Allgemein
Funktionalität und Standardunterstützung von IoT-Software-Plattformen
Derzeit konkurrieren über 450 Anbieter von IoT-Software-Plattformen miteinander, die Komplexität und die unterschiedlichen Eigenschaften dieser Plattformen führen zu einem intransparenten Markt. Folglich stehen Unternehmen, die eine IoT-Anwendung unter Weiternutzung ihrer bestehenden IT-Infrastruktur umsetzen wollen, vor der Herausforderung, die für diesen unternehmensspezifischen Anwendungsfall am besten geeignete IoT-Plattform aus einer Vielzahl von Kandidaten auszuwählen. Vor diesem Hintergrund werden Unternehmen durch das vorliegende Buch in die Lage versetzt, die Funktionalität und Standardunterstützung der am Markt verfügbaren IoT-Plattformen schnell zu verstehen und untereinander zu vergleichen.Sebastian Lempert forscht im Bereich des IoT und hat im März 2020 seine Dissertation zu IoT-Software-Plattformen fertiggestellt.Prof. Dr. Alexander Pflaum erforscht die digitale Transformation von Unternehmen und Branchen, die Auswirkungen der Digitalisierung auf Unternehmen und unternehmensübergreifende Wertschöpfungssysteme sowie die Rolle digitaler Plattformen in Wertschöpfungssystemen. Einleitung und Motivation.- Verwandte Arbeiten.- Methodik.- Einheitliche Beschreibung der Funktionalität und Standardunterstützung von IoT-Software-Plattformen.- Vergleich und Bewertung der Funktionalität und der Standardunterstützung von IoT-Software-Plattformen.- Zusammenfassung und Ausblick.
SAP, The Agile Way
Praxisbewährte Tipps für die erfolgreiche agile Arbeit mit weltweit verteilten SAP-Teams.Der weltweit tätige SAP-Berater und Agile Coach Klaus Wybranietz zerlegt in diesem Buch das hartnäckige Vorurteil: »Ja, Scrum ist toll, aber mit SAP funktioniert das nicht.« Er beweist nämlich seit Jahren das Gegenteil: Scrum und SAP können auf einen Nenner gebracht werden – und das sogar sehr erfolgreich. Denn in seinen Projekten für internationale Großkonzerne hat Klaus Wybranietz immer wieder die Erfahrung gemacht: Selbst über den Globus verteilte SAP-Teams können mit Scrum in der halben Zeit dreimal so effektiv sein.In diesem Buch erklärt der Autor die Entwicklungsstufen, über die er SAP-Teams aus dem klassischen Wasserfalldenken heraus und stattdessen hinein in die agile Performance führt. Das fängt beim Teambuilding trotz Superstars an, führt über den Aufbau von gezielten Kompetenzen und hilfreichen Regelwerken bis hin zum Schaffen echter Kundenwerte durch die Anwendung von Kanban-Metriken. Das alles funktioniert seit vielen Jahren auch mit weltweit verteilten SAP-Teams – »Ja, aber …« hat als Argument somit ausgedient.AUS DEM INHALT //- SAP und Scrum – das geht doch nicht?- Die Grundlagen von Scrum- Mit verteilten SAP-Teams remote arbeiten- Mit agilen SAP-Teams starten- Skalierung mit dem Agile Working Model 4 SAP- Praktiken für fortgeschrittene agile SAP-Teams
Pro Cryptography and Cryptanalysis with C++20
Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discover common ways in which the algorithms could be implemented and used correctly in practice.The authors avoid the complexities of the mathematical background by explaining its mathematical basis in terms that a programmer can easily understand. They show how “bad” cryptography creeps in during implementation and what “good” cryptography should look like. They do so by showing and comparing the advantages and disadvantages based on processing time, execution time, and reliability.WHAT YOU WILL LEARN* Understand where and why cryptography is used and how it gets misused * Discover what modern cryptography algorithms and methods are used for * Design and implement advanced cryptographic mechanisms * See how C++20 and its new features are impacting the future of implementing cryptographic algorithms* Practice the basics of public key cryptography, including ECDSA signatures and more* Find out how most of the algorithms can be brokenWHO THIS BOOK IS FORProfessional programmers, developers, and software engineers who are developing cryptography algorithms and security schemes/modules in C++. Prior C++ programming and IDE experience and some basic experience of cryptography concepts (symmetric and asymmetric) highly recommended.MARIUS IULIAN MIHAILESCU, PHD is CEO at Dapyx Solution Ltd., a company based in Bucharest, Romania and involved in information security- and cryptography-related research projects. He is a lead guest editor for applied cryptography journals and a reviewer for multiple publications with information security and cryptography profiles. He authored and co-authored more than 30 articles in conference proceedings, 25 articles in journals, and three books. For more than six years he has served as a lecturer at well-known national and international universities (University of Bucharest, “Titu Maiorescu” University, Kadir Has University in, Istanbul, Turkey). He has taught courses on programming languages (C#, Java, C++, Haskell), and object-oriented system analysis and design with UML, graphs, databases, cryptography and information security. He served for three years as IT officer at Royal Caribbean Cruises Ltd. where he dealt with IT infrastructure, data security, and satellite communications systems. He received his PhD in 2014 and his thesis was on applied cryptography over biometrics data. He holds two MSc in information security and software engineering.STEFANIA LOREDANA NITA, PHD is a software developer at the Institute of Computer Science of the Romanian Academy and a PhD with her thesis on advanced cryptographic schemes using searchable encryption and homomorphic encryption. She has served more than two years as an assistant lecturer at the University of Bucharest where she taught courses on subjects such as advanced programming techniques, simulation methods, and operating systems. She has authored and co-authored more than 15 workpapers at conferences and journals, and has authored two books on he Haskell programming language. She is a lead guest editor for special issues on information security and cryptography such as Advanced Cryptography and Its Future: Searchable and Homomorphic Encryption. She holds an MSc in software engineering and two BSc in computer science and mathematics.Part I: Foundations1: Introduction2: Cryptography Fundamentals3: Mathematical Background and Its Applicability4: Large Integer Arithmetic5: Floating Point Arithmetic6: New Features in C++207: Secure Coding Guidelines8: Cryptography Libraries in C/C++20Part II: Pro Cryptography9: Elliptic Curve Cryptography10: Lattice-based Cryptography11: earchable Encryption12: Homomorphic Encryption13: (Ring) Learning with Errors Cryptography14: Chaos-based Cryptography15: Big Data Cryptography16:Cloud Computing CryptographyPart III: Pro Cryptanalysis17: Getting Started with Cryptanalysis18: Cryptanalysis Attacks and Techniques19: Linear and Differential Cryptanalysis20: Integral Cryptanalysis21: Brute Force and Buffer Overflow Attacks22: Text Characterization23: Implementation and Practical Approach of Cryptanalysis Methods
Machine Vision Inspection Systems, Machine Learning-Based Approaches
Machine Vision Inspection Systems (MVIS) is a multidisciplinary research field that emphasizes image processing, machine vision and, pattern recognition for industrial applications. Inspection techniques are generally used in destructive and non-destructive evaluation industry. Now a day's the current research on machine inspection gained more popularity among various researchers, because the manual assessment of the inspection may fail and turn into false assessment due to a large number of examining while inspection process.This volume 2 covers machine learning-based approaches in MVIS applications and it can be employed to a wide diversity of problems particularly in Non-Destructive testing (NDT), presence/absence detection, defect/fault detection (weld, textile, tiles, wood, etc.), automated vision test & measurement, pattern matching, optical character recognition & verification (OCR/OCV), natural language processing, medical diagnosis, etc. This edited book is designed to address various aspects of recent methodologies, concepts, and research plan out to the readers for giving more depth insights for perusing research on machine vision using machine learning-based approaches.MUTHUKUMARAN MALARVEL obtained his PhD in digital image processing and he is currently working as an associate professor in the Department of Computer Science and Engineering at Chitkara University, Punjab, India. His research interests include digital image processing, machine vision systems, image statistical analysis & feature extraction, and machine learning algorithms. SOUMYA RANJAN NAYAK obtained his PhD in computer science and engineering from the Biju Patnaik University of Technology, India. He has more than a decade of teaching and research experience and currently is working as an assistant professor, Amity University, Noida, India. His research interests include image analysis on fractal geometry, color and texture analysis jointly and separately. PRASANT KUMAR PATTNAIK PhD (Computer Science), Fellow IETE, Senior Member IEEE is a Professor at the School of Computer Engineering, KIIT Deemed to be University, Bhubaneswar, India. He has more than a decade of teaching and research experience. His areas of interest include mobile computing, cloud computing, cyber security, intelligent systems and brain computer interface. SURYA NARAYAN Panda is a Professor and Director Research at Chitkara University, Punjab, India. His areas of interest include cybersecurity, networking, advanced computer networks, machine learning, and artificial intelligence. He has developed the prototype of Smart Portable Intensive Care Unit through which the doctor can provide immediate virtual medical assistance to emergency cases in the ambulance. He is currently involved in designing different healthcare devices for real-time issues using AI and ML. Preface xiii1 MACHINE LEARNING-BASED VIRUS TYPE CLASSIFICATION USING TRANSMISSION ELECTRON MICROSCOPY VIRUS IMAGES 1Kalyan Kumar Jena, Sourav Kumar Bhoi, Soumya Ranjan Nayak and Chittaranjan Mallick1.1 Introduction 21.2 Related Works 31.3 Methodology 41.4 Results and Discussion 61.5 Conclusion 16References 162 CAPSULE NETWORKS FOR CHARACTER RECOGNITION IN LOW RESOURCE LANGUAGES 23C. Abeysinghe, I. Perera and D.A. Meedeniya2.1 Introduction 242.2 Background Study 252.2.1 Convolutional Neural Networks 252.2.2 Related Studies on One-Shot Learning 262.2.3 Character Recognition as a One-Shot Task 262.3 System Design 282.3.1 One-Shot Learning Implementation 312.3.2 Optimization and Learning 312.3.3 Dataset 322.3.4 Training Process 322.4 Experiments and Results 332.4.1 N-Way Classification 342.4.2 Within Language Classification 372.4.3 MNIST Classification 392.4.4 Sinhala Language Classification 412.5 Discussion 412.5.1 Study Contributions 412.5.2 Challenges and Future Research Directions 422.5.3 Conclusion 43References 433 AN INNOVATIVE EXTENDED METHOD OF OPTICAL PATTERN RECOGNITION FOR MEDICAL IMAGES WITH FIRM ACCURACY—4F SYSTEM-BASED MEDICAL OPTICAL PATTERN RECOGNITION 47Dhivya Priya E.L., D. Jeyabharathi, K.S. Lavanya, S. Thenmozhi, R. Udaiyakumar and A. Sharmila3.1 Introduction 483.1.1 Fourier Optics 483.2 Optical Signal Processing 503.2.1 Diffraction of Light 503.2.2 Biconvex Lens 513.2.3 4f System 513.2.4 Literature Survey 523.3 Extended Medical Optical Pattern Recognition 553.3.1 Optical Fourier Transform 553.3.2 Fourier Transform Using a Lens 553.3.3 Fourier Transform in the Far Field 563.3.4 Correlator Signal Processing 563.3.5 Image Formation in 4f System 573.3.6 Extended Medical Optical Pattern Recognition 583.4 Initial 4f System 593.4.1 Extended 4f System 593.4.2 Setup of 45 Degree 593.4.3 Database Creation 593.4.4 Superimposition of Diffracted Pattern 603.4.5 Image Plane 603.5 Simulation Output 603.5.1 MATLAB 603.5.2 Sample Input Images 613.5.3 Output Simulation 613.6 Complications in Real Time Implementation 643.6.1 Database Creation 643.6.2 Accuracy 653.6.3 Optical Setup 653.7 Future Enhancements 65References 654 BRAIN TUMOR DIAGNOSTIC SYSTEM— A DEEP LEARNING APPLICATION 69Kalaiselvi, T. and Padmapriya, S.T.4.1 Introduction 694.1.1 Intelligent Systems 694.1.2 Applied Mathematics in Machine Learning 704.1.3 Machine Learning Basics 724.1.4 Machine Learning Algorithms 734.2 Deep Learning 754.2.1 Evolution of Deep Learning 754.2.2 Deep Networks 764.2.3 Convolutional Neural Networks 774.3 Brain Tumor Diagnostic System 804.3.1 Brain Tumor 804.3.2 Methodology 804.3.3 Materials and Metrics 844.3.4 Results and Discussions 854.4 Computer-Aided Diagnostic Tool 864.5 Conclusion and Future Enhancements 87References 885 MACHINE LEARNING FOR OPTICAL CHARACTER RECOGNITION SYSTEM 91Gurwinder Kaur and Tanya Garg5.1 Introduction 915.2 Character Recognition Methods 925.3 Phases of Recognition System 935.3.1 Image Acquisition 935.3.2 Defining ROI 945.3.3 Pre-Processing 945.3.4 Character Segmentation 945.3.5 Skew Detection and Correction 955.3.6 Binarization 955.3.7 Noise Removal 975.3.8 Thinning 975.3.9 Representation 975.3.10 Feature Extraction 985.3.11 Training and Recognition 985.4 Post-Processing 1015.5 Performance Evaluation 1035.5.1 Recognition Rate 1035.5.2 Rejection Rate 1035.5.3 Error Rate 1035.6 Applications of OCR Systems 1045.7 Conclusion and Future Scope 105References 1056 SURFACE DEFECT DETECTION USING SVM-BASED MACHINE VISION SYSTEM WITH OPTIMIZED FEATURE 109Ashok Kumar Patel, Venkata Naresh Mandhala, Dinesh Kumar Anguraj and Soumya Ranjan Nayak6.1 Introduction 1106.2 Methodology 1136.2.1 Data Collection 1136.2.2 Data Pre-Processing 1136.2.3 Feature Extraction 1156.2.4 Feature Optimization 1166.2.5 Model Development 1196.2.6 Performance Evaluation 1206.3 Conclusion 123References 1247 COMPUTATIONAL LINGUISTICS-BASED TAMIL CHARACTER RECOGNITION SYSTEM FOR TEXT TO SPEECH CONVERSION 129Suriya, S., Balaji, M., Gowtham, T.M. and Rahul, Kumar S.7.1 Introduction 1307.2 Literature Survey 1307.3 Proposed Approach 1347.4 Design and Analysis 1347.5 Experimental Setup and Implementation 1367.6 Conclusion 151References 1518 A COMPARATIVE STUDY OF DIFFERENT CLASSIFIERS TO PROPOSE A GONN FOR BREAST CANCER DETECTION 155Ankita Tiwari, Bhawana Sahu, Jagalingam Pushaparaj and Muthukumaran Malarvel8.1 Introduction 1568.2 Methodology 1578.2.1 Dataset 1578.2.2 Linear Regression 1598.2.2.1 Correlation 1608.2.2.2 Covariance 1608.2.3 Classification Algorithm 1618.2.3.1 Support Vector Machine 1618.2.3.2 Random Forest Classifier 1628.2.3.3 K-Nearest Neighbor Classifier 1638.2.3.4 Decision Tree Classifier 1638.2.3.5 Multi-Layered Perceptron 1648.3 Results and Discussion 1658.4 Conclusion 169References 1699 MEXICAN SIGN-LANGUAGE STATIC-ALPHABET RECOGNITION USING 3D AFFINE INVARIANTS 171Guadalupe Carmona-Arroyo, Homero V. Rios-Figueroa and Martha Lorena Avendaño-Garrido9.1 Introduction 1719.2 Pattern Recognition 1759.2.1 3D Affine Invariants 1759.3 Experiments 1779.3.1 Participants 1799.3.2 Data Acquisition 1799.3.3 Data Augmentation 1799.3.4 Feature Extraction 1819.3.5 Classification 1819.4 Results 1829.4.1 Experiment 1 1829.4.2 Experiment 2 1849.4.3 Experiment 3 1849.5 Discussion 1889.6 Conclusion 189Acknowledgments 190References 19010 PERFORMANCE OF STEPPED BAR PLATE-COATED NANOLAYER OF A BOX SOLAR COOKER CONTROL BASED ON ADAPTIVE TREE TRAVERSAL ENERGY AND OSELM 193S. Shanmugan, F.A. Essa, J. Nagaraj and Shilpa Itnal10.1 Introduction 19410.2 Experimental Materials and Methodology 19610.2.1 Furious SiO2/TiO2 Nanoparticle Analysis of SSBC Performance Methods 19610.2.2 Introduction for OSELM by Use of Solar Cooker 19810.2.3 Online Sequential Extreme Learning Machine (OSELM) Approach for Solar Cooker 19910.2.4 OSELM Neural Network Adaptive Controller on Novel Design 19910.2.5 Binary Search Tree Analysis of Solar Cooker 20010.2.6 Tree Traversal of the Solar Cooker 20510.2.7 Simulation Model of Solar Cooker Results 20610.2.8 Program 20710.3 Results and Discussion 21010.4 Conclusion 212References 21411 APPLICATIONS TO RADIOGRAPHY AND THERMOGRAPHY FOR INSPECTION 219Inderjeet Singh Sandhu, Chanchal Kaushik and Mansi Chitkara11.1 Imaging Technology and Recent Advances 22011.2 Radiography and its Role 22011.3 History and Discovery of X-Rays 22111.4 Interaction of X-Rays With Matter 22211.5 Radiographic Image Quality 22211.6 Applications of Radiography 22511.6.1 Computed Radiography (CR)/Digital Radiography (DR) 22511.6.2 Fluoroscopy 22711.6.3 DEXA 22811.6.4 Computed Tomography 22911.6.5 Industrial Radiography 23111.6.6 Thermography 23411.6.7 Veterinary Imaging 23511.6.8 Destructive Testing 23511.6.9 Night Vision 23511.6.10 Conclusion 236References 23612 PREDICTION AND CLASSIFICATION OF BREAST CANCER USING DISCRIMINATIVE LEARNING MODELS AND TECHNIQUES 241M. Pavithra, R. Rajmohan, T. Ananth Kumar and R. Ramya12.1 Breast Cancer Diagnosis 24212.2 Breast Cancer Feature Extraction 24312.3 Machine Learning in Breast Cancer Classification 24512.4 Image Techniques in Breast Cancer Detection 24612.5 Dip-Based Breast Cancer Classification 24812.6 RCNNs in Breast Cancer Prediction 25512.7 Conclusion and Future Work 260References 26113 COMPRESSED MEDICAL IMAGE RETRIEVAL USING DATA MINING AND OPTIMIZED RECURRENT NEURAL NETWORK TECHNIQUES 263Vamsidhar Enireddy, Karthikeyan C., Rajesh Kumar T. and Ashok Bekkanti13.1 Introduction 26413.2 Related Work 26513.2.1 Approaches in Content-Based Image Retrieval (CBIR) 26513.2.2 Medical Image Compression 26613.2.3 Image Retrieval for Compressed Medical Images 26713.2.4 Feature Selection in CBIR 26813.2.5 CBIR Using Neural Network 26813.2.6 Classification of CBIR 26913.3 Methodology 26913.3.1 Huffman Coding 27013.3.2 Haar Wavelet 27113.3.3 Sobel Edge Detector 27313.3.4 Gabor Filter 27313.3.5 Proposed Hybrid CS-PSO Algorithm 27613.4 Results and Discussion 27713.5 Conclusion and Future Enhancement 28213.5.1 Conclusion 28213.5.2 Future Work 283References 28314 A NOVEL DISCRETE FIREFLY ALGORITHM FOR CONSTRAINED MULTI-OBJECTIVE SOFTWARE RELIABILITY ASSESSMENT OF DIGITAL RELAY 287Madhusudana Rao Nalluri, K. Kannan and Diptendu Sinha Roy14.1 Introduction 28814.2 A Brief Review of the Digital Relay Software 29114.3 Formulating the Constrained Multi-Objective Optimization of Software Redundancy Allocation Problem (CMOO-SRAP) 29314.3.1 Mathematical Formulation 29414.4 The Novel Discrete Firefly Algorithm for Constrained Multi-Objective Software Reliability Assessment of Digital Relay 29714.4.1 Basic Firefly Algorithm 29814.4.2 The Modified Discrete Firefly Algorithm 29914.4.2.1 Generating Initial Population 29914.4.2.2 Improving Solutions 29914.4.2.3 Illustrative Example 30114.4.3 Similarity-Based Parent Selection (SBPS) 30314.4.4 Solution Encoding for the CMOO-SRAP for Digital Relay Software 30514.5 Simulation Study and Results 30514.5.1 Simulation Environment 30514.5.2 Simulation Parameters 30614.5.3 Configuration of Solution Vectors for the CMOOSRAP for Digital Relay 30614.5.4 Results and Discussion 30614.6 Conclusion 317References 317Index 323
