Right Web page 207PART 4: WRANGLING BIG DATA 223Chapter 12: Managing Big Data 225Chapter 13: Parallelizing Operations 249Chapter 14: Compressing and Concealing Data 267PART 5: CHALLENGING DIFFICULT PROBLEMS 289Chapter 15: Working with Greedy Algorithms 291Chapter 16: Relying on Dynamic Programming 307Chapter 17: Using Randomized Algorithms 331Chapter 18: Performing Local Search 349Chapter 19: Employing Linear Programming 367Chapter 20: Considering Heuristics 381PART 6: THE PART OF TENS 401Chapter 21: Ten Algorithms That Are Changing the World 403Chapter 22: Ten Algorithmic Problems Yet to Solve 411Index 417ntroduction 1PART 1: GETTING STARTED WITH ALGORITHMS 7Chapter 1: Introducing Algorithms 9Chapter 2: Considering Algorithm Design 23Chapter 3: Working with Google Colab 41Chapter 4: Performing Essential Data Manipulations Using Python 59Chapter 5: Developing a Matrix Computation Class 79PART 2: UNDERSTANDING THE NEED TO SORT AND SEARCH 97Chapter 6: Structuring Data 99Chapter 7: Arranging and Searching Data 117PART 3: EXPLORING THE WORLD OF GRAPHS 139Chapter 8: Understanding Graph Basics 141Chapter 9: Reconnecting the Dots 161Chapter 10: Discovering Graph Secrets 195Chapter 11: Getting the Right Web page 207PART 4: WRANGLING BIG DATA 223Chapter 12: Managing Big Data 225Chapter 13: Parallelizing Operations 249Chapter 14: Compressing and Concealing Data 267PART 5: CHALLENGING DIFFICULT PROBLEMS 289Chapter 15: Working with Greedy Algorithms 291Chapter 16: Relying on Dynamic Programming 307Chapter 17: Using Randomized Algorithms 331Chapter 18: Performing Local Search 349Chapter 19: Employing Linear Programming 367Chapter 20: Considering Heuristics 381PART 6: THE PART OF TENS 401Chapter 21: Ten Algorithms That Are Changing the World 403Chapter 22: Ten Algorithmic Problems Yet to Solve 411Index 417

Regulärer Preis: 20,99 €
Produktbild für Security Awareness For Dummies

Security Awareness For Dummies

MAKE SECURITY A PRIORITY ON YOUR TEAMEvery organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team’s willingness to follow their rules and protocols, it’s increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board with following it. Security Awareness For Dummies gives you the blueprint for implementing this sort of holistic and hyper-secure program in your organization.Written by one of the world’s most influential security professionals—and an Information Systems Security Association Hall of Famer—this pragmatic and easy-to-follow book provides a framework for creating new and highly effective awareness programs from scratch, as well as steps to take to improve on existing ones. It also covers how to measure and evaluate the success of your program and highlight its value to management.* Customize and create your own program * Make employees aware of the importance of security * Develop metrics for success * Follow industry-specific sample programs Cyberattacks aren’t going away anytime soon: get this smart, friendly guide on how to get a workgroup on board with their role in security and save your organization big money in the long run.Introduction 1PART 1: GETTING TO KNOW SECURITY AWARENESS 5Chapter 1: Knowing How Security Awareness Programs Work 7Chapter 2: Starting On the Right Foot: Avoiding What Doesn’t Work 19Chapter 3: Applying the Science Behind Human Behavior and Risk Management 33PART 2: BUILDING A SECURITY AWARENESS PROGRAM 51Chapter 4: Creating a Security Awareness Strategy 53Chapter 5: Determining Culture and Business Drivers 61Chapter 6: Choosing What to Tell The Users 75Chapter 7: Choosing the Best Tools for the Job 89Chapter 8: Measuring Performance 107PART 3: PUTTING YOUR SECURITY AWARENESS PROGRAM INTO ACTION 119Chapter 9: Assembling Your Security Awareness Program 121Chapter 10: Running Your Security Awareness Program 143Chapter 11: Implementing Gamification 165Chapter 12: Running Phishing Simulation Campaigns 181PART 4: THE PART OF TENS 207Chapter 13: Ten Ways to Win Support for Your Awareness Program 209Chapter 14: Ten Ways to Make Friends and Influence People 215Chapter 15: Ten Fundamental Awareness Topics 221Chapter 16: Ten Helpful Security Awareness Resources 227Appendix: Sample Questionnaire 233Index 253

Regulärer Preis: 20,99 €
Produktbild für Build Your Own IoT Platform

Build Your Own IoT Platform

Every solution that is in some way related to the IoT needs a platform; learn how to create that platform with us. This book is about being agile and reducing your time to market without breaking the bank. It is about designing something that can scale incrementally without rework and potentially disrupting the current work.So, the key questions are: What does it take? How long does it take? And, how much does it take to build your own IoT platform? This book answers these questions and provides you with step-by-step guide to building your own IoT platform.In this book, the author highlights what the core of an IoT platform looks like. There are always some must-haves and some nice-to-haves. This book distinguishes the two and focuses on building the must-haves. Building your IoT platform is not only the most significant cost-saver but can also be a satisfying learning experience. This edition will extend your work with a sample project to clarify the concepts and show you the possibilities. Additional chapters will also shed some light on the hardware interface and considerations.WHAT YOU WILL LEARN· Master how to architect an interconnected system and develop a flexible platform architecture· Understand how to prioritize system requirements with a bottom-up approach· Design and build a robust IoT communications platform· Create an end-to-end application using guidelines in this bookWHO IS THIS BOOK FORIoT developers with basic-to-intermediate programming skills, small business owners, as well as entrepreneurs and startup founders would benefit from this bookANAND is an award-winning author, innovator, professional speaker, and futurist. A sought-after thought leader, he helps people adapt, leverage technology, and transform with the power of creativity and innovation.Anand specializes in areas that intersect technology and people. As a technology, innovation, and transformation specialist, he is well-known for bringing ideas and strategies to life.Being a polymath, he often sheds new light on a topic you think is "done to death." Having worked with several Fortune 500 multinationals for the past two decades, he has cross-industry, multi-cultural experience.* Chapter 1: So… You Want to Build Your Own!· The Background of IoT and Our Focus· How Many Platforms Are Out There?· Platforms Supporting Network Servicing· Platforms Sitting Between Networks and Applications· Application-Layer Development Platforms· What Should a Good IoT Platform Have?· Why Should You Build Your Own IoT Platform?· SummaryChapter 2: The Building Blocks of an IoT Solution· The Functional Blocks of an IoT Solution· The Detailed Block Diagram of an IoT Platform· Is Everything from this Block Architecture Mandatory?· What Is the Proposed Approach?· SummaryChapter 3: The Essentials for Building Your Own Platform· Deciding Cloud Instance Specifics· Additional Specifications· Where Do We Get this Cloud Instance?· What About Our Own Machine?· Expanding on the IoT Platform Block Diagram· Edge Interface, Message Broker, and Message Bus· Message Router and Communications Management· Time-Series Storage and Data Management· REST API Interface· Microservices· Rule Engine· Device Manager and Application Manager· Our Own IoT Platform Block Diagram· SummaryChapter 4: Let’s Create Our Platform Wish List· Connecting with the Platform in Real Time· Using MQTT as the Message Broker· How Do We Want to Store the Data?· Data Storage Schema· Accessing Platform Resources Through APIs· Data Accessing APIs· Elementary Microservices and Utilities· Routing and Filtering Data and Messages· Updated Block Diagram of Our IoT Platform· SummaryChapter 5: Here We Go!· Initializing the Cloud Instance· Register and Create· Choosing an Operating System Image· Choosing the Size· Choosing a Datacenter Region· Finalizing and Creating the Instance· Connecting to Our Cloud Instance· Installing Basic Software Stacks· Installing Apache· Installing MySQL· Installing PHP· Securing the Instance and Software· It’s Easier with a Domain Name· Add Virtual Hosts to Our Web Server· Installing SSL Certificates· Installing Node.js and Node-RED· Modifying Node-RED Settings· Securing our Node-RED Editor· SummaryChapter 6: The Message Broker· What Is MQTT?· Publish and Subscribe Paradigm· Other Features of a Message Broker and MQTT· Quality of Service· Keep Alive Period· Last Will and Testament· The Retained Message· The Best Part: WebSocket· Are We Using the Best Message Broker Option?· When to Utilize a Message Broker and When Not To· Installing a Message Broker· Securing a Message Broker· SummaryChapter 7: Building the Critical Components· Creating a Time-Series Core Database· Installing Required Nodes in Node-RED· Creating First Flow for Our Platform· Adding MQTT Publish Capability· REST API Message Publisher· Creating the Database Listener· REST API Message Retriever· Verifying that Everything Is Working as Expected· Running Node-RED in the Background Continuously· SummaryChapter 8: Configuring the Message Broker· The Difference Between WebSocket and Normal MQTT· Why Is WebSocket Important?· Adding WebSocket to Our MQTT Configuration· Testing WebSocket· Let’s Add User Access Controls· Let’s Check If This Is Working· Using the Forever Tool with the Message Broker· SummaryChapter 9: Creating a REST Interface· Data Access APIs· Adding Time-Based Filters· Data Deletion APIs· Removing Data Records Completely· Adding Microservices to the Platform· Getting the Current Timestamp· Random Code Generator· Adding New Modules to Node-RED· UUID Generator· Email and Text Message Microservice APIs· Configuration of Nodes· SMS Sending Utility· Email-Sending Utility· SummaryChapter 10: Rule Engine and Authentication· Start with the Rule Engine Logic· Creating a Database· Building the Flow Sequence· Testing the Rule Engine· Rule Management APIs· Enable and Disable a Specific Rule· Enable and Disable All Rules· Create a New Rule· Building Another Rule Engine with Node-RED· Adding Authentication to the Data API· What Are Our Options?· What Is the Plan?· Adding Authentication Middleware· Enable and Test Authentication· Our Core Platform Is Ready Now· SummaryChapter 11: Documentation and Testing· Preparing a Valid OpenAPI Specification Document· Platform API Specification File Explained· Preparing Distribution Package for Final Upload· Upload API Docs and Make It Live· Authorize and Test API· SummaryChapter 12: Connecting Your Hardware· Why learn hardware alongwith IoT platform?· Available hardware options· Creating bespoke designs· Choosing the best option for your project· Connectivity options and suitability for project· Various topologies and arrangements§ The “why” behind each topology and arrangement· Connecting our hardware to the platform§ Two possible modeso Using REST APIo Using MQTTo Can you use both? Why and when?§ Requirements for each modeo Circuit specifico Firmware specific§ How to incorporate them in hardwareo Circuit specifico Firmware specific· Other considerations for connecting the hardware· SummaryChapter 13: Let's Build a Better Mousetrap· Backstory of better mousetrap case study§ How I got this opportunity§ What does “better” mean?§ How I decided to approach this problem§ Importance of top-down approach· System architecture§ High level system design process§ Block diagram and explanation· Hardware selection§ What are different scenarios§ What are potential options§ What is on our shortlist· Connectivity choice§ What are different scenarios§ What are potential options§ What is on our shortlist· Front-end application§ What are different scenarios§ What are potential options§ What is on our shortlist· Hardware arrangement§ Hardware construction (overview)§ How it works§ Testing the hardware· Backend buildup on the platform§ What additions we need on the platform side§ How to build them (details)§ Testing the backend· Dashboard for visualization§ Building a basic dashboard§ How to pool the data· Additional services I built in the mousetrap application§ Workflow for CRM§ Client alert mechanism§ Operator Scheduling§ Compliance reporting§ Machine learning provision for intelligent pest management§ Other business benefits· Project takeaways – real life and for you (as a reader)· SummaryChapter 14: Unlimited Possibilities· What do I mean by unlimited possibilities?· Why is this platform so capable?· Five ideas you can work on§ One button – based on my 1btn projecto The concepto Block diagramo Key ideas and things to work ono Potential applications§ Smart street lampso The concepto Block diagramo Key ideas and things to work ono Potential applications§ Council garbage collection managemento The concepto Block diagramo Key ideas and things to work ono Potential applications§ Datacenter climate controlo The concepto Block diagramo Key ideas and things to work ono Potential applications§ People counter for Covid-19 gathering compliance in shops & storeso The concepto Block diagramo Key ideas and things to work ono Potential applications· SummaryChapter 15: What We Built and the Takeaways· Increasing Security for the Cloud Instance· What About SQL Injection Through APIs?· Should We Have Used MongoDB Instead of MySQL?· Some Experts Might Still Try to Talk You Out of This· How Is Our Platform Different from AWS, Google, and Azure?· There Is a New Version of MQTT· My Platform Is Ready. Now What?· The Next Big Thing· If You Need to Find More Resources· Finally

Regulärer Preis: 62,99 €
Produktbild für Introducing Charticulator for Power BI

Introducing Charticulator for Power BI

Create stunning and complex visualizations using the amazing Charticulator custom visuals in Power BI.Charticulator offers users immense power to generate visuals and graphics. To a beginner, there are myriad settings and options that can be combined in what feels like an unlimited number of combinations, giving it the unfair label, “the DAX of the charting world”. This is not true.This book is your start-to-finish guide to using Charticulator, a custom visualization software that Microsoft integrated into Power BI Desktop so that Power BI users can create incredibly powerful, customized charts and graphs. You will learn the concepts that underpin the software, journeying through every building block of chart design, enabling you to combine these parts to create spectacular visuals that represent the story of your data.Unlike other custom Power BI visuals, Charticulator runs in a separate application window within Power BI with its own interface and requires a different set of interactions and associated knowledge. This book covers the ins and outs of all of them.WHAT YOU WILL LEARN* Generate inspirational and technically competent visuals with no programming or other specialist technical knowledge* Create charts that are not restricted to conventional chart types such as bar, line, or pie* Limit the use of diverse Power BI custom visuals to one Charticulator custom visual* Alleviate frustrations with the limitations of default chart types in Power BI, such as being able to plot data on only one categorical axis* Use a much richer set of options to compare different sets of data* Re-use your favorite or most often used chart designs with Charticulator templatesWHO THIS BOOK IS FORThe average Power BI user. It assumes no prior knowledge on the part of the reader other than being able to open Power BI desktop, import data, and create a simple Power BI visual. User experiences may vary, from people attending a Power BI training course to those with varying skills and abilities, from SQL developers and advanced Excel users to people with limited data analysis experience and technical skills.ALISON BOX is a director of Burningsuit Ltd and an IT trainer and consultant with over 30 years of experience delivering computer applications training to people at all skill levels, from basic users to advanced technical experts. Currently, she specializes in delivering training in Microsoft Power BI Service and Desktop, Data Modeling, DAX (Data Analysis Expressions), and Excel. Alison also works with organizations as a DAX and Data Analysis consultant. Part of her job entails promoting Burningsuit as a knowledge base for Power BI and includes writing regular blog posts on all aspects of Power BI that are published on her website. When Charticulator was incorporated into Power BI in April 2021, she felt there was a need for more detailed documentation that takes the learner from no knowledge to being able to design complex and challenging visuals. With this in mind, she started to write a series of blog posts but soon realized the sheer weight of information regarding Charticulator had outgrown the blog post approach and that writing a book might be more helpful as a means to understanding Charticulator. This book is the result of her own journey of discovery in learning how to use Charticulator.Chapter 1 – Introduction to CharticulatorChapter 2 – Marks, Symbols & LinesChapter 3 – Binding DataChapter 4 – Using SymbolsChapter 5 – 2D Region Plot SegmentsChapter 6 – Using Two Categorical AxesChapter 7 – Using Numerical AxesChapter 8 – Charticulator ExpressionsChapter 9 – Scales & LegendsChapter 10 – Guides & AnchoringChapter 11 – Working with Multiple 2D Region Plot SegmentsChapter 12 – Horizontal & Vertical Line ScaffoldsChapter 13 – Polar ScaffoldsChapter 14 – Plotting Multiple MeasuresChapter 15 – Links & Data LinkingChapter 16 – The Line Plot SegmentChapter 17 – Templates & Nested ChartsChapter 18 – Integrating with Power BIChapter 19 – Taking it to the Next Level

