Allgemein
The Hypermodernity Factory
The digital regime and its bio-anthropotechnology, characteristic of hypermodernity, are giving rise to unprecedented living and working conditions. Relational, inter-individual and exchange systems are being transformed. Technologies bring new ways of communicating, speaking, writing, organizing and controlling tasks. They are explicit, but their reticularities also operate invisibly, underground. However, they define powerful norms for work. Beyond the digital object, at the heart of the computerization process of the last fifty years in France, a progressive transformation of the work regime has taken place. As our social ecologies adapt, adopt, conform and metamorphose, conflict, polemics and sometimes creative resistance emerge. The Hypermodernity Factory is based on an investigation carried out within an administrative department of Inria (the French public institute for research into information technology and techniques) – then in the midst of a social crisis – to discern psychic and collective individuation processes, in a context of instability and specific communication difficulties. Immersed in these almost disruptive anthropotechnical conditions, and subject to unavoidable processes of subjectivation, the subject of office life, from manager to employee, finds themselves in a confused situation; they are constantly living a complex experience of their own in the hybrid, dynamic evolution of the digital regime. Anaïs Djouad, after various assignments in the public and private sectors, became a game designer during the serious games boom. In 2022, she defended her sociology thesis at the EHESS; she is now a sociologist and teacher.
Driving Innovation through AI and Digital Twin for 6G Powered Sustainable Ultra Smart Cities
This book presents the 6G powered integration of Artificial Intelligence (AI) and Digital Twin (DT) technology for sustainable smart cities. In the context of smart cities, 6G, AI and DT hold enormous potential for transformation by boosting city infrastructure and planning, streamlining healthcare facilities, and improving transportation. 6G offers high speed and low latency seamless transfer of vast amounts of data which, when analysed with sophisticated AI models, enhance the decision-making capabilities for smart city infrastructure and urban planning. DT technology, through continuous monitoring and virtual modeling of urban ecosystems, enables predictive maintenance for energy distribution, water management and waste management in a smart city landscape for environmental sustainability. Driving Innovation through AI and Digital Twin for 6G Powered Sustainable Ultra Smart Cities covers the 6G technological innovations, trends and concerns, as well as practical challenges encountered in the implementation of AI and DT for transforming smart cities for a sustainable future. Ashu Taneja is Associate Professor at the Centre for Research Impact and Outcome (CRIO), Chitkara University, India. Abhishek Kumar is a Senior Member of IEEE and works as Assistant Director and Professor in the Computer Science & Engineering Department at Chandigarh University, India. Suresh Vishnudas Limkar is Assistant Professor at the Department of Computer Science and Engineering at the Central University of Jammu, India. Mariya Ouaissa is Professor of Cybersecurity and Networks at the Faculty of Sciences Semlalia, Cadi Ayyad University, Morocco. Mariyam Ouaissa is Assistant Professor of Networks and Systems at ENSA, Chouaib Doukkali University, Morocco.
Fit fürs Studium - Informatik (3. Auflg.)
Informatik – das Studium ist spannend und der Abschluss ist gefragt, aber gerade der Beginn hält einige Herausforderungen bereit. Programmierung ist dabei nicht alles. Mit Rechnerarchitektur, Komplexitätsberechnungen, formalen Kalkülen und nicht zuletzt einer guten Portion Mathematik tut sich leichter, wer vorbereitet an den Start geht.Dieses Buch ist der ideale Brückenkurs für alle, die einen besonders gut verständlichen Einstieg in die komplexen Themen der Informatik suchen. Die Autoren kennen typische Einstiegsprobleme und gehen auch schwierige Themen mit Schwung und didaktischem Feingefühl an. Diagramme, Beispiele und Aufgaben mit Musterlösungen helfen Ihnen, alles zu verstehen. So gehen Sie gut vorbereitet ins Studium.Aus dem Inhalt:Algorithmen und ihre KomplexitätFormale SprachenDatenstrukturen und CodierungBetriebssysteme und CompilerVerschlüsselungSoftwareentwicklung im TeamWichtiges aus der MathematikProgrammierung in PythonKünstliche IntelligenzWie werde ich Informatiker?Über die Autoren:Arne Boockmeyer ist Doktorand an der Professur für Betriebssysteme und Middleware am Hasso-Plattner-Institut in Potsdam.Philipp Fischbeck kennt typische Hürden beim Lernen aus seiner Arbeit mit Jugendlichen in Schüler*innen-Workshops und mit Studierenden als Tutor und Dozent am Hasso-Plattner-Institut.Stefan Neubert hat zahlreiche Informatik-Workshops und -Camps für Schüler*innen entwickelt und durchgeführt.
Künstliche Intelligenz für Alltag und Beruf
Künstliche Intelligenz für Alltag und BerufFür alle, die KI nicht nur verstehen, sondern sinnvoll nutzen und mitgestalten wollen!Die Künstliche Intelligenz verändert unsere Welt in rasantem Tempo – im privaten Alltag ebenso wie im Berufsleben. Dieses Buch bietet eine umfassende Einführung in die transformative Kraft der KI und zeigt, wie sie Lebensqualität, Produktivität und Entscheidungsprozesse neu definiert. Gleichzeitig beleuchtet es kritisch die ethischen, gesellschaftlichen und technologischen Herausforderungen, die mit dieser Entwicklung einhergehen.Ob im Management, im Ingenieurwesen oder im täglichen Leben – anhand zahlreicher praxisnaher Beispiele und fundierter Analysen erhalten Leserinnen und Leser einen vielschichtigen Einblick in die Wirkweise und Auswirkungen moderner KI-Systeme.Beschrieben werden u. a. private bzw. berufliche Anwendungen wie Spracherkennung, Finanzprognosen, maschinelles Sehen, medizinische Diagnosesysteme und Mensch-Maschine-Interaktionen. Ethische Herausforderungen und Fairnessprobleme werden aufgezeigt, um eine Vertrauenskrise zu vermeiden.Dieses Buch ist nicht nur ein informativer Leitfaden, sondern auch ein Denkanstoß: Es lädt dazu ein, die Rolle der KI in einer global vernetzten Welt zu hinterfragen, neue Kompetenzprofile zu entdecken und sich aktiv an der Gestaltung einer fairen, inklusiven und nachhaltigen Technologiezukunft zu beteiligen.Leseprobe (Link)Prof. Dr. Günter Hofbauer lehrt und forscht an der Technischen Hochschule Ingolstadt. Seine Schwerpunkte liegen im Innovations- und Technologiemanagement im internationalen Kontext. Der Forschungsschwerpunkt fokussiert sich auf die Anwendung der künstlichen Intelligenz in der Industrie, aber auch im Alltag. Er forscht als Gastprofessor an der Shenzhen Technology University in China.Dr. Ruimei Zhou ist Dekanin an der L.K. Group Industrial Technology Empowerment Akademie in Shenzhen, an der KI-Anwendungen gelehrt werden. Davor war sie tätig im Management der Shenzhen Artificial Intelligence Industry Association und des Standing Committee of the All-China Federation of Industry and Commerce Artificial Intelligence Committee. Sie hat mehr als 20 Jahre Management-Erfahrung in der Industrie und drei Jahre Lehrtätigkeit an einer Universität.