Blockchain for Business
The book focuses on the power of business blockchain. It gives an overview of blockchain in traditional business, marketing, accounting and business intelligence. The book provides a detailed working knowedge of blockchain, user cases of blockchain in business, cryptocurrency and Initial Coin Offering(ICO) along with the risks associated with them. The book also covers the detailed study of decentralization, mining, consensus, smart contracts, concepts and working of distributed ledgers and hyper ledgers as well as many other important concepts. It also details the security and privacy aspects of blockchain.The book is beneficial for readers who are preparing for their business careers, those who are working with small scale businesses and startups, and helpful for business executives, managers, entrepreneurs, bankers, government officials and legal professionals who are looking to blockchain for secure financial transactions. The book will also be beneficial for researchers and students who want to study the latest developments of blockchain.S.S. TYAGI is a Professor of Computer Engineering and Dean at Manav Rachna International Institute of Research & Studies, Faridabad, India. He obtained his PhD from Kururkshetra University in 2010 in Computer Technology. He has more than 28 years of teaching and research experience and has authored many research publications in high indexed journals. SHAVETA BHATIA is Professor of Faculty of Computer Applications, Manav Rachna International Institute of Research & Studies. She has more than 17 years of academic and research experience. She has authored many research papers and published over a span of her teaching career in various reputed journals and conferences. Preface xv1 INTRODUCTION TO BLOCKCHAIN 1Akshay Mudgal1.1 Introduction 11.1.1 Public Blockchain Architecture 51.1.2 Private Blockchain Architecture 51.1.3 Consortium Blockchain Architecture 51.2 The Privacy Challenges of Blockchain 61.3 De-Anonymization 81.3.1 Analysis of Network 91.3.2 Transaction Fingerprinting 91.3.3 DoS Attacks 91.3.4 Sybil Attacks 91.4 Transaction Pattern Exposure 101.4.1 Transaction Graph Analysis 101.4.2 AS-Level Deployment Analysis 101.5 Methodology: Identity Privacy Preservation 101.5.1 Mixing Services 101.5.2 Ring Signature 121.6 Decentralization Challenges Exist in Blockchain 141.7 Conclusion 151.8 Regulatory Challenges 161.9 Obstacles to Blockchain Regulation 161.10 The Current Regulatory Landscape 171.11 The Future of Blockchain Regulation 181.12 Business Model Challenges 191.12.1 Traditional Business Models 191.12.2 Manufacturer 191.12.3 Distributor 201.12.4 Retailer 201.12.5 Franchise 201.13 Utility Token Model 201.13.1 Right 211.13.2 Value Exchange 211.13.3 Toll 211.13.4 Function 211.13.5 Currency 221.13.6 Earning 221.14 Blockchain as a Service 221.15 Securities 231.16 Development Platforms 241.17 Scandals and Public Perceptions 251.17.1 Privacy Limitations 261.17.2 Lack of Regulations and Governance 261.17.3 Cost to Set Up 261.17.4 Huge Consumption of Energy 261.17.5 Public Perception 27References 272 THE SCOPE FOR BLOCKCHAIN ECOSYSTEM 29Manisha Suri2.1 Introduction 302.2 Blockchain as Game Changer for Environment 322.3 Blockchain in Business Ecosystem 382.3.1 Business Ecosystem 392.3.1.1 What Is Business Model? 392.3.1.2 Business Model—Traditional 392.3.2 Are Blockchain Business Models Really Needed? 412.3.2.1 Blockchain Business Model 412.3.2.2 Model 1: Utility Token Model 412.3.2.3 Model 2: BaaS 432.3.2.4 Model 3: Securities 442.3.2.5 Model 4: Development Platforms 452.3.2.6 Model 5: Blockchain-Based Software Products 462.3.2.7 Model 6: Blockchain Professional Services 462.3.2.8 Model 7: Business Model—P2P 472.4 Is Blockchain Business Ecosystem Profitable? 482.5 How Do You “Design” a Business Ecosystem? 492.6 Redesigning Future With Blockchain 532.6.1 Is Earth Prepared for Blockchain? 532.7 Challenges and Opportunities 57References 583 BUSINESS USE CASES OF BLOCKCHAIN TECHNOLOGY 59Vasudha Arora, Shweta Mongia, Sugandha Sharma and Shaveta Malik3.1 Introduction to Cryptocurrency 603.2 What is a Bitcoin? 603.2.1 Bitcoin Transactions and Their Processing 623.2.2 Double Spending Problem 653.2.3 Bitcoin Mining 673.3 Bitcoin ICO 693.3.1 ICO Token 693.3.2 How to Participate in ICO 703.3.3 Types of Tokens 713.4 Advantages and Disadvantages of ICO 723.5 Merchant Acceptance of Bitcoin 73References 754 ETHEREUM 77Shaveta Bhatia and S.S Tyagi4.1 Introduction 784.2 Basic Features of Ethereum 784.3 Difference between Bitcoin and Ethereum 794.4 EVM (Ethereum Virtual Machine) 824.5 Gas 854.5.1 Gas Price Chart 854.6 Applications Built on the Basis of Ethereum 864.7 ETH 874.7.1 Why Users Want to Buy ETH? 874.7.2 How to Buy ETH? 884.7.3 Alternate Way to Buy ETH 884.7.4 Conversion of ETH to US Dollar 894.8 Smart Contracts 904.8.1 Government 904.8.2 Management 914.8.3 Benefits of Smart Contracts 914.8.4 Problems With Smart Contracts 924.8.5 Solution to Overcome This Problem 924.8.6 Languages to Build Smart Contracts 924.9 DApp (Decentralized Application or Smart Contract) 934.9.1 DApp in Ethereum 934.9.2 Applications of DApps 934.10 Conclusion 95References 955 E-WALLET 97Ms. Vishawjyoti5.1 Overview of Wallet Technology 975.2 Types of Wallet 985.2.1 Paper 985.2.2 Physical Bitcoins 995.2.3 Mobile 995.2.4 Web 1005.2.5 Desktop 1005.2.6 Hardware 1005.2.7 Bank 1015.3 Security of Bitcoin Wallets 1015.4 Workings of Wallet Technology 1015.5 Create HD Wallet From Seed 1025.5.1 Initiation 1035.5.2 Steps for Creating an HD Wallet From a 24-Word Seed Phrase Through Particl-qt Tool 1045.5.3 Steps for Encrypting the HD Wallet 1065.5.4 Utilization 1085.5.5 Steps for Generating Address to Access Transactions on the HD Wallet 1085.6 Navigating HD Wallet 1095.7 Conclusion 110References 1106 BLOCKCHAIN AND GOVERNANCE: THEORY, APPLICATIONS AND CHALLENGES 113Bhavya Ahuja Grover, Bhawna Chaudhary, Nikhil Kumar Rajput and Om Dukiya6.1 Introduction 1146.2 Governance: Centralized vs Decentralized 1156.3 Blockchain’s Features Supportive of Decentralization 1176.4 Noteworthy Application Areas for Blockchain-Based Governance 1196.4.1 Public Service Governance 1196.4.2 Knowledge and Shared Governance 1216.4.3 Governance in Supply Chain 1236.4.4 Governance of Foreign Aid 1246.4.5 Environmental Governance 1256.4.6 Corporate Governance 1266.4.7 Economic Governance 1286.5 Scopes and Challenges 1286.6 Conclusion 136References 1377 BLOCKCHAIN-BASED IDENTITY MANAGEMENT 141Abhishek Bhattacharya7.1 Introduction 1417.2 Existing Identity Management Systems and Their Challenges 1427.3 Concept of Decentralized Identifiers 1447.4 The Workflow of Blockchain Identity Management Systems 1457.5 How Does it Contribute to Data Security? 1487.6 Trending Blockchain Identity Management Projects 1507.7 Why and How of Revocation 1527.8 Points to Ponder 1547.8.1 Comparison Between Traditional and Blockchain-Based Identity Management Systems 1567.9 Conclusion 157References 1588 BLOCKCHAIN & IOT: A PARADIGM SHIFT FOR SUPPLY CHAIN MANAGEMENT 159Abhishek Bhattacharya8.1 Introduction 1598.2 Supply Chain Management 1608.2.1 The Aspects of a Supply Chain 1618.2.2 Supply Chain Performance Dimensions 1628.2.3 Supply Chain Migration Towards Digitalization 1638.3 Blockchain and IoT 1648.3.1 What Makes Blockchain Suitable for SCM? 1668.3.1.1 Shared Ledger 1678.3.1.2 Permissions 1688.3.1.3 Consensus 1688.3.1.4 Smart Contracts 1698.3.2 The Role of Blockchain in Achieving the SCM Performance Dimensions 1708.3.3 The Role of IoT in the Implementation of Blockchain Technology 1718.4 Blockchain Technology and IoT Use Cases in Supply Chain Management 1728.5 Benefits and Challenges in Blockchain-Based Supply Chain Management 1738.6 Conclusion 176References 1769 BLOCKCHAIN-ENABLED SUPPLY CHAIN MANAGEMENT SYSTEM 179Sonal Pathak9.1 Introduction 1809.1.1 Supply Chain Management 1809.2 Blockchain Technology 1849.3 Blockchain Technology in Supply Chain Management 1869.4 Elements of Blockchain That Affects Supply Chain 1909.4.1 Bitcoin 1959.5 Challenges in Implementation of Blockchain-Enabled Supply Chain 1979.6 Conclusion 197References 19910 SECURITY CONCERNS OF BLOCKCHAIN 201Neha Jain and Kamiya Chugh10.1 Introduction: Security Concerns of Blockchain 20110.2 Cryptocurrencies Scenarios 20210.3 Privacy Challenges of Blockchain 20310.3.1 Protection Problems in Blockchain 20310.3.2 Privacy-Preserving Mechanisms Analysis 20710.3.3 Data Anonymization-Mixing 20710.4 Decentralization in Blockchain 20810.4.1 Role of Decentralization in Blockchain 20910.4.2 Analysis of PoS and DPoS 21010.4.3 Problems With Decentralization 21010.4.4 Decentralization Recovery Methods 21210.5 Legal and Regulatory Issues in Blockchain 21310.5.1 Legal Value of Blockchain and its Problems 21410.6 Smart Contracts 21810.7 Scandals of Blockchain 22010.7.1 Blockchain Technologies as Stumbling Blocks to Financial Legitimacy 22310.8 Is Blockchain the Rise of Trustless Trust? 22310.8.1 Why Do We Need a System of Trust? 22610.9 Blockchain Model Challenges 227References 22911 ACCEPTANCE AND ADOPTION OF BLOCKCHAIN TECHNOLOGY: AN EXAMINATION OF THE SECURITY & PRIVACY CHALLENGES 231Amandeep Dhaliwal and Sahil Malik11.1 Introduction 23111.1.1 Research Methodology 23311.1.2 Analysis 23311.2 Security Issues of Blockchain 23311.2.1 The Majority Attack (51% Attacks) 23311.2.2 The Fork Problems 23411.2.2.1 Hard Fork 23411.2.2.2 Soft Fork 23511.2.3 Scale of Blockchain 23511.2.4 Time Confirmation of Blockchain Data— Double-Spend Attack/Race Attack 23511.2.5 Current Regulations Problems 23611.2.6 Scalability and Storage Capacity 23611.2.7 DOS Attack/Sybil Attack/Eclipse Attack/Bugs 23711.2.8 Legal Issues 23711.2.9 Security of Wallets 23811.2.10 The Increased Computing Power 23811.3 Privacy Challenges of Bitcoin 23811.3.1 De-Anonymization 23911.3.1.1 Network Analysis 23911.3.1.2 Address Clustering 23911.3.1.3 Transaction Finger Printing 24011.3.2 Transaction Pattern Exposure 24011.3.2.1 Transaction Graph Analysis 24011.3.2.2 Autonomous System-Level Deployment Analysis 24111.4 Blockchain Application-Based Solutions 24111.4.1 Bitcoins 24111.4.2 IoT 24211.4.2.1 MyBit 24211.4.3 Aero Token 24211.4.4 The Chain of Things 24311.4.5 The Modum 24311.4.6 Twin of Things 24311.4.7 The Blockchain of Things 24411.4.8 Blockchain Solutions: Cloud Computing 24411.5 Conclusion and Future Work 245References 24512 DEFICIENCIES IN BLOCKCHAIN TECHNOLOGY AND POTENTIAL AUGMENTATION IN CYBER SECURITY 251Eshan Bajal, Madhulika Bhatia, Lata Nautiyal and Madhurima Hooda12.1 Introduction 25212.2 Security Issues in Blockchain Technology 25212.3 Privacy Challenges 25312.3.1 BGP Hijacking Attack 25512.3.2 BDoS (Blockchain Denial of Service) 25512.3.3 Forcing Other Miners to Stop Mining 25612.4 Decentralization Challenges 25612.5 Regulatory Challenges 26012.5.1 Principles to Follow While Regulating 26212.5.1.1 Flexible to Legal Innovation 26212.5.1.2 Experimentation Should be Encouraged 26312.5.1.3 Focus on the Immediate Implications 26412.5.1.4 Regulators Should Engage in a Transnational Conversation 26412.5.2 Regulatory Strategies 26512.5.2.1 Wait-and-See 26512.5.2.2 Imposing Narrowing and Broadening Guidance 26612.5.2.3 Sandboxing 26612.5.2.4 Issue a New Legislation 26712.5.2.5 Use Blockchain in Regulation 26812.6 Business Model Challenges 26912.7 Scandals and Public Perception 27112.8 Why Blockchain is Trustless 27712.8.1 Trust Mechanism 27812.8.2 Anonymity 27912.8.3 Use in Digital Wallets 27912.8.4 Forgery Resistance 27912.9 Use of Blockchain in Cybersecurity 28012.9.1 Blockchain Database 28112.9.2 DNS Security 28312.9.3 IoT Security 28312.9.4 DDoS Prevention 28612.9.5 CDN (Content Delivery Network) 28612.9.6 SMS Authentication 287References 28813 INTERNET OF THINGS AND BLOCKCHAIN 295Priyanka Sharma13.1 History of ‘Internet of Things’ 29613.2 IoT Devices 29813.3 Sensors and Actuators 30213.4 Cloud and Haze-Based Engineering 30713.5 Blockchain and IoT 31513.6 Edge Computing 32113.7 Contextual Analyses 32413.8 Fate of Blockchain and IoT 332References 33214 BLOCKCHAIN APPLICATIONS 337Boby Singh, Rohit Pahwa, Hari Om Tanwar and Nikita Gupta14.1 Introduction to Blockchain 33714.1.1 Uses of Blockchain in Administration 33914.2 Blockchain in Big Data Predictive Task Automation 34014.2.1 How Can Blockchain Help Big Data? 34114.2.2 Blockchain Use Cases in Big Data 34114.3 Digital Identity Verification 34214.3.1 Why Digital Identity Matters? 34314.3.2 Blockchain (Definition and its Features) 34314.3.3 Why do we Need Blockchain in Digital Identity? 34414.3.4 How Does a Blockchain Works? 34514.3.5 Why is a Blockchain Secure? 34514.3.6 What’s Blockchain Identification Management? 34614.3.7 Advantages 34714.4 Blockchain Government 34814.4.1 Decentralized Government Services 34914.4.2 Liquid Democracy and Random Sample Election 35014.5 Blockchain Science 35114.5.1 FoldingCoin 35114.5.2 GridCoin (GRC) 35214.5.3 Global Public Health 35314.5.4 Bitcoin Genomics 35414.6 Blockchain Health 35514.6.1 Health Coin 35514.6.2 EMR on Blockchain 35514.6.3 Bit Coin Health Notary 35614.7 Blockchain Learning 35714.7.1 Bitcoin MOOCs 35714.7.2 Smart Contract Literacy 35714.7.3 LearnCoin 359References 35915 ADVANCE CONCEPTS OF BLOCKCHAIN 361Raj Kumar15.1 Community Supercomputing 36115.2 Blockchain Genomics 36415.3 Blockchain Learning 36515.4 Community Coin 36615.4.1 Monetary and Non-Monetary Currencies 36715.4.2 Difference Between Monetary and Non-Monetary Assets 36915.4.3 Currency Multiplicity 36915.4.4 List of Some Prominent Alternate Coins is Given Below 37015.5 Demurrage Currencies 371Reading List 371Index 373
Deep Learning with Swift for TensorFlow
ABOUT THIS BOOKDiscover more insight about deep learning algorithms with Swift for TensorFlow. The Swift language was designed by Apple for optimized performance and development whereas TensorFlow library was designed by Google for advanced machine learning research. Swift for TensorFlow is a combination of both with support for modern hardware accelerators and more. This book covers the deep learning concepts from fundamentals to advanced research. It also introduces the Swift language for beginners in programming. This book is well suited for newcomers and experts in programming and deep learning alike. After reading this book you should be able to program various state-of-the-art deep learning algorithms yourself.The book covers foundational concepts of machine learning. It also introduces the mathematics required to understand deep learning. Swift language is introduced such that it allows beginners and researchers to understand programming and easily transit to Swift for TensorFlow, respectively. You will understand the nuts and bolts of building and training neural networks, and build advanced algorithms.WHAT YOU’LL LEARN• Understand deep learning concepts• Program various deep learning algorithms• Run the algorithms in cloudWHO THIS BOOK IS FOR• Newcomers to programming and/or deep learning, and experienced developers.• Experienced deep learning practitioners and researchers who desire to work in user space instead of library space with a same programming language without compromising the speedRahul Bhalley is an independent machine intelligence researcher. He was the co-founder of a short-lived deep learning startup in 2018. He has published research papers in areas such as speech processing and generative modeling. He actively contributes to open source projects related to deep learning on GitHub. He has also worked with Apple's Swift and shares Google's vision of making it easy for others to understand deep learning with Swift.Chapter 1: Machine Learning BasicsChapter 2: Essential MathChapter 3: Differential ProgrammingChapter 4: TensorFlow BasicsChapter 5: Neural NetworksChapter 6: Computer Vision
TensorFlow 2.x in the Colaboratory Cloud