Regulärer Preis: 62,99 €
Produktbild für Bioinformatics and Medical Applications

Bioinformatics and Medical Applications

BIOINFORMATICS AND MEDICAL APPLICATIONSTHE MAIN TOPICS ADDRESSED IN THIS BOOK ARE BIG DATA ANALYTICS PROBLEMS IN BIOINFORMATICS RESEARCH SUCH AS MICROARRAY DATA ANALYSIS, SEQUENCE ANALYSIS, GENOMICS-BASED ANALYTICS, DISEASE NETWORK ANALYSIS, TECHNIQUES FOR BIG DATA ANALYTICS, AND HEALTH INFORMATION TECHNOLOGY.Bioinformatics and Medical Applications: Big Data Using Deep Learning Algorithms analyses massive biological datasets using computational approaches and the latest cutting-edge technologies to capture and interpret biological data. The book delivers various bioinformatics computational methods used to identify diseases at an early stage by assembling cutting-edge resources into a single collection designed to enlighten the reader on topics focusing on computer science, mathematics, and biology. In modern biology and medicine, bioinformatics is critical for data management. This book explains the bioinformatician’s important tools and examines how they are used to evaluate biological data and advance disease knowledge. The editors have curated a distinguished group of perceptive and concise chapters that presents the current state of medical treatments and systems and offers emerging solutions for a more personalized approach to healthcare. Applying deep learning techniques for data-driven solutions in health information allows automated analysis whose method can be more advantageous in supporting the problems arising from medical and health-related information. AUDIENCEThe primary audience for the book includes specialists, researchers, postgraduates, designers, experts, and engineers, who are occupied with biometric research and security-related issues. A. SURESH, PHD is an associate professor, Department of the Networking and Communications, SRM Institute of Science & Technology, Kattankulathur, Tamil Nadu, India. He has nearly two decades of experience in teaching and his areas of specialization are data mining, artificial intelligence, image processing, multimedia, and system software. He has published 6 patents and more than 100 papers in international journals.S. VIMAL, PHD is an assistant professor in the Department of Artificial Intelligence & DS, Ramco Institute of Technology, Tamilnadu, India. He is the editor of 3 books and guest-edited multiple journal special issues. He has more than 15 years of teaching experience. Y. HAROLD ROBINSON, PHD is currently working in the School of Technology and Engineering, Vellore Institute of Technology, Vellore, India. He has published more than 50 papers in various international journals and presented more than 70 papers in both national and international conferences. DHINESH KUMAR RAMASWAMI, BE in Computer Science, is a Senior Consultant at Capgemini America Inc. He has over 9 years of experience in software development and specializes in various .net technologies. He has published more than 15 papers in international journals and national and international conferences. R. UDENDHRAN, PHD is an assistant professor, Department of Computer Science and Engineering at Sri Sairam Institute of Technology, Chennai, Tamil Nadu, India. He has published about 20 papers in international journals. Preface xv1 PROBABILISTIC OPTIMIZATION OF MACHINE LEARNING ALGORITHMS FOR HEART DISEASE PREDICTION 1Jaspreet Kaur, Bharti Joshi and Rajashree Shedge1.1 Introduction 21.1.1 Scope and Motivation 31.2 Literature Review 41.2.1 Comparative Analysis 51.2.2 Survey Analysis 51.3 Tools and Techniques 101.3.1 Description of Dataset 111.3.2 Machine Learning Algorithm 121.3.3 Decision Tree 141.3.4 Random Forest 151.3.5 Naive Bayes Algorithm 161.3.6 K Means Algorithm 181.3.7 Ensemble Method 181.3.7.1 Bagging 191.3.7.2 Boosting 191.3.7.3 Stacking 191.3.7.4 Majority Vote 191.4 Proposed Method 201.4.1 Experiment and Analysis 201.4.2 Method 221.5 Conclusion 25References 262 CANCEROUS CELLS DETECTION IN LUNG ORGANS OF HUMAN BODY: IOT-BASED HEALTHCARE 4.0 APPROACH 29Rohit Rastogi, D.K. Chaturvedi, Sheelu Sagar, Neeti Tandon and Mukund Rastogi2.1 Introduction 302.1.1 Motivation to the Study 302.1.1.1 Problem Statements 312.1.1.2 Authors’ Contributions 312.1.1.3 Research Manuscript Organization 312.1.1.4 Definitions 322.1.2 Computer-Aided Diagnosis System (CADe or CADx) 322.1.3 Sensors for the Internet of Things 322.1.4 Wireless and Wearable Sensors for Health Informatics 332.1.5 Remote Human’s Health and Activity Monitoring 332.1.6 Decision-Making Systems for Sensor Data 332.1.7 Artificial Intelligence and Machine Learning for Health Informatics 342.1.8 Health Sensor Data Management 342.1.9 Multimodal Data Fusion for Healthcare 352.1.10 Heterogeneous Data Fusion and Context-Aware Systems: A Context-Aware Data Fusion Approach for Health-IoT 352.2 Literature Review 352.3 Proposed Systems 372.3.1 Framework or Architecture of the Work 382.3.2 Model Steps and Parameters 382.3.3 Discussions 392.4 Experimental Results and Analysis 392.4.1 Tissue Characterization and Risk Stratification 392.4.2 Samples of Cancer Data and Analysis 402.5 Novelties 422.6 Future Scope, Limitations, and Possible Applications 422.7 Recommendations and Consideration 432.8 Conclusions 43References 433 COMPUTATIONAL PREDICTORS OF THE PREDOMINANT PROTEIN FUNCTION: SARS-COV-2 CASE 47Carlos Polanco, Manlio F. Márquez and Gilberto Vargas-Alarcón3.1 Introduction 483.2 Human Coronavirus Types 493.3 The SARS-CoV-2 Pandemic Impact 503.3.1 RNA Virus vs DNA Virus 513.3.2 The Coronaviridae Family 513.3.3 The SARS-CoV-2 Structural Proteins 523.3.4 Protein Representations 523.4 Computational Predictors 533.4.1 Supervised Algorithms 533.4.2 Non-Supervised Algorithms 543.5 Polarity Index Method® 543.5.1 The PIM® Profile 543.5.2 Advantages 553.5.3 Disadvantages 553.5.4 SARS-CoV-2 Recognition Using PIM® Profile 553.6 Future Implications 593.7 Acknowledgments 60References 604 DEEP LEARNING IN GAIT ABNORMALITY DETECTION: PRINCIPLES AND ILLUSTRATIONS 63Saikat Chakraborty, Sruti Sambhavi and Anup Nandy4.1 Introduction 634.2 Background 654.2.1 LSTM 654.2.1.1 Vanilla LSTM 654.2.1.2 Bidirectional LSTM 664.3 Related Works 674.4 Methods 684.4.1 Data Collection and Analysis 684.4.2 Results and Discussion 694.5 Conclusion and Future Work 714.6 Acknowledgments 71References 715 BROAD APPLICATIONS OF NETWORK EMBEDDINGS IN COMPUTATIONAL BIOLOGY, GENOMICS, MEDICINE, AND HEALTH 73Akanksha Jaiswar, Devender Arora, Manisha Malhotra, Abhimati Shukla and Nivedita Rai5.1 Introduction 745.2 Types of Biological Networks 765.3 Methodologies in Network Embedding 765.4 Attributed and Non-Attributed Network Embedding 825.5 Applications of Network Embedding in Computational Biology 835.5.1 Understanding Genomic and Protein Interaction via Network Alignment 835.5.2 Pharmacogenomics 845.5.2.1 Drug-Target Interaction Prediction 845.5.2.2 Drug-Drug Interaction 845.5.2.3 Drug-Disease Interaction Prediction 855.5.2.4 Analysis of Adverse Drug Reaction 855.5.3 Function Prediction 865.5.4 Community Detection 865.5.5 Network Denoising 875.5.6 Analysis of Multi-Omics Data 875.6 Limitations of Network Embedding in Biology 875.7 Conclusion and Outlook 89References 896 HEART DISEASE CLASSIFICATION USING REGIONAL WALL THICKNESS BY ENSEMBLE CLASSIFIER 99Prakash J., Vinoth Kumar B. and Sandhya R.6.1 Introduction 1006.2 Related Study 1016.3 Methodology 1036.3.1 Pre-Processing 1036.3.2 Region of Interest Extraction 1046.3.3 Segmentation 1056.3.4 Feature Extraction 1066.3.5 Disease Classification 1076.4 Implementation and Result Analysis 1086.4.1 Dataset Description 1086.4.2 Testbed 1086.4.3 Discussion 1086.4.3.1 K-Fold Cross-Validation 1106.4.3.2 Confusion Matrix 1106.5 Conclusion 115References 1157 DEEP LEARNING FOR MEDICAL INFORMATICS AND PUBLIC HEALTH 117K. Aditya Shastry, Sanjay H. A., Lakshmi M. and Preetham N.7.1 Introduction 1187.2 Deep Learning Techniques in Medical Informatics and Public Health 1217.2.1 Autoencoders 1227.2.2 Recurrent Neural Network 1237.2.3 Convolutional Neural Network (CNN) 1247.2.4 Deep Boltzmann Machine 1267.2.5 Deep Belief Network 1277.3 Applications of Deep Learning in Medical Informatics and Public Health 1287.3.1 The Use of DL for Cancer Diagnosis 1287.3.2 DL in Disease Prediction and Treatment 1297.3.3 Future Applications 1337.4 Open Issues Concerning DL in Medical Informatics and Public Health 1357.5 Conclusion 139References 1408 AN INSIGHT INTO HUMAN POSE ESTIMATION AND ITS APPLICATIONS 147Shambhavi Mishra, Janamejaya Channegowda and Kasina Jyothi Swaroop8.1 Foundations of Human Pose Estimation 1478.2 Challenges to Human Pose Estimation 1498.2.1 Motion Blur 1508.2.2 Indistinct Background 1518.2.3 Occlusion or Self-Occlusion 1518.2.4 Lighting Conditions 1518.3 Analyzing the Dimensions 1528.3.1 2D Human Pose Estimation 1528.3.1.1 Single-Person Pose Estimation 1538.3.1.2 Multi-Person Pose Estimation 1538.3.2 3D Human Pose Estimation 1538.4 Standard Datasets for Human Pose Estimation 1548.4.1 Pascal VOC (Visual Object Classes) Dataset 1568.4.2 KTH Multi-View Football Dataset I 1568.4.3 KTH Multi-View Football Dataset II 1568.4.4 MPII Human Pose Dataset 1578.4.5 BBC Pose 1578.4.6 COCO Dataset 1578.4.7 J-HMDB Dataset 1588.4.8 Human3.6M Dataset 1588.4.9 DensePose 1588.4.10 AMASS Dataset 1598.5 Deep Learning Revolutionizing Pose Estimation 1598.5.1 Approaches in 2D Human Pose Estimation 1598.5.2 Approaches in 3D Human Pose Estimation 1638.6 Application of Human Pose Estimation in Medical Domains 1658.7 Conclusion 166References 1679 BRAIN TUMOR ANALYSIS USING DEEP LEARNING: SENSOR AND IOT-BASED APPROACH FOR FUTURISTIC HEALTHCARE 171Rohit Rastogi, D.K. Chaturvedi, Sheelu Sagar, Neeti Tandon and Akshit Rajan Rastogi9.1 Introduction 1729.1.1 Brain Tumor 1729.1.2 Big Data Analytics in Health Informatics 1729.1.3 Machine Learning in Healthcare 1739.1.4 Sensors for Internet of Things 1739.1.5 Challenges and Critical Issues of IoT in Healthcare 1749.1.6 Machine Learning and Artificial Intelligence for Health Informatics 1749.1.7 Health Sensor Data Management 1759.1.8 Multimodal Data Fusion for Healthcare 1759.1.9 Heterogeneous Data Fusion and Context-Aware Systems a Context-Aware Data Fusion Approach for Health-IoT 1769.1.10 Role of Technology in Addressing the Problem of Integration of Healthcare System 1769.2 Literature Survey 1779.3 System Design and Methodology 1799.3.1 System Design 1799.3.2 CNN Architecture 1809.3.3 Block Diagram 1819.3.4 Algorithm(s) 1819.3.5 Our Experimental Results, Interpretation, and Discussion 1839.3.6 Implementation Details 1839.3.7 Snapshots of Interfaces 1849.3.8 Performance Evaluation 1869.3.9 Comparison with Other Algorithms 1869.4 Novelty in Our Work 1869.5 Future Scope, Possible Applications, and Limitations 1889.6 Recommendations and Consideration 1889.7 Conclusions 188References 18910 STUDY OF EMISSION FROM MEDICINAL WOODS TO CURB THREATS OF POLLUTION AND DISEASES: GLOBAL HEALTHCARE PARADIGM SHIFT IN 21ST CENTURY 191Rohit Rastogi, Mamta Saxena, Devendra Kr. Chaturvedi, Sheelu Sagar, Neha Gupta, Harshit Gupta, Akshit Rajan Rastogi, Divya Sharma, Manu Bhardwaj and Pranav Sharma10.1 Introduction 19210.1.1 Scenario of Pollution and Need to Connect with Indian Culture 19210.1.2 Global Pollution Scenario 19210.1.3 Indian Crisis on Pollution and Worrying Stats 19310.1.4 Efforts Made to Curb Pollution World Wide 19410.1.5 Indian Ancient Vedic Sciences to Curb Pollution and Related Disease 19610.1.6 The Yajna Science: A Boon to Human Race From Rishi-Muni 19610.1.7 The Science of Mantra Associated With Yajna and Its Scientific Effects 19710.1.8 Effect of Different Woods and Cow Dung Used in Yajna 19710.1.9 Use of Sensors and IoT to Record Experimental Data 19810.1.10 Analysis and Pattern Recognition by ML and AI 19910.2 Literature Survey 20010.3 The Methodology and Protocols Followed 20110.4 Experimental Setup of an Experiment 20210.5 Results and Discussions 20210.5.1 Mango 20210.5.2 Bargad 20310.6 Applications of Yagya and Mantra Therapy in Pollution Control and Its Significance 20710.7 Future Research Perspectives 20710.8 Novelty of Our Research 20810.9 Recommendations 20810.10 Conclusions 209References 20911 AN ECONOMICAL MACHINE LEARNING APPROACH FOR ANOMALY DETECTION IN IOT ENVIRONMENT 215Ambika N.11.1 Introduction 21511.2 Literature Survey 21811.3 Proposed Work 22911.4 Analysis of the Work 23011.5 Conclusion 231References 23112 INDIAN SCIENCE OF YAJNA AND MANTRA TO CURE DIFFERENT DISEASES: AN ANALYSIS AMIDST PANDEMIC WITH A SIMULATED APPROACH 235Rohit Rastogi, Mamta Saxena, Devendra Kumar Chaturvedi, Mayank Gupta, Puru Jain, Rishabh Jain, Mohit Jain, Vishal Sharma, Utkarsh Sangam, Parul Singhal and Priyanshi Garg12.1 Introduction 23612.1.1 Different Types of Diseases 23612.1.1.1 Diabetes (Madhumeha) and Its Types 23612.1.1.2 TTH and Stress 23712.1.1.3 Anxiety 23712.1.1.4 Hypertension 23712.1.2 Machine Vision 23712.1.2.1 Medical Images and Analysis 23812.1.2.2 Machine Learning in Healthcare 23812.1.2.3 Artificial Intelligence in Healthcare 23912.1.3 Big Data and Internet of Things (IoT) 23912.1.4 Machine Learning in Association with Data Science and Analytics 23912.1.5 Yajna Science 24012.1.6 Mantra Science 24012.1.6.1 Positive Impact of Recital of Gayatri Mantra and OM Chanting 24112.1.6.2 Significance of Mantra on Indian Culture and Mythology 24112.1.7 Usefulness and Positive Aspect of Yoga Asanas and Pranayama 24112.1.8 Effects of Yajna and Mantra on Human Health 24212.1.9 Impact of Yajna in Reducing the Atmospheric Solution 24212.1.10 Scientific Study on Impact of Yajna on Air Purification 24312.1.11 Scientific Meaning of Religious and Manglik Signs 24412.2 Literature Survey 24412.3 Methodology 24612.4 Results and Discussion 24912.5 Interpretations and Analysis 25012.6 Novelty in Our Work 25812.7 Recommendations 25912.8 Future Scope and Possible Applications 26012.9 Limitations 26112.10 Conclusions 26112.11 Acknowledgments 262References 26213 COLLECTION AND ANALYSIS OF BIG DATA FROM EMERGING TECHNOLOGIES IN HEALTHCARE 269Nagashri K., Jayalakshmi D. S. and Geetha J.13.1 Introduction 26913.2 Data Collection 27113.2.1 Emerging Technologies in Healthcare and Its Applications 27113.2.1.1 RFID 27213.2.1.2 WSN 27313.2.1.3 IoT 27413.2.2 Issues and Challenges in Data Collection 27713.2.2.1 Data Quality 27713.2.2.2 Data Quantity 27713.2.2.3 Data Access 27813.2.2.4 Data Provenance 27813.2.2.5 Security 27813.2.2.6 Other Challenges 27913.3 Data Analysis 28013.3.1 Data Analysis Approaches 28013.3.1.1 Machine Learning 28013.3.1.2 Deep Learning 28113.3.1.3 Natural Language Processing 28113.3.1.4 High-Performance Computing 28113.3.1.5 Edge-Fog Computing 28213.3.1.6 Real-Time Analytics 28213.3.1.7 End-User Driven Analytics 28213.3.1.8 Knowledge-Based Analytics 28313.3.2 Issues and Challenges in Data Analysis 28313.3.2.1 Multi-Modal Data 28313.3.2.2 Complex Domain Knowledge 28313.3.2.3 Highly Competent End-Users 28313.3.2.4 Supporting Complex Decisions 28313.3.2.5 Privacy 28413.3.2.6 Other Challenges 28413.4 Research Trends 28413.5 Conclusion 286References 28614 A COMPLETE OVERVIEW OF SIGN LANGUAGE RECOGNITION AND TRANSLATION SYSTEMS 289Kasina Jyothi Swaroop, Janamejaya Channegowda and Shambhavi Mishra14.1 Introduction 28914.2 Sign Language Recognition 29014.2.1 Fundamentals of Sign Language Recognition 29014.2.2 Requirements for the Sign Language Recognition 29214.3 Dataset Creation 29314.3.1 American Sign Language 29314.3.2 German Sign Language 29614.3.3 Arabic Sign Language 29714.3.4 Indian Sign Language 29814.4 Hardware Employed for Sign Language Recognition 29914.4.1 Glove/Sensor-Based Systems 29914.4.2 Microsoft Kinect–Based Systems 30014.5 Computer Vision–Based Sign Language Recognition and Translation Systems 30214.5.1 Image Processing Techniques for Sign Language Recognition 30214.5.2 Deep Learning Methods for Sign Language Recognition 30414.5.3 Pose Estimation Application to Sign Language Recognition 30514.5.4 Temporal Information in Sign Language Recognition and Translation 30614.6 Sign Language Translation System—A Brief Overview 30714.7 Conclusion 309References 310Index 315

Regulärer Preis: 190,99 €
Produktbild für IT Security Controls

IT Security Controls

Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure.The book proposes a comprehensive approach to the implementation of IT security controls with an easily understandable graphic implementation proposal to comply with the most relevant market standards (ISO 27001, NIST, PCI-DSS, and COBIT) and a significant number of regulatory frameworks from central banks across the World (European Union, Switzerland, UK, Singapore, Hong Kong, India, Qatar, Kuwait, Saudi Arabia, Oman, etc.).To connect the book with the real world, a number of well-known case studies are featured to explain what went wrong with the biggest hacks of the decade, and which controls should have been in place to prevent them. The book also describes a set of well-known security tools available to support you.WHAT YOU WILL LEARN* Understand corporate IT security controls, including governance, policies, procedures, and security awareness* Know cybersecurity and risk assessment techniques such as penetration testing, red teaming, compliance scans, firewall assurance, and vulnerability scans* Understand technical IT security controls for unmanaged and managed devices, and perimeter controls* Implement security testing tools such as steganography, vulnerability scanners, session hijacking, intrusion detection, and moreWHO THIS BOOK IS FORIT security managers, chief information security officers, information security practitioners, and IT auditors will use the book as a reference and support guide to conduct gap analyses and audits of their organizations’ IT security controls implementations.VIRGILIO VIEGAS, CISSP, CCSP, CISM, CISA, CRISC, CEH, has more than 25 years of experience in the banking sector, having worked in Europe, Asia and the Middle East. Currently he is the Group Head of International IT Security in one of the largest financial institutions in the Middle East and Africa with a strong presence across Europe, Africa and Asia.Virgilio previously worked for more than 20 years for a major Portuguese financial institution, where he participated in the design and implementation of a Internet services reference platform and later developed an information security reference architecture.While working in Asia, Virgilio developed projects related to information security, compliance, and retail such as Internet banking, ATM and POS network implementation, issuing and acquiring international card schemes, anti-money laundering, customer fingerprint authentication, amongst others. He also supported projects with significant impact in the Timor-Leste financial sector such as the definition of the country International Bank Account Number (IBAN) standard, the implementation of the Real Time Gross Settlement System (RTGS), and the national ATM and POS switch.OBEN KUYUCU, CISSP, CISA, has 15 years of experience in IT security, cybersecurity, governance, risk, compliance, and PCI DSS, as well as other international standards and regulations. Currently, he is an IT Security Governance and Oversight Senior Analyst at one of the largest financial institutions in the Middle East and Africa.Oben previously worked as Senior Information Security Expert and PCI Qualified Security Assessor (QSA) at a leading information security company in Turkey. He was the first PCI 3DSecure Assessor and one of the first PCI QSAs in Turkey, and he carried out more than 150 IT security-related engagements, mainly related to PCI DSS and ISO 27001 internal audits.Throughout his career Oben has performed PCI DSS auditing, system administration, design, penetration testing, security analysis, consulting, pre-sales activities and post-sales support for companies in Europe, Asia, and the Middle East. He also has made a significant contribution to many information security projects, including providing support to a PCI SSC Approved Scanning Vendor portal and transforming it into a governance, risk, and compliance vulnerability management tool.ABOUT THE AUTHORSINTRODUCTIONCHAPTER 1. STANDARDS AND FRAMEWORKSISO 27001ISO 27002ISO 27018 n17NIST sp 800-53NIST sp 800-160PCI DSSCloud standardsISO 17789NIST sp 500-292Cobit for it securityCIS controlsCHAPTER 2. CORPORATE SECURITY CONTROLSInformation security processes and servicesSecurity governanceGovernance of information security (ISO 27014:2013)Security metricsPolicies and proceduresCyber security and risk assessmentPenetration testingRed teamingOwasp code reviewCompliance scansVulnerability scansFirewall assuranceRisk assessmentsSecurity awarenessSecurity awareness trainingSimulated attacksSecurity operations centerIncident response and recoveryThreat huntingEdiscovery/forensicsThreat intelligenceCyber crisis management planSecurity engineeringAsset managementConfiguration management and security baselinesSecurity architecture and designIt security technical controlsOff premises unmanaged devicesSecure connectionsClean pipesDDOS protectionIpsec / tls encryptionEMM – enterprise mobility management (mdm, mam, mcm)NAC – network access controlMulti factor authenticationManaged devicesActive directory integrationSCCM – system center configuration managerTPM – trusted platform moduleVPN clientNAC – network access control (agent)Data classificationUAM – user activity monitoringPhishing reporting toolEndpoint protectionHost ips / edrDesktop firewallAntivirusAntispywareFull disk encryptionApp-control / white-listingPerimeter controlsFirewallIDS / IPSProxy and content filteringDLP – data leakage/loss protectionHoneypotWAF – web application firewallSsl / vpnDnsMessage securityAdfsSandboxFile integrityEncrypted emailOn premises controlsMandatory requirementsVlan segmentationCriticalityNatureTypeSecurity baselinesRedundancyLoad balancingProduction traffic encryptionMultilayer implementationTls decryptionStatic routingDisaster recoveryTime synchronizationRedundancyPhysical network segmentationDistinct heartbeat interfacesCentralized managementDefault gatewaysSinkholePublic key infrastructureSecurity monitoring and enforcementPrivileged access managementLog concentratorIdentity and access managementVulnerability management and penetration testingSecurity information and event managementDatabase activity monitoringRisk registerSingle sign-onCHAPTER 3. IT SECURITY TECHNICAL CONTROL MATRIXCHAPTER 4. IT SECURITY PROCESSES MATURITY LEVEL MATRIXCHAPTER 5. MORE ABOUT CLOUDISO 17789 and NIST sp500-292 developedIaaSSaaS & secaasCHAPTER 6. SECURITY TESTING TOOLSWeb applications attacksPassive online password hackingSteganographyWindows log toolsVulnerability scannerSQL injectionWireless attacksSession hijackingBluetooth attacksArp poisoningWebsite mirroringIntrusion detectionMobile devicesSocial engineeringIoT (internet of things)Cloud security and toolsCHAPTER 7. CASE STUDIESCHAPTER 8. ACRONYMS