Rechnernetze
Dieses einführende Lehrbuch für Studierende der Informatik und ingenieurwissenschaftlicher Studiengänge an Hochschulen und Berufsakademien vermittelt praxisnah und leicht verständlich die Grundlagen der Netzwerktechnik und der Netzwerkarchitektur. Es erläutert die Voraussetzungen, die Funktionsweise und die technischen Hintergründe von Computernetzwerken. Das Buch befähigt nicht nur zur Beurteilung der Technik, sondern hilft auch, praktische Abwägungen und Entscheidungen bei der Netzwerkplanung zu treffen. Es zeigt neben den Basiskomponenten, Übertragungsverfahren und Verbindungskomponenten auch strategische Aspekte, Trends und zukünftige Entwicklungslinien und vermittelt die Grundlagen zu Strategien und Methoden der Computervernetzung. Neu in der achten Auflage: Neue Transportprotokolle und Sicherheit in Transportkontrollen: Transport Layer Security (TLS), QUIC; Erweiterung Routing-Protokolle: Border Gateway Protocol (BGP); Sicherheit bei der Namensauflösung: DNS über HTTPS; neuer WLAN-Standard: Wifi7; Trends im Ethernet: automotive Ethernet, Time Sensitive Networking; Standards im und Organisation des Internets. Auf plus.hanser-fachbuch.de finden Sie zu diesem Titel digitales Zusatzmaterial: Lehrvideos, Quizzes zur Lernkontrolle, Mind-Maps der wichtigsten Konfigurationsbefehle für Cisco Router/Switches und die Lösungen zu den Aufgaben.
Programmieren mit PHP
Programmieren mit PHP: Einstieg in die serverseitige Webprogrammierung. Erstauflage aus Oktober 2025.Dieses Einsteigerbuch zu PHP vermittelt grundlegende Konzepte und Techniken der Programmiersprache PHP. Leser lernen, wie man einfache Webanwendungen entwickelt, HTML mit PHP dynamisch kombiniert und Formulardaten verarbeitet. Quasi nebenbei wird damit auch ein grundlegender Einstieg in die allgemeinen Konzepte der Programmierung vermittelt.Das Buch führt durch grundlegende Syntax, Variablen, Kontrollstrukturen (wie Schleifen und Bedingungen), Funktionen sowie den Umgang mit Datenbanken (meist mit MySQL). Es bietet praktische Übungen, um Leser Schritt für Schritt in die Erstellung interaktiver Webseiten und die Verarbeitung von Benutzereingaben einzuführen. Am Ende ist der Leser in der Lage, einfache, datenbankgestützte Webanwendungen zu programmieren.Aus dem Inhalt: Voraussetzungen Einführung in PHP Was ist PHP? Das Konzept von PHP Historie und die verschiedenen Versionen Die aktuelle Version 8 Informationen zu PHP Notwendige Software Installation und Konfiguration Editoren und IDEs Webserver direkt installieren und verwalten PHP direkt installieren PEAR MySQL/MariaDB direkt installieren und verwalten XAMPP – ein Rundumsorglospaket Mit XAMPP arbeiten PHP-Code in Webseiten HTML-Grundlagen Grundgerüst einer Webseite Ressourcen in eine Webseite einbinden Webseiten über den Webserver aufrufen SSI und PHP-Skripte über den Webserver aufrufen und ausführen Webseiten mit PHP generieren bzw. PHP in HTML einbinden Aufruf von PHP-Dateien über den Browser Daten im Browser ausgeben Übungen und Praxis CGI und die Datenübergabe zum Client Grundlagen des Datenverkehrs im WWW CGI GET und POST Übungen und Praxis Grundlegende Sprachelemente in PHP Codieren von PHP-Skripten Anweisungsarten und Techniken Kommentare Literale und Token Interpretation und andere Varianten der Übersetzung Grundlagen zur Fehlersuche in PHP-Skripten Übungen und Praxis Datentypen, Variablen und Operatoren Datentypen Variablen Konstanten Vordefinierte Variablen und Konstanten Die verfügbaren Operatoren in PHP Übungen und Praxis Kontrollstrukturen Kontrollstrukturen einsetzen Die verschiedenen Arbeiten Entscheidungsanweisungen Schleifen Sprunganweisungen Übungen und Praxis Funktionen Was sind Funktionen bzw. allgemein Unterprogramme? Standardfunktionen in PHP Funktionen erstellen und aufrufen Mit Funktionen arbeiten Der Gültigkeitsbereich von Variablen PHP-Dateien einbinden mit include() und require() Übungen und Praxis Arrays Grundlagen zu Arrays Indizierte eindimensionale Arrays Assoziative eindimensionale Arrays Arrays mit der Kurzschreibweise erstellen Mehrdimensionale indizierte Arrays Mehrdimensionale assoziative Arrays Array-Funktionen Arrays und Schleifen (foreach und Iterationsfunktionen) Superglobale Arrays Übungen und Praxis Mit Formularen arbeiten Interaktion mit PHP Formulare mit PHP auswerten Übungen und Praxis Externe Dateien Externe Dateien nutzen Dateien öffnen, lesen und schließen Verschiedene Datei-Funktionen Allgemeine Datei- und Verzeichnisoperationen Übungen und Praxis Zeichenketten-Funktionen Unterschiedliche Aktionen bei Zeichenketten Arrays und Zeichenketten Reguläre Ausdrücke nutzen Übungen und Praxis Umgang mit Datum und Uhrzeit Datum und Zeit ermitteln Datum und Zeit formatieren Datumsangabe anpassen Verschiedene Datum- und Zeitfunktionen Übungen und Praxis Umgang mit Sessions Was sind Sessions? Cookies & Co. Mit Sessions arbeiten Session starten bzw. fortsetzen Daten in einer Session speichern Daten einer Session abrufen Session-Daten und Session löschen Übungen und Praxis Kurzeinblick in OOP Was ist OOP? Das Verhältnis von PHP zu OOP Objekte in PHP verwenden Übungen und Praxis Grundlagen des Datenbankzugriffs mit MySQL/MariaDB Was ist ein DBMS? Die Datenbanken MySQL und MariaDB Zugriff mit dem DB-Client auf Konsolenebene MySQL-Datenbanken mit phpMyAdmin verwalten PHP und der Zugriff auf MySQL/MariaDB mysql vs mysqli vs PDO MySQL-Abfragen Rückgabe aus MySQL-Abfrage auswerten Formulardaten in einer MySQL-Datenbank speichern Übungen und Praxis Quellen Stichwortverzeichnis
Observability For Legacy Systems
Become an expert in implementing observability methods for legacy technologies and discover how to use AIOps and OpenTelemetry to analyze root causes and solve problems in banking and telecommunications. Through this book, you will engage with issues that occur in kernels, networks, CPU, and IO by developing skills to handle traces and logs, as well as Profiles (eBPF) and debugging. The real-world examples in the book will enable you to analyze and aggregate observability data, helping you gain competence in automating systems and resolving business-critical issues rapidly and efficiently.The book will introduce you to new observability approaches, describe different types of errors, and explain how observability addresses them. It will provide training on how to develop dashboards and charts and design a root cause analysis process. Emphasizing trace-centric observability, you will gain expertise in using EAI servers to integrate legacy tech and using extensions to complement the OpenTelemetry Agent. You will also understand the varied practical uses of OpenTelemetry through examples from multiple industries, as well as an OpenTelemetry demo application.The book then takes you through infrastructure observability and infrastructure anomaly detection, enabling you to visualize and trace problems, and helping you identify and proactively respond to anomalies in system resources. In the final chapters, you will learn how to aggregate and analyze observability data using Presto and Druid. Finally, you will familiarize yourself with AIOps and learn how to implement it with Langchain and RAGs.By the end of this book, you will be fully trained in the practical implementation of observability and using observability data to identify, analyze, and solve problems for large industries like finance and telecommunications.WHAT YOU WILL LEARN* Integrate observability with legacy technology* Perform root cause analysis using observability platforms like OpenTelemetry* Analyze and aggregate observability data to solve business problems* Use AIOps and anomaly detection tools to automate operations and reduce costsWHO THIS BOOK IS FORSystem developers, data engineers, SREs, infrastructure engineers, system architects, Java developers, and DevOps engineers who are enthusiastic about observability and want to implement it with legacy technology.Chapter 1: Root Cause Analysis.- Chapter 2: The Observability Approach.- Chapter 3: Trace-centric Observability.- Chapter 4: Observability Examples by Industry.- Chapter 5: OpenTelemetry Demo Application.- Chapter 6: Infrastructure Observability.- Chapter 7: Infrastructure Anomaly Detection.- Chapter 8: Analyze Observability Data.- Chapter 9: Aggregate Observability Data.- Chapter 10: AIOps.