Use TensorFlow 2.x with Google's Colaboratory (Colab) product that offers a free cloud service for Python programmers. Colab is especially well suited as a platform for TensorFlow 2.x deep learning applications. You will learn Colab’s default install of the most current TensorFlow 2.x along with Colab’s easy access to on-demand GPU hardware acceleration in the cloud for fast execution of deep learning models. This book offers you the opportunity to grasp deep learning in an applied manner with the only requirement being an Internet connection. Everything else—Python, TensorFlow 2.x, GPU support, and Jupyter Notebooks—is provided and ready to go from Colab.The book begins with an introduction to TensorFlow 2.x and the Google Colab cloud service. You will learn how to provision a workspace on Google Colab and build a simple neural network application. From there you will progress into TensorFlow datasets and building input pipelines in support of modeling and testing. You will find coverage of deep learning classification and regression, with clear code examples showing how to perform each of those functions. Advanced topics covered in the book include convolutional neural networks and recurrent neural networks.This book contains all the applied math and programming you need to master the content. Examples range from simple to relatively complex when necessary to ensure acquisition of appropriate deep learning concepts and constructs. Examples are carefully explained, concise, accurate, and complete to perfectly complement deep learning skill development. Care is taken to walk you through the foundational principles of deep learning through clear examples written in Python that you can try out and experiment with using Google Colab from the comfort of your own home or office.WHAT YOU WILL LEARN* Be familiar with the basic concepts and constructs of applied deep learning* Create machine learning models with clean and reliable Python code* Work with datasets common to deep learning applications* Prepare data for TensorFlow consumption* Take advantage of Google Colab’s built-in support for deep learning* Execute deep learning experiments using a variety of neural network models* Be able to mount Google Colab directly to your Google Drive account* Visualize training versus test performance to see model fitWHO THIS BOOK IS FORReaders who want to learn the highly popular TensorFlow 2.x deep learning platform, those who wish to master deep learning fundamentals that are sometimes skipped over in the rush to be productive, and those looking to build competency with a modern cloud service tool such as Google ColabDR. DAVID PAPER is a full professor at Utah State University (USU) in the Management Information Systems department. He has over 30 years of higher education teaching experience. At USU, he has over 26 years teaching in the classroom and distance education over satellite. Dr. Paper has taught a variety of classes at the undergraduate, graduate, and doctorate levels, but he specializes in technology education. He has competency in several programming languages, but his focus is currently on deep learning (Python) and database programming (PyMongo). Dr. Paper has published three technical books for industry professionals, including Web Programming for Business: PHP Object-Oriented Programming with Oracle, Data Science Fundamentals for Python and MongoDB (Apress), and Hands-on Scikit-Learn for Machine Learning Applications: Data Science Fundamentals with Python (Apress). He has authored more than 100 academic publications. Besides growing up in family businesses, Dr. Paper has worked for Texas Instruments, DLS, Inc., and the Phoenix Small Business Administration. He has performed IS consulting work for IBM, AT&T, Octel, Utah Department of Transportation, and the Space Dynamics Laboratory. 1. Introduction to Deep Learning2. Build Your First Neural Network with Google Colab3. Working with TensorFlow Data4. Working with Other Data5. Classification6. Regression7. Convolutional Neural Networks8. Automated Text Generation9. Sentiment Analysis10. Time Series Forecasting with RNNs
Hands-on Question Answering Systems with BERT
Get hands-on knowledge of how BERT (Bidirectional Encoder Representations from Transformers) can be used to develop question answering (QA) systems by using natural language processing (NLP) and deep learning.The book begins with an overview of the technology landscape behind BERT. It takes you through the basics of NLP, including natural language understanding with tokenization, stemming, and lemmatization, and bag of words. Next, you’ll look at neural networks for NLP starting with its variants such as recurrent neural networks, encoders and decoders, bi-directional encoders and decoders, and transformer models. Along the way, you’ll cover word embedding and their types along with the basics of BERT.After this solid foundation, you’ll be ready to take a deep dive into BERT algorithms such as masked language models and next sentence prediction. You’ll see different BERT variations followed by a hands-on example of a question answering system.Hands-on Question Answering Systems with BERT is a good starting point for developers and data scientists who want to develop and design NLP systems using BERT. It provides step-by-step guidance for using BERT.WHAT YOU WILL LEARN* Examine the fundamentals of word embeddings* Apply neural networks and BERT for various NLP tasksDevelop a question-answering system from scratch* Train question-answering systems for your own dataWHO THIS BOOK IS FORAI and machine learning developers and natural language processing developers.Navin is the chief architect for HCL DryICE Autonomics. He is an innovator, thought leader, author, and consultant in the areas of AI, machine learning, cloud computing, big data analytics, and software product development. He is responsible for IP development and service delivery in the areas of AI and machine learning, automation, AIOPS, public cloud GCP, AWS, and Microsoft Azure. Navin has authored 15+ books in the areas of cloud computing , cognitive virtual agents, IBM Watson, GCP, containers, and microservices.Amit Agrawal is a senior data scientist and researcher delivering solutions in the fields of AI and machine learning. He is responsible for designing end-to-end solutions and architecture for enterprise products. He has also authored and reviewed books in the area of cognitive virtual assistants.Chapter 1: Introduction to Natural Language ProcessingChapter Goal: To introduce basics of natural language processing1.1 What is natural language processing1.2 What is natural language understanding1.3 Natural language processing tasks1.3.1 Tokenization1.3.2 Stemming and lemmatization1.3.3 Bag of words1.3.4 Word / Sentence vectorizationChapter 2: Introduction to Word EmbeddingsChapter Goal: To introduce the basics of word embeddings3.1 What is word embeddings3.2 Different methods of word embeddings3.2.1 Word2vec3.2.2 Glove3.2.3 Elmo3.2.4 Universal sentence encoders3.2.5 BERT3.3 Bidirectional Encoder Representations from Transformers (BERT)3.3.1 BERT – base3.3.2 BERT - largeChapter 3: BERT Algorithms ExplainedChapter Goal: Details on BERT model algorithms4.1 Masked language model4.2 Next sentence prediction (NSP)4.3 Text classification using BERT4.4 Various types of BERT based models4.4.1 ALBERT4.4.2 ROBERT4.4.3 DistilBERTChapter 4: BERT Model Applications - Question Answering SystemChapter Goal: Details on question answering system5.1 Introduction5.2 Types of QA systems5.3 QA system design using BERT5.4 DrQA system5.5 DeepPavlov QA systemChapter 5: BERT Model Applications - Other tasksChapter Goal: Details on NLP tasks performed by BERT.6.1 Introduction6.2 Other NLP Tasks:6.2.1 Sentiment analysis6.2.2. Named entity recognition6.2.3 Tag generation6.2.4 Classification6.2.5 Text summarization6.2.6 Language translationChapter 6: Future of BERT modelsChapter Goal: Provides an introduction to the new advances in the areas NLP using BERT7.1 BERT - Future capabilities
Intelligent Data Analytics for Terror Threat Prediction
Intelligent data analytics for terror threat prediction is an emerging field of research at the intersection of information science and computer science, bringing with it a new era of tremendous opportunities and challenges due to plenty of easily available criminal data for further analysis.This book provides innovative insights that will help obtain interventions to undertake emerging dynamic scenarios of criminal activities. Furthermore, it presents emerging issues, challenges and management strategies in public safety and crime control development across various domains. The book will play a vital role in improvising human life to a great extent. Researchers and practitioners working in the fields of data mining, machine learning and artificial intelligence will greatly benefit from this book, which will be a good addition to the state-of-the-art approaches collected for intelligent data analytics. It will also be very beneficial for those who are new to the field and need to quickly become acquainted with the best performing methods. With this book they will be able to compare different approaches and carry forward their research in the most important areas of this field, which has a direct impact on the betterment of human life by maintaining the security of our society. No other book is currently on the market which provides such a good collection of state-of-the-art methods for intelligent data analytics-based models for terror threat prediction, as intelligent data analytics is a newly emerging field and research in data mining and machine learning is still in the early stage of development.SUBHENDU KUMAR PANI received his PhD from Utkal University Odisha, India in 2013. He is a professor in the Department of Computer Science & Engineering, Orissa Engineering College (OEC), Bhubaneswar, India. He has published more than 50 articles in international journals, authored 5 books and edited 2 volumes. SANJAY KUMAR SINGH is a professor in the Department of Computer Science and Engineering at the Indian Institute of Technology, Varanasi. He has published more than 130 international publications, 4 edited books and 2 patents. LALIT GARG received his PhD from the University of Ulster, UK in Computing and Information Engineering. He is a senior lecturer in Computer Information Systems, University of Malta, Malta. RAM BILAS PACHORI received his PhD degree in Electrical Engineering from the Indian Institute of Technology (IIT) Kanpur, India in 2008. He is now a professor of Electrical Engineering, IIT Indore, India. He has more than 170 publications which include journal papers, conference papers, books, and book chapters. XIAOBO ZHANG obtained his Master of Computer Science, Doctor of Engineering (Control Theory and Control Engineering) and is now working in the Internet of Things Department of Automation, Guangdong University of Technology, China. He has published more than 30 journal articles, edited 3 books, and has applied for more than 40 invention patents and obtained 6 software copyrights. Preface xv1 RUMOR DETECTION AND TRACING ITS SOURCE TO PREVENT CYBER-CRIMES ON SOCIAL MEDIA 1Ravi Kishore Devarapalli and Anupam Biswas1.1 Introduction 21.2 Social Networks 41.2.1 Types of Social Networks 41.3 What is Cyber-Crime? 71.3.1 Definition 71.3.2 Types of Cyber-Crimes 71.3.2.1 Hacking 71.3.2.2 Cyber Bullying 71.3.2.3 Buying Illegal Things 81.3.2.4 Posting Videos of Criminal Activity 81.3.3 Cyber-Crimes on Social Networks 81.4 Rumor Detection 91.4.1 Models 91.4.1.1 Naïve Bayes Classifier 101.4.1.2 Support Vector Machine 131.4.2 Combating Misinformation on Instagram 141.5 Factors to Detect Rumor Source 151.5.1 Network Structure 151.5.1.1 Network Topology 161.5.1.2 Network Observation 161.5.2 Diffusion Models 181.5.2.1 SI Model 181.5.2.2 SIS Model 191.5.2.3 SIR Model 191.5.2.4 SIRS Model 201.5.3 Centrality Measures 211.5.3.1 Degree Centrality 211.5.3.2 Closeness Centrality 211.5.3.3 Betweenness Centrality 221.6 Source Detection in Network 221.6.1 Single Source Detection 231.6.1.1 Network Observation 231.6.1.2 Query-Based Approach 251.6.1.3 Anti-Rumor-Based Approach 261.6.2 Multiple Source Detection 261.7 Conclusion 27References 282 INTERNET OF THINGS (IOT) AND MACHINE TO MACHINE (M2M) COMMUNICATION TECHNIQUES FOR CYBER CRIME PREDICTION 31Jaiprakash Narain Dwivedi2.1 Introduction 322.2 Advancement of Internet 332.3 Internet of Things (IoT) and Machine to Machine (M2M) Communication 342.4 A Definition of Security Frameworks 382.5 M2M Devices and Smartphone Technology 392.6 Explicit Hazards to M2M Devices Declared by Smartphone Challenges 412.7 Security and Privacy Issues in IoT 432.7.1 Dynamicity and Heterogeneity 432.7.2 Security for Integrated Operational World with Digital World 442.7.3 Information Safety with Equipment Security 442.7.4 Data Source Information 442.7.5 Information Confidentiality 442.7.6 Trust Arrangement 442.8 Protection in Machine to Machine Communication 482.9 Use Cases for M2M Portability 522.10 Conclusion 53References 543 CRIME PREDICTIVE MODEL USING BIG DATA ANALYTICS 57Hemanta Kumar Bhuyan and Subhendu Kumar Pani3.1 Introduction 583.1.1 Geographic Information System (GIS) 593.2 Crime Data Mining 603.2.1 Different Methods for Crime Data Analysis 623.3 Visual Data Analysis 633.4 Technological Analysis 653.4.1 Hadoop and MapReduce 653.4.1.1 Hadoop Distributed File System (HDFS) 653.4.1.2 MapReduce 653.4.2 Hive 673.4.2.1 Analysis of Crime Data using Hive 673.4.2.2 Data Analytic Module With Hive 683.4.3 Sqoop 683.4.3.1 Pre-Processing and Sqoop 683.4.3.2 Data Migration Module With Sqoop 683.4.3.3 Partitioning 683.4.3.4 Bucketing 683.4.3.5 R-Tool Analyse Crime Data 693.4.3.6 Correlation Matrix 693.5 Big Data Framework 693.6 Architecture for Crime Technical Model 723.7 Challenges 733.8 Conclusions 74References 754 THE ROLE OF REMOTE SENSING AND GIS IN MILITARY STRATEGY TO PREVENT TERROR ATTACKS 79Sushobhan Majumdar4.1 Introduction 804.2 Database and Methods 814.3 Discussion and Analysis 824.4 Role of Remote Sensing and GIS 834.5 Cartographic Model 834.5.1 Spatial Data Management 854.5.2 Battlefield Management 854.5.3 Terrain Analysis 864.6 Mapping Techniques Used for Defense Purposes 874.7 Naval Operations 884.7.1 Air Operations 894.7.2 GIS Potential in Military 894.8 Future Sphere of GIS in Military Science 894.8.1 Defense Site Management 904.8.2 Spatial Data Management 904.8.3 Intelligence Capability Approach 904.8.4 Data Converts Into Information 904.8.5 Defense Estate Management 914.9 Terrain Evolution 914.9.1 Problems Regarding the Uses of Remote Sensing and GIS 914.9.2 Recommendations 924.10 Conclusion 92References 935 TEXT MINING FOR SECURE CYBER SPACE 95Supriya Raheja and Geetika Munjal5.1 Introduction 955.2 Literature Review 975.2.1 Text Mining With Latent Semantic Analysis 1005.3 Latent Semantic Analysis 1015.4 Proposed Work 1025.5 Detailed Work Flow of Proposed Approach 1045.5.1 Defining the Stop Words 1065.5.2 Stemming 1075.5.3 Proposed Algorithm: A Hybrid Approach 1095.6 Results and Discussion 1115.6.1 Analysis Using Hybrid Approach 1115.7 Conclusion 115References 1156 ANALYSES ON ARTIFICIAL INTELLIGENCE FRAMEWORK TO DETECT CRIME PATTERN 119R. Arshath Raja, N. Yuvaraj and N.V. Kousik6.1 Introduction 1206.2 Related Works 1216.3 Proposed Clustering for Detecting Crimes 1226.3.1 Data Pre-Processing 1236.3.2 Object-Oriented Model 1246.3.3 MCML Classification 1246.3.4 GAA 1246.3.5 Consensus Clustering 1246.4 Performance Evaluation 1246.4.1 Precision 1256.4.2 Sensitivity 1256.4.3 Specificity 1316.4.4 Accuracy 1316.5 Conclusions 131References 1327 A BIOMETRIC TECHNOLOGY-BASED FRAMEWORK FOR TACKLING AND PREVENTING CRIMES 133Ebrahim A.M. Alrahawe, Vikas T. Humbe and G.N. Shinde7.1 Introduction 1347.2 Biometrics 1357.2.1 Biometric Systems Technologies 1377.2.2 Biometric Recognition Framework 1417.2.3 Biometric Applications/Usages 1427.3 Surveillance Systems (CCTV) 1447.3.1 CCTV Goals 1467.3.2 CCTV Processes 1467.3.3 Fusion of Data From Multiple Cameras 1497.3.4 Expanding the Use of CCTV 1497.3.5 CCTV Effectiveness 1507.3.6 CCTV Limitations 1507.3.7 Privacy and CCTV 1507.4 Legality to Surveillance and Biometrics vs. Privacy and Human Rights 1517.5 Proposed Work (Biometric-Based CCTV System) 1537.5.1 Biometric Surveillance System 1547.5.1.1 System Component and Flow Diagram 1547.5.2 Framework 1567.6 Conclusion 158References 1598 RULE-BASED APPROACH FOR BOTNET BEHAVIOR ANALYSIS 161Supriya Raheja, Geetika Munjal, Jyoti Jangra and Rakesh Garg8.1 Introduction 1618.2 State-of-the-Art 1638.3 Bots and Botnets 1668.3.1 Botnet Life Cycle 1668.3.2 Botnet Detection Techniques 1678.3.3 Communication Architecture 1688.4 Methodology 1718.5 Results and Analysis 1758.6 Conclusion and Future Scope 177References 1779 SECURING BIOMETRIC FRAMEWORK WITH CRYPTANALYSIS 181Abhishek Goel, Siddharth Gautam, Nitin Tyagi, Nikhil Sharma and Martin Sagayam9.1 Introduction 1829.2 Basics of Biometric Systems 1849.2.1 Face 1859.2.2 Hand Geometry 1869.2.3 Fingerprint 1879.2.4 Voice Detection 1879.2.5 Iris 1889.2.6 Signature 1899.2.7 Keystrokes 1899.3 Biometric Variance 1929.3.1 Inconsistent Presentation 1929.3.2 Unreproducible Presentation 1929.3.3 Fault Signal/Representational Accession 1939.4 Performance of Biometric System 1939.5 Justification of Biometric System 1959.5.1 Authentication (“Is this individual really the authenticate user or not?”) 1959.5.2 Recognition (“Is this individual in the database?”) 1969.5.3 Concealing (“Is this a needed person?”) 