Regulärer Preis: 66,99 €
Produktbild für Unsupervised Pattern Discovery in Automotive Time Series

Unsupervised Pattern Discovery in Automotive Time Series

In the last decade unsupervised pattern discovery in time series, i.e. the problem of finding recurrent similar subsequences in long multivariate time series without the need of querying subsequences, has earned more and more attention in research and industry. Pattern discovery was already successfully applied to various areas like seismology, medicine, robotics or music. Until now an application to automotive time series has not been investigated. This dissertation fills this desideratum by studying the special characteristics of vehicle sensor logs and proposing an appropriate approach for pattern discovery. To prove the benefit of pattern discovery methods in automotive applications, the algorithm is applied to construct representative driving cycles.Introduction.- RelatedWork.- Development of Pattern Discovery Algorithms for Automotive Time Series.- Pattern-based Representative Cycles.- Evaluation.- Conclusion.

Regulärer Preis: 96,29 €
Produktbild für Beginning gRPC with ASP.NET Core 6

Beginning gRPC with ASP.NET Core 6

Broaden your developer experience by learning how to use gRPC and ASP.NET Core together on the Microsoft’s developer framework, .NET 6 and discover a new way of developing APIs with gRPC.BEGINNING GRPC WITH ASP.NET CORE 6 is your guide to quickly and efficiently getting down to the business of building gRPC applications in the Microsoft .NET ecosystem. Readers will dive in and build an application using gRPC and the latest technologies such Angular and ASP.NET Core Razor Pages.This book will teach you how to set up an efficient application using industry best practices such as security, monitoring, logging, and more. You will do this by performing Create, Read, Update, and Delete (CRUD) operations on a SQL Server database with Entity Framework Core. From there you will build web applications using Angular and ASP.NET Core Razor pages combined with gRPC APIs.After reading the book, you’ll be able to take advantage of the full range of developer opportunities with gRPC, and come away with any understanding of which usage scenarios are best suited for your projects. And you will possess a solid understanding of the best way to build APIs with ASP.NET Core.WHAT YOU WILL LEARNDiscover the latest .NET 6 framework * Benefit from a new way to design APIs* Build modern web applications* Migrate easily from WCF to gRPC* Become comfortable with latest industry programming standardsWHO THIS BOOK IS FORProfessional developers who are interested in getting started with gRPC and want to learn how to use it to build applications in the .NET ecosystem.ANTHONY GIRETTI, is a senior lead software developer at OneOcean in Montreal Canada. He is a technical leader and four-time Microsoft MVP award recipient. Anthony specializes in web technologies (17 years of experience) and .NET. His expertise in technology and IT, and a heartfelt desire to share his knowledge, motivates him to dive into and embrace any web project, complex or otherwise, in order to help developers achieve their project goals. He invites challenges such as performance constraints, high availability, and optimization with open arms. He is a certified MCSD who is passionate about his craft and always game for learning new technologies.PART I: GETTING STARTED WITH .NET 6CHAPTER 1: WELCOME TO MODERN .NETCHAPTER 2: INTRODUCING ASP.NET CORE 6PART II: GRPC FUNDAMENTALSCHAPTER 3 : UNDERSTANDING THE GRPC SPECIFICATIONCHAPTER 4: PROTBUFSCHAPTER 5: CREATING AN ASP.NET CORE GRPC APPLICATIONCHAPTER 6: API VERSIONINGPART III: GRPC AND ASP.NET CORECHAPTER 7: CREATE A GRPC CLIENTCHAPTER 8: FROM WCF TO GRPCCHAPTER 9: IMPORT AND DISPLAY DATA WITH ASP.NET CORE RAZOR PAGES, HOSTED SERVICES, AND GRPCCHAPTER 10: THE GRPC-WEB SPECIFICATIONCHAPTER 11: CREATE A GRPC-WEB SERVICE FROM A GRPC-SERVICE WITH ASP.NET COREPART IV: GRPC-WEB AND ASP.NET CORECHAPTER 12: IMPORT AND DISPLAY DATA WITH ANGULAR 12 AND GRPC-WEBPART V: SECURITYCHAPTER 13: SECURE YOUR APPLICATION WITH OPENID CONNECT

Regulärer Preis: 62,99 €
Produktbild für Untersuchungen zur Datenqualität und Nutzerakzeptanz von Forschungsinformationssystemen

Untersuchungen zur Datenqualität und Nutzerakzeptanz von Forschungsinformationssystemen

In der vorliegenden Arbeit wird die Datenqualität eines Forschungsinformationssystems (FIS) bzw. deren Einfluss auf die Nutzerakzeptanz ganzheitlich untersucht. Otmane Azeroual entwickelt hierfür ein Konzept bzw. ein Framework zur Überwachung und Verbesserung der Datenqualität, um die Akzeptanz des FIS zu erhöhen.Dr.-Ing. Otmane Azeroual arbeitet seit Dezember 2016 als wissenschaftlicher Mitarbeiter und Projektleiter am DZHW. Nach seinem Studium der Wirtschaftsinformatik an der Hochschule für Technik und Wirtschaft Berlin (HTW) schloss er seine Promotion in Ingenieurinformatik bei Prof. Dr. rer. nat. habil. Gunter Saake am Institut für Technische und Betriebliche Informationssysteme (ITI), Arbeitsgruppe Datenbanken & Software Engineering der Otto-von-Guericke Universität Magdeburg. Seine wissenschaftlichen Forschungsgebiete liegen im Bereich Datenbanken und Informationssysteme, Datenqualitätsmanagement, Business Intelligence, Big Data, Open Data und Künstliche Intelligenz.Einleitung.- Konzeptionelle Grundlagen.- Untersuchung der Datenqualität in FIS.- Ermittlung der Nutzerakzeptanz von FIS.- Proof-of-Concept.- Zusammenfassung und Ausblick.

Regulärer Preis: 49,99 €
Produktbild für Praxiswissen Joomla! 4

Praxiswissen Joomla! 4

DAS BEWÄHRTE STANDARDWERK ZU JOOMLA! JETZT AKTUALISIERT AUF VERSION 4 * Alles zu Joomla! 4 von den Grundlagen bis zum Profiwissen * Mit dem durchgehenden Beispielprojekt direkt praktisch einsteigen * Verständliche Schritt-für-Schritt-Anleitungen mit vielen Praxistipps Sie möchten Schritt für Schritt und ohne langwieriges Ausprobieren eine eigene Website mit Joomla! aufsetzen? Dann ist dieser praxisorientierte Leitfaden zur Joomla!-Version 4 genau das Richtige für Sie. Tim Schürmann führt Sie anhand eines Beispielprojekts in den Aufbau und die Pflege eines Webauftritts ein und behandelt dabei das komplette Joomla!-Themenspektrum von den Grundlagen bis hin zum Profiwissen. Sie erfahren, wie Sie Joomla! installieren, Bilder und Texte verwalten, Ihrer Webpräsenz mit Templates ein unverwechselbares Look-and-feel geben und Ihre Website um zusätzliche Funktionen wie einen Kalender, Kommentarmöglichkeiten oder eine eigene Erweiterung ergänzen. Kapitel zu Suchmaschinenoptimierung, Barrierefreiheit und Datenbankpflege runden das Handbuch ab. Es deckt umfassend die in Joomla! enthaltenen Funktionen ab und eignet sich daher sowohl als Einstieg als auch als Nachschlagewerk.

Regulärer Preis: 42,90 €
Produktbild für Pro Active Directory Certificate Services

Pro Active Directory Certificate Services

In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TLS, and S/MIME. It is also important to understand the concepts behind public key infrastructure (PKI). This book teaches you all the required background knowledge you need. Then it takes you deeper, step by step, teaching you how to deploy Certificate Services and configure it to issue various digital certificate types, complete with examples of using these certificates with IIS, Outlook, and Windows.Microsoft-based networks—on-premises, hybrid, and cloud-based networks—are used in companies of all sizes. Within them, there are many applications of digital certificates that can be created and managed by Microsoft Certificate Services. As security is more important than ever, and cryptography and PKI are fundamental to so many of these defenses, understanding Microsoft Certificate Services is becoming an increasingly more desirable skill.Most IT workers don’t realize the many uses and purposes of Certificate Services, especially within a corporate or government agency network, and how tightly integrated they are with the Microsoft Windows Domain style of networks and Active Directory (on-premises or cloud-based, including Azure, AWS, and Google Cloud Services). This book will teach you the gamut.You will appreciate the learning approach presented in the book, beginning with the basics (cryptographic primitives such as encryption and message digests), getting into combinations of primitives to accomplish specific things (such as digital signatures and envelopes), and then trying real-word systems based on digital certificates and PKI (such as TLS, S/MIME secure email, cryptographic authentication, and more). The book wraps it all up and teaches you how to deploy Certificate Services and issue the various types of certificates, including how they are used.WHAT YOU WILL LEARN* Understand basic cryptography (symmetric and asymmetric key encryption, message digests, and digital signatures and envelopes)* Know how TLS, S/MIME, and cryptographic authentication work* Discover applications of cryptography related to secure servers with TLS and cryptographic (passwordless) authentication to online services including Windows and secure email* Get to know the common types of digital certificates, how to create and manage them, and examples of their use with IIS, Outlook, etc. WHO THIS BOOK IS FORMicrosoft system and network engineers, security engineers, and CISOs. Readers should have familiarity with Windows Server 2019 (or more recent) and Active Directory.LAWRENCE E. HUGHES is a renowned expert in cryptography and PKI. He previously worked at VeriSign and co-founded and was CTO at CipherTrust (a secure email proxy appliance). He also was employed at Sixscape Communications in Singapore where he was responsible for creating much of their technology. Lawrence founded the US-based company PKIEdu Inc. (Public Key Infrastructure Education) to conduct training and consulting in the area of PKI. He created and taught the courseware at VeriSign (the first leading company in the PKI space) and presented it internationally to affiliates and large customers. He is a security author and was heavily involved in the deployment of several national certification authorities in the UK, Netherlands, and Australia.PART I: FOUNDATIONS IN CRYPTOGRAPHY, DIGITAL CERTIFICATES AND PKIChapter 1-01 – Basic Cryptography – Symmetric Key EncryptionChapter 1-02 – Basic Cryptography – Hash FunctionChapter 1-03 – Basic Cryptography – Asymmetric Key EncryptionChapter 1-04 – Digital Signature and Digital EnvelopeChapter 1-05 – X.509 Digital CertificateChapter 1-06 – PKCS #10 Certificate Signing Request CSR)Chapter 1-07 – Certificate Revocation and RenewalChapter 1-08 – Key ManagementChapter 1-09 – Certificate Management ProtocolsChapter 1-10 – Public Key Infrastructure (PKI)Chapter 1-11 – SSL and TLSChapter 1-12 – S/MIME Secure EmailPART II: DEPLOYING AND USING ACTIVE DIRECTORY CERTIFICATE SERVICESChapter 2-01 – Chapter 13: Deploy Microsoft Certificate ServicesChapter 2-02 – Chapter 14: Issue and Manage TLS Server CertificatesChapter 2-03 – Chapter 15: Issue and Manage TLS Client CertificatesChapter 2-04 – Chapter 16: Issue and Manage S/MIME Secure E-mail CertificatesChapter 2-05 – Chapter 17: Issue and Manage Windows Logon CertificatesChapter 18: Appendix A: Relevant Standards.

Regulärer Preis: 56,99 €
Produktbild für Microsoft Azure Virtual Desktop Guide

Microsoft Azure Virtual Desktop Guide

Modernize your business to make it more agile using Azure Virtual Desktop (AVD). Azure Virtual Desktop is a cloud desktop virtualization platform that securely delivers virtual desktops and remote apps. This book will help you will help you to understand designing, implementing, configuring, and maintaining an Azure Virtual Desktop environment for enterprise and prepare to take the Microsoft AZ-140 certification exam.The book starts with an introduction to Azure Virtual Desktop and its design architecture. You will learn designing Azure Virtual desktop including user identities and profiles. Additionally, you will learn how to implement network for Azure Virtual desktop. Creation and configuration of host pools and session hosts is covered with all steps so that you can understand all options and select appropriate configuration for enterprise deployment. You will also go through session host images creation process and managing the image with image gallery and possible automation options. Managing access and security in AVD is discussed along with the installation, configuration, and management of FSLogix. The book will take you through user experience settings and show you how to configure apps on a session host. You will also learn about disaster recovery and how to automate AVD management tasks. Monitoring and managing performance is included as well as knowing how to use AVD automation to create and delete the host pool and session host.After reading this book, you will understand all aspects of AVD architecture, its implementation, monitoring, and management in preparation to take the AZ-140 exam.WHAT YOU WILL LEARN* Know what is Azure Virtual Desktop (or AVD)Design the Azure Virtual Desktop architecture for enterprise deployment, user identities, and profiles * Plan and implement networking and storage for Azure Virtual Desktop* Create, manage, and automate operating system images with image gallery* Implement FSLogix Profile Containers and FSLogix Cloud Cache* Create and configure host pools and session hosts (all detailed steps)* Install and configure apps on a session host including all app publish options* Plan and implement business continuity and disaster recovery* Implement and manage OneDrive, Teams for a multi-session environment* Monitor and manage performance and health of Azure Virtual desktopWho This Book Is ForIT professional, Cloud administrators, support personnel, developers, DevOps engineers, architect, or consultant learning about designing, implementing, and managing Azure Virtual Desktop to improve knowledge or clear Microsoft AZ-140 exam.ARUN SABALE is a Microsoft Certified Azure architect and Microsoft Certified Modern Desktop Expert. He has blogged on Azure services and automation, PowerShell, ARM, and Terraform. Arun has more than 12 years of experience with PowerShell automation and other Microsoft services and more than 6 years of experience with Azure infra design, deployment, automation, PowerShell, ARM, Terraform, and Azure DevOps. His current role is a combination of Azure design, development, and automation. Arun is the owner and author of PowershellTalk.com blog and regularly writes about Microsoft products and new services.BALU N. ILAG is a Microsoft Certified Trainer (MCT), former Microsoft MVP (2013-2019), and Microsoft Certified Solution Expert (MCSE) for communication. He has been working as a Unified Communication and Collaboration engineer. His role is a combination of product support and customization, implementation, and strategic guidance for enterprise customers. He is fascinated by artificial intelligence (AI) and machine learning (ML) technology. He regularly writes books, blog posts and articles on Microsoft products. He is highly motivated and engaged with the Microsoft Tech community, writing blog posts on Bloguc.com and regularly in discussion on twitter and LinkedIn.CHAPTER 1: INTRODUCTION TO AZURE VIRTUAL DESKTOPIntroductionWhat is Azure Virtual Desktop?CHAPTER 2: DESIGN THE AZURE VIRTUAL DESKTOP ARCHITECTURE· assess existing physical and virtual desktop environments· assess network capacity and speed requirements for Azure Virtual Desktop· recommend an operating system for an Azure Virtual Desktop implementation· plan and configure name resolution for Active Directory (AD) and Azure Active Directory Domain Services (Azure AD DS)· plan a host pools architecture· recommend resource groups, subscriptions, and management groups· configure a location for the Azure Virtual Desktop metadata· calculate and recommend a configuration for performance requirements· calculate and recommend a configuration for Azure Virtual Machine capacity requirementsCHAPTER 3: DESIGN FOR USER IDENTITIES AND PROFILES· select an appropriate licensing model for Azure Virtual Desktop based on requirements· recommend an appropriate storage solution (including Azure NetApp Files versus Azure Files)· plan for Azure Virtual Desktop client deployment· plan for user profiles· recommend a solution for network connectivity· plan for Azure AD Connect for user identitiesCHAPTER 4: IMPLEMENT AND MANAGE NETWORKING FOR AZURE VIRTUAL DESKTOP· implement Azure virtual network connectivity· manage connectivity to the internet and on-premises networks· implement and manage network security· manage Azure Virtual Desktop session hosts by using Azure Bastion· monitor and troubleshoot network connectivityCHAPTER 5: IMPLEMENT AND MANAGE STORAGE FOR AZURE VIRTUAL DESKTOP· configure storage for FSLogix components· configure storage accounts· configure disks· create file sharesCHAPTER 6: CREATE AND CONFIGURE HOST POOLS AND SESSION HOSTS· create a host pool by using the Azure portal· automate creation of Azure Virtual Desktop host and host pools by using PowerShell, Command-Line Interface (CLI), and Azure Resource Manager templates· create a host pool based on Windows client or Windows Server session hosts· configure host pool settings· manage licensing for session hosts that run Windows client or Windows Server· assign users to host pools· apply OS and application updates to a running Azure Virtual Desktop host· apply security and compliance settings to session hostsCHAPTER 7: CREATE AND MANAGE SESSION HOST IMAGES· create a gold image· modify a session host image· install language packs in Azure Virtual Desktop· deploy a session host by using a custom image· plan for image update and management· create and use a Shared Image Gallery· troubleshoot OS issues related to Azure Virtual DesktopCHAPTER 8: MANAGE ACCESS· plan and implement Azure roles and role-based access control (RBAC) for Azure Virtual Desktop· manage roles, groups and rights assignment on Azure Virtual Desktop session hosts· configure user restrictions by using AD group policies and Azure policiesCHAPTER 9: MANAGE SECURITY· plan and implement Conditional Access policies for connections to Azure Virtual Desktop· plan and implement multifactor authentication in Azure Virtual Desktop· manage security by using Azure Security Center· configure Microsoft Defender Antivirus for session hostsCHAPTER 10: IMPLEMENT AND MANAGE FSLOGIX· plan for FSLogix· install and configure FSLogix· configure Profile Containers· configure Cloud Cache· migrate user profiles to FSLogixCHAPTER 11: CONFIGURE USER EXPERIENCE SETTINGS· configure Universal Print· configure user settings through group policies and Endpoint Manager policies· configure persistent and non-persistent desktop environments· configure Remote Desktop Protocol (RDP) properties on a host pool· configure session timeout properties· troubleshoot user profile issues· troubleshoot Azure Virtual Desktop clientsCHAPTER 12: INSTALL AND CONFIGURE APPS ON A SESSION HOST· configure dynamic application delivery by using MSIX App Attach· implement application masking· deploy an application as a RemoteApp· implement and manage OneDrive for Business for a multi-session environment· implement and manage Microsoft Teams AV Redirect· implement and manage browsers and internet access for Azure Virtual Desktop sessions· create and configure an application group· troubleshoot application issues related to Azure Virtual DesktopCHAPTER 13: PLAN AND IMPLEMENT BUSINESS CONTINUITY AND DISASTER RECOVERY· plan and implement a disaster recovery plan for Azure Virtual Desktop· design a backup strategy for Azure Virtual Desktop· configure backup and restore for FSLogix user profiles, personal virtual desktop infrastructures (VDIs), and golden imagesCHAPTER 14: AUTOMATE AZURE VIRTUAL DESKTOP MANAGEMENT TASKS· configure automation for Azure Virtual Desktop· automate management of host pools, session hosts, and user sessions by using PowerShell and Azure Command-Line Interface (CLI)· implement autoscaling in host poolsCHAPTER 15: MONITOR AND MANAGE PERFORMANCE AND HEALTH· monitor Azure Virtual Desktop by using Azure Monitor· monitor Azure Virtual Desktop by using Azure Advisor· customize Azure Monitor workbooks for Azure Virtual Desktop monitoring· optimize session host capacity and performance· manage active sessions and application groups· monitor and optimize autoscaling resultsCHAPTER 16: AZURE VIRTUAL DESKTOP AUTOMATIONAVD automation for create/delete hostpool / sessionhostAVD pooled advance autoscaling logic to start/stop/add new sessionhost in hostpool automatically based on CPU usage