Implementing Identity Management on GCP
"Identity Management on GCP" is a detailed step-by-step guide that helps readers through Identity Management within the Google Cloud Platform (GCP). Even though it is a comprehensive guide to GCP IAM, it provides precise definitions of the main concepts, practical recommendations, and best practices for identity management in cloud environments.The topics described in the book, with the help of clear explanations and examples, include connecting on-premise identity systems to GCP, managing admin and workforce identities, and securing applications running on GCP. It also considers issues of integrating IAM with the business environment and compliance, providing the readers with information on implementing IAM solutions that are effective and can be scaled easily.At the end of the book, the readers will have effectively gained knowledge on GCP IAM and can implement improved security measures and manage and optimize identity processes in their cloud environments effectively. Cloud security specialists, identity engineers, and IT administrators are the primary target audience of this book.YOU WILL:* Understand the core concepts and principles of Identity and Access Management (IAM) in Google Cloud Platform (GCP)* Learn to manage administrative and workforce identities effectively* Implement IAM solutions that align with business needs and regulatory compliance requirementsTHIS BOOK IS FOR: Cloud Security Specialists, Identity Engineers and Compliance Engineers, Site Reliability Engineers, Cloud Architects, Cloud Ops EngineersChapter 1: Introduction to Identity and Access Management on Google Cloud Platform.- Chapter 2: Managing Roles, Policies and Permissions.- Chapter 3: Advanced IAM Features.- Chapter 4: Service Accounts and Workload Identity.- Chapter 5: Securing APIs and Workloads.- Chapter 6: Automating IAM Policies.- Chapter 7: Auditing and Monitoring IAM Policies.- Chapter 8 : Managing Multi-Cloud and Hybrid IAM.- Chapter 9:Securing Sensitive Data with IAM.- Chapter 10: AI-Driven Identity and Access Management.
GitHub Copilot Certification Study Guide
A hands-on guide to preparing for the GitHub Copilot certification exam The GitHub Copilot Certification Study Guide is a complete resource for accurate coverage of the challenging GitHub Copilot certification exam. This Sybex Study Guide covers all of the exam’s domain competencies. You’ll prepare smarter and faster with Sybex thanks to efficient and accurate content including, assessment tests that validate test readiness, objective maps, real-world examples and scenarios, practical exercises, and challenging chapter review questions. Retain what you’ve learned with the Sybex online learning environment and test bank, accessible across multiple devices. Get prepared for the GitHub Copilot certification exam with Sybex. Coverage of 100% of all exam objectives in this Study Guide means you’ll be ready for: Responsible AIGitHub Copilot® plans and featuresHow GitHub Copilot works and handles dataPrompt crafting and Prompt engineeringDeveloper use cases for AITesting with GitHub CopilotPrivacy fundamentals and context exclusions ABOUT THE GitHub COPILOT CERTIFICATION EXAM The GitHub Copilot certification exam is designed for individuals in the field of software development who are proficient in using GitHub, including software developers, administrators, and project managers. This certification is intended for individuals who have a foundational understanding of GitHub Copilot as a product and its available features, along with hands-on experience in optimizing software development workflows using GitHub Copilot. Interactive learning environment Take your exam prep to the next level with Sybex’s superior interactive online study tools. To access our learning environment, simply visit www.wiley.com/go/sybextestprep, register your book to receive your unique PIN, and instantly gain one year of FREE access after activation to: Interactive test bank with a practice exam to help you identify areas where further review is needed. Get more than 90% of the answers correct, and you’re ready to take the certification exam.100 electronic flashcards to reinforce learning and last-minute prep before the examComprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared The fastest, most effective way to prepare for the GitHub Copilot certification exam and hone your skills with the popular AI-powered programming tool In the GitHub Copilot Certification Study Guide, tech entrepreneur and Pluralsight trainer, Tom Taulli, delivers a concise and accurate walkthrough of the AI-powered programming tool. Perfect for everyone preparing to take the new GitHub Copilot Certification exam, as well as programmers who regularly use the tool in their day-to-day work, this Study Guide helps you optimize your software development workflows, understand the structure of the test, and learn the material covered by it. This book explains every topic covered by the GitHub Copilot Certification exam, including: Responsible AIGitHub Copilot plans and featuresThe inner workings of GitHub Copilot and how it handles dataPrompt crafting and prompt engineeringDeveloper use casesTesting workflows with GitHub CopilotPrivacy fundamentals and context exclusions From step-by-step tutorials of the GitHub Copilot installation process to proven exam-taking techniques from the experts at Sybex, the GitHub Copilot Certification Guide explores everything you need to understand to succeed on the test and improve your on-the-job coding performance. It offers: Job-ready strategies and techniques for avoiding common generative AI-enhanced programming pitfalls and making use of its many benefitsUp-to-date descriptions of the most useful features and functions of GitHub Copilot, including Copilot EditsComplimentary access to a practice Assessment Test, a Practice Exam, 100 digital flashcards, and a glossary of key terms on the Sybex online learning environment Generative AI tools, like GitHub Copilot, have transformed the software engineering and programming landscapes. If you're preparing for the certification exam, or you wish to expand your AI coding skillset, grab a copy of the GitHub Copilot Certification Study Guide today. ABOUT THE AUTHOR TOM TAULLI is an author, speaker, Pluralsight trainer, and startup advisor. He is the author of AI-Assisted Programming: Better Planning, Coding, Testing, and Deployment, as well as other AI-focused technology books.