1969.6 Assaults on a Biometric System 1969.6.1 Zero Effort Attacks 1979.6.2 Adversary Attacks 1989.6.2.1 Circumvention 1989.6.2.2 Coercion 1989.6.2.3 Repudiation 1989.6.2.4 DoB (Denial of Benefit) 1999.6.2.5 Collusion 1999.7 Biometric Cryptanalysis: The Fuzzy Vault Scheme 1999.8 Conclusion & Future Work 203References 20510 THE ROLE OF BIG DATA ANALYSIS IN INCREASING THE CRIME PREDICTION AND PREVENTION RATES 209Galal A. AL-Rummana, Abdulrazzaq H. A. Al-Ahdal and G.N. Shinde10.1 Introduction: An Overview of Big Data and Cyber Crime 21010.2 Techniques for the Analysis of BigData 21110.3 Important Big Data Security Techniques 21610.4 Conclusion 219References 21911 CRIME PATTERN DETECTION USING DATA MINING 221Dipalika Das and Maya Nayak11.1 Introduction 22111.2 Related Work 22211.3 Methods and Procedures 22411.4 System Analysis 22711.5 Analysis Model and Architectural Design 23011.6 Several Criminal Analysis Methods in Use 23311.7 Conclusion and Future Work 235References 23512 ATTACKS AND SECURITY MEASURES IN WIRELESS SENSOR NETWORK 237Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan and Aditya Khamparia12.1 Introduction 23812.2 Layered Architecture of WSN 23912.2.1 Physical Layer 23912.2.2 Data Link Layer 23912.2.3 Network Layer 24012.2.4 Transport Layer 24012.2.5 Application Layer 24112.3 Security Threats on Different Layers in WSN 24112.3.1 Threats on Physical Layer 24112.3.1.1 Eavesdropping Attack 24112.3.1.2 Jamming Attack 24212.3.1.3 Imperil or Compromised Node Attack 24212.3.1.4 Replication Node Attack 24212.3.2 Threats on Data Link Layer 24212.3.2.1 Collision Attack 24312.3.2.2 Denial of Service (DoS) Attack 24312.3.2.3 Intelligent Jamming Attack 24312.3.3 Threats on Network Layer 24312.3.3.1 Sybil Attack 24312.3.3.2 Gray Hole Attack 24312.3.3.3 Sink Hole Attack 24412.3.3.4 Hello Flooding Attack 24412.3.3.5 Spoofing Attack 24412.3.3.6 Replay Attack 24412.3.3.7 Black Hole Attack 24412.3.3.8 Worm Hole Attack 24512.3.4 Threats on Transport Layer 24512.3.4.1 De-Synchronization Attack 24512.3.4.2 Flooding Attack 24512.3.5 Threats on Application Layer 24512.3.5.1 Malicious Code Attack 24512.3.5.2 Attack on Reliability 24612.3.6 Threats on Multiple Layer 24612.3.6.1 Man-in-the-Middle Attack 24612.3.6.2 Jamming Attack 24612.3.6.3 Dos Attack 24612.4 Threats Detection at Various Layers in WSN 24612.4.1 Threat Detection on Physical Layer 24712.4.1.1 Compromised Node Attack 24712.4.1.2 Replication Node Attack 24712.4.2 Threat Detection on Data Link Layer 24712.4.2.1 Denial of Service Attack 24712.4.3 Threat Detection on Network Layer 24812.4.3.1 Black Hole Attack 24812.4.3.2 Worm Hole Attack 24812.4.3.3 Hello Flooding Attack 24912.4.3.4 Sybil Attack 24912.4.3.5 Gray Hole Attack 25012.4.3.6 Sink Hole Attack 25012.4.4 Threat Detection on the Transport Layer 25112.4.4.1 Flooding Attack 25112.4.5 Threat Detection on Multiple Layers 25112.4.5.1 Jamming Attack 25112.5 Various Parameters for Security Data Collection in WSN 25212.5.1 Parameters for Security of Information Collection 25212.5.1.1 Information Grade 25212.5.1.2 Efficacy and Proficiency 25312.5.1.3 Reliability Properties 25312.5.1.4 Information Fidelity 25312.5.1.5 Information Isolation 25412.5.2 Attack Detection Standards in WSN 25412.5.2.1 Precision 25412.5.2.2 Germane 25512.5.2.3 Extensibility 25512.5.2.4 Identifiability 25512.5.2.5 Fault Forbearance 25512.6 Different Security Schemes in WSN 25612.6.1 Clustering-Based Scheme 25612.6.2 Cryptography-Based Scheme 25612.6.3 Cross-Checking-Based Scheme 25612.6.4 Overhearing-Based Scheme 25712.6.5 Acknowledgement-Based Scheme 25712.6.6 Trust-Based Scheme 25712.6.7 Sequence Number Threshold-Based Scheme 25812.6.8 Intrusion Detection System-Based Scheme 25812.6.9 Cross-Layer Collaboration-Based Scheme 25812.7 Conclusion 264References 26413 LARGE SENSING DATA FLOWS USING CRYPTIC TECHNIQUES 269Hemanta Kumar Bhuyan13.1 Introduction 27013.2 Data Flow Management 27113.2.1 Data Flow Processing 27113.2.2 Stream Security 27213.2.3 Data Privacy and Data Reliability 27213.2.3.1 Security Protocol 27213.3 Design of Big Data Stream 27313.3.1 Data Stream System Architecture 27313.3.1.1 Intrusion Detection Systems (IDS) 27413.3.2 Malicious Model 27513.3.3 Threat Approaches for Attack Models 27613.4 Utilization of Security Methods 27713.4.1 System Setup 27813.4.2 Re-Keying 27913.4.3 New Node Authentication 27913.4.4 Cryptic Techniques 28013.5 Analysis of Security on Attack 28013.6 Artificial Intelligence Techniques for Cyber Crimes 28113.6.1 Cyber Crime Activities 28213.6.2 Artificial Intelligence for Intrusion Detection 28213.6.3 Features of an IDPS 28413.7 Conclusions 284References 28514 CYBER-CRIME PREVENTION METHODOLOGY 291Chandra Sekhar Biswal and Subhendu Kumar Pani14.1 Introduction 29214.1.1 Evolution of Cyber Crime 29414.1.2 Cybercrime can be Broadly Defined as Two Types 29614.1.3 Potential Vulnerable Sectors of Cybercrime 29614.2 Credit Card Frauds and Skimming 29714.2.1 Matrimony Fraud 29714.2.2 Juice Jacking 29814.2.3 Technicality Behind Juice Jacking 29914.3 Hacking Over Public WiFi or the MITM Attacks 29914.3.1 Phishing 30014.3.2 Vishing/Smishing 30214.3.3 Session Hijacking 30314.3.4 Weak Session Token Generation/Predictable Session Token Generation 30414.3.5 IP Spoofing 30414.3.6 Cross-Site Scripting (XSS) Attack 30514.4 SQLi Injection 30614.5 Denial of Service Attack 30714.6 Dark Web and Deep Web Technologies 30914.6.1 The Deep Web 30914.6.2 The Dark Web 31014.7 Conclusion 311References 312Index 313
CompTIA Security+ Review Guide
LEARN THE INS AND OUTS OF THE IT SECURITY FIELD AND EFFICIENTLY PREPARE FOR THE COMPTIA SECURITY+ EXAM SY0-601 WITH ONE EASY-TO-FOLLOW RESOURCECompTIA Security+ Review Guide: Exam SY0-601, Fifth Edition helps you to efficiently review for the leading IT security certification—CompTIA Security+ SY0-601. Accomplished author and security expert James Michael Stewart covers each domain in a straightforward and practical way, ensuring that you grasp and understand the objectives as quickly as possible.Whether you’re refreshing your knowledge or doing a last-minute review right before taking the exam, this guide includes access to a companion online test bank that offers hundreds of practice questions, flashcards, and glossary terms.Covering all five domains tested by Exam SY0-601, this guide reviews:* Attacks, Threats, and Vulnerabilities* Architecture and Design* Implementation* Operations and Incident Response* Governance, Risk, and ComplianceThis newly updated Fifth Edition of CompTIA Security+ Review Guide: Exam SY0-601 is not just perfect for anyone hoping to take the SY0-601 Exam, but it is also an excellent resource for those wondering about entering the IT security field.JAMES MICHAEL STEWART holds variety of certifications, including: Security+, Network+, A+, CySA+, PenTest+, CASP+, CTT+, CEH, CHFI, ECSA, ECIH, CND, CEI, CISSP, CISM, and CFR. He has been working with computers and technology for over thirty years. His work focuses on security, certification, and various operating systems. Michael has been teaching job skill and certification courses for over 25 years, such as CISSP, ethical hacking/penetration testing, computer forensics, and Security+. He has taught hundreds of classes, accumulating over 16,000 hours of instruction. His most recent publications include the CISSP Study Guide, 9th Edition. Michael has also contributed to many other security focused materials including exam preparation guides, practice exams, video instruction, and courseware. He has developed certification courseware and training materials as well as presented these materials in the classroom. Michael graduated in 1992 from the University of Texas at Austin. Introduction xixCHAPTER 1 THREATS, ATTACKS, AND VULNERABILITIES 11.1 Compare and contrast different types of social engineering techniques 51.2 Given a scenario, analyze potential indicators to determine the type of attack 201.3 Given a scenario, analyze potential indicators associated with application attacks 371.4 Given a scenario, analyze potential indicators associated with network attacks 571.5 Explain different threat actors, vectors, and intelligence sources 801.6 Explain the security concerns associated with various types of vulnerabilities 911.7 Summarize the techniques used in security assessments 991.8 Explain the techniques used in penetration testing 109Review Questions 118CHAPTER 2 ARCHITECTURE AND DESIGN 1232.1 Explain the importance of security concepts in an enterprise environment 1282.2 Summarize virtualization and cloud computing concepts 1392.3 Summarize secure application development, deployment, and automation concepts 1522.4 Summarize authentication and authorization design concepts 1672.5 Given a scenario, implement cybersecurity resilience 1832.6 Explain the security implications of embedded and specialized systems 1962.7 Explain the importance of physical security controls 2082.8 Summarize the basics of cryptographic concepts 220Review Questions 240CHAPTER 3 IMPLEMENTATION 2453.1 Given a scenario, implement secure protocols 2483.2 Given a scenario, implement host or application security solutions 2623.3 Given a scenario, implement secure network designs 2803.4 Given a scenario, install and configure wireless security settings 3043.5 Given a scenario, implement secure mobile solutions 3153.6 Given a scenario, apply cybersecurity solutions to the cloud 3303.7 Given a scenario, implement identity and account management controls 3363.8 Given a scenario, implement authentication and authorization solutions 3443.9 Given a scenario, implement public key infrastructure 355Review Questions 370CHAPTER 4 OPERATIONS AND INCIDENT RESPONSE 3754.1 Given a scenario, use the appropriate tool to assess organizational security 3774.2 Summarize the importance of policies, processes, and procedures for incident response 3984.3 Given an incident, utilize appropriate data sources to support an investigation 4094.4 Given an incident, apply mitigation techniques or controls to secure an environment 4184.5 Explain the key aspects of digital forensics 422Review Questions 435CHAPTER 5 GOVERNANCE, RISK, AND COMPLIANCE 4415.1 Compare and contrast various types of controls 4435.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture 4465.3 Explain the importance of policies to organizational security 4565.4 Summarize risk management processes and concepts 4695.5 Explain privacy and sensitive data concepts in relation to security 486Review Questions 494APPENDIX ANSWERS TO REVIEW QUESTIONS 499Chapter 1: Threats, Attacks, and Vulnerabilities 500Chapter 2: Architecture and Design 505Chapter 3: Implementation 508Chapter 4: Operations and Incident Response 511Chapter 5: Governance, Risk, and Compliance 514Index 519
CompTIA Security+ Practice Tests
GET READY FOR A CAREER IN IT SECURITY AND EFFICIENTLY PREPARE FOR THE SY0-601 EXAM WITH A SINGLE, COMPREHENSIVE RESOURCECompTIA Security+ Practice Tests: Exam SY0-601, Second Edition efficiently prepares you for the CompTIA Security+ SY0-601 Exam with one practice exam and domain-by-domain questions. With a total of 1,000 practice questions, you'll be as prepared as possible to take Exam SY0-601.Written by accomplished author and IT security expert David Seidl, the 2nd Edition of CompTIA Security+ Practice Tests includes questions covering all five crucial domains and objectives on the SY0-601 exam:* Attacks, Threats, and Vulnerabilities* Architecture and Design* Implementation* Operations and Incident Response* Governance, Risk, and CompliancePerfect for anyone looking to prepare for the SY0-601 Exam, upgrade their skills by earning a high-level security certification (like CASP+, CISSP, or CISA), as well as anyone hoping to get into the IT security field, CompTIA Security+ Practice Tests allows for efficient and comprehensive preparation and study.ABOUT THE AUTHORDAVID SEIDL, CYSA+, CISSP, GPEN, GCIH, is the co-author of CompTIA Security+ Study Guide: Exam SY0-601, CompTIA CySA+ Study Guide: Exam CS0-002, CompTIA CySA+ Practice Tests: Exam CS0-002, and CompTIA PenTest+ Study Guide: Exam PT0-001. David is Vice President for Information Technology and CIO at Miami University. Previously, he led the University of Notre Dame security team as Director of Information Security and has served in a variety of technical and IT security roles. Introduction xixChapter 1 Threats, Attacks, and Vulnerabilities 1Chapter 2 Architecture and Design 45Chapter 3 Implementation 81Chapter 4 Operations and Incident Response 129Chapter 5 Governance, Risk, and Compliance 159Appendix Answers and Explanations 185Index 299
Microsoft Excel Functions Quick Reference
This condensed syntax reference presents the essential Excel function syntax in a well-organized format that can be used as a quick and handy reference. You can use it to improve your Excel knowledge and increase your productivity. It will help you upgrade the quality of your data analysis, dashboards, models, and templates.The Microsoft Excel Functions Quick Reference helps you set up workbooks, enter data, and format it for easier viewing. It starts by giving an overview of Excel functions explaining the different types of Excel functions available followed by an understanding of string functions and date functions. It then covers time, lookup, aggregate, and logical functions along with practice problems. Further, you will see math functions and information functions in Excel. You will also be able to create sophisticated forecast worksheets, key performance indicators (KPIs), and timelines. Each function in the text is illustrated by helpful, illuminating examples.With this book by your side, you'll always have the answer to your Excel function syntax questions.WHAT YOU WILL LEARN* Work with basic Excel functions* Use the LOOKUP function* Take advantage of new functions in information functions* Create a mega formulaWHO THIS BOOK IS FORAdministrators, analysts, and anyone else working with Microsoft Excel.Mandeep has more than 20 years of experience in administration, operations, software development, and reporting. He mostly works with cross-functional teams in ensuring operational and service excellence. Mandeep has worked with Capgemini for more than ten years and is currently working as a freelancer in conducting various training in MS Office and providing data services.CHAPTER 1 – WHAT IS AN EXCEL FUNCTION?· Excel formula definition· How to use an Excel formula· Different types of Excel functionsCHAPTER 2 –TEXT FUNCTIONS· LEFT· RIGHT· MID· UPPER· LOWER· PROPER· TRIM· LEN· FIND· SEARCH· CONCATENATE/&· VALUE· TEXT· EXACT· REPLACE· SUBSTITUTECHAPTER 3 – DATE FUNCTIONS· TODAY· DAY· MONTH· YEAR· DATE· EDATE· EOMONTH· WEEKDAY· WEEKNUM· DATEVALUE· NETWORKDAYS· DATEDIFCHAPTER 4 – TIME FUNCTIONS· NOW· HOUR· MINUTE· SECOND· TIMEVALUECHAPTER 5 – LOOKUP FUNCTIONS· VLOOKUP· HLOOKUP· MATCH· INDEX· CHOOSECHAPTER 6 – AGGREGATE FUNCTIONS· SUM· SUMIF· SUMIFS· SUMPRODUCT· SUBTOTAL· COUNT· COUNTIF· COUNTIFS· AVERAGE· AVERAGEIF· AVERAGEIFS· AGGREGATECHAPTER 7 – LOGICAL FUNCTIONS· IF· IFS· AND· OR· NOT· IFERROR· IFNA· SWITCHCHAPTER 8 – REFERENCE FUNCTIONS· INDIRECT· ADDRESS· OFFSET· ROW· ROWS· COLUMN· COLUMNSCHAPTER 9 – MATH FUNCTIONS· ABS· INT· TRUNC· ROUND· ODD· EVEN· POWER· PRODUCTCHAPTER 10 – INFORMATION FUNCTIONS· CELL· ISBLANK· ISERROR· ISEVEN· ISODD· ISFORMULA· ISLOGICAL· ISNA· ISNONTEXT· ISNUMBER· ISTEXT· N· TYPECHAPTER 11 – MEGA-FORMULA· What is Mega formula?· How to create a mega formula· ExamplesCHAPTER 12 – ARRAY FORMULA· What is an array formula?· Advantages and disadvantages· ExamplesAppendix A – Formula Reference ready reckoner
Requirements Engineering für Dummies
Für den Erfolg von Softwareprojekten ist es entscheidend, sich erstmal klar zu machen, wozu das System überhaupt dienen soll und wie es dafür beschaffen sein muss. Klingt eigentlich selbstverständlich, und doch scheitern Projekte oft gerade an der Anforderungsanalyse. Das Buch "Requirements Engineering für Dummies" beschreibt verständlich und pragmatisch, wie Sie vorgehen sollten - und zwar sowohl für klassische als auch für agile Projekte. Es liefert Ihnen Techniken, wie Sie Ziele bestimmen und Releases sinnvoll zusammenstellen, wie Sie Anforderungen erheben und verstehen, wie Sie mit Änderungen umgehen und wie Sie Fallstricke vermeiden. Das Buch ist auch geeignet zur Vorbereitung auf die CPRE-FL-Prüfung. Dr. Marcus Winteroll ist Mitglied der oose Innovative Informatik eG, einem Anbieter von Schulungen und Workshops zu Software & Systems Engineering in Hamburg. Als Trainer und Berater beschäftigt er sich mit der Analyse sowie Verbesserung von Geschäfts- und Entwicklungsprozessen. Dazu setzt er auf agile Methoden; aber auch die klassischen Vorgehensweisen sind ihm aus seiner langjährigen Erfahrung als Requirements Engineer, Projektleiter, Prozessmanager, Qualitätssicherer und Entwickler vertraut. Seine gesammelten Erfahrungen teilt er auf Konferenzen und als Autor von Fachartikeln.Über den Autor 13EINLEITUNG 25Über dieses Buch 25Konventionen in diesem Buch 26Was Sie nicht lesen müssen 26Törichte Annahmen über die Leser 26Wie dieses Buch aufgebaut ist 26Teil I: Requirements Engineering verstehen 27Teil II: Vorgehen im Requirements Engineering 27Teil III: Anforderungsanalyse 27Teil IV: Requirements Management 27Teil V: Der Top-Ten-Teil 27Symbole, die in diesem Buch verwendet werden 27Wie es weitergeht 28TEIL I: REQUIREMENTS ENGINEERING VERSTEHEN 29KAPITEL 1 DAS IST REQUIREMENTS ENGINEERING 31Warum uns Requirements Engineering weiterhelfen kann 31Aufgaben im Requirements Engineering 34Wer das Requirements Engineering macht 36Der Requirements Engineer 37Wer sonst noch das Requirements Engineering macht 37Viele Arten von Anforderungen 38Funktionale Anforderungen 38Nichtfunktionale Anforderungen 39Randbedingungen 40Abstraktionsstufen von Anforderungen 41Möglichkeiten der Zertifizierung 42Zertifikate des IREB 43Zertifikate des IIBA 44PMI Professional in Business Analysis (PMI-PBA) 45KAPITEL 2 EINBETTUNG DES REQUIREMENTS ENGINEERING47Das Zusammenspiel mit den übrigen Beteiligten 47Die Kunden des Requirements Engineering 48Wer sonst noch so wichtig ist: die Stakeholder 48Die Basis vieler Anforderungen: die Geschäftsprozesse 49Das Anforderungsdokument: eines für alle? 50Requirements Engineering im klassischen Vorgehen: alles klar 52Was zu erwarten ist 52Was nicht zu erwarten ist 52Requirements Engineering in agilen Projekten: just in time 53Beliebte Missverständnisse beim agilen Requirements Engineering 53Was agiles Vorgehen vom klassischen unterscheidet 54Klassisch, agil, Festpreis, Aufwandspreis –nicht jede Kombination ist sinnvoll 56Klassisch und Festpreis 56Agil und Aufwandspreis 56Agil und Festpreis 57Klassisch und Aufwandspreis 57Alles im Überblick 57KAPITEL 3 FALLSTRICKE59Was wir von den Kunden erwarten dürfen – und sie von uns 59Wer nimmt die Anforderungen auf? 60Der Projektleiter als Requirements Engineer 60Der Product Owner als Requirements Engineer 61Entwickler als Requirements Engineers 61Kunde und Nutzer als Requirements Engineers 62Die richtige Detaillierung von Anforderung 63Umgang mit Änderungen 64Dokumentation von Anforderungen 66TEIL II: VORGEHEN IM REQUIREMENTS ENGINEERING 69KAPITEL 4 VORGEHEN IN KLASSISCHEN PROJEKTEN71Einordnung in den Projektablauf 71Der Ablauf 73KAPITEL 5 VORGEHEN IN AGILEN PROJEKTEN77Direkte Kommunikation statt Dokumentation 78Der Wert gibt den Takt an 79Das Ziel immer vor Augen 80Die Vorbereitungsphase 80Requirements Engineering in Scrum 82Scrum kurz erklärt 82Wo das Requirements Engineering in Scrum stattfindet 84Das Product Backlog weiterentwickeln: Refinement 86Fertig heißt fertig: die Definition of Done 88Welche Rolle für die Anforderungen zuständig ist 89Wenn mehrere Teams an einem System arbeiten 90Fortwährende Analyse statt Änderungsmanagement 91Die Unterschiede zwischen klassischem und agilem Requirements Engineering 92KAPITEL 6 ANPASSUNG DES REQUIREMENTS-ENGINEERING-PROZESSES93Einflussfaktoren 93Facetten des Requirements-Engineering-Prozesses 94Zeitfacette 95Zweckfacette 96Zielfacette 96Konfiguration des Prozesses 97TEIL III: ANFORDERUNGSANALYSE 99KAPITEL 7 AN DIE ANFORDERUNGEN HERANKOMMEN101Stakeholderanalyse 102Stakeholder identifizieren 103Stakeholder verstehen 105Maßnahmen zur Einbindung der Stakeholder 110Zusätzliche Anforderungsquellen 111Anforderungen ermitteln 112Von geheimen und selbstverständlichen Anforderungen: das Kano-Modell 113Wer fragt, gewinnt: die Befragungstechniken 115Anforderungen gemeinsam erheben: Kooperationstechniken 121Schauen Sie genau hin: Beobachtungstechniken 123Systemarchäologie und der Blick zurück: artefaktbasierte Techniken 126Recycling im Requirements Engineering: die Wiederverwendung von Anforderungen 127Seien Sie kreativ: Entwurfs- und Ideenfindungstechniken 128Hypothesen bilden und ausprobieren 133Techniken, die Sie zusätzlich unterstützen 134Welche Technik Ihnen weiterhilft 135Konflikte und der Umgang damit 138Analyse von Konflikten 138Auflösung von Konflikten 139KAPITEL 8 WAS UNS ZU BEGINN KLAR SEIN SOLLTE 145Wohin soll die Reise gehen? Das Ziel klar vor Augen 145Auf die Verpackung kommt es an: der Produktkarton 147Alles auf einem Blick: das Product Vision Board 150Auf die Schnelle: das Fahrstuhlgespräch 152Den Überblick gewinnen 153Den Kontext des Systems verstehen 154Wie das System verwendet werden soll: Anwendungsfälle 156Der Überblick über die ganze Geschichte: Story Map 159Releases schneiden 164Werden Sie zum Minimalisten: das Minimale Marktfähige Release 164Von der Story Map zum Releaseplan 167KAPITEL 9 FUNKTIONALE ANFORDERUNGEN VERSTEHEN UND BESCHREIBEN175Die Systemverwendung mit Anwendungsfällen beschreiben 176Wer das System zu welchem Zweck verwendet: das Anwendungsfalldiagramm 178Anwendungsfälle Schritt für Schritt: Abläufe beschreiben 180Anwendungsfälle mit Anwendungsfällen erweitern 192Die Geschichten der Nutzer: User Stories 196Die Akzeptanzkriterien einer User Story 198Wie kleine User Stories große ersetzen 201Anwendungsfälle oder User Stories? 