Regulärer Preis: 66,99 €
Produktbild für CompTIA A+ Complete Practice Tests

CompTIA A+ Complete Practice Tests

IMPROVE YOUR UNDERSTANDING OF ALL CORE 1 AND CORE 2 A+ EXAM OBJECTIVES AND PREPARE FOR A NEW CAREER AS A COMPUTER TECHNICIANThe Third Edition of the CompTIA A+ Complete Practice Tests: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 offers aspiring and practicing computer technicians essential and practical exam prep material for the industry favorite A+ certification. The hundreds of domain-by-domain practice questions cover all of the A+ exam objectives tested on the Core 1 and Core 2 exams, helping you prepare for success on the tests and in the real world. Just like the real exams, the practice questions contained within this resource cover mobile devices, networking, hardware, virtualization and cloud computing, hardware and network troubleshooting, operating systems, security, software troubleshooting, and operational procedures. These rigorous and realistic practice questions will get you ready for your first role as a computer technician and let you hit the ground running. This comprehensive set includes:* Challenging questions designed to advance your understanding and comprehension of all covered exam domains* Questions similar to those found on the real Core 1 and Core 2 A+ exams* Access to the Sybex online test bank, with hundreds of questions and full-length practice examsPerfect for anyone prepping for the Core 1 and Core 2 A+ exams, CompTIA A+ Complete Practice Tests: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 is also an ideal resource for aspiring and early-career computer technicians who want to improve their understanding of some of the foundational concepts they rely on each day in the field. ABOUT THE AUTHORSAUDREY O’SHEA, A+, ITF+, PROJECT +, NETWORK +, SECURITY+, AND OTHER INDUSTRY CERTIFICATIONS, is a professional educator. After a successful career in information technology, she turned to teaching and has taught courses in computer technology, electrical theory and practice for energy workers, general electronics, and other related fields. She holds a variety of computer industry certifications and is a member of the Phi-Kappa-Phi honor society, and active in helping young women prepare for STEM careers. JEFF T. PARKER, CISSP, Project+, CySA+, is a certified technical trainer and consultant specializing in governance, risk management and compliance. Introduction xiPART I COMPTIA A+ CORE 1 EXAM 220- 1101 1Chapter 1 Mobile Devices 3Chapter 2 Networking 29Chapter 3 Hardware 61Chapter 4 Virtualization and Cloud Computing 115Chapter 5 Hardware and Network Troubleshooting 125PART II COMPTIA A+ CORE 2 EXAM 220- 1102 173Chapter 6 Operating Systems 175Chapter 7 Security 237Chapter 8 Software Troubleshooting 281Chapter 9 Operational Procedures 309Chapter 10 Practice Exam 1 (220- 1101) 339Chapter 11 Practice Exam 2 (220- 1102) 361Appendix Answers to the Review Questions 383Chapter 1: Mobile Devices 384Chapter 2: Networking 397Chapter 3: Hardware 417Chapter 4: Virtualization and Cloud Computing 437Chapter 5: Hardware and Network Troubleshooting 442Chapter 6: Operating Systems 466Chapter 7: Security 510Chapter 8: Software Troubleshooting 540Chapter 9: Operational Procedures 558Chapter 10: Practice Exam 1 (220- 1101) 574Chapter 11: Practice Exam 2 (220- 1102) 588Index 603

Regulärer Preis: 27,99 €
Produktbild für The New Advanced Society

The New Advanced Society

THE NEW ADVANCED SOCIETYINCLUDED IN THIS BOOK ARE THE FUNDAMENTALS OF SOCIETY 5.0, ARTIFICIAL INTELLIGENCE, AND THE INDUSTRIAL INTERNET OF THINGS, FEATURING THEIR WORKING PRINCIPLES AND APPLICATION IN DIFFERENT SECTORS.A 360-degree view of the different dimensions of the digital revolution is presented in this book, including the various industries transforming industrial manufacturing, the security and challenges ahead, and the far-reaching implications for society and the economy. The main objective of this edited book is to cover the impact that the new advanced society has on several platforms such as smart manufacturing systems, where artificial intelligence can be integrated with existing systems to make them smart, new business models and strategies, where anything and everything is possible through the internet and cloud, smart food chain systems, where food products can be delivered to any corner of the world at any time and in any situation, smart transport systems in which robots and self-driven cars are taking the lead, advances in security systems to assure people of their privacy and safety, and smart healthcare systems, where biochips can be incorporated into the human body to predict deadly diseases at early stages. Finally, it can be understood that the social reformation of Society 5.0 will lead to a society where every person leads an active and healthy life. AUDIENCEThe targeted audience for this book includes research scholars and industry engineers in artificial intelligence and information technology, engineering students, cybersecurity experts, government research agencies and policymakers, business leaders, and entrepreneurs. SANDEEP KUMAR PANDA, PHD is an associate professor in the Department of Data Science and Artificial Intelligence at IcfaiTech (Faculty of Science and Technology), ICFAI Foundation for Higher Education, Hyderabad. His research areas include artificial intelligence, IoT, blockchain technology, cloud computing, cryptography, computational intelligence, and software engineering. RAMESH KUMAR MOHAPATRA, PHD is an assistant professor in the Department of Computer Science and Engineering, National Institute of Technology, Rourkela, Odisha, India. His research interests include optical character recognition, document image analysis, video processing, secure computing, and machine learning. SUBHRAKANTA PANDA, PHD is an assistant professor in the Department of Computer Science and Information Systems, BITS-PILANI, Hyderabad Campus, Jawahar Nagar, Hyderabad, India. His research interests include social network analysis, cloud computing, security testing, and blockchain. S. BALAMURUGAN, PHD is the Director of Research and Development, Intelligent Research Consultancy Services (iRCS), Coimbatore, Tamilnadu, India. He is also Director of the Albert Einstein Engineering and Research Labs (AEER Labs), as well as Vice-Chairman, Renewable Energy Society of India (RESI), India. He has published 45 books, 200+ international journals/ conferences, and 35 patents. SANDEEP KUMAR PANDA,PHD is an associate professor in the Department of Data Science and Artificial Intelligence at IcfaiTech (Faculty of Science and Technology), ICFAI Foundation for Higher Education, Hyderabad. His research areas include Artificial Intelligence, IoT, Blockchain Technology, Cloud Computing, Cryptography, Computational Intelligence, and Software Engineering.RAMESH KUMAR MOHAPATRA, PHD is an assistant professor in the Department of Computer Science and Engineering, National Institute of Technology, Rourkela, Odisha, India. His research interests include Optical Character Recognition, Document Image Analysis, Video Processing, Secure Computing, Machine Learning.SUBHRAKANTA PANDA,PHD is an assistant professor in the department of Computer Science and Information Systems, BITS-PILANI, Hyderabad Campus, Jawahar Nagar, Shameerpet Mandal, Hyderabad, INDIA. His research interests include Social Network Analysis, Cloud Computing, Security Testing, Blockchain.S. BALAMURUGAN, PHD is the Director of Research and Development, Intelligent Research Consultancy Services (iRCS), Coimbatore, Tamilnadu, India. He is also Director of the Albert Einstein Engineering and Research Labs (AEER Labs), as well as Vice-Chairman, Renewable Energy Society of India (RESI), India. He has published 45 books, 200+ international journals/ conferences, and 35 patents.Preface xviiAcknowledgments xxiii1 POST PANDEMIC: THE NEW ADVANCED SOCIETY 1Sujata Priyambada Dash1.1 Introduction 11.1.1 Themes 21.1.1.1 Theme: Areas of Management 21.1.1.2 Theme: Financial Institutions Cyber Crime 31.1.1.3 Theme: Economic Notion 41.1.1.4 Theme: Human Depression 61.1.1.5 Theme: Migrant Labor 71.1.1.6 Theme: Digital Transformation (DT) of Educational Institutions 91.1.1.7 School and Colleges Closures 111.2 Conclusions 12References 122 DISTRIBUTED LEDGER TECHNOLOGY IN THE CONSTRUCTION INDUSTRY USING CORDA 15Sandeep Kumar Panda, Shanmukhi Priya Daliyet, Shagun S. Lokre and Vihas Naman2.1 Introduction 162.2 Prerequisites 162.2.1 DLT vs Blockchain 172.3 Key Points of Corda 182.3.1 Some Salient Features of Corda 202.3.2 States 202.3.3 Contract 222.3.3.1 Create and Assign Task (CAT) Contract 222.3.3.2 Request for Cash (RT) Contract 232.3.3.3 Transfer of Cash (TT) Contract 242.3.3.4 Updation of the Task (UOT) Contract 242.3.4 Flows 252.3.4.1 Flow Associated With CAT Contract 252.3.4.2 Flow Associated With RT Contract 262.3.4.3 Flow Associated With TT Contract 262.3.4.4 Flow Associated With UOT Contract 262.4 Implementation 262.4.1 System Overview 272.4.2 Working Flowchart 282.4.3 Experimental Demonstration 292.5 Future Work 352.6 Conclusion 36References 373 IDENTITY AND ACCESS MANAGEMENT FOR INTERNET OF THINGS CLOUD 43Soumya Prakash Otta and Subhrakanta Panda3.1 Introduction 443.2 Internet of Things (IoT) Security 453.2.1 IoT Security Overview 453.2.2 IoT Security Requirements 463.2.3 Securing the IoT Infrastructure 493.3 IoT Cloud 493.3.1 Cloudification of IoT 503.3.2 Commercial IoT Clouds 523.3.3 IAM of IoT Clouds 543.4 IoT Cloud Related Developments 553.5 Proposed Method for IoT Cloud IAM 583.5.1 Distributed Ledger Approach for IoT Security 593.5.2 Blockchain for IoT Security Solution 603.5.3 Proposed Distributed Ledger-Based IoT Cloud IAM 623.6 Conclusion 64References 654 AUTOMATED TSR USING DNN APPROACH FOR INTELLIGENT VEHICLES 67Banhi Sanyal, Piyush R. Biswal, R.K. Mohapatra, Ratnakar Dash and Ankush Agarwalla4.1 Introduction 684.2 Literature Survey 694.3 Neural Network (NN) 704.4 Methodology 714.4.1 System Architecture 714.4.2 Database 714.5 Experiments and Results 714.5.1 FFNN 744.5.2 RNN 764.5.3 CNN 764.5.4 CNN 764.5.5 Pre-Trained Models 794.6 Discussion 794.7 Conclusion 80References 885 HONEYPOT: A TRAP FOR ATTACKERS 91Anjanna Matta, G. Sucharitha, Bandlamudi Greeshmanjali, Manji Prashanth Kumar and Mathi Naga Sarath Kumar5.1 Introduction 925.1.1 Research Honeypots 935.1.2 Production Honeypots 935.2 Method 945.2.1 Low-Interaction Honeypots 945.2.2 Medium-Interaction Honeypots 955.2.3 High-Interaction Honeypots 955.3 Cryptanalysis 965.3.1 System Architecture 965.3.2 Possible Attacks on Honeypot 975.3.3 Advantages of Honeypots 985.3.4 Disadvantages of Honeypots 995.4 Conclusions 99References 1006 EXAMINING SECURITY ASPECT IN INDUSTRIAL-BASED INTERNET OF THINGS 103Rohini Jha6.1 Introduction 1046.2 Process Frame of IoT Before Security 1056.2.1 Cyber Attack 1076.2.2 Security Assessment in IoT 1076.2.2.1 Security in Perception and Network Frame 1086.3 Attacks and Security Assessments in IIoT 1116.3.1 IoT Security Techniques Analysis Based on its Merits 1116.4 Conclusion 116References 1197 A COOPERATIVE NAVIGATION FOR MULTI-ROBOTS IN UNKNOWN ENVIRONMENTS USING HYBRID JAYA-DE ALGORITHM 123D. Chandrasekhar Rao7.1 Introduction 1247.2 Related Works 1267.3 Problem Formulation 1307.4 Multi-Robot Navigation Employing Hybrid Jaya-DE Algorithm 1347.4.1 Basic Jaya Algorithm 1347.5 Hybrid Jaya-DE 1367.5.1 Mutation 1367.5.2 Crossover 1367.5.3 Selection 1377.6 Simulation Analysis and Performance Evaluation of Jaya-DE Algorithm 1397.7 Total Navigation Path Deviation (TNPD) 1477.8 Average Unexplored Goal Distance (AUGD) 1487.9 Conclusion 159References 1598 CATEGORIZATION MODEL FOR PARKINSON’S DISEASE OCCURRENCE AND SEVERITY PREDICTION 163Prashant Kumar Shrivastava, Ashish Chaturvedi, Megha Kamble and Megha Jain8.1 Introduction 1648.2 Applications 1668.2.1 Machine Learning in PD Diagnosis 1668.2.2 Challenges of PD Detection 1698.2.3 Structuring of UPDRS Score 1708.3 Methodology 1738.3.1 Overview of Data Driven Intelligence 1738.3.2 Comparison Between Deep Learning and Traditional Machine 1758.3.3 Deep Learning for PD Diagnosis 1768.3.4 Convolution Neural Network for PD Diagnosis 1768.4 Proposed Models 1788.4.1 Classification of Patient and Healthy Controls 1788.4.2 Severity Score Classification 1818.5 Results and Discussion 1848.5.1 Performance Measures 1858.5.2 Graphical Results 1878.6 Conclusion 187References 1879 AI-BASED SMART AGRICULTURE MONITORING USING GROUND-BASED AND REMOTELY SENSED IMAGES 191Shounak Chakraborty, Nikumani Choudhury and Indrajit Kalita9.1 Introduction 1929.2 Automatic Land-Cover Classification Techniques Using Remotely Sensed Images 1949.3 Deep Learning-Based Agriculture Monitoring 1969.4 Adaptive Approaches for Multi-Modal Classification 1979.4.1 Unsupervised DA 1999.4.2 Semi-Supervised DA 2009.4.3 Active Learning-Based DA 2019.5 System Model 2029.6 IEEE 802.15.4 2049.6.1 802.15.4 MAC 2049.6.2 DSME MAC 2059.6.3 TSCH MAC 2069.7 Analysis of IEEE 802.15.4 for Smart Agriculture 2079.7.1 Effect of Device Specification 2079.7.1.1 Low-Power 2089.7.2 Effect of MAC Protocols 2089.8 Experimental Results 2099.9 Conclusion & Future Directions 212References 21210 CAR BUYING CRITERIA EVALUATION USING MACHINE LEARNING APPROACH 223Samdeep Kumar Panda10.1 Introduction 22410.2 Literature Survey 22510.3 Proposed Method 22610.4 Dataset 22710.5 Exploratory Data Analysis 22710.6 Splitting of Data Into Training Data and Test Data 23010.7 Pre-Processing 23210.8 Training of Our Models 23210.8.1 Gaussian Naïve Bayes 23310.8.2 Decision Tree Classifier 23410.8.3 Tuning the Model 23510.8.4 Karnough Nearest Neighbor Classifier 23610.8.5 Tuning the Model 23710.8.6 Neural Network 23810.8.7 Tuning the Model 23910.9 Result Analysis 24010.9.1 Confusion Matrix 24010.9.2 Gaussian Naïve Bayes 24110.9.3 Decision Tree Classifier 24210.9.4 Karnough Nearest Neighbor Classifier 24210.9.5 Neural Network 24210.9.6 Accuracy Scores 24310.10 Conclusion and Future Work 244References 24411 BIG DATA, ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING: A PARADIGM SHIFT IN ELECTION CAMPAIGNS 247Md. Safiullah and Neha Parveen11.1 Introduction 24811.2 Big Data Reveals the Voters’ Preference 24911.2.1 Use of Software Applications in Election Campaigns 25111.2.1.1 Team Joe App 25211.2.1.2 Trump 2020 25211.2.1.3 Modi App 25311.3 Deep Fakes and Election Campaigns 25411.3.1 Deep Fake in Delhi Elections 25411.4 Social Media Bots 25611.5 Future of Artificial Intelligence and Machine Learning in Election Campaigns 259References 25912 IMPACT OF OPTIMIZED SEGMENT ROUTING IN SOFTWARE DEFINED NETWORK 263Amrutanshu Panigrahi, Bibhuprasad Sahu, Satya Sobhan Panigrahi, Ajay Kumar Jena and Md. Sahil Khan12.1 Introduction 26412.2 Software-Defined Network 26612.3 SDN Architecture 26812.4 Segment Routing 27012.5 Segment Routing in SDN 27212.6 Traffic Engineering in SDN 27412.7 Segment Routing Protocol 27512.8 Simulation and Result 27712.9 Conclusion and Future Work 278References 28313 AN INVESTIGATION INTO COVID-19 PANDEMIC IN INDIA 289Shubhangi V. Urkude, Vijaykumar R. Urkude, S. Vairachilai and Sandeep Kumar Panda13.1 Introduction 28913.1.1 Symptoms of COVID-19 29213.1.2 Precautionary Measures 29213.1.3 Ways of Spreading the Coronavirus 29413.2 Literature Survey 29513.3 Technologies Used to Fight COVID-19 29613.3.1 Robots 29613.3.2 Drone Technology 29713.3.3 Crowd Surveillance 29713.3.4 Spraying the Disinfectant 29813.3.5 Sanitizing the Contaminated Areas 29813.3.6 Monitoring Temperature Using Thermal Camera 29813.3.7 Delivering the Essential Things 29813.3.8 Public Announcement in the Infected Areas 29813.4 Impact of COVID-19 on Business 29913.4.1 Impact on Financial Markets 29913.4.2 Impact on Supply Side 29913.4.3 Impact on Demand Side 30013.4.4 Impact on International Trade 30013.5 Impact of COVID-19 on Indian Economy 30013.6 Data and Result Analysis 30013.7 Conclusion and Future Scope 304References 30414 SKIN CANCER CLASSIFICATION: ANALYSIS OF DIFFERENT CNN MODELS VIA CLASSIFICATION ACCURACY 307Poonam Biswal, Monali Saha, Nishtha Jaiswal and Minakhi Rout14.1 Introduction 30714.2 Literature Survey 30814.3 Methodology 31014.3.1 Dataset Preparation 31014.3.2 Dataset Loading and Data Pre-Processing 31114.3.3 Creating Models 31214.4 Models Used 31214.5 Simulation Results 31314.5.1 Changing Size of MaxPool2D(n,n) 31414.5.2 Changing Size of AveragePool2D(n,n) 31414.5.3 Changing Number of con2d(32n–64n) Layers 31514.5.4 Changing Number of con2d-32*n Layers 31514.5.5 ROC Curves and MSE Curves 31814.6 Conclusion 321References 32115 ROUTE MAPPING OF MULTIPLE HUMANOID ROBOTS USING FIREFLY-BASED ARTIFICIAL POTENTIAL FIELD ALGORITHM IN A CLUTTERED TERRAIN 323Abhishek Kumar Kashyap, Anish Pandey and Dayal R. Parhi15.1 Introduction 32415.2 Design of Proposed Algorithm 32815.2.1 Mechanism of Artificial Potential Field 32815.2.1.1 Potential Field Generated by Attractive Force of Goal 32915.2.1.2 Potential Field Generated by Repulsive Force of Obstacle 33115.2.2 Mechanism of Firefly Algorithm 33215.2.2.1 Architecture of Optimization Problem Based on Firefly Algorithm 33515.2.3 Dining Philosopher Controller 33715.3 Hybridization Process of Proposed Algorithm 33915.4 Execution of Proposed Algorithm in Multiple Humanoid Robots 33915.5 Comparison 34415.6 Conclusion 346References 34616 INNOVATIVE PRACTICES IN EDUCATION SYSTEMS USING ARTIFICIAL INTELLIGENCE FOR ADVANCED SOCIETY 351Vinutha D.C., Kavyashree S., Vijay C.P. and G.T. Raju16.1 Introduction 35216.2 Literature Survey 35316.2.1 AI in Auto-Grading 35416.2.2 AI in Smart Content 35616.2.3 AI in Auto Analysis on Student’s Grade 35616.2.4 AI Extends Free Intelligent Tutoring 35716.2.5 AI in Predicting Student Admission and Drop-Out Rate 35916.3 Proposed System 35916.3.1 Data Collection Module 36016.3.2 Data Pre-Processing Module 36416.3.3 Clustering Module 36416.3.4 Partner Selection Module 36616.4 Results 36816.5 Future Enhancements 37016.6 Conclusion 370References 37117 PSO-BASED HYBRID WEIGHTED K-NEAREST NEIGHBOR ALGORITHM FOR WORKLOAD PREDICTION IN CLOUD INFRASTRUCTURES 373N. Yamuna, J. Antony Vijay and B. Gomathi17.1 Introduction 37417.2 Literature Survey 37517.2.1 Machine Learning 37817.3 Proposed System 37917.3.1 Load Aware Cloud Computing Model 37917.3.2 Wavelet Neural Network 37917.3.3 Evaluation Using LOOCV Model 38017.3.4 k-Nearest Neighbor (k-NN) Algorithm 38117.3.5 Particle Swarm Optimization (PSO) Algorithm 38217.3.6 HWkNN Optimization Algorithm Based on PSO 38317.3.7 PSO-Based HWkNN (PHWkNN) Load Prediction Algorithm 38417.4 Experimental Results 38517.5 Conclusion 390References 39118 AN EXTENSIVE SURVEY ON THE PREDICTION OF BANKRUPTCY 395Sasmita Manjari Nayak and Minakhi Rout18.1 Introduction 39518.2 Literature Survey 39718.2.1 Data Pre-Processing 39718.2.1.1 Balancing of Imbalanced Dataset 39718.2.1.2 Outlier Data Handling 41018.2.2 Classifiers 41818.2.3 Ensemble Models 42218.3 System Architecture and Simulation Results 43818.4 Conclusion 438References 44319 FUTURE OF INDIAN AGRICULTURE USING AI AND MACHINE LEARNING TOOLS AND TECHNIQUES 447Manoj Kumar, Pratibha Maurya and Rinki Verma19.1 Introduction 44819.2 Overview of AI and Machine Learning 45019.3 Review of Literature 45219.4 Application of AI & Machine Learning in Agriculture 45619.5 Current Scenario and Emerging Trends of AI and ML in Indian Agriculture Sector 46019.6 Opportunities for Agricultural Operations in India 46519.7 Conclusion 466References 467Index 473