Data Product Management in the AI Age
“_An outstanding companion for any data professional seeking to deepen their expertise and grow in the field of Data Product Management_.” (Eduardo Juremeira, Data Engineering Manager, Adyen)“_This book is a valuable resource for data professionals, offering clear concepts and practical tools_.” (Luis Oliveira, Analytics Engineering Tech Manager, Nubank)A PRACTICAL GUIDE TO MASTERING DATA PRODUCT MANAGEMENT—BRIDGING STRATEGY, ARCHITECTURE, AND EXECUTION FOR THE AI ERA.We have firmly entered the age of artificial intelligence (AI). Data, the backbone of this technology, is more crucial than ever. If the algorithm is the brain, data is the content that feeds it. This book argues that to succeed in this era, organizations should adopt a holistic approach to data—one that uses product management principles to inform how data is sourced, designed, managed, maintained, optimized, and leveraged.This book is divided into two sections, moving from fundamentals to practical applications. In the first part, you’ll learn about the concepts that underlie product theory, the data architecture journey, and the essential knowledge needed to manage data products. The second part focuses on putting everything into practice, with particular attention to designing solutions, ongoing maintenance, and optimization.Additionally, the book introduces the Golden Data Platform and the Data Product Management Canvas, important tools and frameworks coined by author Jessika Milhomem. These resources will help you begin transforming your organization’s data strategy, empowering you to stay ahead of the competition and thrive in the AI age.WHAT YOU WILL LEARN* Explore the evolution of data architecture and strategies* Understand the fundamentals of data product management* Differentiate between Data Product and Data as a Product* Know what the Golden Data Platform is and how to use it* Utilize the Data Product Management Canvas effectively* Reorient your data strategy with product management principles* Examine the concepts of products and data architecture evolution in relation to leadership* Evaluate how to solve data architecture without bias by technology* Design and implement Data as a Product and Data Products through a project* Maintain and enhance Data Products once launchedWHO THIS BOOK IS FORData leaders and managers responsible for designing and delivering data products, as well as product managers who want to collaborate more effectively with data teams. Analytics engineers, data engineers, data scientists, and machine learning engineers will find practical guidance for building impactful data solutions. Developers and data professionals aiming to move into leadership or product roles will also find valuable insights throughout.Part I: Fundamentals for Data Product Management.- Chapter 1: Data Product Management Introduction.- Chapter 2: Data Analytical Architecture - Traditional Architecture.- Chapter 3 : Data Analytical Architecture - Big Data Architecture.- Chapter 4: Consolidating the Analytics Journey Knowledge.- Part II: Data Product Management in Practice.- Chapter 5: Golden Data Platform to Manage Data as a Product.- Chapter 6: Data Product Management.- Chapter 7: Designing the Product of Data - Understanding Phase.- Chapter 8: Designing the Product of Data - Exploring Phase.- Chapter 9: Designing the Data Product - Materializing Phase.- Chapter 10: Ownership process - Recurrent Cycle - Ongoing.
Cybersecurity Law
Comprehensive textbook covering the latest developments in the field of cybersecurity law Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments for this constantly evolving subject since the previous edition was released in 2022. This comprehensive text deals with all aspects of cybersecurity law, including data security and enforcement actions, anti-hacking laws, surveillance and privacy laws, and national and international cybersecurity law. In this new edition, readers will find insights on revisions to regulations and guidance concerning cybersecurity from federal agencies, such as 2023 SEC cybersecurity regulations for all publicly traded companies, and the Cyber Incident Reporting for Critical Infrastructure Act and its impact on the obligations of companies across the United States. Other recent developments discussed in this book include litigation from customers against companies after data breaches and the resulting legal articulation of companies’ duties to secure personal information, the increased focus from lawmakers and regulators on the Internet of Things (IoT), and the FDA’s guidelines for medical device cyber security. Readers of Cybersecurity Law will also find new information on: Litigation cases where courts ruled on whether plaintiffs stated viable causes of action in data breach cases, including the Eleventh Circuit’s opinion in Ramirez v. Paradies Shops Fourth Amendment opinions involving geofence warrants and keyword search warrants Courts’ applications of the Supreme Court’s first Computer Fraud and Abuse Act opinion, Van Buren v. United States NIST’s 2024 revisions to its popular Cybersecurity Framework Version 2 of the Cybersecurity Maturity Model Certification Cybersecurity Law is an ideal textbook for undergraduate and graduate level courses in cybersecurity, cyber operations, management-oriented information technology (IT), and computer science. It is also a useful reference for IT professionals, government personnel, business managers, auditors, cybersecurity insurance agents, and academics in these fields. Jeff Kosseff, JD, MPP, is a cybersecurity and privacy lawyer. He frequently speaks and writes about cybersecurity and was a journalist covering technology and politics at The Oregonian, a finalist for the Pulitzer Prize, and a recipient of the George Polk Award for national reporting.