205Anwendungsfälle klassisch 205Von der Story Map über Anwendungsfälle zu den User Stories 205KAPITEL 10 WEITERE ASPEKTE FUNKTIONALER ANFORDERUNGEN209Fachliche Begriffe begreifen 210Alle wichtigen Begriffe auf einem Blick: das Glossar 210Der Zusammenhang zwischen den fachlichen Gegenständen im Fachklassenmodell 212Das sind ja Zustände 220Die Zustände fachlicher Gegenstände 220Das System bekommt Zustände 225Wie das Geschäft zu regeln ist 232Prototypen 243Die natürliche Sprache 247Man kann nicht alles verstehen 248Tipps zum Umgang mit der Sprache 248Ein Bausatz für Sätze: Satzschablonen 250Die Sprache und nichts als die Sprache 254KAPITEL 11 NICHTFUNKTIONALE ANFORDERUNGEN UND RANDBEDINGUNGEN257Die Bedeutung der nichtfunktionalen Anforderungen 258Nichtfunktionale Anforderungen verstehen 260Nichtfunktionale Anforderungen ermitteln 265Nichtfunktionale Anforderungen in der agilen Entwicklung 270Was schon vorher feststeht: die Randbedingungen 273KAPITEL 12 WER WEIẞ, OB DAS AUCH SO STIMMT – ANFORDERUNGEN PRÜFEN277Was gibt es denn da zu prüfen? 278Vorgehen im klassischen Requirements Engineering 279Qualitätskriterien zur Verifikation und Validierung 279Vorgehen im agilen Requirements Engineering 281Techniken für die Prüfung 282Reviewtechniken 282Explorative Validierungstechniken 284Prinzipien der Überprüfung 286KAPITEL 13 ANFORDERUNGEN FESTHALTEN289Zweck der Dokumentation 289Der richtige Zeitpunkt 292Hilfreiche Regeln 294Arten der Dokumentation 295Dokumente 296Modelle 302Anforderungssammlungen im Requirements-Management-Tool 304Product Backlog 305Story Map 306Formularvorlagen für Anforderungen 306TEIL IV: REQUIREMENTS MANAGEMENT 309KAPITEL 14 ANFORDERUNGEN ORGANISIEREN311Requirements Management im agilen Vorgehen 312Der Lebenszyklus einer Anforderung 314Versionierung 316Attribute einer Anforderung 317Kann man so oder so sehen: Sichtweisen 318Konfigurationen 320KAPITEL 15 IST DAS WIRKLICH WICHTIG? – PRIORISIERUNG VON ANFORDERUNGEN323Was wichtig ist 324Ad-hoc-Priorisierungstechniken 325Priorisierung mittels Stufen 325Ranking 326Top-Ten-Technik 326Kauf dir ein Feature 326Analytische Priorisierungstechniken 327Wiegers’sche Priorisierungsmatrix 327Kano-Modell 330Vorgehen 330KAPITEL 16 DIE ANFORDERUNGEN VERFOLGEN 333Zweck der Verfolgbarkeit 333Verfolgbarkeit darstellen 335Methodisches Verfolgen 338KAPITEL 17 UMGANG MIT ÄNDERUNGEN341Ganz normal und doch unbeliebt 341Der Änderungsprozess und seine Bestandteile 342KAPITEL 18 WERKZEUGE IM REQUIREMENTS ENGINEERING: UNTERSTÜTZUNG UND LAST347Arten von Werkzeugen 348Office-Tools 348Requirements-Management-Tools 349Modellierungstools 350Was schon da ist: Bugtracker und Wiki 351Lowtech-Tools 351Kombinationen von Tools 352Einführung von Werkzeugen 352TEIL V: DER TOP-TEN-TEIL 355KAPITEL 19 ZEHN PRINZIPIEN DES REQUIREMENTS ENGINEERING357Zusammenarbeit: Requirements Engineering allein funktioniert nicht 357Wertorientierung: Anforderungen sind kein Selbstzweck 358Stakeholder: Es geht darum, ihren Bedarf zu erfüllen 358Gemeinsames Verständnis: Die Basis für erfolgreiche Systementwicklung 358Kontext: Notwendig, um Systeme zu verstehen 359Problem, Anforderung, Lösung: Eine untrennbare Verbindung 359Validierung: Ungeprüfte Anforderungen sind nutzlos 360Evolution: Änderungen sind normal 360Innovation: Mehr vom Gleichen reicht nicht 361Systematische und disziplinierte Arbeit: Ohne geht es nicht 361KAPITEL 20 ZEHN BELIEBTE FEHLER IM REQUIREMENTS ENGINEERING 363Die Suche nach dem Schuldigen 363Lösungen beschreiben anstatt Probleme zu verstehen 364Anforderungen einfach vom Altsystem übernehmen 364Die Nutzer beschreiben die Anforderungen 364Wir arbeiten agil und dokumentieren nichts 365Entweder keine oder unverständliche Systemdokumentationen 365User Stories sind allein dazu da, die bestehenden Anforderungen in das Backlog aufzunehmen 365Agil und Modellierung geht nicht zusammen 366Fachleute und Entwickler sprechen nicht miteinander 366Das Requirements Engineering läuft nicht, also brauchen wir ein Tool 366KAPITEL 21 ZEHN ONLINE-QUELLEN369IREB-Lehrpläne, Handbücher und Glossar 369Requirements Engineering Magazine 369Scrum-Guide 369Online Browsing Platform der ISO 370V-Modell 370UML-Spezifikation 370UML-Übersicht 371DMN-Spezifikation 371Übersicht über Requirements-Tools 371Übersicht über UML-Tools 371Stichwortverzeichnis 375
Mobile Device Management in Zeiten von mobilem Arbeiten. Wie Unternehmen mobile Endgeräte erfolgreich in bestehende IT-Infrastrukturen integrieren
In Unternehmen geht der Trend immer mehr zum Homeoffice und Remote Work. Viele Unternehmen erlauben es den Mitarbeitern, private Endgeräte wie Smartphones oder Tablets für Firmenzwecke zu nutzen. Für Unternehmen bedeutet dies jedoch eine Gefährdung ihrer Firmendaten. Mobile Device Management-Systeme können dabei helfen, mögliche Sicherheitslücken zu schließen. Welche technischen Anforderungen stellen Mobile Device Management-Systeme an Unternehmen? Wie sicher ist Mobile Device Management und welche Chancen und Risiken gibt es? Und welche rechtlichen Aspekte müssen Unternehmen beim Verwalten von mobilen Geräten beachten? Der Autor Timmy Lutz klärt die wichtigsten Fragen zum Thema Mobile Device Management. Er nimmt die aktuelle Mobile Device Management Software in den Blick und erläutert, wie Unternehmen das richtige System für sich finden. Dabei gibt er praktische Tipps für eine erfolgreiche Implementierung in Unternehmen. Aus dem Inhalt: - Mobile Security Management; - Bring your own Device; - Betriebssystem; - Firmendaten; - Datensicherheit; - IT-Infrastruktur
CompTIA Security+ Study Guide
LEARN THE KEY OBJECTIVES AND MOST CRUCIAL CONCEPTS COVERED BY THE SECURITY+ EXAM SY0-601 WITH THIS COMPREHENSIVE AND PRACTICAL STUDY GUIDE! AN ONLINE TEST BANK OFFERS 650 PRACTICE QUESTIONS AND FLASHCARDS!The Eighth Edition of the CompTIA Security+ Study Guide Exam SY0-601 efficiently and comprehensively prepares you for the SY0-601 Exam. Accomplished authors and security experts Mike Chapple and David Seidl walk you through the fundamentals of crucial security topics, including the five domains covered by the SY0-601 Exam:* Attacks, Threats, and Vulnerabilities* Architecture and Design* Implementation* Operations and Incident Response* Governance, Risk, and ComplianceThe study guide comes with the Sybex online, interactive learning environment offering 650 practice questions! Includes a pre-assessment test, hundreds of review questions, practice exams, flashcards, and a glossary of key terms. The book is written in a practical and straightforward manner, ensuring you can easily learn and retain the material.Perfect for everyone planning to take the SY0-601 Exam—as well as those who hope to secure a high-level certification like the CASP+, CISSP, or CISA—the study guide also belongs on the bookshelves of everyone who has ever wondered if the field of IT security is right for them. It's a must-have reference!ABOUT THE AUTHORSMIKE CHAPPLE, PHD, SECURITY+, CYSA+, CISSP, is Teaching Professor of IT, Analytics, and Operations at the University of Notre Dame. He's a cybersecurity professional and educator with over 20 years of experience. Mike provides cybersecurity certification resources at his website, CertMike.com. DAVID SEIDL, SECURITY+, CYSA+, CISSP, PENTEST+, is Vice President for Information Technology and CIO at Miami University. David co-led Notre Dame's move to the cloud and has written multiple cybersecurity certification books. Introduction xxvAssessment Test xxxviCHAPTER 1 TODAY’S SECURITY PROFESSIONAL 1Cybersecurity Objectives 2Data Breach Risks 3The DAD Triad 3Breach Impact 5Implementing Security Controls 7Security Control Categories 7Security Control Types 8Data Protection 9Summary 12Exam Essentials 12Review Questions 14CHAPTER 2 CYBERSECURITY THREAT LANDSCAPE 19Exploring Cybersecurity Threats 20Classifying Cybersecurity Threats 20Threat Actors 22Threat Vectors 28Threat Data and Intelligence 30Open Source Intelligence 31Proprietary and Closed-Source Intelligence 33Assessing Threat Intelligence 35Threat Indicator Management and Exchange 36Public and Private Information Sharing Centers 37Conducting Your Own Research 38Summary 38Exam Essentials 39Review Questions 40CHAPTER 3 MALICIOUS CODE 45Malware 46Ransomware 47Trojans 47Worms 48Rootkits 48Backdoors 49Bots 50Keyloggers 52Logic Bombs 53Viruses 53Fileless Viruses 53Spyware 54Potentially Unwanted Programs (PUPs) 55Malicious Code 55Adversarial Artificial Intelligence 57Summary 58Exam Essentials 59Review Questions 61CHAPTER 4 SOCIAL ENGINEERING, PHYSICAL, AND PASSWORD ATTACKS 65Social Engineering 66Social Engineering Techniques 67Influence Campaigns 72Password Attacks 72Physical Attacks 74Summary 76Exam Essentials 76Review Questions 78CHAPTER 5 SECURITY ASSESSMENT AND TESTING 83Vulnerability Management 84Identifying Scan Targets 84Determining Scan Frequency 86Configuring Vulnerability Scans 87Scanner Maintenance 92Vulnerability Scanning Tools 95Reviewing and Interpreting Scan Reports 96Validating Scan Results 106Security Vulnerabilities 107Patch Management 107Legacy Platforms 108Weak Configurations 109Error Messages 110Insecure Protocols 111Weak Encryption 112Penetration Testing 113Adopting the Hacker Mindset 114Reasons for Penetration Testing 115Benefits of Penetration Testing 115Penetration Test Types 116Rules of Engagement 118Reconnaissance 119Running the Test 120Cleaning Up 120Training and Exercises 120Summary 122Exam Essentials 122Review Questions 124CHAPTER 6 SECURE CODING 129Software Assurance Best Practices 130The Software Development Life Cycle 130Software Development Phases 131Software Development Models 133DevSecOps and DevOps 136Designing and Coding for Security 138Secure Coding Practices 138API Security 139Code Review Models 139Software Security Testing 143Analyzing and Testing Code 143Injection Vulnerabilities 144SQL Injection Attacks 145Code Injection Attacks 148Command Injection Attacks 149Exploiting Authentication Vulnerabilities 150Password Authentication 150Session Attacks 151Exploiting Authorization Vulnerabilities 154Insecure Direct Object References 154Directory Traversal 155File Inclusion 156Privilege Escalation 157Exploiting Web Application Vulnerabilities 157Cross-Site Scripting (XSS) 158Request Forgery 160Application Security Controls 161Input Validation 162Web Application Firewalls 163Database Security 163Code Security 166Secure Coding Practices 168Source Code Comments 168Error Handling 168Hard-Coded Credentials 170Memory Management 170Race Conditions 171Unprotected APIs 172Driver Manipulation 172Summary 173Exam Essentials 173Review Questions 175CHAPTER 7 CRYPTOGRAPHY AND THE PUBLIC KEY INFRASTRUCTURE 179An Overview of Cryptography 180Historical Cryptography 181Goals of Cryptography 186Confidentiality 187Integrity 188Authentication 188Nonrepudiation 189Cryptographic Concepts 189Cryptographic Keys 189Ciphers 190Modern Cryptography 191Cryptographic Secrecy 191Symmetric Key Algorithms 192Asymmetric Key Algorithms 193Hashing Algorithms 196Symmetric Cryptography 197Data Encryption Standard 197Triple DES 199Advanced Encryption Standard 200Symmetric Key Management 200Asymmetric Cryptography 203RSA 203Elliptic Curve 204Hash Functions 205SHA 206MD5 207Digital Signatures 207HMAC 208Digital Signature Standard 209Public Key Infrastructure 209Certificates 209Certificate Authorities 211Certificate Generation and Destruction 212Certificate Formats 215Asymmetric Key Management 216Cryptographic Attacks 217Emerging Issues in Cryptography 220Tor and the Dark Web 220Blockchain 220Lightweight Cryptography 221Homomorphic Encryption 221Quantum Computing 222Summary 222Exam Essentials 222Review Questions 224CHAPTER 8 IDENTITY AND ACCESS MANAGEMENT 229Identity 230Authentication and Authorization 231Authentication and Authorization Technologies 232Directory Services 236Authentication Methods 237Multifactor Authentication 237One-Time Passwords 239Biometrics 241Knowledge-Based Authentication 243Managing Authentication 244Accounts 245Account Types 245Account Policies and Controls 245Access Control Schemes 248Filesystem Permissions 249Summary 251Exam Essentials 252Review Questions 253CHAPTER 9 RESILIENCE AND PHYSICAL SECURITY 257Building Cybersecurity Resilience 258Storage Resiliency: Backups and Replication 260Response and Recovery Controls 266Physical Security Controls 269Site Security 269Summary 278Exam Essentials 279Review Questions 281CHAPTER 10 CLOUD AND VIRTUALIZATION SECURITY 285Exploring the Cloud 286Benefits of the Cloud 287Cloud Roles 289Cloud Service Models 289Cloud Deployment Models 293Shared Responsibility Model 295Cloud Standards and Guidelines 298Virtualization 300Hypervisors 300Cloud Infrastructure Components 302Cloud Compute Resources 302Cloud Storage Resources 304Cloud Networking 307Cloud Security Issues 311Availability 311Data Sovereignty 311Virtualization Security 312Application Security 312Governance and Auditing 313Cloud Security Controls 313Cloud Access Security Brokers 314Resource Policies 314Secrets Management 316Summary 316Exam Essentials 316Review Questions 318CHAPTER 11 ENDPOINT SECURITY 323Protecting Endpoints 324Preserving Boot Integrity 325Endpoint Security Tools 326Hardening Endpoints and Systems 332Service Hardening 333Operating System Hardening 335Hardening the Windows Registry 336Configuration, Standards, and Schemas 336Disk Security and Sanitization 338File Manipulation and Other Useful Command-Line Tools 341Scripting, Secure Transport, and Shells 343Securing Embedded and Specialized Systems 344Embedded Systems 345SCADA and ICS 346Securing the Internet of Things 348Specialized Systems 349Communication Considerations 350Security Constraints of Embedded Systems 351Summary 352Exam Essentials 354Review Questions 356CHAPTER 12 NETWORK SECURITY 361Designing Secure Networks 363Network Segmentation 365Network Access Control 366Port Security and Port-Level Protections 367Port Spanning/Port Mirroring 369Virtual Private Network 370Network Appliances and Security Tools 371Network Security, Services, and Management 377Deception and Disruption 382Secure Protocols 383Using Secure Protocols 383Secure Protocols 384Attacking and Assessing Networks 389On-Path Attacks 389Domain Name System Attacks 391Layer 2 Attacks 393Distributed Denial-of-Service Attacks 394Network Reconnaissance and Discovery Tools and Techniques 398Summary 411Exam Essentials 412Review Questions 414CHAPTER 13 WIRELESS AND MOBILE SECURITY 419Building Secure Wireless Networks 420Connectivity Methods 421Wireless Network Models 425Attacks Against Wireless Networks 426Designing a Network 430Controller and Access Point Security 432Wi-Fi Security Standards 433Wireless Authentication 434Managing Secure Mobile Devices 436Mobile Device Deployment Methods 436Mobile Device Management 438Specialized Mobile Device Security Tools 442Summary 442Exam Essentials 443Review Questions 445CHAPTER 14 INCIDENT RESPONSE 449Incident Response 450The Incident Response Process 451Attack Frameworks and Identifying Attacks 457Incident Response Data and Tools 461Security Information and Event Management Systems 462Alerts and Alarms 464Correlation and Analysis 465Rules 465Mitigation and Recovery 473Summary 477Exam Essentials 478Review Questions 480CHAPTER 15 DIGITAL FORENSICS 485Digital Forensic Concepts 486Legal Holds and e-Discovery 487Conducting Digital Forensics 488Acquiring Forensic Data 489Acquisition Tools 493Validating Forensic Data Integrity 496Data Recovery 499Forensic Suites and a Forensic Case Example 499Reporting 504Digital Forensics and Intelligence 504Summary 505Exam Essentials 505Review Questions 507CHAPTER 16 SECURITY POLICIES, STANDARDS, AND COMPLIANCE 511Understanding Policy Documents 512Policies 512Standards 515Procedures 517Guidelines 518Exceptions and Compensating Controls 519Personnel Management 520Least Privilege 520Separation of Duties 521Job Rotation and Mandatory Vacations 521Clean Desk Space 522Onboarding and Offboarding 522Nondisclosure Agreements 522Social Media 522User Training 522Third-Party Risk Management 523Winding Down Vendor Relationships 524Complying with Laws and Regulations 524Adopting Standard Frameworks 525NIST Cybersecurity Framework 525NIST Risk Management Framework 528ISO Standards 529Benchmarks and Secure Configuration Guides 531Security Control Verification and Quality Control 531Summary 533Exam Essentials 534Review Questions 535CHAPTER 17 RISK MANAGEMENT AND PRIVACY 539Analyzing Risk 540Risk Identification 541Risk Calculation 542Risk Assessment 543Managing Risk 547Risk Mitigation 547Risk Avoidance 549Risk Transference 549Risk Acceptance 549Risk Analysis 550Disaster Recovery Planning 552Disaster Types 552Business Impact Analysis 553Privacy 553Sensitive Information Inventory 554Information Classification 554Data Roles and Responsibilities 556Information Lifecycle 557Privacy Enhancing Technologies 557Privacy and Data Breach Notification 558Summary 559Exam Essentials 559Review Questions 560APPENDIX ANSWERS TO REVIEW QUESTIONS 565Chapter 1: Today’s Security Professional 566Chapter 2: Cybersecurity Threat Landscape 567Chapter 3: Malicious Code 569Chapter 4: Social Engineering, Physical, and Password Attacks 572Chapter 5: Security Assessment and Testing 574Chapter 6: Secure Coding 576Chapter 7: Cryptography and the Public Key Infrastructure 578Chapter 8: Identity and Access Management 579Chapter 9: Resilience and Physical Security 582Chapter 10: Cloud and Virtualization Security 584Chapter 11: Endpoint Security 586Chapter 12: Network Security 589Chapter 13: Wireless and Mobile Security 591Chapter 14: Incident Response 594Chapter 15: Digital Forensics 596Chapter 16: Security Policies, Standards, and Compliance 598Chapter 17: Risk Management and Privacy 600Index 603