Regulärer Preis: 190,99 €
Produktbild für CompTIA Data+ Study Guide

CompTIA Data+ Study Guide

BUILD A SOLID FOUNDATION IN DATA ANALYSIS SKILLS AND PURSUE A COVETED DATA+ CERTIFICATION WITH THIS INTUITIVE STUDY GUIDECompTIA Data+ Study Guide: Exam DA0-001 delivers easily accessible and actionable instruction for achieving data analysis competencies required for the job and on the CompTIA Data+ certification exam. You'll learn to collect, analyze, and report on various types of commonly used data, transforming raw data into usable information for stakeholders and decision makers.With comprehensive coverage of data concepts and environments, data mining, data analysis, visualization, and data governance, quality, and controls, this Study Guide offers:* All the information necessary to succeed on the exam for a widely accepted, entry-level credential that unlocks lucrative new data analytics and data science career opportunities* 100% coverage of objectives for the NEW CompTIA Data+ exam* Access to the Sybex online learning resources, with review questions, full-length practice exam, hundreds of electronic flashcards, and a glossary of key termsIdeal for anyone seeking a new career in data analysis, to improve their current data science skills, or hoping to achieve the coveted CompTIA Data+ certification credential, CompTIA Data+ Study Guide: Exam DA0-001 provides an invaluable head start to beginning or accelerating a career as an in-demand data analyst.ABOUT THE AUTHORSMIKE CHAPPLE, PHD, is Teaching Professor of IT, Analytics, and Operations at the University of Notre Dame. He’s a technology professional and educator with over 20 years of experience. Mike provides certification resources at his website, CertMike.com. SHARIF NIJIM is Assistant Teaching Professor of IT, Analytics, and Operations in the Mendoza College of Business at the University of Notre Dame. He teaches undergraduate and graduate courses on cloud computing, business analytics, and information technology. Introduction xvAssessment Test xxiiCHAPTER 1 TODAY’S DATA ANALYST 1Welcome to the World of Analytics 2Data 2Storage 3Computing Power 4Careers in Analytics 5The Analytics Process 6Data Acquisition 7Cleaning and Manipulation 7Analysis 8Visualization 8Reporting and Communication 8Analytics Techniques 10Descriptive Analytics 10Predictive Analytics 11Prescriptive Analytics 11Machine Learning, Artificial Intelligence, and Deep Learning 11Data Governance 13Analytics Tools 13Summary 15CHAPTER 2 UNDERSTANDING DATA 17Exploring Data Types 18Structured Data Types 20Unstructured Data Types 31Categories of Data 36Common Data Structures 39Structured Data 39Unstructured Data 41Semi-structuredData 42Common File Formats 42Text Files 42JavaScript Object Notation 44Extensible Markup Language (XML) 45HyperText Markup Language (HTML) 47Summary 48Exam Essentials 49Review Questions 51CHAPTER 3 DATABASES AND DATA ACQUISITION 57Exploring Databases 58The Relational Model 59Relational Databases 62Nonrelational Databases 68Database Use Cases 71Online Transactional Processing 71Online Analytical Processing 74Schema Concepts 75Data Acquisition Concepts 81Integration 81Data Collection Methods 83Working with Data 88Data Manipulation 89Query Optimization 96Summary 99Exam Essentials 100Review Questions 101CHAPTER 4 DATA QUALITY 105Data Quality Challenges 106Duplicate Data 106Redundant Data 107Missing Values 110Invalid Data 111Nonparametric data 112Data Outliers 113Specification Mismatch 114Data Type Validation 114Data Manipulation Techniques 116Recoding Data 116Derived Variables 117Data Merge 118Data Blending 119Concatenation 121Data Append 121Imputation 122Reduction 124Aggregation 126Transposition 127Normalization 128Parsing/String Manipulation 130Managing Data Quality 132Circumstances to Check for Quality 132Automated Validation 136Data Quality Dimensions 136Data Quality Rules and Metrics 140Methods to Validate Quality 142Summary 144Exam Essentials 145Review Questions 146CHAPTER 5 DATA ANALYSIS AND STATISTICS 151Fundamentals of Statistics 152Descriptive Statistics 155Measures of Frequency 155Measures of Central Tendency 160Measures of Dispersion 164Measures of Position 173Inferential Statistics 175Confidence Intervals 175Hypothesis Testing 179Simple Linear Regression 186Analysis Techniques 190Determine Type of Analysis 190Types of Analysis 191Exploratory Data Analysis 192Summary 192Exam Essentials 194Review Questions 196CHAPTER 6 DATA ANALYTICS TOOLS 201Spreadsheets 202Microsoft Excel 203Programming Languages 205R 205Python 206Structured Query Language (SQL) 208Statistics Packages 209IBM SPSS 210SAS 211Stata 211Minitab 212Machine Learning 212IBM SPSS Modeler 213RapidMiner 214Analytics Suites 217IBM Cognos 217Power BI 218MicroStrategy 219Domo 220Datorama 221AWS QuickSight 222Tableau 222Qlik 224BusinessObjects 225Summary 225Exam Essentials 225Review Questions 227CHAPTER 7 DATA VISUALIZATION WITH REPORTS AND DASHBOARDS 231Understanding Business Requirements 232Understanding Report Design Elements 235Report Cover Page 236Executive Summary 237Design Elements 239Documentation Elements 244Understanding Dashboard Development Methods 247Consumer Types 247Data Source Considerations 248Data Type Considerations 249Development Process 250Delivery Considerations 250Operational Considerations 252Exploring Visualization Types 252Charts 252Maps 258Waterfall 264Infographic 266Word Cloud 267Comparing Report Types 268Static and Dynamic 268Ad Hoc 269Self-Service (On-Demand) 269Recurring Reports 269Tactical and Research 270Summary 271Exam Essentials 272Review Questions 274CHAPTER 8 DATA GOVERNANCE 279Data Governance Concepts 280Data Governance Roles 281Access Requirements 281Security Requirements 286Storage Environment Requirements 289Use Requirements 291Entity Relationship Requirements 292Data Classification Requirements 292Jurisdiction Requirements 297Breach Reporting Requirements 298Understanding Master Data Management 299Processes 300Circumstances 301Summary 303Exam Essentials 304Review Questions 306APPENDIX ANSWERS TO THE REVIEW QUESTIONS 311Chapter 2: Understanding Data 312Chapter 3: Databases and Data Acquisition 314Chapter 4: Data Quality 315Chapter 5: Data Analysis and Statistics 317Chapter 6: Data Analytics Tools 319Chapter 7: Data Visualization with Reports and Dashboards 322Chapter 8: Data Governance 323Index 327

Regulärer Preis: 38,99 €
Produktbild für Windows 10 für Senioren - aktualisierte Neuauflage

Windows 10 für Senioren - aktualisierte Neuauflage

Der Lernkurs für Einsteiger ohne Vorkenntnisse:- Alles zu Internet, E-Mails, Dateien, Fotos, Musik und Sicherheit auf über 400 Seiten- Von Dozenten Schritt für Schritt erklärt – leicht verständlich und gut nachvollziehbar- Große Schrift, praktisches Querformat und komplett in Farbe- Aufgebaut wie ein Kurs, mit vielen Bildern, Beispielen, Praxistipps und HilfenDieses Buch bietet nicht nur Senioren, sondern allen Neu-Anwendern einen umfassenden Einstieg in die Benutzung von Windows 10. Schritt für Schritt werden alle wichtigen Techniken zur Bedienung von PC, Laptop und Tablet erklärt. Mit anschaulichen Beispielen und Bildern lernen Sie die wichtigsten Windows-Apps wie z.B. Kontakte, Mail, Fotosoder den Internet-Browser Microsoft Edge kennen und verstehen. Alle Anleitungen sind gut nachvollziehbar erklärt, Computervorkenntnisse sind nicht erforderlich. Dank dem praktischen Querformat legen Sie das Buch vor Ihre Tastatur, beginnen direkt zu üben und können sich über schnelle Lernerfolge freuen! Zur besseren Lesbarkeit wurde eine große Schrift verwendet. Das Buch eignet sich für das Selbststudium bzw. begleitend zum Unterricht.Aus dem Inhalt:- Einstellungen und erster Start von Windows 10- Apps finden, starten und beenden- Die wichtigsten Einstellungen vornehmen und Programme installieren- Bildschirmanzeige vergrößern- Das Internet einrichten- Einen Brief schreiben, gestalten und ausdrucken- Dateien speichern und Ordnung halten- Im Internet surfen und E-Mails versenden- Wetter checken – Reisen buchen – Bewertungen ansehen u. v. m.- Sicherheit im Netz- Kontakte organisieren- Termine im Kalender eintragen    - Fotos auf den Computer übertragen, ansehen und bearbeiten- Videos ansehen und Musik hören- Tipps & Tricks zur Problemlösung- Glossar mit ausführlicher Begriffserklärung