Quantitative Prognosen in der externen Unternehmensrechnung
Barwertkalküle erfordern Prognosen künftiger Zahlungsströme oder Gewinne, haben sich zur vorherrschenden Bewertungsmethodik entwickelt und kommen immer häufiger zur Anwendung. In dieser Arbeit werden ausgewählte quantitative Prognoseverfahren aufgezeigt, empirisch evaluiert und daraus Empfehlungen für die Anwendung innerhalb der Rechnungslegung sowie für die Unternehmensbewertung abgeleitet. Betrachtet werden etablierte sowie neuere Methoden aus dem Bereich des maschinellen Lernens. Darüber hinaus werden die Prognosefelder der handelsrechtlichen und internationalen Rechnungslegung sowie die Auswirkungen von Rechnungslegungspolitik evaluiert. Die Untersuchungen liefern wichtige Erkenntnisse für die Unternehmensanalyse auf Basis von Daten der Finanzberichterstattung und die Ermittlung von Unternehmenswerten. Der Autor empfiehlt zudem methodische Vorgaben für Prognosen in der externen Unternehmensrechnung. Quantitative Prognosen in der Rechnungslegung.- Zukunftsorientierung der Rechnungslegung.- Methodik und Datenbasis.- Cashflow- und Erfolgsprognosen.- Rechnungslegungspolitik als begrenzender Faktor quantitativer Modellierungen.- Modellgestützte Erfolgsprognosen für die Unternehmensbewertung.- Schlussbetrachtung und Fazit.
Künstliche Intelligenz und politischer Extremismus
Dieses essential bietet einen Überblick über die Nutzung von KI durch Extremist*innen. Es werden Beispiele für die Nutzung von KI durch Extremist*innen angeführt. Zudem wird diskutiert, wie diese dadurch gezielt etwa Propaganda, Hass und Hetze verbreiten. Ferner werden Chancen und Möglichkeiten für (Sicherheits-)Behörden und andere Institutionen für den Umgang mit der Nutzung von KI durch Extremist*innen sowohl in der Bekämpfung von Extremismus als auch der Prävention thematisiert. Relevant ist der Band somit für Vertreter*innen von (Sicherheits-)Behörden, für Mitarbeitende bei Trägern der Extremismusprävention, für Wissenschaftler*innen, aber auch etwa für die IT-Branche. Begriffsklärungen und Einordnung.- Wofür Extremist*innen KI nutzen (können).- Gründe für die Nutzung von KI durch Extremist*innen.- Die Nutzung von KI gegen Extremismus.- Herausforderungen für die Nutzung von KI gegen Extremismus.- Wie KI die Entwicklung weiter beeinflussen wird.
Science MashUp: Games und schulische Bildung
Spielen in der Schule? Spielen und schulische Bildung schlossen sich lange Zeit aus: Spiel fand in der Freizeit statt, Schule bereitete auf den Arbeitsprozess vor. Doch die Integration von digitalen Spielen in den schulischen Bildungsbereich hat in den letzten Jahren zunehmend an Bedeutung gewonnen.Der Band _Science MashUp: Games und schulische Bildung_ versammelt die Beiträge zur gleichnamigen Tagung im April 2024 in Leipzig. Die Perspektiven von Lehrkräften, Eltern und Schülern stehen dabei im Fokus von drei Themenbereichen: 1. Standpunkte: Games in der Schule, 2. Best Practices: Games im Unterricht, 3. Spiele, Technik und Wissen: Digitale Bildungskultur im Wandel.Grußwort.- Einleitung.- Standpunkte: Games in der Schule.- Best Practice: Games im Unterricht.- Spiele, Wissen und Technik: Digitale Bildungskultur im Wandel.- Podiuumsdiskussion.
Deep Learning in Textual Low-Data Regimes for Cybersecurity
In today's fast-paced cybersecurity landscape, professionals are increasingly challenged by the vast volumes of cyber threat data, making it difficult to identify and mitigate threats effectively. Traditional clustering methods help in broadly categorizing threats but fall short when it comes to the fine-grained analysis necessary for precise threat management. Supervised machine learning offers a potential solution, but the rapidly changing nature of cyber threats renders static models ineffective and the creation of new models too labor-intensive. This book addresses these challenges by introducing innovative low-data regime methods that enhance the machine learning process with minimal labeled data. The proposed approach spans four key stages:Data Acquisition: Leveraging active learning with advanced models like GPT-4 to optimize data labeling.Preprocessing: Utilizing GPT-2 and GPT-3 for data augmentation to enrich and diversify datasets.Model Selection: Developing a specialized cybersecurity language model and using multi-level transfer learning.Prediction: Introducing a novel adversarial example generation method, grounded in explainable AI, to improve model accuracy and resilience.Introduction.- Research Design.- Findings.- Discussion.- Conclusion.- Information Overload in Crisis Management: Bilingual Evaluation of Embedding Models for Clustering Social Media Posts in Emergencies.- ActiveLLM: Large Language Model-based Active Learning for Textual Few-Shot Scenarios.- A Survey on Data Augmentation for Text Classification.- Data Augmentation in Natural Language Processing: A Novel Text Generation Approach for Long and Short Text Classifiers.- Design and Evaluation of Deep Learning Models for Real-Time Credibility Assessment in Twitter.- CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain.- Multi-Level Fine-Tuning, Data Augmentation, and Few-Shot Learning for Specialized Cyber Threat Intelligence.- XAI-Attack: Utilizing Explainable AI to Find Incorrectly Learned Patterns for Black-Box Adversarial Example Creation.
Datenmodellierung in Data-Warehouse-Systemen
Dieses Buch bietet wertvolle Unterstützung beim Aufbau und bei der Modellierung eines Data Warehouse (DW). Es führt praxisnah durch alle Phasen eines DW-Projekts – von der Anforderungsanalyse über die Datenmodellierung und Architektur bis hin zur praktischen Umsetzung. Leserinnen und Leser gewinnen ein tiefes Verständnis für bewährte Modellierungstechniken, die einen entscheidenden Faktor für die Struktur und den Erfolg eines DW darstellen. Ein besonderer Schwerpunkt liegt dabei auf der Definition von Regelwerken zur effektiven Erstellung semantischer und logischer Datenmodelle. Zudem werden nicht nur theoretische Grundlagen vermittelt, sondern auch praktisches Wissen zur Umsetzung – abgerundet durch eine realistische Fallstudie.ZIELGRUPPE* Praktiker*innenEinleitung.- Aufbau und Komponenten klassischer DW-Architekturen.- Anforderungsanalyse.- Klassische relationale Datenmodelle.- Multidimensionale Datenmodelle.- Data Vault.- Konzepte und Techniken der Historisierung.- Fallstudie zur Gestaltung einer Data-Warehouse-Anwendung.- Zusammenfassung.- Glossar.- Literatur.
