This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures.
The most comprehensive, up-to-date introduction to the theory and practice of artificial intelligence The long-anticipated revision of Artificial Intelligence: A Modern Approach explores the full breadth and depth of the field of artificial intelligence (AI).
This second edition of the renowned Cambridge Handbook of Creativity expands on the first edition with over two thirds new material reaching across psychology, business, entrepreneurship, education, and neuroscience. It introduces creativity scholarship by summarising its history, major theories and assessments, how creativity develops across the lifespan, and suggestions for improving creativity. It also illustrates cutting-edge work on genetics and the neuroscience of creativity, alongside creativity's potential for both benevolence and malevolence. The chapters cover the related areas of imagination, genius, play, and aesthetics and tackle questions about how cultural differences, one's physical environment, mood, and self-belief can impact creativity. The book then examines the impacts on creativity of behaviour by teachers, managers, and leaders in particular.
This book explains the cloud from the user's viewpoint - the business user's, in particular. The author explains what the cloud is, when to use it (and when not to), how to select a cloud service, how to integrate it with other technologies, and what the best practices are for using cloud computing.
Enjoy reading interviews with more than two dozen data professionals to see a picture of what it’s like to work in the industry managing and analyzing data, helping you to know what it takes to move from your current expertise into one of the fastest growing areas of technology today.
Data Science and Big Data Analytics is about harnessing the power of data for new insights. The content focuses on concepts, principles and practical applications that are applicable to any industry and technology environment, and the learning is supported and explained with examples that you can replicate using open-source software.
Data science libraries, frameworks, modules, and toolkits are great for doing data science, but they're also a good way to dive into the discipline without actually understanding data science. With this updated second edition, you'll learn how many of the most fundamental data science tools and algorithms work by implementing them from scratch. If you have an aptitude for mathematics and some programming skills, author Joel Grus will help you get comfortable with the math and statistics at the core of data science, and with hacking skills you need to get started as a data scientist.
This textbook explains the concepts and techniques required to write programs that can handle large amounts of data efficiently. Project-oriented and classroom-tested, the book presents a number of important algorithms supported by examples that bring meaning to the problems faced by computer programmers.
Handbook of Statistical Analysis and Data Mining Applications, Second Edition, is a comprehensive professional reference book that guides business analysts, scientists, engineers and researchers, both academic and industrial, through all stages of data analysis, model building and implementation. The handbook helps users discern technical and business problems, understand the strengths and weaknesses of modern data mining algorithms and employ the right statistical methods for practical application. This book is an ideal reference for users who want to address massive and complex datasets with novel statistical approaches and be able to objectively evaluate analyses and solutions. It has clear, intuitive explanations of the principles and tools for solving problems using modern analytic techniques and discusses their application to real problems in ways accessible and beneficial to practitioners across several areas--from science and engineering, to medicine, academia and commerce.
This accessible and classroom-tested textbook/reference presents an introduction to the fundamentals of the emerging and interdisciplinary field of data science. The coverage spans key concepts adopted from statistics and machine learning, useful techniques for graph analysis and parallel programming, and the practical application of data science for such tasks as building recommender systems or performing sentiment analysis.
An Introduction to Statistical Learning provides an accessible overview of the field of statistical learning, an essential toolset for making sense of the vast and complex data sets that have emerged in fields ranging from biology to finance to marketing to astrophysics in the past twenty years. This book presents some of the most important modeling and prediction techniques, along with relevant applications.
"Get complete instructions for manipulating, processing, cleaning, and crunching datasets in Python. Updated for Python 3.6, the second edition of this hands-on guide is packed with practical case studies that show you how to solve a broad set of data analysis problems effectively. You'll learn the latest versions of pandas, NumPy, IPython, and Jupyter in the process.
The financial industry has recently adopted Python at a tremendous rate, with some of the largest investment banks and hedge funds using it to build core trading and risk management systems. Updated for Python 3, the second edition of this hands-on book helps you get started with the language, guiding developers and quantitative analysts through Python libraries and tools for building financial applications and interactive financial analytics.
This practical book provides a quick reference to the language--including Python 3.5, 2.7, and highlights of 3.6--commonly used areas of its vast standard library, and some of the most useful third-party modules and packages.
“Aiello (Univ. of Stuttgart, Germany) documents the history of the Web in this small but informative volume. … An excellent resource, particularly for students and professionals in computer science and engineering. Summing Up: Recommended. All academic levels.” (C. Tappert, Choice, Vol. 56 (7), March, 2019)
"The world's most famous computer hacker and cybercult hero...has written a blueprint for system security based on his own experiences. Required reading for IT professionals, this book is highly recommended for public, academic, and corporate libraries."
If you've ever spent hours renaming files or updating hundreds of spreadsheet cells, you know how tedious tasks like these can be. But what if you could have your computer do them for you. In this fully revised second edition of the best-selling classic Automate the Boring Stuff with Python, you'll learn how to use Python to write programs that do in minutes what would take you hours to do by hand--no prior programming experience required.