Regulärer Preis: 14,99 €
Produktbild für CompTIA A+ Complete Study Guide

CompTIA A+ Complete Study Guide

The Fifth Edition of the CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 offers accessible and essential test preparation material for the popular A+ certification. Providing full coverage of all A+ exam objectives and competencies covered on the latest Core 1 and Core 2 exams, the book ensures you'll have the skills and knowledge to confidently succeed on the test and in the field as a new or early-career computer technician. The book presents material on mobile devices, hardware, networking, virtualization and cloud computing, network, hardware, and software troubleshooting, operating systems, security, and operational procedures. Comprehensive discussions of all areas covered by the exams will give you a head start as you begin your career as a computer technician. This new edition also offers:* Accessible and easy-to-follow organization perfect to prepare you for one of the most popular certification exams on the market today* Opportunities to practice skills that are in extraordinary demand in the IT industry* Access to the Sybex online test bank, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key termsPerfect for anyone prepping for the Core 1 and Core 2 A+ exams, CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 is a must-have resource for new and early-career computer technicians seeking to improve their skills and increase their efficacy in the field. ABOUT THE AUTHORSQUENTIN DOCTER, A+, Network+, IT Fundamentals+, Cloud Essentials+, is an IT consultant who started in the industry in 1994 working in tech support for Packard Bell. Since then, he’s worked as a tech and network support specialist, trainer, consultant, and webmaster. During his career, he has achieved certifications from CompTIA, Microsoft, Cisco, Novell, and Sun Microsystems. He has written over a dozen books for Sybex, including the CompTIA IT Fundamentals+ Study Guide and the CompTIA Cloud Essentials+ Study Guide.JON BUHAGIAR, A+, Network+, is an information technology professional with two decades of experience in higher education. During the past 22 years he has been responsible for Network Operations at Pittsburgh Technical College and lead several projects, including virtualization (server and desktop), VoIP, Microsoft 365, and many other projects supporting the quality of education at the college. He has achieved several certifications from CompTIA, Cisco, and Microsoft, and taught many of the certification paths. He is the author of several books, including Sybex’s CompTIA Network+ Review Guide.Introduction xxviiAssessment Test lxxxiiPART I 220- 1101 1CHAPTER 1 MOTHERBOARDS, PROCESSORS, AND MEMORY 3Understanding Motherboards 7Motherboard Form Factors 7System Board Components 10Understanding Processors 42CPU Architecture 43CPU Characteristics 45Understanding Memory 49Important Memory Terms 50Types of Memory 54Memory Packaging 59Understanding Cooling Systems 63Fans 63Memory Cooling 66Hard Drive Cooling 67Chipset Cooling 67CPU Cooling 67Summary 71Exam Essentials 71Review Questions 73Performance-Based Question 1 77Performance-Based Question 2 78CHAPTER 2 EXPANSION CARDS, STORAGE DEVICES, AND POWER SUPPLIES 79Installing and Configuring Expansion Cards 81Video 82Multimedia 83Network Interface Card 85Input/Output 87Adapter Configuration 88Understanding Storage Devices 89Hard Disk Drive Systems 90Solid- State Drives 96Raid 104Removable Storage and Media 107Installing, Removing, and Configuring Storage Devices 114Understanding Power Supplies 118Power Supply Input 119Power Supply Output and Ratings 120Power Connectors 121Modular Power Supplies 125Redundant Power Supplies 126Replacing Power Supplies 129AC Adapters as Power Supplies 130Summary 131Exam Essentials 131Review Questions 133Performance-Based Question 137CHAPTER 3 PERIPHERALS, CABLES, AND CONNECTORS 139Understanding Cables and Connectors 140Video Devices 141Audio Devices 154Input and Output Devices 156Storage Devices 159Understanding Cables and Connectors 160Peripheral Cables and Connectors 160Serial Ports 169Video Cables and Connectors 170Hard Drive Cables and Connectors 178Summary 184Exam Essentials 185Review Questions 186Performance-Based Question 190CHAPTER 4 PRINTERS AND MULTIFUNCTION DEVICES 191Understanding Print Technologies and Imaging Processes 193Impact Printers 194Inkjet Printers 196Laser Printers 205Thermal Printers 2173D Printers 218Installing and Maintaining Printers 223Printer Interface Components 224Installing and Sharing Local Printers 229Installing and Sharing Networked Printers 241Performing Printer Maintenance 251Installing Printer Upgrades 257Summary 262Exam Essentials 262Review Questions 264Performance-Based Question 268CHAPTER 5 NETWORKING FUNDAMENTALS 269Understanding Networking Principles 271Network Types 272Primary Network Components 279Network Operating Systems 283Network Resource Access 283Network Topologies 286Rules of Communication 290Identifying Common Network Hardware 295Network Interface Cards 295Cables and Connectors 299Networking Components 314Summary 324Exam Essentials 324Review Questions 327Performance-Based Question 331CHAPTER 6 INTRODUCTION TO TCP/IP 333Understanding TCP/IP 335TCP/IP Structure 336Understanding IP Addressing 346Understanding DHCP and DNS 356IPv6 365Understanding Virtual Networks 368Virtual Local Area Networks 368Virtual Private Networks 370Summary 372Exam Essentials 372Review Questions 374Performance-Based Question 378CHAPTER 7 WIRELESS AND SOHO NETWORKS 379Understanding Wireless Networking Technologies 381802.11 Networking Standards 382Bluetooth Networking 393Long- Range Fixed Wireless 396Radio Frequency Networking Standards 398Installing and Configuring SOHO Networks 402Keys to Planning a Network 402Choosing an Internet Connection 404Choosing Internal Network Connections 418Installing the Network Infrastructure 422Configuring Wireless Routers and Access Points 433Summary 449Exam Essentials 449Review Questions 451Performance-Based Question 455CHAPTER 8 NETWORK SERVICES, VIRTUALIZATION, AND CLOUD COMPUTING 457Understanding Network Services 459Server Roles 460Internet Appliances 473Legacy/Embedded Systems 480Internet of Things Devices 482Understanding Virtualization and Cloud Computing 487Concepts of Cloud Computing 488Concepts of Virtualization 499Summary 515Exam Essentials 516Review Questions 518Performance-Based Question 522CHAPTER 9 LAPTOP AND MOBILE DEVICE HARDWARE 523Working with Laptop and Mobile Device Hardware 526Understanding the Differences between Device Types 526Disassembling and Reassembling Laptops 531Installing and Configuring Laptop Hardware 535Setting Up and Configuring Accessories and Ports 580Summary 584Exam Essentials 585Review Questions 586Performance-Based Question 590CHAPTER 10 MOBILE CONNECTIVITY AND APPLICATION SUPPORT 591Understanding Mobile Connectivity 593Understanding Cellular Networking Standards 595Using Cellular Data Connections 597Establishing Wi- Fi Connectivity 608Establishing Bluetooth Connectivity 622Understanding Mobile App Support 635Understanding Location Services 635Understanding Mobile Device and App Management 641Configuring Mobile Device Synchronization 654Syncing Android Devices 666Summary 668Exam Essentials 668Review Questions 670Performance-Based Question 674CHAPTER 11 TROUBLESHOOTING METHODOLOGY AND RESOLVING CORE HARDWARE PROBLEMS 675Using the Troubleshooting Best Practice Methodology 678Step 1: Identify the Problem 678Step 2: Establish a Theory 683Step 3: Test the Theory 684Step 4: Establish a Plan of Action 687Step 5: Verify Functionality 688Step 6: Document Findings 689Troubleshooting Motherboards, CPUs, RAM, and Power Problems 690Identifying General Hardware Symptoms and Causes 691Identifying BIOS/UEFI and POST Routine Problems 696Identifying Motherboard and CPU Problems 700Identifying Memory Issues 702Identifying Power Supply Problems 705Summary 708Exam Essentials 709Review Questions 711Performance-Based Question 715CHAPTER 12 HARDWARE AND NETWORK TROUBLESHOOTING 717Troubleshooting Storage Drives and RAID Arrays 721Lights and Sounds 722Devices Not Found 723Performance Issues 724S.M.A.R.T. Diagnostics 725RAID Issues 729Optical Drive Issues 730Troubleshooting Video, Projector, and Display Issues 731Video Input Issues 731Video Image Problems 732Other Display Issues 735Troubleshooting Common Mobile Device Issues 737Power and Heat Issues 738Input Problems 741Connectivity Issues 743Physical Damage and Malware 748Troubleshooting Printer Problems 751Impact Printer Problems 752Inkjet Printer Problems 755Laser Printer Problems 759Managing Print Jobs 772Troubleshooting Networking Problems 779Using Network Troubleshooting Tools 779Resolving Connectivity Issues 799Summary 806Exam Essentials 806Review Questions 809Performance-Based Question 813PART II 220- 1102 815CHAPTER 13 OPERATING SYSTEM BASICS 817Understanding Operating Systems 819Operating System Terms and Concepts 821Operating Systems 823Minimum System Requirements 828Understanding Applications 830System Requirements for Applications 830Application Installation 832Security Considerations 835Other Considerations for New Applications 835INTRODUCTION TO WINDOWS 10 836Windows Editions 836Windows Features 840The Windows Interface 851What’s in a Window? 864File Management 867Preparing for the Exam 871Summary 872Exam Essentials 872Review Questions 874Performance- Based Question 878CHAPTER 14 WINDOWS CONFIGURATION 879Interacting with Operating Systems 882Task Manager 882Microsoft Management Console 888Additional Tools 899Control Panel 905Windows Settings 937The Windows Registry 960Disk Management 962Getting Disks Ready to Store Files and Programs 963Checking the Health of Hard Disks and Optimizing Their Performance 969Summary 970Exam Essentials 970Review Questions 972Performance- Based Question 976CHAPTER 15 WINDOWS ADMINISTRATION 977Installing and Upgrading Windows 980Windows Installation Options 982The Installation Process 984The Upgrade Process 1002Repair Installation 1006Recovery Partition 1007Side- by- Side Upgrading Windows 10/11 1007Image Deployment 1008Upgrading Editions of Windows 1008Security and Feature Updates 1008Installation/Upgrade Boot Options 1011Considerations 1012Command- Line Tools 1013Networking in Windows 1030Networking Models 1030User Authentication 1034Establishing a Network Connection 1036Accessing Resources 1041Firewall Settings 1044Client Network Configuration 1046Summary 1050Exam Essentials 1050Review Questions 1052Performance- Based Question 1056CHAPTER 16 WORKING WITH MACOS AND LINUX 1057macOS and Linux 1060Applications on macOS 1061Installing Applications from the App Store 1061Installing Downloadable Applications 1062Managing Applications 1064Creating Shortcuts 1065Best Practices 1065Scheduled Backups 1065Scheduled Disk Maintenance 1068System Updates/App Store 1068Patch Management 1069Driver/Firmware Updates 1070Antivirus/Antimalware Updates 1071Tools 1071System Preferences 1073Features 1082Basic Linux Commands 1087Understanding the Syntax of Shell Commands 1088Discovering and Using Linux Commands 1089Becoming root (Super User) 1091Maintaining the Operating System 1092Managing Processes 1095Directory Navigation 1097Directory Listings 1098Changing Permissions and Ownership 1099Working with Files 1100Working with Directories 1103Networking Utilities 1104Getting Help 1106Linux and Windows 1106Summary 1108Exam Essentials 1109Review Questions 1110Performance- Based Question 1114CHAPTER 17 SECURITY CONCEPTS 1115Physical Security Concepts 1121Access Control Vestibule 1121Badge Reader 1122Video Surveillance 1122Motion Sensors 1123Alarm System 1124Door Locks 1124Equipment Locks 1125Security Guards 1127Fences 1127Bollards 1128Physical Security for Staff 1128Key Fobs 1129Smartcards and RFID Badges 1129Keys 1130Biometrics 1131Lighting 1132Magnetometers 1132Logical Security 1132Principle of Least Privilege 1133Access Control Lists 1133Authentication Factors 1135Multifactor Authentication 1135Mobile Device Management (MDM) 1137Active Directory 1138Malware 1143Ransomware 1144Trojans 1144Keyloggers 1145Rootkits 1145Spyware 1145Cryptominers 1146Viruses 1146Virus Transmission in a Network 1150Botnets 1151Worms 1151Mitigating Software Threats 1151Antivirus 1152Antimalware 1153Recovery Console 1154End- User Education 1154Software Firewalls 1156Reinstalling the OS 1158Social Engineering Attacks, Threats, and Vulnerabilities 1159Phishing 1160Shoulder Surfing 1161Tailgating 1161Impersonation 1162Dumpster Diving 1162Evil Twin 1162Common Security Threats 1163Denial- of- Service Attacks 1163Zero- Day Attacks 1165Spoofing Attacks 1166On- Path Attack (Previously Known as Man- in- the- Middle Attack) 1167Password Attacks 1167Insider Threat 1168SQL Injection 1169Cross- Site Scripting (XSS) 1169Exploits and Vulnerabilities 1170Noncompliant Systems 1170Patching and Updates 1170Operating Systems Life Cycle 1171Unprotected Systems 1171Byod 1171Security Best Practices 1172Data Encryption 1172Setting Strong Passwords 1173Requiring Passwords 1174Password Expiration 1175End- User Best Practices 1176Account Management 1177Disable AutoRun 1181Destruction and Disposal Methods 1183Recycling or Repurposing Best Practices 1183Physical Destruction 1185Summary 1187Exam Essentials 1187Review Questions 1190Performance- Based Question 1194CHAPTER 18 SECURING OPERATING SYSTEMS 1195Working with Windows OS Security Settings 1199Users and Groups 1199User Authentication 1203NTFS vs. Share Permissions 1208Shared Files and Folders 1215System Files and Folders 1218Windows Security Features 1220Web Browser Security 1228Browser Download and Installation 1228Extensions and Plug- ins 1230Credentials Managers 1232Secure Data Transfers 1233Settings 1234Securing a SOHO Network (Wireless) 1239Changing Default Usernames and Passwords 1240Changing the SSID 1240Guest Network Isolation 1240Setting Encryption 1241Disabling SSID Broadcast 1242Wireless MAC Filtering 1242Frequencies 1243Radio Power Levels 1244Antenna and Access Point Placement 1245Assign Static IP Addresses 1245WPS 1246Authentication 1246Securing a SOHO Network (Wired) 1247Changing Default Credentials 1247Upgrading Firmware 1248Filtering 1248DHCP 1252Physical Security 1252Mobile Device Security 1253Screen Locks 1254Remote Wipes and Locator Applications 1256Remote Backup 1258Failed Login Attempts Restrictions 1258Viruses and Malware on Mobile Devices 1259Operating System Updates 1260Full- Device Encryption 1260Multifactor Authentication 1260Authenticator Applications 1261Firewalls 1261Policies and Procedures 1261IoT Considerations 1263Summary 1263Exam Essentials 1264Review Questions 1265Performance-Based Question 1269CHAPTER 19 TROUBLESHOOTING OPERATING SYSTEMS AND SECURITY 1271Troubleshooting Common Microsoft Windows OS Problems 1275Common Symptoms 1275Common Troubleshooting Steps 1297Troubleshooting Security Issues 1309Common Symptoms 1310Browser- Related Symptoms 1315Best Practices for Malware Removal 13181. Identify and Verify Malware Symptoms 13182. Quarantine Infected Systems 13193. Disable System Restore in Windows 13204. Remediate Infected Systems 13215. Schedule Scans and Run Updates 13236. Enable System Restore and Create a Restore Point in Windows 13247. Educate the End User 1325Troubleshooting Mobile OS Issues 1325Application Problems 1325Performance Issues 1327OS Fails to Update 1329Extremely Short Battery Life 1330Connectivity Issues 1331Autorotate Issues 1334Troubleshooting Mobile Security Issues 1335Security Concerns 1336Common Symptoms 1338Summary 1341Exam Essentials 1342Review Questions 1343Performance- Based Question 1346CHAPTER 20 SCRIPTING AND REMOTE ACCESS 1347Scripting 1349Scripting Basics 1351Scripting Languages 1355Scripting Use Cases 1366Script Considerations 1373Remote Access 1375Remote Desktop Protocol 1375Virtual Private Network (VPN) 1376Virtual Network Computing 1379Telnet 1379Secure Shell 1380Remote Monitoring and Management 1381Remote Access Tools 1382Security Considerations 1387Summary 1387Exam Essentials 1388Review Questions 1389Performance- Based Question 1392CHAPTER 21 SAFETY AND ENVIRONMENTAL CONCERNS 1393Understanding Safety Procedures 1395Identifying Potential Safety Hazards 1395Creating a Safe Workplace 1407Understanding Environmental Controls 1417Managing the Physical Environment 1418Handling and Disposing of Computer Equipment 1424Understanding Policies, Licensing, and Privacy 1433Dealing with Prohibited Content/Activity 1434Incident Response 1435Managing Software Licenses 1440Managing Sensitive Information 1443Summary 1446Exam Essentials 1446Review Questions 1448Performance-Based Question 1452CHAPTER 22 DOCUMENTATION AND PROFESSIONALISM 1453Documentation and Support 1457Ticketing Systems 1458Asset Management 1462Common Documentation 1466Knowledge Base/Articles 1475Change Management Best Practices 1476Disaster Prevention and Recovery 1482Data Backups 1483Battery Backup/UPS 1489Power Generators 1490Surge Protection 1491Account Recovery Options 1492Demonstrating Professionalism 1494Professional Appearance 1495Communicating with Customers 1496Using Appropriate Behavior 1500Putting It All in Perspective 1507Summary 1508Exam Essentials 1508Review Questions 1510Performance- Based Question 1514Appendix A Answers to the Review Questions 1515Chapter 1: Motherboards, Processors, and Memory 1516Chapter 2: Expansion Cards, Storage Devices, and Power Supplies 1518Chapter 3: Peripherals, Cables, and Connectors 1520Chapter 4: Printers and Multifunction Devices 1521Chapter 5: Networking Fundamentals 1523Chapter 6: Introduction to TCP/IP 1525Chapter 7: Wireless and SOHO Networks 1527Chapter 8: Network Services, Virtualization, and Cloud Computing 1529Chapter 9: Laptop and Mobile Device Hardware 1531Chapter 10: Mobile Connectivity and Application Support 1533Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems 1535Chapter 12: Hardware and Network Troubleshooting 1537Chapter 13: Operating System Basics 1539Chapter 14: Windows Configuration 1540Chapter 15: Windows Administration 1543Chapter 16: Working with macOS and Linux 1545Chapter 17: Security Concepts 1547Chapter 18: Securing Operating Systems 1549Chapter 19: Troubleshooting Operating Systems and Security 1551Chapter 20: Scripting and Remote Access 1554Chapter 21: Safety and Environmental Concerns 1556Chapter 22: Documentation and Professionalism 1558Appendix B Answers to Performance- Based Questions 1561Chapter 1: Motherboards, Processors, and Memory 1562Chapter 2: Expansion Cards, Storage Devices, and Power Supplies 1563Chapter 3: Peripherals, Cables, and Connectors 1563Chapter 4: Printers and Multifunction Devices 1564Chapter 5: Networking Fundamentals 1565Chapter 6: Introduction to TCP/IP 1566Chapter 7: Wireless and SOHO Networks 1566Chapter 8: Network Services, Virtualization, and Cloud Computing 1567Chapter 9: Laptop and Mobile Device Hardware 1568Chapter 10: Mobile Connectivity and Application Support 1568Chapter 11: Troubleshooting Methodology and Resolving Core Hardware Problems 1569Chapter 12: Hardware and Network Troubleshooting 1569Chapter 13: Operating System Basics 1570Chapter 14: Windows Configuration 1570Chapter 15: Windows Administration 1571Chapter 16: Working with macOS and Linux 1575Chapter 17: Security Concepts 1577Chapter 18: Securing Operating Systems 1577Chapter 19: Troubleshooting Operating Systems and Security 1578Chapter 20: Scripting and Remote Access 1578Chapter 21: Safety and Environmental Concerns 1579Chapter 22: Documentation and Professionalism 1579Index 1581Exercise 2.1 Removing an Internal Storage Device 115Exercise 2.2 Installing an Internal Storage Device 116Exercise 2.3 Removing a Power Supply 130Exercise 3.1 Changing the Refresh Rate in Windows 10 143Exercise 3.2 Changing the Settings for Multiple Monitors 148Exercise 4.1 Identifying the Parts of an Inkjet Printer 203Exercise 4.2 Installing a USB Printer in Windows 10 239Exercise 4.3 Installing a TCP/IP Printer in Windows 10 242Exercise 4.4 Determining if Bonjour Is Installed in Windows 244Exercise 4.5 Scanning a Document to Google Drive 250Exercise 4.6 Using an Inkjet Cleaning Solution 255Exercise 4.7 Installing Memory into a Laser Printer 258Exercise 5.1 Pricing Network Cables 313Exercise 7.1 The Cost of Networking 422Exercise 7.2 Installing an Internal NIC in Windows 10 422Exercise 8.1 Configuring Windows 10 to Use a Proxy Server 477Exercise 8.2 Using Google’s Cloud Services 497Exercise 8.3 Enabling Hyper- V in Windows 10 503Exercise 8.4 Installing VirtualBox and Lubuntu on Windows 10 508Exercise 9.1 Removing Speakers from a Laptop 536Exercise 9.2 Removing the Display Assembly 544Exercise 9.3 Removing the Display Panel 546Exercise 9.4 Removing the Motherboard from a Laptop 549Exercise 9.5 Replacing Laptop Memory 553Exercise 9.6 Removing an M 2 SSD from a Laptop 557Exercise 9.7 Removing a Laptop Keyboard 560Exercise 9.8 Disabling a Touchpad in Windows 10 563Exercise 9.9 Removing an Internal Laptop Battery 568Exercise 9.10 Removing the System Fan 572Exercise 9.11 Removing the CPU Heat Sink 573Exercise 9.12 Removing the Wireless NIC 574Exercise 9.13 Removing the CMOS Battery 575Exercise 9.14 Flashing the System BIOS 576Exercise 10.1 Connecting an iPhone to a Wi- Fi Network 609Exercise 10.2 Connecting an Android Phone to a Wi- Fi Network 611Exercise 10.3 Disabling Cellular Use for Data Networking on an iPhone 614Exercise 10.4 Disabling Cellular Use for Data Networking in Android OS 616Exercise 10.5 Setting Up a VPN in Android 619Exercise 10.6 Pairing an Android Device with a Windows Laptop 623Exercise 10.7 Pairing an iPhone with a Vehicle’s Sound System 632Exercise 10.8 Configuring Location Services in iOS 638Exercise 10.9 Email Account Configuration on an iPhone 645Exercise 10.10 Email Account Configuration in Android 648Exercise 10.11 Enabling ActiveSync in iOS 658Exercise 11.1 Troubleshooting Practice 707Exercise 12.1 Using a S M A R T Software Utility in Windows 729Exercise 12.2 Stopping and Restarting the Print Spooler in Windows 10 775Exercise 12.3 Renewing an IP Address in Windows 10 787Exercise 12.4 Renewing an IP Address from the Command Line 789Exercise 12.5 Using the net share Command in Windows 795Exercise 13.1 Changing a Screen Saver in Windows 854Exercise 13.2 Auto- Hiding the Taskbar 856Exercise 13.3 Starting a Program from the Run Window 859Exercise 14.1 Working with Task Manager 887Exercise 14.2 Working with Performance Monitor 896Exercise 14.3 Changing the Time Zone 908Exercise 14.4 Showing Hidden Files and Folders 913Exercise 15.1 Command- Line Directory Management 1015Exercise 15.2 Running chkdsk within Windows 1025Exercise 15.3 Running chkdsk at the Command Line 1026Exercise 16.1 Installing Applications on macOS 1063Exercise 16.2 Uninstalling Applications on macOS 1065Exercise 16.3 Working with Files 1103Exercise 17.1 Testing Your Antimalware 1153Exercise 17.2 Testing Social Engineering 1160Exercise 18.1 Examining a Security Token 1207Exercise 18.2 Examining File Permissions 1214Exercise 18.3 Working with File Hashes 1230Exercise 18.4 Setting the Passcode Lock on an iPhone 1255Exercise 18.5 Setting the Passcode Lock on an Android Phone 1255Exercise 19.1 Reviewing Reliability Monitor 1288Exercise 19.2 Manually Creating a Restore Point in Windows 1304Exercise 20.1 Creating and Running a Windows Batch Script 1356Exercise 20.2 Creating Your First PowerShell Script 1360Exercise 21.1 Finding Trip Hazards 1413Exercise 21.2 Finding MSDSs 1425Exercise 22.1 Understanding Punctuality 1501Exercise 22.2 Surprise Someone 1505