Modern REST API Development in Go
Modern REST API Development in Go is a hands-on guide to understanding and applying REST principles using Go’s powerful standard library. In an era where interconnected systems demand robust and performant APIs, Go offers the perfect combination of simplicity, performance, and tooling to build modern backend services. This book is centered around a complete, real-world REST API project and guides you through every stage of the development process, from building HTTP handlers to applying authentication and generating OpenAPI documentation. You’ll learn to structure your application, handle persistence with common libraries like GORM and Squirrel, apply observability patterns through logging and tracing, and ensure code quality through unit and integration tests. Each concept is grounded in REST theory and backed by idiomatic Go practices, enabling you to build APIs that are not only functional but production-ready. By the end of the book, you’ll be ready to design, build, and maintain REST APIs in Go.
CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!
Prepare faster and smarter with CertMike Get Certified! for passing the CompTIA A+ Core 1 certification exam! In CompTIA® A+® CertMike: Prepare. Practice. Pass the Test! Get Certified! Core 1 Exam 220-1201, Second Edition, experienced IT expert and tech educator Mike Chapple delivers a focused, no-nonsense guide for anyone preparing for the CompTIA A+ Core 1 exam. Take advantage of the proven CertMike approach to: Prepare—As your personal study coach, CertMike guides you through all the exam objectives, helping you gain an understanding of how they apply to on-the-job tasks!Practice—Each chapter includes two multiple choice practice questions. Work through the detailed explanations to evaluate each answer option and understand the reason for the best answer.Pass the Test—On exam day, take the critical knowledge you’ve learned into the test. You’ll feel ready and confident to pass the exam and earn your certification! This book skips the fluff and helps you validate you have the knowledge and skills to install, configure, and maintain computer equipment, mobile devices, and software for end users. You’ll also demonstrate your competency in networking basics and essential cybersecurity methods and properly and safely diagnose, resolve, and document common hardware and software issues. Interactive learning environment Take your exam prep to the next level with Sybex’s superior interactive online study tools. To access our interactive learning environment, simply visit www.wiley.com/go/sybextestprep, register your book to receive your unique PIN, and instantly gain one year of FREE access after activation to: Interactive test bank with a practice exam to help you identify areas where further review is needed. Get more than 90% of the answers correct, and you’re ready to take the certification exam.Audio recordings of the book’s CertMike Exam Essentials to help you review for the exam. Skip the fluff and quickly master the essentials with this accurate CompTIA A+ certification test prep In the second edition of CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified! Core 1 Exam 220-1201, tech educator and expert Mike Chapple delivers a hands-on guide to efficiently and effectively preparing for the CompTIA A+ Core 1 exam. The book contains concise discussions of the mobile devices, networking technologies, hardware components, virtualization and cloud computing services, and troubleshooting techniques you'll need for the updated test and on a day-to-day basis at your job. Chapple covers all relevant technological advances in mobile, cloud, networking, and security that have taken place since publication of the first edition of this book. He also walks you through the material you need to know to succeed on the newly created 220-1201 exam. You'll use the proven CertMike approach to: Prepare—CertMike is your personal study coach, guiding you through all the exam objectives and helping you gain an understanding of how they apply to on-the-job tasks!Practice—Each chapter includes two multiple choice practice questions. Work through the detailed explanations to evaluate each answer option and understand the reason for the best answer!Pass—On exam day, use the critical knowledge you've learned when you're ready to take the test. You'll feel ready and confident to pass the exam and earn your certification! Laser-focused on starting and accelerating your IT technician career and ensuring your success on the A+ certification Core 1 exam, the book skips the fluff and familiarizes you with IT basics you'll use on the test and every day in your work. It also offers complimentary access to helpful online study tools, like a bonus practice exam and audio recordings of the CertMike Exam Essentials. The second edition of CompTIA A+ CertMike is perfect for anyone preparing for their A+ certification who wants to reduce test anxiety, boost their confidence, and get up to speed quickly and efficiently. It's also a great resource for hardware and PC technicians who want to reinforce foundational skills and upgrade their professional knowledge. ABOUT THE AUTHOR Mike Chapple, PhD, CISSP, CISM, CIPP/US, CIPM, CCSP, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is the bestselling author of over 50 technical books. He is also the Faculty Director of the University’s Business/Computer Science program.
CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!
Prepare faster and smarter with CertMike Get Certified! for passing the CompTIA A+ Core 2 certification exam! In CompTIA® A+® CertMike: Prepare. Practice. Pass the Test! Get Certified! Core 2 Exam 220-1202, Second Edition, experienced IT expert and tech educator Mike Chapple delivers a focused, no-nonsense guide for anyone preparing for the CompTIA A+ Core 2 exam. Take advantage of the proven CertMike approach to: Prepare—As your personal study coach, CertMike guides you through all the exam objectives, helping you gain an understanding of how they apply to on-the-job tasks!Practice—Each chapter includes two multiple choice practice questions. Work through the detailed explanations to evaluate each answer option and understand the reason for the best answer.Pass the Test—On exam day, take the critical knowledge you’ve learned into the test. You’ll feel ready and confident to pass the exam and earn your certification! This book skips the fluff and helps you validate you have the knowledge and skills to install, configure, and maintain computer equipment, mobile devices, and software for end users. You’ll also demonstrate your competency in networking basics and essential cybersecurity methods and properly and safely diagnose, resolve, and document common hardware and software issues. Interactive learning environment Take your exam prep to the next level with Sybex’s superior interactive online study tools. To access our interactive learning environment, simply visit www.wiley.com/go/sybextestprep, register your book to receive your unique PIN, and instantly gain one year of FREE access after activation to: Interactive test bank with a practice exam to help you identify areas where further review is needed. Get more than 90% of the answers correct, and you’re ready to take the certification exam.Audio recordings of the book’s CertMike Exam Essentials to help you review for the exam. Skip the fluff and quickly master the essentials with this accurate CompTIA A+ certification test prep In the second edition of CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified! Core 2 Exam 220-1202, tech educator and expert Mike Chapple delivers a hands-on guide to efficiently and effectively preparing for the CompTIA A+ Core 2 exam. The book contains concise discussions of the operating systems, security practices, software troubleshooting techniques, and operational procedures you'll need for the updated test and on a day-to-day basis at your job. Chapple covers all relevant technological advances in mobile, cloud, networking, and security that have taken place since publication of the first edition of this book. He also walks you through the material you need to know to succeed on the newly created 220-1202 exam. You'll use the proven CertMike approach to: Prepare—CertMike is your personal study coach, guiding you through all the exam objectives and helping you gain an understanding of how they apply to on-the-job tasks!Practice—Each chapter includes two multiple choice practice questions. Work through the detailed explanations to evaluate each answer option and understand the reason for the best answer!Pass—On exam day, use the critical knowledge you've learned when you're ready to take the test. You'll feel ready and confident to pass the exam and earn your certification! Laser-focused on starting and accelerating your IT technician career and ensuring your success on the A+ certification Core 2 exam, the book skips the fluff and familiarizes you with IT basics you'll use on the test and every day in your work. It also offers complimentary access to helpful online study tools, like a bonus practice exam and audio recordings of the CertMike Exam Essentials. The second edition of CompTIA A+ CertMike is perfect for anyone preparing for their A+ certification who wants to reduce test anxiety, boost their confidence, and get up to speed quickly and efficiently. It's also a great resource for hardware and PC technicians who want to reinforce foundational skills and upgrade their professional knowledge. ABOUT THE AUTHOR Mike Chapple, PhD, CISSP, CISM, CIPP/US, CIPM, CCSP, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is the bestselling author of over 50 technical books. He is also the Faculty Director of the University’s Business/Computer Science program.