Introduction -- What is cloud computing? -- Infrastructure security -- Data security and storage -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance -- Examples of cloud service providers -- Security-as-a-[cloud] service -- The impact of cloud computing on the role of corporate IT -- Conclusion, and the future of the cloud.
"The Code Book" tells the story of the most powerful intellectual weapon ever known: secrecy. Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world's most difficult codes.
"Presents a crash course in Python programming, followed by instructions for making, testing, and hacking classic cipher programs, from the Caesar cipher to public key cryptography and the RSA cipher"-- Provided by publisher.
Thorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts. Nihilist, grille, U. S. Army, key-phrase, multiple-alphabet, Gronsfeld, Porta, Beaufort, periodic ciphers, and more. Simple and advanced methods. 166 specimens to solve -- with solutions.
The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom-even democracy itself Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
A groundbreaking exploration of how cyberspace is changing the way we think, feel, and behave Mary Aiken is the world's leading expert in forensic cyberpsychology--a discipline that combines psychology, criminology, and technology to investigate the intersection where technology and human behavior meet. In this, her first book, Aiken has created a starting point for all future conversations about how the Internet is shaping development and behavior, societal norms and values, children, safety, security, and our perception of the world.
This comprehensive work focuses on the current state of play regarding cyber security threats to government and business, which are imposing unprecedented costs and disruption. At the same time, it aggressively takes a forward-looking approach to such emerging industries as automobiles and appliances, the operations of which are becoming more closely tied to the internet. Revolutionary developments will have security implications unforeseen by manufacturers, and the authors explore these in detail, drawing on lessons from overseas as well as the United States to show how nations and businesses can combat these threats.
This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals.
What exactly is cybersecurity? -- Getting to know common cyberattacks -- Bad guys and accidental bad guys: The folks you must defend against -- Evaluating your current cybersecurity posture -- Enhancing physical security -- Securing your accounts -- Passwords -- Preventing social engineering -- Securing your small business -- Cybersecurity and big businesses -- Identifying a security breach -- Recovering from a security breach -- Backing up -- Resetting your device -- Restoring from backups -- Pursuing a cybersecurity career -- Emerging technologies bring new threats -- Ten ways you can improve your cybersecurity without spending a fortune -- Ten lessons from major cybersecurity breaches -- Ten ways to safely use public wi-fi..
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well.
This book argues that relying on cyber-doom rhetoric to frame our thinking about such threats is counterproductive, and encourages us to develop ways of thinking and speaking about cybersecurity beyond cyber doom. This book will be of much interest to students of cyber-security, foreign policy, public administration, national security and IR in general"-- Provided by publisher.
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.
This new textbook offers an accessible introduction to the topic of cybersecurity ethics. The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy and philosophy of science, three ethical frameworks - virtue ethics, utilitarian ethics and communitarian ethics - and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, intellectual property and piracy, surveillance, and cyberethics in relation to military affairs. The third part concludes by exploring current codes of ethics used in cybersecurity. The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics and information science.
"This book offers easy-to-understand definitions of cybersecurity technical terminology and hacker jardon related to automated control systems common to buildings, utilities, and industry, and explains the threats and vulnerabilities of critical infrastructure ... Concepts related to cyber-physical attacks and building hacks are listed alphabetically with text easily searchable by key phrase ..."--Provided by the publisher.
This book draws on research into darknet cryptomarkets to examine themes of cybercrime, cybersecurity, illicit markets and drug use. This book argues that, far from being a dangerous anarchist haven, the darknet and the technologies used within it could have benefits and significance for everyone online.
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime.
This practical and accessible textbook/reference describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice. The coverage includes discussions on forensic artifacts and constraints, as well as forensic tools used for law enforcement and in the corporate sector.
Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escape, and a portrait of a visionary whose creativity, skills, and persistence forced the authorities to rethink the way they pursued him, inspiring ripples that brought permanent changes in the way people and companies protect their most sensitive information. - Publisher.
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers.
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Rather than merely showing how to run existing exploits, Hacking: The Art of Exploitation, 2nd Edition author Jon Erickson explains how arcane hacking techniques actually work.
This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book's 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students' understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge.
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who have spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. This includes: -Understanding cyber risks and how best to control them -Planning and preparing for a crisis'and leading in its aftermath -Making cybersecurity a companywide initiative and responsibility -Drawing attention to the nontechnical dynamics that influence the effectiveness of cybersecurity measures -Aligning the board, executive leadership, and cybersecurity teams on priorities Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
Cybercrimes are a threat and as dangerous as an armed intruder--yet millions of Americans are complacent or simply uninformed of how to protect themselves. The Secret to Cyber security closes that knowledge gap by using real-life examples to educate readers.
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited.
"Using conceptual innovations and case studies, this book clarifies the much-discussed but understudied phenomena of leaking and whistleblowing, with a particular focus on the collaborative networks that make the extraction and publication of secrets possible"-- Provided by publisher.