Convolutional Neural Networks with Swift for Tensorflow
Dive into and apply practical machine learning and dataset categorization techniques while learning Tensorflow and deep learning. This book uses convolutional neural networks to do image recognition all in the familiar and easy to work with Swift language.It begins with a basic machine learning overview and then ramps up to neural networks and convolutions and how they work. Using Swift and Tensorflow, you'll perform data augmentation, build and train large networks, and build networks for mobile devices. You’ll also cover cloud training and the network you build can categorize greyscale data, such as mnist, to large scale modern approaches that can categorize large datasets, such as imagenet.Convolutional Neural Networks with Swift for Tensorflow uses a simple approach that adds progressive layers of complexity until you have arrived at the current state of the art for this field.WHAT YOU'LL LEARN* Categorize and augment datasets* Build and train large networks, including via cloud solutions* Deploy complex systems to mobile devicesWHO THIS BOOK IS FORDevelopers with Swift programming experience who would like to learn convolutional neural networks by example using Swift for Tensorflow as a starting point. BRETT KOONCE is the CTO of Quarkworks, a mobile consulting agency. He's a developer with five years experience creating apps for iOS and Android. His team has worked on dozens of apps that are used by millions of people around the world. Brett knows the pitfalls of development and can help you avoid them. Whether you want to build something from scratch, port your app from iOS to Android (or vice versa) or accelerate your velocity, Brett can help.Chapter 1: MNIST: 1D Neural NetworkChapter 2: MNIST: 2D Neural NetworkChapter 3: CIFAR: 2D Nueral Network with BlocksChapter 4: VGG NetworkChapter 5: Resnet 34Chapter 6: Resnet 50Chapter 7: SqueezeNetChapter 8: MobileNrt v1Chapter 9: MobileNet v2Chapter 10: Evolutionary StrategiesChapter 11: MobileNet v3Chapter 12: Bag of TricksChapter 13: MNIST RevisitedChapter 14: You are Here
Design Patterns in .NET Core 3
Implement design patterns in .NET Core 3 using the latest versions of the C# and F# languages. This book provides a comprehensive overview of the field of design patterns as they are used in today’s developer toolbox. This new edition introduces topics such as Functional Builder, Asynchronous Factory Method, Generic Value Adapter, and new Composite Proxies, including one that attempts to solve the SoA/AoS problem.Using the C# and F# programming languages, DESIGN PATTERNS IN .NET CORE 3 explores the classic design pattern implementations and discusses the applicability and relevance of specific language features for implementing patterns. You will learn by example, reviewing scenarios where patterns are applicable. MVP and patterns expert Dmitri Nesteruk demonstrates possible implementations of patterns, discusses alternatives and pattern inter-relationships, and illustrates the way that a dedicated refactoring tool (ReSharper) can be used to implement design patterns with ease.WHAT YOU WILL LEARN* Become familiar with the latest pattern implementations available in C# 8 and F# 5* Know how to better reason about software architecture* Understand the process of refactoring code to patterns* Refer to researched and proven variations of patterns* Study complete, self-contained examples, including many that cover advanced scenarios* Use the latest implementations of C# and Visual Studio/Rider/ReSharperWHO THIS BOOK IS FORDevelopers who have some experience in the C# language and want to expand their comprehension of the art of programming by leveraging design approaches to solving modern problemsDMITRI NESTERUK is a quantitative analyst, developer, course and book author, and an occasional conference speaker. His interests lie in software development and integration practices in the areas of computation, quantitative finance, and algorithmic trading. His technological interests include C# and C++ programming as well as high-performance computing using technologies such as CUDA and FPGAs. He has been a C# MVP from 2009 to 2018.PART I: INTRODUCTION.-Chapter 1: The SOLID Design PrinciplesChapter 2: The Functional PerspectivePART II: CREATIONAL PATTERNSChapter 3: BuilderChapter 4: FactoriesChapter 5: PrototypeChapter 6: SingletonPART III: STRUCTURAL PATTERNSChapter 7: AdapterChapter 8: BridgeChapter 9: CompositeChapter 10: DecoratorChapter 11: FaçadeChapter 12: FlyweightChapter 13: ProxyPART IV: BEHAVIORAL PATTERNSChapter 14: Chain of ResponsibilityChapter 15: CommandChapter 16: InterpreterChapter 17: IteratorChapter 18: MediatorChapter 19: MementoChapter 20: Null ObjectChapter 21: ObserverChapter 22: StateChapter 23: StrategyChapter 24: Template MethodChapter 25: Visitor
The TYPO3 Guidebook
Learn how to make the most of TYPO3 – the enterprise CMS – to organize information and digital assets, and communicate globally with powerful multi-site and multilingual support. This book will show you how the TYPO3 CMS backend and frontend work from top to bottom.Content management is a core aspect of every company’s communications, whether intranets and internal digital asset repositories or public-facing product pages and online communities. The book starts with four chapters covering how TYPO3 works, giving you a high-level overview of the most important aspects you should know about, including its community and professional ecosystem. If you’ve never seen TYPO3 before, you’ll learn how to make the most of it and what makes TYPO3 different from other content management systems you may have used before.You'll then move on to 10 hands-on guides. These step-by-step tutorials show you how to work with TYPO3 CMS. Each guide is self-contained, introducing a scenario, and showing you how to solve a given problem. The guides include references to documentation, examples, code samples, and everything you need to get the job done.The TYPO3 Guidebook will help you learn how to put your creative ideas online with TYPO3.WHAT YOU'LL LEARN* Scope, plan, design, and build efficient websites and web applications with TYPO3* Determine how TYPO3 can work best for you and how to avoid complications* Implement a project from idea to launch* Manage client expectations and complete TYPO3 projects on time and within budget* Understand TYPO3 terminology in practical terms* Create TYPO3 projects using best practices and configure them efficiently* Build integrations and features using TYPO3 Core APIsWHO THIS BOOK IS FORDecision makers, project managers, consultants and developersFELICITY BRAND, Open Strategy Partners. Felicity has more than ten years of experience as a writer and technical communicator. She spent the ten years before that as a business analyst. She has spent much of her career writing a variety of technical content for internal and external consumption—from online help to manuals, release notes, and in-house product training webinars, to web content and white papers. Felicity has a special knack for designing visuals and illustrations and a passion for clearly communicating technical concepts.HEATHER MCNAMEE, Open Strategy Partners. Heather is a technical communications professional with an M.Sc. in Learning and Technology. By using her marketing skills for good, she enables the right audiences to find, learn, and get the most out of the products they love. She loves working with subject-matter experts to distill their knowledge so newcomers can be successful. Since 2008, she’s developed hundreds of hours of documentation, learning, and certification materials to facilitate open-source technology and product adoption.JEFFREY A. “JAM” MCGUIRE, keynote speaker, Partner at Open Strategy Partners. Jeffrey helps organizations communicate and grow, finding and telling the stories that connect their technologies with the value they deliver. He builds on more than a dozen years of experience and a strong following at the intersection of open source software, business, and culture. His approach to technology marketing—sharing the human context of complex technology solutions, for example, celebrating their creators’ expertise and success—has left its mark in business and open source communities.PART 1: OVERVIEW.1. TYPO3 Showroom2. Designing and Planning with TYPO33. Building and Extending TYPO34.- Managing and Maintaining TYPO3PART 2: HANDS-ON GUIDES5. Guide 1 - Installing TYPO36. Guide 2 - Creating Your First TYPO3 Site7. Guide 3 - Extending TYPO38. Guide 4 - Planning, Building, and Using Content Elements9. Guide 5 - Create Your First Standalone Extension10. Guide 6 - Creating a Password-Protected Members' Area11. Guide 7 - Translating Your Site12. Guide 8 - Configure Content Management Workflow and Permissions13. Guide 9 -Creating a Business around TYPO314. Guide 10 - Debugging and Troubleshooting TYPO315. A Guidebook to Your New TYPO3 HomeAppendix A. GlossaryAppendix B. References
Blockchain Enabled Applications
Learn all about blockchain and its applications in cryptocurrency, healthcare, Internet of Things, finance, decentralized organizations, and more. Featuring case studies and practical insights, this book covers a unique mix of topics and offers insight into how to overcome hurdles that arise as the market and consumers grow accustomed to blockchain-based organizations and services.The book is divided into three major sections. The first section provides a historical background to blockchain technology. You will start with a historical context to financial capital markets when Bitcoin was invented, followed by mining protocols, the need for consensus, hardware mining, etc. Next, a formal introduction to blockchain is provided covering transaction workflow, role of decentralized network, and payment verification. Then, we dive deep into a different implementation of a blockchain: Ethereum. The main technical features, such as Ethereum Virtual Machine, are presented along with the smart contract programming language, Solidity.In this second section, you will look at some modern use cases for blockchain from a decentralized autonomous organization, high-performance computing in Ethereum and off-grid computations, and healthcare and scientific discovery. The final section of the book looks toward the future of blockchain. This is followed by chapters covering the rise of consortia in the blockchain world, the Hyperledger project, particularly the updates since 2018, and a chapter on educational blockchain games. This is followed by updates to EOS.IO, Chain Core, and Quorum, ICOs and a look at the major changes to financial markets brought about by blockchain and decentralized networks.WHAT YOU WILL LEARN* Get an overview of the popular games employed to teach the basic concepts of blockchain and decentralized networks* Be familiar with the rise of blockchain consortiums as well as updates to Hyperledger Project, 2020* Find out about cloud blockchains, including Microsoft Azure and Amazon Webservices, and how to set up test environments* Study machine learning integration in the blockchain and the role of smart contractsWHO THIS BOOK IS FORBlockchain developers interested in keeping up with the newest updates and students looking for a broad overview of this vast ecosystem, plus business executives who want to make informed product decisions about including blockchain as well as policy makers who want a better understanding of the current use casesVIKRAM DHILLON is an internal medicine resident physician at Wayne State University, Detroit Medical Center and a research fellow at the Institute of Simulation and Training, University of Central Florida (UFC). He holds a bachelor of science degree in molecular biology from the University of Central Florida where his main focus was bioinformatics, a Doctor of Osteopathic Medicine, and a doctoral degree from Nova Southeastern University. He has published multiple scientific papers on computational genomics. He has worked as a software and business development coach at the Blackstone Launchpad to mentor young entrepreneurs and startups through the process of building technology products. He was previously funded by the National Science Foundation through the Innovation Corps program to study customer discovery and apply it to commercialize high-risk startup ideas. He is a member of the Linux Foundation and has been involved in open-source projects and initiatives for the past several years. He often speaks at local conferences and meetups about programming, design, security, and entrepreneurship.DAVID METCALF is a serial entrepreneur who has launched multiple successful ventures and spinoff companies. He has reviewed thousands of emerging technology companies as an advisor and investor. He is the Director of the Mixed Emerging Technology Integration Lab at UCF’s Institute for Simulation and Training. His past projects involving XR and IoT span across education, health, space, cyber, and transportation. Current efforts include smart cities, blockchain, and enterprise learning transformation for government and industry. He is the co-editor/author of Voice Technology in Healthcare (2020) and Blockchain in Healthcare (2019) as part of the HIMSS Emerging Technology Series, Blockchain Enabled Applications (2018), Connected Health (2017), HIMSS mHealth Innovation (2014), and the HIMSS best-seller mHealth: From Smartphones to Smart Systems (2012).MAX HOOPER is the chief executive officer of Merging Traffic. He is responsible for the company’s management and growth strategy, serving as the corporate liaison to the financial services industry and various capital formation groups. Prior to starting the company, he was co-founder of Equity Broadcasting Corporation (EBC), a media company that owned and operated more than 100 television stations across the United States. He was responsible for activities in the cable, satellite, investment banking, and technology industries, and during his tenure, it grew to become one of the top 10 largest broadcasting companies in the country. He is a lifelong learner and has earned five doctorate degrees: PhD, DMin, PhD, ThD, and DMin from a variety of institutions. Hooper studied financial technology with cohorts at MIT, and cryptocurrency and business disruption with cohorts at the London School of Economics. As an avid runner, he has completed more than 100 marathons and an additional 20 ultra-marathons, which are 50- or 100-mile runs. He has completed the Grand Slam of Ultra Running. He is committed to his family and is a husband, father to five children, and grandfather to seven grandsons. He is active in many organizations and serves on various boards of directors. He works globally with several ministries and nonprofit aid groups and was honored to speak at the United Nations in New York in 2015.CHAPTER 1: BEHOLD THE DEAMERSChapter Goal: Provide a backdrop for introducing blockhain and the basics of a decentralized appSub -Topics:1. Financial crisis of 2008, the origins of bitcoin2. Basics of private-public keys3. What is a block, how is a block created4. What's a blockchain-enabled application? What is a decentralized application?CHAPTER 2: GOLD RUSH: MINING BITCOINChapter Goal: Provide a technical introduction to mining and the mathematical background to hashes, block headers, and consensusSub -Topics:1. Overview of mining, why is mining necessary for Bitcoin2. What is consensus3. Components of a block and a block header (mining components)4. What are hashes and how are they used in Bitcoin5. Hardware for mining (the gold rush part refers to the arms race that happened in hardware mining field).CHAPTER 3: FOUNDATIONS OF A BLOCKCHAINChapter Goal: Provide a technical introduction to transaction workflow, a blockchain network, simple payment verification, merkel roots, and block identifiersSub -Topics:1. What is a block header (block identifiers)2. How does the network participate3. A transaction workflow4. Unspent transaction