Revenue Management in the Age of Artificial Intelligence
Today, Revenue Management is a key practice in the air transport, tourism and hotel industries. Originally known as Yield Management, Revenue Management has gradually evolved into an integral revenue optimization strategy for businesses characterized by capacity constraints and fluctuating demand. Revenue Management in the Age of Artificial Intelligence explores, through numerous case studies and concrete examples, the principles, models and applications of Revenue Management, while addressing the ethical challenges and prospects offered by digital technology and artificial intelligence. This book is aimed at professionals, students, researchers and anyone wishing to understand the dynamics of price management in a constantly changing economic environment. It highlights the importance of transparency and fairness in maintaining consumer confidence, while demonstrating that Revenue Management is much more than a simple pricing technique: it is an essential strategic tool for many service companies. Sourou Meatchi is Senior Lecturer in Management Sciences at the University of Angers, within the ESTHUA National Institute of Tourism, France. As a member of the Economics and Management Research Laboratory (GRANEM), his scientific research focuses on Revenue Management, the digital transformation of VSEs and SMEs, and the economics of tourism in emerging countries.
Sustainable Resource Management in Next-Generation Computational Constrained Networks
The book provides essential insights into cutting-edge networking technologies that not only enhance performance and efficiency but also address critical sustainability challenges in an increasingly connected world. The landscape of networking and computational technologies is rapidly evolving, driven by the increasing demand for efficient and sustainable resource management. The advent of next-generation technologies such as 5G and 6G has marked a significant leap in enabling high-capacity, low-latency communication and massive connectivity. These advancements are crucial for supporting the growing number of connected devices and complex applications they run, particularly in environments with limited processing, memory, and energy capabilities. Sustainable Resource Management in Next-Generation Computational Constrained Networks provides insight into the advancements of recent cutting-edge networking technologies that cater to society’s needs more efficiently, meeting the expectations of sustainable resource management in computationally constrained networks. By exploring the practical applications of various next-generation technologies, the book addresses critical challenges such as scalability, interoperability, energy efficiency, and security. This knowledge equips professionals with the tools to enhance network performance, optimize resource management, and develop innovative solutions for sustainable and efficient computational networks, ultimately contributing to the advancement of technology and societal well-being. Readers will find this book: Provides thorough reviews on a wide range of cutting-edge network technologies contributing to resource management in computationally constrained networks;Explores the role of various network technologies for the development of sustainable applications;Details architectural viewpoints of integrating emerging network technologies with real-world applications to manage network resources efficiently;Highlights challenges in integrating the latest network technologies with sustainable real-world applications;Discusses real-world case studies of various network technologies in leveraging sustainable resource management for the fulfillment of different industrial and societal needs. Audience Software engineers, electronic engineers, and policymakers in the networking and security domain. Subhasis Dash, PhD is an assistant professor in the School of Computer Engineering at the Kalinga Institute of Industrial Technology with over 22 years of teaching experience. His research interests include wireless sensor networks, distributed computing, and operating systems. Manas Ranjan Lenka, PhD is an assistant professor in the School of Computer Engineering, at the Kalinga Institute of Industrial Technology with over 18 years of experience. His current research focuses on wireless sensor networks, mobile wireless networks, Internet of Things, and blockchain. S. Balamurugan, PhD is the Director of Intelligent Research Consultancy Services and serves as a consultant for many other companies and start-ups. He has published over 70 books, 300 articles in national and international journals and conferences, and 300 patents. His research interests include artificial intelligence, machine learning, soft computing algorithms, and robotics and automation. Ambika Prasad Tripathy is a senior technical leader with Cisco’s Network Security Business Unit with over 17 years of experience. He has worked in the network industry to standardize Yang-based subscription mechanisms and their applications. He specializes in Sigtran, 3G, 4G core networks, switching and routing, telemetry, and datacenter, network, and cloud security. Amarendra Mohanty is a senior engineer at the Intel Corporation in India with over 17 years of research experience. He has worked for a number of leading companies in the computer science field, including Intel, VMWare, TCS, and Aricent. His specializations include network security, network virtualization, data center networking, routing and switching, and 3G wireless networks in the development and QA fields.
The Gen AI Manufacturing Revolution
Reduce downtime, navigate disruptions, and improve the efficiency of your manufacturing organization The Gen AI Manufacturing Revolution: Smarter Factories, Enhanced Products, and Reduced Costs is a practical roadmap to reshaping your manufacturing organization with generative artificial intelligence. Author and innovator, Matthew Alberts, explains how to take advantage of the latest advances in Gen AI. Using tailored strategies and hands-on use cases, he demonstrates how to automate routine tasks, enable data-driven decision making, build an AI-capable workforce, address AI adoption challenges and obstacles, and create enduring competitive advantage in any industry. Alberts walks you through techniques and strategies you can implement immediately to streamline product design, improve creativity, innovate, manage workflows, monitor performance, and more. He also offers a set of tools and ideas you can use to manage the significant ethical, cultural, and operational problems that are generated by AI adoption. Perfect for executives and managers at manufacturing firms, The Gen AI Manufacturing Revolution is also a must-read guide for AI and tech professionals, consultants, and anyone else with a stake in the coming transformation of industry and manufacturing. Transformative insights and advice to reduce downtime, navigate disruptions, and improve efficiency The Gen AI Manufacturing Revolution highlights how generative and agentic artificial intelligence are transforming manufacturing processes, driving innovation, and reshaping the way we work. Implementing AI in manufacturing comes with unique challenges, such as integrating AI with physical machinery, managing intricate supply chains, and ensuring regulatory compliance. This book addresses these challenges, helping you harness AI's potential while navigating its complexities. With tailored strategies and use cases, the book demonstrates how to unlock the power of Gen AI, from automating routine tasks to enabling better decision-making. You'll learn to build an AI-ready workforce, overcome common challenges in adoption, drive value across the organization, and maintain accountability. Leverage generative AI to streamline product design, boost creativity, and accelerate innovationDeploy agentic AI systems to autonomously manage workflows, monitor performance, and support complex decision-makingBuild an AI-ready workforce capable of collaborating with intelligent systemsAddress ethical, operational, and cultural challenges in AI adoptionDrive enterprise-wide value while maintaining transparency and accountability Whether you're looking to reduce downtime, enhance efficiency, or stay ahead of disruptive change, this book is your essential guide to leading the next wave of industrial transformation through AI. MATTHEW ALBERTS, PhD, is a technology strategist, engineer, and thought leader. With over 15 years of experience driving digital transformation across the manufacturing, energy, and industrial sectors, he has led the adoption of cutting-edge solutions such as AI, robotics, IoT, and predictive analytics for Fortune 500 companies and high-growth startups alike.