Regulärer Preis: 39,99 €
Produktbild für IT-Sicherheit für Dummies

IT-Sicherheit für Dummies

IT-SICHERHEITSICHERHEIT IN DER INFORMATIONSTECHNIKMüssen Sie eine Prüfung zur Informationssicherheit ablegen oder wollen Sie eine Berufslaufbahn in der Informationssicherheit einschlagen? Dieses Buch ist drei Bücher in einem: Es beschreibt für Studierende, Datenschutzbeauftragte und IT-Administratoren gleichermaßen die regulatorischen Vorgaben in Deutschland und der EU. Es geht auf die verschiedenen organisatorischen Aspekte von Informationssicherheit im Unternehmen ein und liefert Ihnen darüber hinaus auch das technische Grundlagenwissen. Die Inhalte werden so präsentiert, dass sie im Wesentlichen ohne spezielles Vorwissen verständlich sind. SIE ERFAHREN* Welche rechtlichen Vorgaben es gibt* Wie Sie IT-Sicherheit im Unternehmen organisieren* Wie Ihnen Verschlüsselung, biometrische Verfahren, Chipkarten und Secure Hardware Token helfen* Wie Sie Daten und Netzwerke sinnvoll absichernMACH DICH SCHLAU:WWW.FUER-DUMMIES.DE PROF. DR. RAINER W. GERLING war Datenschutz- und IT-Sicherheitsbeauftragter der Max-Planck-Gesellschaft.DR.-ING. SEBASTIAN R. GERLING ist Chief Digital Officer der Universität Hamburg und Berater für IT-Sicherheit. Beide schreiben und veröffentlichen zum Thema »Datenschutz und IT-Sicherheit«. Über die Autoren 7EINLEITUNG19Über dieses Buch 19Törichte Annahmen über den Leser 19Was Sie nicht lesen müssen 20Wie dieses Buch aufgebaut ist 20Teil I: Informationssicherheit, IT-Sicherheit und Datenschutz 20Teil II: Rechtliche Anforderungen 21Teil III: Organisation der Informationssicherheit 21Teil IV: Bausteine der technischen IT-Sicherheit 22Teil V: Lösungen und Umsetzungen 22Teil VI: Der Top-Ten-Teil 22Symbole, die in diesem Buch verwendet werden 23Konventionen in diesem Buch 23Wie es weitergeht 24TEIL I: INFORMATIONSSICHERHEIT, IT-SICHERHEIT UND DATENSCHUTZ 25KAPITEL 1: IRRTÜMER UND HÄUFIGE FEHLER27Internet-Sicherheit 27Mobile und Cloud-Sicherheit 29Endgerätesicherheit 31E-Mail-Sicherheit 32KAPITEL 2: GRUNDLAGEN DER INFORMATIONSSICHERHEIT35Was ist Informationssicherheit? 35Was ist IT-Sicherheit? 35Was ist Cybersicherheit? 38Klassische Schutzziele der Informationssicherheit 39Verfügbarkeit 39Integrität 41Vertraulichkeit 42Authentizität 42Verantwortlichkeit 42Benutzbarkeit 43Weitere Schutzziele 44KAPITEL 3: BAUSTEINE DER INFORMATIONSSICHERHEIT 47Risikomanagement 48Meldepflichten bei Vorfällen 51Einhaltung von Sicherheitsstandards 54Nachweis der Einhaltung durch Audits 55KAPITEL 4: DATENSCHUTZ UND TECHNISCH-ORGANISATORISCHE MAẞNAHMEN59TEIL II: RECHTLICHE ANFORDERUNGEN 63KAPITEL 5: DIE DS-GVO UND DAS BDSG65Die acht Gebote des Datenschutzes (BDSG a F.) 65Stand der Technik 67Implementierungskosten 70Gewährleistungsziele des Datenschutzes 73KAPITEL 6: GESETZE ZUR IT-SICHERHEIT75NIS-Richtlinie (EU) 75Rechtsakt zur Cybersicherheit (EU) 77eIDAS-Verordnung (EU) 79Single-Digital-Gateway-(SDG-)Verordnung (EU) 81BSI-Gesetz (D) 81BSI-Kritisverordnung (D) 85Geschäftsgeheimnisgesetz (D) 86Onlinezugangsgesetz (D) 87Sozialgesetzbuch V (D) 88TKG, TMG und TTDSG (D) 92KAPITEL 7: ISO-NORMEN95ISO/IEC 270xx Informationssicherheit 96Anforderungsnormen 98Leitfäden 100ISO/IEC 27701 Datenschutz 102KAPITEL 8: BSI UND GRUNDSCHUTZ105IT-Grundschutz 105BSI-Standards 106IT-Grundschutz-Kompendium 108Standard-Datenschutzmodell und IT-Grundschutz 113Technische Richtlinien des BSI 115KAPITEL 9: WEITERE STANDARDS119Prozessorientierte Standards 119VdS 10000: ISMS für KMU 120ISIS12 wird CISIS12 122TISAX 122Finanzstandards 123Vorgaben für die öffentliche Verwaltung 124Technikorientierte Standards 125Common Criteria 125PCI-DSS 127FIPS 129ITIL 130KAPITEL 10: TECHNISCH-ORGANISATORISCHE MAẞNAHMEN (TOM)131Vertraulichkeit 131Zutrittskontrolle, physische und umgebungsbezogene Sicherheit 132Zugangskontrolle, Zugangssteuerung 133Zugriffskontrolle 134[Trennungskontrolle], Nichtverkettbarkeit 135Pseudonymisierung 137Verschlüsselung, Kryptografie 139Integrität 141Eingabekontrolle 141Digitale Signatur, Hashfunktionen 142Weitergabekontrolle, Kommunikationssicherheit 143Löschkontrolle (»Recht auf Vergessen werden«) 144Verfügbarkeit und Belastbarkeit 145Verfügbarkeitskontrolle und Informationssicherheitsaspektebeim Business Continuity Management 146Auftragskontrolle, Lieferantenbeziehungen 147Überprüfung, Bewertung und Evaluierung der Wirksamkeit der TOM 149TEIL III: ORGANISATION DER INFORMATIONSSICHERHEIT 153KAPITEL 11: ORGANISATION IM UNTERNEHMEN155Verantwortung für die Informationssicherheit 155Organisatorische Strukturen 155Geschäftsleitung 156Chief Information Officer/Chief Digital Officer 156Informationssicherheitsbeauftragter 156IT-Leitung 157Computer Emergency Response Team (CERT) 158Informationssicherheitsausschuss 159Richtlinien und Regeln 159KAPITEL 12: DER DEMING-KREIS (PDCA) UND DIE STÄNDIGE VERBESSERUNG163KAPITEL 13: RISIKOANALYSE UND KRONJUWELEN 165Klassifizierung der Daten 165Klassifizierung der Systeme 166Bedrohungsanalyse 168Metriken und Bewertung 169KAPITEL 14: GRUNDLEGENDE DOKUMENTATION171Asset- und Konfigurationsmanagement 174Nutzermanagement und Zugriffskontrolle 180KAPITEL 15: MELDEPFLICHTEN UND VORFALLSMANAGEMENT185Datenschutzvorfälle 185IT-Sicherheitsvorfälle 187Angriffserkennung 189Security Information and Event Management (SIEM) 190Dokumentation von Vorfällen und Forensik 191Sharing von Threat-Informationen 192KAPITEL 16: AWARENESS UND BESCHÄFTIGTE 197TEIL IV: BAUSTEINE DER TECHNISCHEN IT-SICHERHEIT 201KAPITEL 17: GRUNDLAGEN DER VERSCHLÜSSELUNG203Symmetrische Verschlüsselung 208Betriebsarten der Blockverschlüsselung 210Asymmetrische Verschlüsselung 214Diffie-Hellman-Merkle-Schlüsselaustausch 214Das RSA-Verfahren 215Hybride Verschlüsselung 220Hashfunktionen 221Digitale und elektronische Signaturen 225Elliptische-Kurven-Kryptografie 227DLIES und ECIES 229Vertrauensmodelle 229Persönlicher Kontakt 232Zertifizierungsstellen 233Web of Trust 235Trust on First Use 237Kryptograpische Forschung 237Homomorphe Verschlüsselung 238Post-Quantenkryptografie 240KAPITEL 18: BIOMETRIE243Hautleisten 246Venenmuster 247Iris-Scan 247Gesichtserkennung 247KAPITEL 19: CHIPKARTEN UND SECURE HARDWARE TOKEN249Einmalpasswort-Token 252TEIL V: LÖSUNGEN UND UMSETZUNGEN 255KAPITEL 20: BACKUP & CO 257Datensicherung 258Kontrollfragen 261Aufbewahrungspflichten 262Archivierung 263Redundanz 264KAPITEL 21: NETZWERKSICHERHEIT267Grundlagen 269Sicherheitserweiterungen von Netzwerkprotokollen 270DNS, Anwendungsschicht 270HTTPS, SMTPS, Anwendungsschicht 272TCP und UDP, Transportschicht 272IP und IPsec, Netzwerkschicht 276ARP und 802.1X, Verbindungsschicht 277Netzwerkzugang 278Netzwerksegmentierung 280Denial-of-Service-Angriffe 281Anonymisierung in Netzwerken 283Funknetze 284WLAN 284Bluetooth 286NFC, RFID 288Das sichere Internet der Zukunft 290KAPITEL 22: FIREWALLS291Grundlagen von Firewalls 291Packet Filter 294Stateful Inspection Firewall 294Network Address Translation (NAT) 295Proxy-Server und Application Layer Firewall 296NG Firewall und Deep Packet Inspection 297Firewall in der Cloud 298KAPITEL 23: VERSCHLÜSSELUNG IM EINSATZ 301Daten in Ruhe 301Datenträgerverschlüsselung 304Partitionsverschlüsselung 307Containerverschlüsselung 307Dateiverschlüsselung 308Daten in Bewegung 309Transportverschlüsselung 309E-Mail-Verschlüsselung 311Virtuelle private Netzwerke (VPN) 311KAPITEL 24: MONITORING 319Metriken der IT-Sicherheit 319Angriffserkennungssysteme 322Angriffserkennungssysteme (netzwerkbasiert) 323Angriffserkennungssysteme (hostbasiert) 324Managed Security 325Schadsoftware 326Abwehrstrategien 327Analyse von Schadsoftware 328KAPITEL 25: PATCH MANAGEMENT331KAPITEL 26: ZUGANGSSICHERUNG UND AUTHENTISIERUNG335Passwörter im Unternehmen 335Zwei-Faktor-Authentisierung 338Biometrie 339Single Sign-on 340KAPITEL 27: ANWENDUNGSSICHERHEIT343Chat 343E-Mail 344Verschlüsselung 345Allgemeine Sicherheit 346Videokonferenzen 347Multipoint Control Unit 347Selective Forwarding Unit 348Peer to Peer 348Webanwendungen 349Datenbanken 351Cloud 352Speichern in der Cloud 353Verarbeiten in der Cloud 353Blockchain 354Künstliche Intelligenz 356TEIL VI: DER TOP-TEN-TEIL 359KAPITEL 28: ZEHN MAẞNAHMEN FÜR DEN TECHNISCHEN BASISSCHUTZ361Backup 361Schutz vor Schadsoftware 361Netzwerkschutz 361Firewall 362Patch-Management 362Verschlüsselt speichern 362Verschlüsselt kommunizieren 362Passwort-Management 362Biometrie und Zwei-Faktor-Authentifikation 362Spam-Abwehr 363KAPITEL 29: ZEHN MAẞNAHMEN FÜR DEN ORGANISATORISCHEN ÜBERBAU365Übernahme der Verantwortung 365Leitlinie zur Informationssicherheit 365Richtlinien zur Informationssicherheit 365Definition und Besetzung der Rollen 366Definition der fundamentalen Prozesse 366Risikobetrachtung 366Klassifizierung der Daten und Systeme 366Awareness 366Krisenmanagement 366Regelmäßige Überprüfung 367Literaturverzeichnis 369Abbildungsverzeichnis 373Stichwortverzeichnis 379

Regulärer Preis: 20,99 €
Produktbild für R 4 Quick Syntax Reference

R 4 Quick Syntax Reference

This handy reference book detailing the intricacies of R covers version 4.x features, including numerous and significant changes to syntax, strings, reference counting, grid units, and more.Starting with the basic structure of R, the book takes you on a journey through the terminology used in R and the syntax required to make R work. You will find looking up the correct form for an expression quick and easy. Some of the new material includes information on RStudio, S4 syntax, working with character strings, and an example using the Twitter API.With a copy of the R 4 Quick Syntax Reference in hand, you will find that you are able to use the multitude of functions available in R and are even able to write your own functions to explore and analyze data.WHAT YOU WILL LEARN* Discover the modes and classes of R objects and how to use them* Use both packaged and user-created functions in R* Import/export data and create new data objects in R* Create descriptive functions and manipulate objects in R* Take advantage of flow control and conditional statements* Work with packages such as base, stats, and graphicsWHO THIS BOOK IS FORThose with programming experience, either new to R, or those with at least some exposure to R but who are new to the latest version. Margot Tollefson is a self-employed consulting statistician residing in the tiny town of Stratford in the corn and soybean fields of north-central Iowa. She started using the S-Plus language in the early 1990s and was happy to switch to R about ten years ago. Margot enjoys writing her own functions in R - to do plots and simulations, as well as to implement custom modeling and use published statistical methods. She earned her graduate degrees in statistics from Iowa State University in Ames, Iowa.Part 1: R Basics1. Downloading R and Setting Up a File System2. The R Prompt3. Assignments and OperatorsPart 2: Kinds of Objects4. Modes of Objects5. Classes of ObjectsPart 3: Functions6. Packaged Functions7. User Created Functions8. How to Use a FunctionPart 4: I/O and Manipulating Objects9. Importing/Creating Data10. Exporting from R11. Descriptive Functions and Manipulating ObjectsPart 5: Flow control12. Flow Control13. Examples of Flow Control14. The Functions ifelse() and switch()Part 6: Some Common Functions, Packages and Techniques15. Some Common Functions16. The Packages base, stats and graphics17. The Tricks of the Trade

Regulärer Preis: 56,99 €
Produktbild für Kubernetes Native Development

Kubernetes Native Development

Building applications for Kubernetes is both a challenge and an opportunity—a challenge because the options and complexity to develop for Kubernetes are evolving rapidly, an opportunity because, if done right, your applications will go into production quicker, scale easier, and run smoother.This book outlines the impact of Containers and Kubernetes on modern software development and discusses the application frameworks to pick from, how to design an application, and how to develop for and on Kubernetes. You are guided through the application life cycle: development, build, and deployment into the runtime phase. In each phase, you see how it ties to Kubernetes and how to leverage its manifold capabilities. Applications will be more lightweight, easier to maintain, and simpler to operate by just focusing on the business logic.This book provides a strong technical foundation in modern software development and operations. Practical examples show you how to apply the concepts and teach you the full potential of Kubernetes.WHAT YOU WILL LEARN* Get hands-on experience developing, building, and deploying software to Kubernetes* Develop your software to get the best out of Kubernetes* Focus on business logic while leveraging Kubernetes services* Design application components of different granularity from application server-based services to lightweight services* Automate deployments and Day 2 operationsWho This Book Is ForDevelopers who want to close the gap between development and the production environment in order to gain high delivery performance in terms of throughput and stability. This book also targets application operations and DevOps engineers.BENJAMIN SCHMELING is an IT professional with more than 15 years of experience in developing, building, and deploying Java-based software. Today, he works as a solution architect for Red Hat, with a passion for the design and implementation of cloud-native applications running on Kubernetes-based container platforms.MAXIMILIAN DARGATZ has been working in the IT industry for more than 10 years and consults clients on their journey to modernize applications for containers and Kubernetes. He currently works for IBM as a solution architect, working with large German clients on their cloud adoption and how to apply DevOps concepts.Chapter 1: The Impact of Kubernetes on developmentChapter Goal: Understand the foundations of Kubernetes and how it disrupted development and operationsNo of pages 30Sub -Topics* Introduction to Kubernetes* Services provided by Kubernetes (Infrastructure, Cluster, Application, Developer)* Why change development behaviour?* How Kubernetes and DevOps fit togetherChapter 2: Application Design DecisionsChapter Goal: Discuss various design decisions before you start with developmentNo of pages: 40Sub - Topics* Domain Driven Design* Microservices * Choosing the right programming platform (Quarkus, Javascript, Go … (Python :) * Application Deployment Models (App Server, Modular App Server, e.g. Galleon, Bootable Jar, Serverless, Function as a Service)Chapter 3: Developing on and with KubernetesChapter Goal: Learn different development models and optionsNo of pages : 50Sub - Topics:* Local Development, Build and Testing * Hybrid Models (local coding / remote build / remote test, local coding / local build / remote test)* Coding on KubernetesChapter 4: Writing Kubernetes-native ApplicationsChapter Goal: Explain how to leverage Kubernetes API, Resources, CRDsNo of pages: 20Sub - Topics:1. Using the Kubernetes API to make the application control the infrastructure2. Create Custom Resource Definitions to interact with the application3. Use Custom Resource Definitions to store application dataChapter 5: Kubernetes-native CI/CDNo of pages: 30Chapter Goal: How to Leverage Kubernetes for Build (pipelines)* Staging environments * Container Builds * Kubernetes Build Pipelines * Continuous Deployment * GitOpsChapter 6: Reproducible Deployments and Operations to KubernetesNo of pages: 30Chapter Goal: Show different ways of packaging and deploying applications and separating environment-specific configuration* HELM* What are Operators?* Writing your own Operator* Configuration ManagementChapter 7: Running Distributed ApplicationsNo of pages: 30Chapter Goal: Explain the different runtime aspects and how to use application service to shift technical responsibilities to the platform* Composing applications from services* Databases* Leveraging platform services to purify business logic (Service Mesh, Prometheus, EFK)* Kubernetes-native Middleware Chapter 8: Managing the Application LifecycleNo of pages: 20Chapter Goal: Illustrate how to scale an application, release new features, manage traffic and make services more resilient in a distributed environment.* Scaling your application* Serverless / Function as a Service* Canary Releases, Blue/Green Deployment, Dark Releases, A/B Testing* Improving robustness and resiliency

Regulärer Preis: 56,99 €
Produktbild für Teach Yourself VISUALLY MacBook Pro & MacBook Air