outputs, transaction propagation5. Simple payment verification6. Merkel roots, blockchain forksCHAPTER 4: UNPACKING ETHEREUMChapter Goal: Provide a technical introduction to Ethereum, the differences between a Bitcoin blockchain and Ethereum blockchain, internal states, Ethereum Virtual Machine, and dAppsSub -Topics:1. Overview of Ethereum2. Proof of stake3. Accounts and contract model in Ethereum4. Global state, gas, internal storage5. Ethereum Virtual Machine6. Solidity programming language + Smart Contracts7. World Computer Model and components8. Blockchain as a service9. Decentralized apps10. Geth, MistCHAPTER 5: DECENTRALIZED ORGANIZATIONS (DAOS)Chapter Goal: Provide a technical introduction to DAOs and Aragon for setting up a DAO, including updates to new implementations of decentralized organizations in 2020.Sub -Topics:1. What is a DAO2. What is a blockchain organizations/companies3. Aragon-core and Kernel4. How do you make DAOs and other blockchain organizations using Aragon?5. How do you operate DAOs?CHAPTER 6: THE DAO HACKEDChapter Goal: Provide an overview to the vulnerabilities in the original DAO model, the conditions that led up to the hack, and the consequences to security hardening since.Sub -Topics:1. Concept of a DAO building on Vitalik’s concepts2. Slock.it and its involvement in making the DAO3. The Smart Contract for DAO4. The code vulnerability responsible for the hack5. Consequences of the hack6. Ethereum splitting into ETCCHAPTER 7: ETHEREUM TOKENS: HIGH PERFORMANCE COMPUTING (HPC)Chapter Goal: Provide an introduction to token in Ethereum by highlighting applications in HPC. Particularly, focus on Golem, SONM, and iEx.ec grid computing for off-chain computations and conflict resolution.Sub -Topics:1. Why tokens and what’s the value of using tokens2. Introduction to tokens, ERC 20 compatibility3. Token layer and an app layer4. Prototype for tokens and HPC – Ethereum Computation Markets5. Golem network, app registry, transaction framework, use-cases initially, and how the Smart Contract system ties them together6. SONM network and fog computing, use-cases, Smart Contract system, buyer-miner-hub interactions, purchasing computational power, Superglobal architecture, and OS7. iEx.ec, grid computing, sidechains, and how iEx.ec worksCHAPTER 8: BLOCKCHAIN IN HEALTHCAREChapter Goal: Provide an introduction to areas in healthcare where using a blockchain can provide benefit - Patient workflows, insurance claims processing, lightning network, verifiable data auditSub -Topics:1. Payer-provider-patient model, how claims work within this framework, and how will that change in the future2. Patient workflow based on permissions, blockchain-based workflow of a simple EHR, how permissions are passed as a patient moves from a general physician to a specialist3. Show how permissions work in blockchain insurance claims processing4. Waste management in healthcare and claims processing5. Concept of hotswitching, mentioning lightning network6. How can blockchain be used to reduce economic waste7. DeepMind’s Verifiable Data Audit as an alternative to blockchain8. Blockchain to streamline business processesCHAPTER 9: BLOCKCHAIN IN SCIENCEChapter Goal: Provide an introduction to major topics in science where blockchain can be beneficial – Reputation markets, reproducibility crisis, drug tracking, digital clinical trialsSub -Topics:1. Reproducibility crisis in science2. Prediction markets in science – Augur and Gnosis3. Initiatives to fix reproducibility traditionally4. Clinical trials using the blockchain, colored coins to demonstrate workflow5. Reputation systems using Blockchain6. Pharma drug tracking using blockchainCHAPTER 10: BUILDING HEALTHCARE COMPANIES ON BLOCKCHAINChapter Goal: Interview with John Bass on how to build a healthcare company on the blockchain and lessons learned along the way.Sub -Topics:1. The makings of Hashed Health2. Collaborative and consortium models3. Working groups for high-risk, high-reward technologies4. Governance models for Hashed Health consortia5. Member participationCHAPTER 11: RISE OF CONSORTIUMSChapter Goal: Provide an overview of consortium models that have become popular in the blockchain industry, the challenges consortiums hope to solve, and advantages to individual membersSub -Topics:1. Collaborative and consortium models2. Working groups for high-risk, high-reward technologies3. Governance models for Hashed Health consortiaCHAPTER 12: THE HYPERLEDGER PROJECTChapter Goal: Provide a broad overview of the Hyperledger Project and cover the rapid pace of developments since 2018 to the new products launched.Sub -Topics:1. Updates to all the components under Hyperledger umbrella including Fabric and Sawtooth2. New consensus algorithm (PBFT)3. Demo of Hyperledger Fabric Constructor4. Does your business need a blockchain (flowcharts)?5. Security in enterprise-grade Blockchains6. Smart Contracts in FabricCHAPTER 13: RECENT ADVANCES IN BLOCKCHAINChapter Goal: Provide a review of three major networks shaping the future of Blockchain – EOS.io with parallel processing virtual machine, chain-core with asset management, and Ivy Playground and Quorum with private–public transaction interfacesSub -Topics:1. EOS.io, how the tech works, the new advances such as parallel processing of smart contracts and instructions2. Chain Core, managing assets on blockchain, Ivy Playground as the new programming language to manage assets3. Quorum by JP Morgan, how the consensus works, how private transactions work, zero-knowledge proofs, Ethereum Enterprise AllianceCHAPTER 14: BLOCKCHAIN GAMESChapter Goal: Provide a review of the educational games and APIs that have been released to teach the basic concepts of a blockchain networkSub -Topics:1. Components of a blockchain game2. Formal education and training in blockchain3. Formalization of blockchain study with journals and research articles4. Review of major blockchain games (3)CHAPTER 15: CLOUD BLOCKCHAINSChapter Goal: Provide an overview of how to click and deploy a blockchain using cloud services and give a visual tutorial on how to set it upSub -Topics:1. Demo of Hyperledger Fabric Constructor on IBM Bluemix2. Azure blockchain deployment3. Amazon ECS cloud blockchain deployment4. Setting up your own blockchain test-lab and budget itCHAPTER 16: TECHNOLOGICAL REVOLUTIONS AND FINANCIAL CAPITALChapter Goal: Provide an overview of the financial markets and ICOs, focusing particularly on how to set up ICOs, how to manage them, advances to financial regulation technology based on blockchainSub -Topics:1. Dr. Hooper’s chapter focused on ICOs and financial capital markets2. Setting up ICOs, major pitfalls to avoid, and challenges to overcome during an ICO3. Major tech advances in financial markets using blockchain4. Reg TechAFTERWORD – CALL TO ACTION AND THE FUTURE OF BLOCKCHAIN
Data Science - Analytics and Applications
Organisationen sind bereits von der starren Struktur des klassischen Projektmanagements zu agilen Ansätzen übergegangen. Dies gilt auch für Softwareentwicklungsprojekte, die flexibel sein müssen, um schnell auf die Wünsche der Kunden reagieren zu können und um Änderungen zu berücksichtigen, die aufgrund von Architekturentscheidungen erforderlich sind. Nachdem sich die Datenwissenschaft als Eckpfeiler in Organisationen und Unternehmen etabliert hat, ist es nun zwingend erforderlich, diesen entscheidenden Schritt auch für analytische Geschäftsprozesse durchzuführen. Die nicht-deterministische Natur der Datenwissenschaft und die ihr innewohnenden analytischen Aufgaben erfordern einen interaktiven Ansatz für eine evolutionäre, schrittweise Entwicklung zur Realisierung der wichtigsten Geschäftsanwendungen und Anwendungsfälle.Die 3. Internationale Konferenz zur Datenwissenschaft (iDSC 2020) brachte Forscher, Wissenschaftler und Wirtschaftsexperten zusammen, um Möglichkeiten zu erörtern, wie neue Wege zur Umsetzung agiler Ansätze in den verschiedenen Bereichen der Datenwissenschaft, wie maschinelles Lernen und KI, Data Mining oder Visualisierung und Kommunikation, sowie Fallstudien und Best Practices von führenden Forschungseinrichtungen und Wirtschaftsunternehmen etabliert werden können.Der Tagungsband umfasst alle im wissenschaftlichen Track vorgestellten Volltexte und die Kurzbeiträge aus dem studentischen Track.Zu den Themen, die Sie interessieren, gehören unter anderem:* Künstliche Intelligenz und Maschinelles Lernen * Implementierung von Data-Mining-Prozessen * Agile Datenwissenschaft und Visualisierung * Fallstudien und Anwendungen für Agile DatenwissenschaftOrganizations have moved already from the rigid structure of classical project management towards the adoption of agile approaches. This holds also true for software development projects, which need to be flexible to adopt to rapid requests of clients as well to reflect changes that are required due to architectural design decisions. With data science having established itself as corner stone within organizations and businesses, it is now imperative to perform this crucial step for analytical business processes as well. The non-deterministic nature of data science and its inherent analytical tasks require an interactive approach towards an evolutionary step-by-step development to realize core essential business applications and use-cases.The 3rd International Data Science Conference (iDSC 2020) brougt together researchers, scientists, and business experts to discuss means of establishing new ways of embracing agile approaches within the various domains of data science, such as machine learning and AI, data mining, or visualization and communication as well as case studies and best-practices from leading research institutions and business companies.The proceedings include all full papers presented in the scientific track and the short papers from the student track.Among the topics of interest are:* Artificial Intelligence and Machine Learning * Implementation of data mining processes * Agile Data Science and Visualization * Case Studies and Applications for Agile Data SciencePETER HABEr is a Professor of Information and Communication Technology, in particular for analog and digital signal processing, and responsible coordinator for system theory and electrical engineering at Salzburg University of Applied Sciences. He is a researcher and project manager, leading and coordinating national and international projects in the field of IT and IT management, while also integrating data science solutions at businesses. Since 2009 he has been a member of the international advisory board for the IATED conferences.THOMAS LAMPOLTSHAMMER is an Assistant Professor for ICT and Deputy Head of the Centre for E-Governance at the Department of E-Governance and Administration, Danube University Krems, Austria. His current research focus is on the domain of data governance, the effects of ICT application in a connected society, and the effects on a data-driven society. He has a substantial background in the design and implementation of expert and decision-making systems, data analytics, and semantic-based reasoning.MANFRED MAYR is the Academic Program Director for “Business Informatics and Digital Transformation” as well department head for IT-Management at Salzburg University of Applied Sciences. He is a lecturer at international conferences and the author of various publications in the field of business informatics and researches business applications of data science. The digitalisation of ERP applications in the industrial environment is a long-standing and important field of his research. In addition, he has coordinated several national and international research projects.KATHRIN PLANKENSTEINER is the Head of „Data Analytics & Intelligence“ at the research center Digital Factory Vorarlberg, FH Vorarlberg University of Applied Science. She studied technical mathematics and data analysis and holds a PhD in Applied Statistics from the University of Klagenfurt (Austria). Her field of research includes reliability testing and analyzing, lifetime modeling, regression analysis, computational statistics, multivariate data analysis, statistical inference, reasoning, & statistical machine learning.The editors are the conference chairs of the International Data Science Conference.-------PETER HABER ist Professor für Informations- und Kommunikationstechnik, insbesondere für analoge und digitale Signalverarbeitung, und verantwortlicher Koordinator für Systemtheorie und Elektrotechnik an der Fachhochschule Salzburg. Er ist Forscher und Projektleiter, leitet und koordiniert nationale und internationale Projekte im Bereich IT und IT-Management und integriert datenwissenschaftliche Lösungen in Unternehmen. Seit 2009 ist er Mitglied des internationalen Beirats für die IATED-Konferenzen.THOMAS LAMPOLTSHAMMER ist Assistenzprofessor für IKT und stellvertretender Leiter des Zentrums für E-Governance am Lehrstuhl für E-Governance und Verwaltung, Donau-Universität Krems, Österreich. Sein aktueller Forschungsschwerpunkt liegt auf dem Gebiet der Datenverwaltung, den Auswirkungen der IKT-Anwendung in einer vernetzten Gesellschaft und den Auswirkungen auf eine datengesteuerte Gesellschaft. Er verfügt über einen substantiellen Hintergrund im Design und in der Implementierung von Experten- und Entscheidungssystemen, Datenanalyse und semantisch-basierter Argumentation.MANFRED MAYR ist Akademischer Programmdirektor für "Wirtschaftsinformatik und digitale Transformation" sowie Abteilungsleiter für IT-Management an der Fachhochschule Salzburg. Er ist Vortragender bei internationalen Konferenzen und Autor verschiedener Publikationen im Bereich der Wirtschaftsinformatik und forscht zu betriebswirtschaftlichen Anwendungen der Datenwissenschaft. Die Digitalisierung von ERP-Anwendungen im industriellen Umfeld ist ein langjähriges und wichtiges Feld seiner Forschung. Darüber hinaus hat er mehrere nationale und internationale Forschungsprojekte koordiniert.KATHRIN PLANKENSTEINER ist Leiterin der Abteilung "Data Analytics & Intelligence" am Forschungszentrum Digitale Fabrik Vorarlberg, FH Vorarlberg. Sie studierte Technische Mathematik und Datenanalyse und promovierte in Angewandter Statistik an der Universität Klagenfurt (Österreich). Ihr Forschungsgebiet umfasst Zuverlässigkeitstests und -analysen, Lebensdauermodellierung, Regressionsanalyse, rechnergestützte Statistik, multivariate Datenanalyse, statistische Inferenz, logisches Denken und statistisches maschinelles Lernen.Die Herausgeber sind die Konferenzvorsitzenden der International Data Science Conference.Abstracts of Industry Contributions - Non Peer-Reviewed Invited Papers - German Abstracts of Peer-Reviewed Full Papers - Peer-Reviewed Full Papers - Data Science Frameworks - Bayesian Analysis - Optimizing Methods for Data Science - Deep Learning Applications
Internet of Things in Business Transformation
The objective of this book is to teach what IoT is, how it works, and how it can be successfully utilized in business. This book helps to develop and implement a powerful IoT strategy for business transformation as well as project execution. Digital change, business creation/change and upgrades in the ways and manners in which we work, live, and engage with our clients and customers, are all enveloped by the Internet of Things which is now named "Industry 5.0" or "Industrial Internet of Things." The sheer number of IoT(a billion+), demonstrates the advent of an advanced business society led by sustainable robotics and business intelligence. This book will be an indispensable asset in helping businesses to understand the new technology and thrive.PARUL GANDHI obtained her PhD in Computer Science and Software Engineering from Guru Jambheshwar University, Hisar, India. She is an associate professor at the Manav Rachna International Institute of Research and Studies (MRIIRS), Faridabad where she also handles the PhD program. She has published more than 30 research papers in reputed journals and conferences. Her research interests include software quality, soft computing, software metrics and component-based software development, data mining, IOT. SURBHI BHATIA obtained her PhD in Computer Science and Engineering from Banasthali Vidypaith, India. She is an assistant professor in the Department of Information Systems, College of Computer Sciences and Information Technology, King Faisal University, Saudi Arabia. She has published seven patents with the Government of India and more than 25 papers in reputed journals and conferences in high indexing databases. She is an active researcher in the field of data mining, machine learning, deep learning and information retrieval. ABHISHEK KUMAR obtained his PhD in Computer Science from the University of Madras. He is an assistant professor in the Department of Computer Science & Engineering, Chitkara University Institute of Engineering and Technology, India. He has more than 60 publications in peer-reviewed journals and has edited more than 15 books. His research areas include AI, image processing, computer vision, data mining, machine learning. MOHAMMAD ALOJAIL obtained his PhD in Information systems from RMIT University, Australia. He is the Chairman of Information System Department, College of Computer Sciences and Information Technology, King Faisal University, Saudi Arabia. He has considerable experience in the field of information systems and has delivered many presentations on leadership and management as well as successfully leading and managing teams to deliver large scale industrial projects. Dr. Alojail has written many scholarly papers in the field of IS and IT outsourcing. PRAMOD SINGH RATHORE is pursuing his Doctorate in Computer Science & Engineering from Bundelkhand University, India. He has been working as an assistant professor at the Computer Science & Engineering Department at Aryabhatt Engineering College and Research Centre, Rajasthan. He has more than 45 publications in peer-reviewed journals. Über die Autorin 9EINFÜHRUNG 19Über dieses Buch 20Konventionen in diesem Buch 20Was Sie nicht lesen müssen 21Törichte Annahmen über die Leser:innen 21Wie dieses Buch aufgebaut ist 22Teil I: Männlich, weiblich, divers – alle Geschlechter ansprechen 22Teil II: Sechs Arten zu gendern 22Teil III: Richtig gendern in jeder Situation 23Teil IV: Der Top-Ten-Teil 23Symbole, die in diesem Buch verwendet werden 23Wie es weitergeht 24TEIL I: MÄNNLICH, WEIBLICH, DIVERS – ALLE GESCHLECHTER ANSPRECHEN 25KAPITEL 1 WAS ES MIT DEM GENDERN AUF SICH HAT27Gendern heißt: Alle Geschlechter gleich ansprechen 27Wie viele Geschlechter gibt es überhaupt? 