journey 2 shared understanding
Das «journey 2 shared understanding» richtet sich an alle, die Freude an guter Software haben und etwas dazu beitragen möchten. Es bietet dir einen Leitfaden, wie du durch dein eigenes Engagement einen spürbaren Mehrwert erzielen kannst - unabhängig davon, ob du im 1st-, 2nd- oder 3rd-Level arbeitest, ob als Supporter, Kundenbetreuer, Business-Analyst, Fachvertreter, Manager, Applikationsmanager, Product-Owner, Scrum-Master, Projektleiter, Entwickler oder in einer anderen Rolle.Mit dem «j2su-Manifest» ist es dir möglich, in komplexen Arbeitsumgebungen ein gemeinsames Verständnis zu erlangen und dadurch leistungsstark zusammenzuarbeiten. Es geht darum, die typischen Probleme in der Software-Entwicklung gezielt in den Griff zu bekommen. Software-Anforderungen müssen «good enough» sein, um effizient entwickelt werden zu können.Das «j2su-Manifest» basiert auf Tools, die im Projektmanagement, im Applikationsmanagement und in der Software-Entwicklung bewährt sind. Aufgrund eigener Praxiserfahrungen werden weitere Aspekte wie der Reifegrad der Mitarbeitenden und die Kommunikation von Software-Anforderungen berücksichtigt.Anhand verschiedener praxisnaher Anwendungsfälle werden Lösungen zu den typischen Problemen aufgezeigt. Eine Auswahl an bekannten Tools unterstützt dabei das «j2su-Manifest», das aus den folgenden drei Bestandteilen besteht:Denken / Analysieren / TransformierenDer erste Bestandteil des j2su-Manifests ist «Denken». Denken ist in diesem Zusammenhang vor allem als Mindset zu verstehen. Es bezieht sich darauf, was unsere Werte sind, wie wir uns mit Neuem auseinandersetzen, wie Anforderungen angepackt werden und wie wir miteinander umgehen. Dies definiert und beeinflusst unsere grundlegendsten Handlungsweisen.Eine individuelle Analyse bringt für die Vollständigkeit einer Anforderung einen grossen Mehrwert. Dies ist insbesondere dann der Fall, wenn Mitarbeitende aus verschiedenen Teams, Abteilungen oder Firmen das jeweilige fachliche Know-how zu einer Anforderung beitragen können.Die Transformation der Anforderung besteht aus sechs Phasen, die nacheinander durchlaufen werden. Die Phasen können von allen beteiligten Mitarbeitenden individuell oder als Team durchlaufen werden. Das «j2su-Manifest» kann dabei aus einer persönlichen Perspektive oder als Unternehmen bzw. als Team oder Abteilung angewandt werden.
Building Effective Privacy Programs
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today’s data-driven world, protecting personal information has become a critical priority for organizations of all sizes. Building Effective Privacy Programs: Cybersecurity from Principles to Practice equips professionals with the tools and knowledge to design, implement, and sustain robust privacy programs. Seamlessly integrating foundational principles, advanced privacy concepts, and actionable strategies, this practical guide serves as a detailed roadmap for navigating the complex landscape of data privacy. Bridging the gap between theoretical concepts and practical implementation, Building Effective Privacy Programs combines in-depth analysis with practical insights, offering step-by-step instructions on building privacy-by-design frameworks, conducting privacy impact assessments, and managing compliance with global regulations. In-depth chapters feature real-world case studies and examples that illustrate the application of privacy practices in a variety of scenarios, complemented by discussions of emerging trends such as artificial intelligence, blockchain, IoT, and more. Providing timely and comprehensive coverage of privacy principles, regulatory compliance, and actionable strategies, Building Effective Privacy Programs: Addresses all essential areas of cyberprivacy, from foundational principles to advanced topicsPresents detailed analysis of major laws, such as GDPR, CCPA, and HIPAA, and their practical implicationsOffers strategies to integrate privacy principles into business processes and IT systemsCovers industry-specific applications for healthcare, finance, and technology sectorsHighlights successful privacy program implementations and lessons learned from enforcement actionsIncludes glossaries, comparison charts, sample policies, and additional resources for quick reference Written by seasoned professionals with deep expertise in privacy law, cybersecurity, and data protection, Building Effective Privacy Programs: Cybersecurity from Principles to Practice is a vital reference for privacy officers, legal advisors, IT professionals, and business executives responsible for data governance and regulatory compliance. It is also an excellent textbook for advanced courses in cybersecurity, information systems, business law, and business management. Jason Edwards, DM, CISSP, is an accomplished cybersecurity leader with extensive experience in the technology, finance, insurance, and energy sectors. Holding a Doctorate in Management, Information Systems, and Technology, Jason specializes in guiding large public and private companies through complex cybersecurity challenges. His career includes leadership roles across the military, insurance, finance, energy, and technology industries. He is a husband, father, former military cyber officer, adjunct professor, avid reader, dog dad, and popular on LinkedIn. Griffin Weaver is the Managing Legal Director (Privacy, Cybersecurity, and Technology) at Dell Technologies. He holds a Juris Doctorate and is a Fellow of Information Privacy (FIP). Weaver specializes in digital law, privacy governance, and cybersecurity policy. He is a sought-after speaker and educator who has taught privacy and cybersecurity law at leading institutions, regularly contributes to industry publications, and presents at global conferences on privacy, data protection, and digital rights.