Teach Yourself VISUALLY MacBook Pro & MacBook Air

GET UP TO SPEED WITH YOUR NEW MACBOOK PRO OR MACBOOK AIR FASTER THAN YOU THOUGHT POSSIBLEIn Teach Yourself VISUALLY: MacBook Pro & MacBook Air, technology educator extraordinaire and bestselling author Guy Hart-Davis delivers a highly illustrated and easy-to-follow guide to using your MacBook Pro or MacBook Air with macOS Monterey. In the book, you’ll get up and running quickly whether you’re brand new to computers or just transitioning from an older Mac or a PC. With the graphics-driven approach used successfully by tens of thousands of readers of the Teach Yourself VISUALLY series, you see exactly what each step of instruction should look like on your own screen and can follow—step-by-step—through the installation process, file management, email, and messaging, and much more. You’ll also:* Become expert with the latest macOS version—Monterey—and the newest features that enable you to make the most of your MacBook and the Internet* Learn exactly how to handle the most common and useful everyday tasks you need to get stuff done* Glean valuable customization tips to make your MacBook work just the way you preferTeach Yourself VISUALLY: MacBook Pro & MacBook Air skips confusing tech jargon in favor of clear pictures, simple instructions, and stepwise guidance that will give you a flying start to using your new MacBook, regardless of your experience level. CHAPTER 1 GETTING STARTED WITH YOUR MACBOOKUnderstanding the MacBook Pro and MacBook Air 4Set Up Your MacBook 8Start Your MacBook and Log In 12Explore the macOS Desktop 14Point and Click with the Trackpad 18Connect to a Wireless Network 20Give Commands 22Open, Close, and Manage Windows 24Using Control Center 26Using Notifications 28Put Your MacBook to Sleep and Wake It Up 30Log Out, Shut Down, and Resume 32CHAPTER 2 CONFIGURING YOUR MACBOOKChange the Desktop Background 36Set Up a Screen Saver 38Configure Battery and Sleep Settings 40Customize the Dock 42Configure the Menu Bar and Control Center 44Add or Remove Desktop Spaces 46Create Hot Corners to Control Screen Display 48Make the Screen Easier to See 50Configure the Appearance, Accent, and Highlight 54Configure the Keyboard 56Configure the Trackpad or Other Pointing Device 58Configure iCloud Settings 60Add a Second Display 62Using an Apple TV and HDTV as an Extra Display 64Using an iPad as an Extra Display and Input Device 66Connect External Devices 68Explore Other Important Settings 70CHAPTER 3 SHARING YOUR MACBOOK WITH OTHERSCreate a User Account 74Configure Your MacBook for Multiple Users 76Share Your MacBook with Fast User Switching 78Set Up Family Sharing 80Turn On Screen Time and Set Downtime 84Set Time Limits for Apps and Websites 86Make Apps Always Available to a User 88Apply Content and Privacy Restrictions 90Review a User’s Actions 96CHAPTER 4 RUNNING APPSOpen an App and Quit It 100Install an App from the App Store 102Install an App from a Third‐Party Source 104Run an App Full Screen 106Set Apps to Run Automatically at Login 108Using Split View 110Switch Quickly Among Apps 112Switch Apps Using Mission Control 114Set Up Dictation and Spoken Content 116Using Dictation and Spoken Content 118Configure and Invoke Siri 120Perform Tasks with Siri 122Remove Apps 124Identify Problem Apps 126Force a Crashed App to Quit 128Revert to an Earlier Version of a Document 130CHAPTER 5 MANAGING YOUR FILES AND FOLDERSUnderstanding Where to Store Files 134Using the Finder’s Views 136Work with Finder Tabs 138View a File with Quick Look 140Organize Your Desktop Files with Stacks 142Search for a File or Folder 144Control Which Folders Spotlight Searches 146Create a New Folder 148Rename a File or Folder 149Copy a File 150Move a File 152View the Information About a File or Folder 154Organize Your Files with Tags 156Work with Zip Files 158Using the Trash 160Customize the Finder Toolbar 162Customize the Sidebar 164Configure Finder Preferences 166CHAPTER 6 SURFING THE WEBOpen Safari and Customize Your Start Page 170Open a Web Page 172Follow a Link to a Web Page 173Open Several Web Pages at Once 174Navigate Among Web Pages 176Return to a Recently Visited Page 178Play Music and Videos on the Web 180Set Your Home Page and Search Engine 182Create Bookmarks for Web Pages 184Using Reader View and Reading List 186Organize Safari Tabs into Tab Groups 188Download a File 190Configure Safari for Security and Privacy 192CHAPTER 7 SENDING AND RECEIVING E-MAILSet Up Your E‐Mail Accounts 198Send an E‐Mail Message 200Receive and Read Your Messages 202Reply to a Message 204Forward a Message 206Send a File via E‐Mail 208Receive a File via E‐Mail 210View E‐Mail Messages by Conversations 212Block and Unblock Contacts 214Reduce the Amount of Spam You Receive 216CHAPTER 8 CHATTING AND CALLINGSet Up Messages and Choose Preferences 220Chat with a Contact 222Send and Receive Files with Messages 224Sign In to FaceTime and Set Preferences 226Make and Receive FaceTime Calls 228Configure and Use Handoff with Your iPhone 230CHAPTER 9 ORGANIZING YOUR LIFEManage Your Apple ID and iCloud Account 234Navigate the Calendar App 236Create a New Calendar 238Create an Event 240Share an iCloud Calendar with Other People 242Subscribe to a Shared Calendar 244Add Someone to Your Contacts 246Change a Contact’s Information 248Organize Contacts into Groups 250Create Notes 252Track Your Commitments with Reminders 256Get Directions in the Maps App 260CHAPTER 10 ENJOYING MUSIC, VIDEO, AND BOOKSAdd Your Music to the Music App 264Set Up Home Sharing 266Play Songs 268Create Playlists 270Create Smart Playlists 272Listen to Apple Radio and Internet Radio 274Enjoy Podcasts 276Play Videos with the TV App 278Read Books 280CHAPTER 11 MAKING THE MOST OF YOUR PHOTOSImport Photos 284Browse Your Photos 286Select Photos from Bursts 292Crop a Photo 294Rotate or Straighten a Photo 296Improve a Photo’s Colors 298Add Filters to Photos 300Create Photo Albums 302Create and Play Slide Shows 304E‐Mail a Photo 306Take Photos or Movies of Yourself 308CHAPTER 12 NETWORKING, SECURITY, AND TROUBLESHOOTINGTransfer Files Using AirDrop 312Connect to a Shared Folder 314Share a Folder 316Connect to a Shared or Network Printer 318Turn Off Automatic Login 320Enable and Configure the Firewall 322Choose Privacy Settings 324Reclaim Space by Emptying the Trash 326Keep Your MacBook Current with Updates 328Control Checking for Software and App Updates 330Back Up Your Files 332Recover Files from Backup 334Recover When macOS Crashes 336Troubleshoot Corrupt Preference Files 338Recover, Restore, or Reinstall macOS 340Index 342

Regulärer Preis: 19,99 €
Produktbild für Digital Forensics and Internet of Things

Digital Forensics and Internet of Things

DIGITAL FORENSICS AND INTERNET OF THINGSIT PAYS TO BE AHEAD OF THE CRIMINAL, AND THIS BOOK HELPS ORGANIZATIONS AND PEOPLE TO CREATE A PATH TO ACHIEVE THIS GOAL.The book discusses applications and challenges professionals encounter in the burgeoning field of IoT forensics. IoT forensics attempts to align its workflow to that of any forensics practice—investigators identify, interpret, preserve, analyze and present any relevant data. As with any investigation, a timeline is constructed, and, with the aid of smart devices providing data, investigators might be able to capture much more specific data points than in a traditional crime. However, collecting this data can often be a challenge, as it frequently doesn’t live on the device itself, but rather in the provider’s cloud platform. If you can get the data off the device, you’ll have to employ one of a variety of methods given the diverse nature of IoT devices hardware, software, and firmware. So, while robust and insightful data is available, acquiring it is no small undertaking. DIGITAL FORENSICS AND INTERNET OF THINGS ENCOMPASSES:* State-of-the-art research and standards concerning IoT forensics and traditional digital forensics* Compares and contrasts IoT forensic techniques with those of traditional digital forensics standards* Identifies the driving factors of the slow maturation of IoT forensic standards and possible solutions* Applies recommended standards gathered from IoT forensic literature in hands-on experiments to test their effectiveness across multiple IoT devices* Provides educated recommendations on developing and establishing IoT forensic standards, research, and areas that merit further study.AUDIENCEResearchers and scientists in forensic sciences, computer sciences, electronics engineering, embedded systems, information technology. ANITA GEHLOT, PHD is an associate professor at Lovely Professional University with more than 12 years of experience in academics. She has published more than 70 research papers in refereed journals/conferences and 28 books in the area of Embedded Systems and Internet of Things.RAJESH SINGH, PHD is a professor at Lovely Professional University with more than 16 years of experience in academics. He has published more than 100 research papers in refereed journals/conferences. JASKARAN SINGH, PHD in Forensic Sciences from Amity University Noida, serves as the Head of Department of Forensic Sciences at Lovely Professional University, Punjab, India. He has more than 14 research publications, 13 patents, 3 copyrights, and one edited book to his credit. NEETA RAJ SHARMA, PHD in Biochemistry from Jiwaji University, Gwalior. She is visiting professor at Birmingham City University, UK, and working in association with University of British Columbia, McGill University, Laval University, and University of Victoria in Canada. She has published more than 55 publications, 20 patents, 4 copyrights, and 2 edited books. Preface xiii1 FACE RECOGNITION–BASED SURVEILLANCE SYSTEM: A NEW PARADIGM FOR CRIMINAL PROFILING 1Payal Singh, Sneha Gupta, Vipul Gupta, Piyush Kuchhal and Arpit Jain1.1 Introduction 11.2 Image Processing 61.3 Deep Learning 71.3.1 Neural Network 91.3.2 Application of Neural Network in Face Recognition 101.4 Methodology 101.4.1 Face Recognition 101.4.2 Open CV 111.4.3 Block Diagram 111.4.4 Essentials Needed 121.4.5 Website 121.4.6 Hardware 121.4.7 Procedure 121.5 Conclusion 16References 172 SMART HEALTHCARE MONITORING SYSTEM: AN IOT-BASED APPROACH 19Paranjeet Kaur2.1 Introduction 192.2 Healthcare at Clinics 212.3 Remote Healthcare 212.4 Technological Framework 212.5 Standard UIs, Shows, and User Requirements 232.5.1 Advantages 232.5.2 Application 232.6 Cloud-Based Health Monitoring Using IoT 242.7 Information Acquisition 242.8 The Processing of Cloud 252.9 IoT-Based Health Monitoring Using Raspberry Pi 252.10 IoT-Based Health Monitoring Using RFID 262.10.1 Sensor Layer 272.10.2 Network Layer 282.10.3 Service Layer 282.11 Arduino and IoT-Based Health Monitoring System 282.12 IoT-Based Health Monitoring System Using ECG Signal 292.12.1 System Model 302.12.2 Framework 302.13 IoT-Based Health Monitoring System Using Android App 312.13.1 Transferring the Information to the Cloud 332.13.2 Application Controls 332.14 Conclusion and Future Perspectives 33References 343 DESIGN OF GESTURE-BASED HAND GLOVES USING ARDUINO UNO: A GRACE TO ABLED MANKIND 37Harpreet Singh Bedi, Dekkapati Vinit Raju, Nandyala Meghanath Reddy C. Partha Sai Kumar and Mandla Ravi Varma3.1 Introduction 383.1.1 Block Diagram 383.1.2 The Proposed New Design 393.1.3 Circuit Diagram 403.2 Result and Discussion 403.2.1 Data Analysis 413.3 Conclusion 413.4 Future Scope 42References 424 PLAYING WITH GENES: A PRAGMATIC APPROACH IN GENETIC ENGINEERING 45Prerna Singh and Dolly Sharma4.1 Introduction 464.2 Literature Review 474.3 Methodology 484.3.1 Plasmid Method 484.3.2 The Vector Method 494.3.3 The Biolistic Method 494.4 Food and Agriculture 504.5 Impact on Farmers 534.6 Diseases: Gene Editing and Curing 544.7 Conclusion 564.8 Future Scope 56References 575 DIGITAL INVESTIGATIVE MODEL IN IOT: FORENSIC VIEW 59Suryapratap Ray and Tejasvi Bhatia5.1 Introduction 595.1.1 Artificial Neural Network 605.2 Application of AI for Different Purposes in Forensic Science 615.2.1 Artificial Intelligence for Drug Toxicity and Safety 615.2.2 Crime Scene Reconstruction 625.2.3 Sequence or Pattern Recognition 625.2.4 Repositories Building 635.2.5 Establishment of Connection Among the Investigating Team 635.2.6 Artificial Intelligence and Expert System in Mass Spectrometry 635.2.7 AI in GPS Navigation 655.3 Future of AI 665.4 Challenges While Implementing AI 675.4.1 Unexplainability of AI 675.4.2 AI Anti-Forensics 675.4.3 Connection Interruption Between the Cyber Forensics and AI Communities 675.4.4 Data Analysis and Security 685.4.5 Creativity 685.5 Conclusion 68References 696 INTERNET OF THINGS MOBILITY FORENSICS 73Shipra Rohatgi, Aman Sharma and Bhavya Sharma6.1 Introduction 746.2 Smart Device and IoT 756.3 Relation of Internet of Things with Mobility Forensics 766.3.1 Cyber Attack on IoT Data 776.3.2 Data Recovery from IoT Devices 786.3.3 Scenario-Based Analysis of IoT Data as Evidence 796.4 Mobility Forensics IoT Investigation Model 806.5 Internet of Things Mobility Forensics: A Source of Information 826.6 Drawbacks in IoT Devices Data Extraction 826.7 Future Perspective of Internet of Things Mobility Forensics 846.8 Conclusion 84References 857 A GENERIC DIGITAL SCIENTIFIC EXAMINATION SYSTEM FOR INTERNET OF THINGS 87Shipra Rohatgi and Sakshi Shrivastava7.1 Introduction 887.2 Internet of Things 897.3 IoT Architecture 917.4 Characteristics of IoT 927.5 IoT Security Challenges and Factors of Threat 947.5.1 Effects of IoT Security Breach 957.6 Role of Digital Forensics in Cybercrime Investigation for IoT 967.6.1 IoT in Digital Forensic 967.6.2 Digital Forensics Investigation Framework for IoT Devices 987.6.3 Road Map for Issues in IoT Forensics 997.7 IoT Security Steps 1027.7.1 How to Access IoT Security 1037.8 Conclusion 107References 1088 IOT SENSORS: SECURITY IN NETWORK FORENSICS 111D. Karthika8.1 Introduction 1118.2 Cybersecurity Versus IoT Security and Cyber-Physical Systems 1128.3 The IoT of the Future and the Need to Secure 1148.3.1 The Future—Cognitive Systems and the IoT 1148.4 Security Engineering for IoT Development 1158.5 Building Security Into Design and Development 1158.6 Security in Agile Developments 1168.7 Focusing on the IoT Device in Operation 1178.8 Cryptographic Fundamentals for IoT Security Engineering 1188.8.1 Types and Uses of Cryptographic Primitives in the IoT 1188.8.1.1 Encryption and Decryption 1198.8.1.2 Symmetric Encryption 1208.8.1.3 Asymmetric Encryption 1218.8.1.4 Hashes 1228.8.1.5 Digital Signatures 1238.8.1.6 Symmetric (MACS) 1238.8.1.7 Random Number Generation 1248.8.1.8 Cipher Suites 1258.9 Cloud Security for the IoT 1258.9.1 Asset/Record Organization 1268.9.2 Service Provisioning, Billing, and Entitlement Management 1268.9.3 Real-Rime Monitoring 1268.9.4 Sensor Coordination 1278.9.5 Customer Intelligence and Marketing 1278.9.6 Information Sharing 1278.9.7 Message Transport/Broadcast 1288.10 Conclusion 128References 1299 XILINX FPGA AND XILINX IP CORES: A BOON TO CURB DIGITAL CRIME 131B. Khaleelu Rehman, G. Vallathan, Vetriveeran Rajamani and Salauddin Mohammad9.1 Introduction 1329.2 Literature Review 1329.3 Proposed Work 1329.4 Xilinx IP Core Square Root 1369.5 RTL View of the 8-Bit Multiplier 1409.5.1 Eight-Bit Multiplier Simulation Results Using IP Core 1449.6 RTL View of 8-Bit Down Counter 1459.6.1 Eight-Bit Down Counter Simulation Results 1459.7 Up/Down Counter Simulation Results 1499.8 Square Root Simulation Results 1509.9 Hardware Device Utilization Reports of Binary Down Counter 1549.10 Comparison of Proposed and Existing Work for Binary Up/Down Counter 1569.10.1 Power Analysis of Binary Up/Down Counter 1599.11 Conclusion 160References 16010 HUMAN-ROBOT INTERACTION: AN ARTIFICIAL COGNITION-BASED STUDY FOR CRIMINAL INVESTIGATIONS 163Deepansha Adlakha and Dolly Sharma10.1 Introduction 16410.1.1 Historical Background 16510.2 Methodology 16710.2.1 Deliberative Architecture and Knowledge Model 16710.2.1.1 Natural Mind 16810.2.1.2 Prerequisites for Developing the Mind of the Social Robots 16910.2.1.3 Robot Control Paradigms 16910.3 Architecture Models for Robots 17010.4 Cognitive Architecture 17110.4.1 Taxonomy of Cognitive Architectures 17210.4.1.1 Symbolic Architectures 17210.4.1.2 The Emergent or the Connectionist Architecture 17310.4.1.3 The Hybrid Architecture 17310.4.2 Cognitive Skills 17310.4.2.1 Emotions 17310.4.2.2 Dialogue for Socially Interactive Communication 17510.4.2.3 Memory in Social Robots 17810.4.2.4 Learning 18010.4.2.5 Perception 18110.5 Challenges in the Existing Social Robots and the Future Scopes 18710.5.1 Sensors Technology 18710.5.2 Understanding and Learning from the Operator 18710.5.3 Architectural Design 18810.5.4 Testing Phase 18910.5.5 Credible, Legitimate, and Social Aspects 18910.5.6 Automation in Digital Forensics 19010.6 Conclusion 19010.7 Robots in Future Pandemics 194References 19411 VANET: AN IOT FORENSIC-BASED MODEL FOR MAINTAINING CHAIN OF CUSTODY 199Manoj Sindhwani, Charanjeet Singh and Rajeshwar Singh11.1 Introduction 20011.2 Cluster Performance Parameters 20111.3 Routing Protocols in VANET 20211.3.1 Performance Metrics 20211.3.2 Proposed Cluster Head Selection Algorithm 20311.4 Internet of Vehicles 20511.5 IoT Forensic in Vehicular Ad Hoc Networks 20611.6 Conclusion 207References 20712 COGNITIVE RADIO NETWORKS: A MERIT FOR TELEFORENSICS 211Yogita Thareja, Kamal Kumar Sharma and Parulpreet Singh12.1 Introduction 21212.1.1 Integration of WSN with Psychological Radio 21312.1.2 Characteristics of Cognitive Radio 21412.2 Contribution of Work 21612.2.1 Push-to-Talk 21812.2.2 Digital Forensic–Radio Communication Equipment 21912.2.3 Energy Harvesting Network 22012.2.4 Challenges with the Use of Clusters in Cognitive Radio Networks 22012.3 Conclusion and Future Scope 221Acknowledgement 221References 22213 FINGERPRINT IMAGE IDENTIFICATION SYSTEM: AN ASSET FOR SECURITY OF BANK LOCKERS 227Mahendra, Apoorva, Shyam, Pavan and Harpreet Bedi13.1 Introduction 22713.1.1 Design Analysis 23013.2 Result and Discussion 23113.3 Conclusion 23213.4 Future Scope 234References 23514 IOT FORENSICS: INTERCONNECTION AND SENSING FRAMEWORKS 237Nidhi Sagarwal14.1 Introduction 23714.2 The Need for IoT Forensics 24014.3 Various Types of Evidences Encountered 24214.4 Protocols and Frameworks in IoT Forensics 24214.5 IoT Forensics Process Model 24314.6 Suggestive Solutions 24814.7 Conclusion 249References 24915 IOT FORENSICS: A PERNICIOUS REPERCUSSIONS 255Gift Chimkonda Chichele15.1 Introduction: Challenges in IoT Forensics 25515.2 Scope of the Compromise and Crime Scene Reconstruction 25615.3 Device and Data Proliferation 25615.4 Multiple Data Location and Jurisdiction Challenges 25615.5 Device Type 25715.6 Lack of Training and Weak Knowledge Management 25715.7 Data Encryption 25815.8 Heterogeneous Software and/or Hardware Specifications 25815.9 Privacy and Ethical Considerations by Accessing Personal Data 25815.10 Lack of a Common Forensic Model in IoT Devices 25915.11 Securing the Chain of Custody 25915.12 Lifespan Limitation 25915.13 The Cloud Forensic Problem 25915.14 The Minimum or Maximum Period in Which Data is Stored in the Cloud 26015.15 Evidence Analysis and Correlation 26015.16 Conclusion 260References 262About the Editors 263Index 265

Regulärer Preis: 184,99 €