28Viele Ideen, ein Ziel: So geht Gendern 29Darum ist gendergerechte Sprache wichtig 29Alle mitmeinen? Gar nicht so einfach! 30Das AGG und andere Gesetze 31Finden Sie Ihre Art zu gendern 32Ihre Werte zählen 32Was Ihre Zielgruppe will 33Keine Angst vor Hater:innen 33KAPITEL 2 DIVERS: DAS GESETZ ZUM DRITTEN GESCHLECHT35Wer mit »divers« gemeint ist 35Mit uneindeutigen Geschlechtsmerkmalen geboren 36Transgeschlechtliche Menschen 36So hat sich das Personenstandsgesetz verändert 38Eine dritte Geschlechtsoption – leider nicht für alle 39Die Sache mit der Bürokratie 40Was die Option »divers« für das Gendern bedeutet 41Sprachvarianten, die alle Geschlechter einschließen 41Blick in die Zukunft: ein drittes Pronomen? 42KAPITEL 3 WARUM DAS GENERISCHE MASKULINUM NICHT GESCHLECHTSNEUTRAL IST45Die deutsche Sprache ist männlich dominiert 45Sprachen mit Geschlecht: Genus und Sexus 46Vermeintlich neutral: Das generische Maskulinum 47Frauen fühlen sich nicht angesprochen 48Vom subjektiven Empfinden… 48… und was Studien sagen 49Stereotype spielen auch eine Rolle 50Wie das generische Maskulinum zu Missverständnissen führt 50Die Lösung: Geschlechtergerechte Sprache 51Und ein generisches Femininum? 52Die Sache mit der Lesbarkeit 52TEIL II: SECHS ARTEN ZU GENDERN 55KAPITEL 4 DIE PAARFORM57Immer Hand in Hand 57Das perfekte Match: Paarform und neutral Formulierungen 58Für Sparfüchse: Sparschreibungen gegen Wortwiederholungen 59Die Paarform ist einfach umzusetzen 61Verständlich und lesbar – für alle 61Rechtschreibung und Grammatik? Kein Problem! 61Hier geht es aber nur um Männer und Frauen 62Mitgemeint und mitgenannt – viele Frauen freuen sich! 62Lesbarkeit oder Inklusivität: Das große Dilemma 63Checkliste: Wann die Paarform zu Ihnen passt 64KAPITEL 5 BINNEN-I UND SCHRÄGSTRICH65Die Rentner:innen unter den Arten zu gendern 65Der Schrägstrich verkürzt die Paarform 65Binnen-I: Großbuchstaben statt nerviger Sonderzeichen 66Alte Bekannte lädt man gerne ein 67Das Problem mit der Lesbarkeit 68Vorsicht: Verwechslungsgefahr und Stolperfallen 68Da schwirrt den Leser:innen der Kopf 69Ob sich Binnen-I und Schrägstrich lohnen 70Checkliste: Wann Binnen-I oder Schrägstrich zu Ihnen passen 71KAPITEL 6 NEUTRALE FORMULIERUNGEN73Sagen Sie’s doch mal neutral 73Machen Sie Verb oder Adjektiv zum Substantiv 74-kraft und -schaft anhängen 75Diese Wörter sind sowieso schon neutral 76Es kann so einfach sein 78Sie gendern und keine:r merkt’s 78Stark im Team mit anderen Arten zu gendern 78Doch es lauern Fallstricke 79Ist da wirklich kein Geschlecht? 80Zusammengesetzte Wörter 80Neutral, aber unpersönlich 82Checkliste: Wann neutrale Formulierungen zu Ihnen passen 82KAPITEL 7 STERNCHEN, UNTERSTRICH UND DOPPELPUNKT – DER GENDER-GAP83Mut zur Lücke 83Diese Sonderzeichen dürfen Sie wählen 84Wo die Lücke hingehört – und wo nicht 85Das passiert mit Artikeln und Personalpronomen 86Alle fühlen sich gemeint 87Nichtbinäre Menschen richtig ansprechen 88Experimente mit Pronomen 88Aber nicht alle haben Zugang 89Wo der Gender-Gap an seine Grenzen stößt 89Komplizierte Formulierungen umschiffen 90Checkliste: Wann der Gender-Gap zu Ihnen passt 91KAPITEL 8 DAS PRINZIP DER ROLLENVERTEILUNG 93Mal so, mal so – aber nach Plan 93Aktivieren Sie Ihre Vorstellungskraft 94Was mit dem Plural passiert 95Stolperfallen ade! 96Die Mischung macht’s 97Perfekt als Ergänzung zu Gender-Gap und Co. 97Gute Lesbarkeit hat ihren Preis 98Wer nicht mitspielt 98Vorsicht vor stereotypen Rollenbildern 99Checkliste: Wann das Prinzip der Rollenverteilung zu Ihnen passt 100TEIL III: RICHTIG GENDERN IN JEDER SITUATION 101KAPITEL 9 GENDERN IN STUDIUM UND BERUF103Richtig gendern in Haus- und Abschlussarbeit 103Mitgemeint in der Fußnote 104Wer sucht, der findet: Die Vorgaben Ihrer Hochschule 104Kein Punktabzug für Fehler beim Gendern 106Worauf Sie in Ihrer Arbeit achten sollten 106Geschlechtergerechte Sprache im Berufsalltag 107Gendern als Teil der Corporate Language 108E-Mails und Anrede: So treten Sie niemandem auf die Füße 109Geschlechtergerechte Sprache bindet Kund:innen! 111Alle Geschlechter ansprechen in der Stellenanzeige 112Hier ist Gendern Pflicht: Das Allgemeine Gleichbehandlungsgesetz 113M/W/D/X/Y/Z: So behalten Sie den Durchblick 114KAPITEL 10 GENDERN IM INTERNET 117Gendern und Suchmaschinenoptimierung vereinbaren 117Was Suchmaschinenoptimierung eigentlich ist 118So suchen wir im Web 119Die Suchmaschine austricksen 122SEO für Frauen: So werden Sie online gefunden 123Sie müssen sich nicht als Mann ausgeben 123Nutzer:innen haben die Macht 124Digitale Texte für die Sprachausgabe gendern 125KAPITEL 11 BARRIEREFREI GENDERN – DAMIT ALLE MITKOMMEN127Wann Gendern nicht barrierefrei ist 127Geschlechterinklusiv schreiben für blinde Menschen 129Digitale Texte und die Vorlesefunktion 130Die Sache mit der Blindenschrift 131Gendern in Leichter und Einfacher Sprache 132Leicht für alle 133Das Gendern erklären 134KAPITEL 12 GESCHLECHTERGERECHT SPRECHEN 137Mündlich gendern – kein Problem 137In der Paarform sprechen 138Die Lücke richtig aussprechen 138Die Macht der Gewohnheit bezwingen 139Wie Medien gendern 141Beispiele aus Fernsehen und Radio 141Als Medienmacher:in gendergerecht sprechen 142Mit und über nichtbinäre Menschen sprechen 143TEIL IV: TOP-TEN-TEIL 147KAPITEL 13 ZEHN PUNKTE, DIE ES BEIM GENDERN ZU BEACHTEN GILT149Lesbarkeit geht vor 149Die richtige Art zu gendern gibt es nicht 149Es gibt keine falsche Art zu gendern 150Im ganzen Satz wird’s manchmal schwierig 150Schnelle Hilfe aus dem Genderwörterbuch 151Verzetteln Sie sich nicht 151Treffen Sie eine Entscheidung 151Beachten Sie die Vorgaben 152Zwei oder alle Geschlechter 152Lassen Sie sich nicht verunsichern 153KAPITEL 14 ZEHN WÖRTER, DIE SIE NICHT GENDERN MÜSSEN155Geschlechtsneutrale Substantive 155Verben 155Adjektive 156Verwendete Literatur 157Stichwortverzeichnis 159
A Web-Based Approach to Measure Skill Mismatches and Skills Profiles for a Developing Country:
Several interdisciplinary studies highlight imperfect information as a possible explanation of skill mismatches, which in turn has implications for unemployment and informality rates. Despite information failures and their consequences, countries like Colombia (where informality and unemployment rates are high) lack a proper labour market information system to identify skill mismatches and employer skill requirements. One reason for this absence is the cost of collecting labour market data. Recently, the potential use of online job portals as a source of labour market information has gained the attention of researchers and policymakers, since these portals can provide quick and relatively low-cost data collection. As such, these portals could be of use for Colombia. However, debates continue about the efficacy of this use, particularly concerning the robustness of the collected data. This book implements a novel mixed-methods approach (such as web scraping, text mining, machine learning, etc.) to investigate to what extent a web-based model of skill mismatches can be developed for Colombia. The main contribution of this book is demonstrating that, with the proper techniques, job portals can be a robust source of labour market information. In doing so, it also contributes to current knowledge by developing a conceptual and methodological approach to identify skills, occupations, and skill mismatches using online job advertisements, which would otherwise be too complex to be collected and analysed via other means. By applying this novel methodology, this study provides new empirical data on the extent and nature of skill mismatches in Colombia for a considerable set of non-agricultural occupations in the urban and formal economy. Moreover, this information can be used as a complement to household surveys to monitor potential skill shortages. Thus, the findings are useful for policymakers, statisticians, and education and training providers, among others.
AWS Certified Security Study Guide
GET PREPARED FOR THE AWS CERTIFIED SECURITY SPECIALTY CERTIFICATION WITH THIS EXCELLENT RESOURCEBy earning the AWS Certified Security Specialty certification, IT professionals can gain valuable recognition as cloud security experts. The AWS Certified Security Study Guide: Specialty (SCS-C01) Exam helps cloud security practitioners prepare for success on the certification exam. It’s also an excellent reference for professionals, covering security best practices and the implementation of security features for clients or employers.Architects and engineers with knowledge of cloud computing architectures will find significant value in this book, which offers guidance on primary security threats and defense principles. Amazon Web Services security controls and tools are explained through real-world scenarios. These examples demonstrate how professionals can design, build, and operate secure cloud environments that run modern applications.The study guide serves as a primary source for those who are ready to apply their skills and seek certification. It addresses how cybersecurity can be improved using the AWS cloud and its native security services. Readers will benefit from detailed coverage of AWS Certified Security Specialty Exam topics.* Covers all AWS Certified Security Specialty exam topics* Explains AWS cybersecurity techniques and incident response* Covers logging and monitoring using the Amazon cloud* Examines infrastructure security* Describes access management and data protectionWith a single study resource, you can learn how to enhance security through the automation, troubleshooting, and development integration capabilities available with cloud computing. You will also discover services and tools to develop security plans that work in sync with cloud adoption.ABOUT THE AUTHORSDARIO GOLDFARB is a Security Solutions Architect at Amazon Web Services in Latin America. He has more than 15 years of experience in cybersecurity. ALEXANDRE M.S.P. MORAES is a Director of Teltec, a Brazilian systems integrator that is highly specialized in Network Design, Security Architectures and Cloud Computing. THIAGO MORAIS is the leader of Solutions Architecture teams at Amazon Web Services in Brazil. He has more than 20 years of experience in the IT industry. MAURICIO MUÑOZ is a Sr. Manager of a Specialist Solutions Architects team at Amazon Web Services in Latin America. He's worked in IT for more than 20 years, specializing in Information Security. MARCELLO ZILLO NETO is a Chief Security Advisor and a former Chief Information Security Officer (CISO) in Latin America. He has over 20 years of experience in cybersecurity and incident response. GUSTAVO A. A. SANTANA is the leader of the Specialist and Telecommunications Solutions Architecture teams at Amazon Web Services in Latin America. FERNANDO SAPATA is a Principal Business Development Manager for Serverless at Amazon Web Services in Latin America. He has more than 19 years of experience in the IT industry. Prolog 91. EINLEITUNG 15Veränderung 17Innovationsfähigkeit: Ohne Druck keine Bewegung 23Vier historische technische Revolutionen und ihrWeg zur Akzeptanz innerhalb der Gesellschaft 28Rückkehr zum eigenständigen, selbstermächtigten Menschen 31Mitarbeitende werden immer essenzieller 33Wissen verdoppelt sich, wenn man es teilt 352. MIT NETZWERKFÜHRUNG IN DIE ZUKUNFT 39Unternehmerische Voraussetzungen für das Gelingen von Netzwerken 42Führen in Netzwerken 48Unternehmensnetzwerke 52Inoffizielle Netzwerke 53Unternehmensinterne Netzwerke 54Unternehmensexterne Netzwerke 623. WAS HAT EIN PERÜCKENMACHER MIT STRATEGISCHER NETZWERKFÜHRUNG ZU TUN? 67Hierarchie und Eigenverantwortung 68Der Purpose geht uns alle an 87Serendipität 125Innovative Vernetzungsformate 134Mut zur Lücke 1634. WIE KANN AKTIV AUS TRENDS UND KRISEN GELERNT WERDEN? 167Wie können Vorbehalte abgebaut werden? 171Beispiel Corona – die Krise aktiv nutzen 172Krisen nutzen, um Gewohnheiten zu ändern 1755. WEITERBILDUNG UND PERSONALENTWICKLUNG ALS BEITRAG ZUR VERNETZUNG 183Disruption 1.0 derWeiterbildung 187Die neue Rolle der Personalentwicklung 191Mit dem TEAK®-Konfigurator auf Erfolgskurs 203Was ist Ihr Beitrag? 2366. DIE UNAUFHALTSAME DYNAMIK DES NETZWERKES AM BEISPIEL DER GROUP SCHUMACHER GMBH 2397. DIE NEUE PERSPEKTIVE DER ZUKUNFT – NACHWORT 249Danksagung 253Die Autorin 257Literaturverzeichnis 259Stichwortverzeichnis 269
Deep Reinforcement Learning in Unity
Gain an in-depth overview of reinforcement learning for autonomous agents in game development with Unity.This book starts with an introduction to state-based reinforcement learning algorithms involving Markov models, Bellman equations, and writing custom C# code with the aim of contrasting value and policy-based functions in reinforcement learning. Then, you will move on to path finding and navigation meshes in Unity, setting up the ML Agents Toolkit (including how to install and set up ML agents from the GitHub repository), and installing fundamental machine learning libraries and frameworks (such as Tensorflow). You will learn about: deep learning and work through an introduction to Tensorflow for writing neural networks (including perceptron, convolution, and LSTM networks), Q learning with Unity ML agents, and porting trained neural network models in Unity through the Python-C# API. You will also explore the OpenAI Gym Environment used throughout the book.DEEP REINFORCEMENT LEARNING IN UNITY provides a walk-through of the core fundamentals of deep reinforcement learning algorithms, especially variants of the value estimation, advantage, and policy gradient algorithms (including the differences between on and off policy algorithms in reinforcement learning). These core algorithms include actor critic, proximal policy, and deep deterministic policy gradients and its variants. And you will be able to write custom neural networks using the Tensorflow and Keras frameworks.Deep learning in games makes the agents learn how they can perform better and collect their rewards in adverse environments without user interference. The book provides a thorough overview of integrating ML Agents with Unity for deep reinforcement learning.WHAT YOU WILL LEARN* Understand how deep reinforcement learning works in games* Grasp the fundamentals of deep reinforcement learning * Integrate these fundamentals with the Unity ML Toolkit SDK* Gain insights into practical neural networks for training Agent Brain in the context of Unity ML Agents* Create different models and perform hyper-parameter tuning* Understand the Brain-Academy architecture in Unity ML Agents* Understand the Python-C# API interface during real-time training of neural networks* Grasp the fundamentals of generic neural networks and their variants using Tensorflow* Create simulations and visualize agents playing games in UnityWHO THIS BOOK IS FORReaders with preliminary programming and game development experience in Unity, and those with experience in Python and a general idea of machine learningABHILASH MAJUMDER is a natural language processing research engineer for HSBC (UK/India) and technical mentor for Udactiy (ML). He also has been associated with Unity Technologies and was a speaker at Unite India-18, and has educated close to 1,000 students from EMEA and SEPAC (India) on Unity. He is an ML contributor and curator for Open Source Google Research and Tensorflow, and creator of ML libraries under Python Package Index (Pypi). He is an online educationalist for Udemy and a deep learning mentor for Upgrad.Abhilash was an apprentice/student ambassador for Unity Technologies where he educated corporate employees and students on using general Unity for game development. He was a technical mentor (AI programming) for the Unity Ambassadors Community and Content Production. He has been associated with Unity Technologies for general education, with an emphasis on graphics and machine learning. He is one of the first content creators for Unity Technologies India since 2017.Chapter 1: Introduction to Reinforcement LearningSub -Topics1. Markov Models and State Based Learning2. Bellman Equations3. Creating a Multi Armed Bandit RL simulation.4. Value and Policy iteration.Chapter 2: Pathfinding and NavigationSub - Topics1. Pathfinding in Unity2. Navigation Meshes3. Creating Enemy AIChapter 3: Setting Up ML Agents Toolkit SDKSub - Topics:1. Installing ML Agents2. Configuring Brain Academy3. Linking ML Agents with Tensorflow with Jupyter Notebooks4. Playing with ML agents samplesChapter 4: Understanding Brain Agents and AcademySub - Topics:1. Understanding the architecture of Brain2. Training different Agents with Single Brain3. Generic HyperparametersChapter 5: Deep Reinforcement LearningSub - Topics:1. Fundamentals of Mathematical Machine Learning with Python2. Deep Learning with Keras and Tensorflow3. Deep Reinforcement Learning Algorithms4. Writing neural network for Deep Q learning for Brain5. Hyperparameter Tuning for Optimization6. Memory-based LSTM Network Design with Keras for Brain7. Building an AI Agent for Kart Game Using Trained NetworkChapter 6: Competitive Networks for AI AgentsSub - Topics:1. Cooperative Network and Adversarial Network2. Extended Reinforcement Learning–Deep Policy Gradients3. Simulations Made with Unity ML Agents4. Simulating AI Autonomous Agent for Self-drivingChapter 7: Case Study – Obstacle Tower ChallengeSub - Topics:1. Obstacle Tower Challenge2. Unity ML Agents Challenge3. Research Developments from Unity AI4. Playing with the Open AI Gym Wrapper