Автор: Welsh Название: Ethics and Security Automata ISBN: 1138050229 ISBN-13(EAN): 9781138050228 Издательство: Taylor&Francis Рейтинг: Цена: 22968.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: An accessible overview of the machine ethics technology likely to be installed in military and police robots and in civilian robots with security functions such as childcare. The author builds upon existing research to define the conditions under which robotic force can and should be used to preserve human security.
Автор: Giovanni Sartor; L. Karl Branting Название: Judicial Applications of Artificial Intelligence ISBN: 9048151368 ISBN-13(EAN): 9789048151363 Издательство: Springer Рейтинг: Цена: 19564.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The judiciary is in the early stages of a transformation in which AI (Artificial Intelligence) technology will help to make the judicial process faster, cheaper, and more predictable without compromising the integrity of judges` discretionary reasoning.
Описание: This book thoroughly explores coherence and its significance in legal reasoning from the general philosophical perspective, the perspective of legal theory, and from the viewpoint of cognitive sciences, including research on artificial intelligence and law.
Автор: Xingming Sun; Zhaoqing Pan; Elisa Bertino Название: Artificial Intelligence and Security ISBN: 3030242676 ISBN-13(EAN): 9783030242671 Издательство: Springer Рейтинг: Цена: 12577.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows:Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.
Автор: Wischmeyer Thomas, Rademacher Timo Название: Regulating Artificial Intelligence ISBN: 3030323609 ISBN-13(EAN): 9783030323608 Издательство: Springer Рейтинг: Цена: 19564.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book assesses the normative and practical challenges for artificial intelligence (AI) regulation, offers comprehensive information on the laws that currently shape or restrict the design or use of AI, and develops policy recommendations for those areas in which regulation is most urgently needed.
Описание: The book develops a general legal theory concerning the liability for offenses involving artificial intelligence systems.
Автор: Martin Ebers, Susana Navas Название: Algorithms and Law ISBN: 1108424821 ISBN-13(EAN): 9781108424820 Издательство: Cambridge Academ Рейтинг: Цена: 16474.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This collection is the first to comprehensively examine the implications of AI technology on legal and regulatory systems. Featuring experts from Europe and the US, this book will appeal to scholars of law, economics, and public policy, as well as readers generally interested in emerging legal questions related to algorithms.
Автор: Chamundeswari Arumugam, Sanjay Misra, Saraswathi S, Suresh Jaganathan Название: Confluence of AI, Machine, and Deep Learning in Cyber Forensics ISBN: 1799858383 ISBN-13(EAN): 9781799858386 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 22869.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Developing a knowledge model helps to formalize the difficult task of analyzing crime incidents in addition to preserving and presenting the digital evidence for legal processing. The use of data analytics techniques to collect evidence assists forensic investigators in following the standard set of forensic procedures, techniques, and methods used for evidence collection and extraction. Varieties of data sources and information can be uniquely identified, physically isolated from the crime scene, protected, stored, and transmitted for investigation using AI techniques. With such large volumes of forensic data being processed, different deep learning techniques may be employed.
Confluence of AI, Machine, and Deep Learning in Cyber Forensics contains cutting-edge research on the latest AI techniques being used to design and build solutions that address prevailing issues in cyber forensics and that will support efficient and effective investigations. This book seeks to understand the value of the deep learning algorithm to handle evidence data as well as the usage of neural networks to analyze investigation data. Other themes that are explored include machine learning algorithms that allow machines to interact with the evidence, deep learning algorithms that can handle evidence acquisition and preservation, and techniques in both fields that allow for the analysis of huge amounts of data collected during a forensic investigation. This book is ideally intended for forensics experts, forensic investigators, cyber forensic practitioners, researchers, academicians, and students interested in cyber forensics, computer science and engineering, information technology, and electronics and communication.
Автор: Chamundeswari Arumugam, Sanjay Misra, Saraswathi S, Suresh Jaganathan Название: Confluence of AI, Machine, and Deep Learning in Cyber Forensics ISBN: 1799849007 ISBN-13(EAN): 9781799849001 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 30215.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Developing a knowledge model helps to formalize the difficult task of analyzing crime incidents in addition to preserving and presenting the digital evidence for legal processing. The use of data analytics techniques to collect evidence assists forensic investigators in following the standard set of forensic procedures, techniques, and methods used for evidence collection and extraction. Varieties of data sources and information can be uniquely identified, physically isolated from the crime scene, protected, stored, and transmitted for investigation using AI techniques. With such large volumes of forensic data being processed, different deep learning techniques may be employed.
Confluence of AI, Machine, and Deep Learning in Cyber Forensics contains cutting-edge research on the latest AI techniques being used to design and build solutions that address prevailing issues in cyber forensics and that will support efficient and effective investigations. This book seeks to understand the value of the deep learning algorithm to handle evidence data as well as the usage of neural networks to analyze investigation data. Other themes that are explored include machine learning algorithms that allow machines to interact with the evidence, deep learning algorithms that can handle evidence acquisition and preservation, and techniques in both fields that allow for the analysis of huge amounts of data collected during a forensic investigation. This book is ideally intended for forensics experts, forensic investigators, cyber forensic practitioners, researchers, academicians, and students interested in cyber forensics, computer science and engineering, information technology, and electronics and communication.
The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerning a person or an organization. With several years of experience of tracking hackers with OSINT, the author whips up a classical plot-line involving a hunt for a threat actor. While taking the audience through the thrilling investigative drama, the author immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques. Technical users will want a basic understanding of the Linux command line in order to follow the examples. But a person with no Linux or programming experience can still gain a lot from this book through the commentaries.
This book's unique digital investigation proposition is a combination of story-telling, tutorials, and case studies. The book explores digital investigation from multiple angles:
Through the eyes of the author who has several years of experience in the subject.
Through the mind of the hacker who collects massive amounts of data from multiple online sources to identify targets as well as ways to hit the targets.
Through the eyes of industry leaders.
This book is ideal for:
Investigation professionals, forensic analysts, and CISO/CIO and other executives wanting to understand the mindset of a hacker and how seemingly harmless information can be used to target their organization.
Security analysts, forensic investigators, and SOC teams looking for new approaches on digital investigations from the perspective of collecting and parsing publicly available information.
CISOs and defense teams will find this book useful because it takes the perspective of infiltrating an organization from the mindset of a hacker. The commentary provided by outside experts will also provide them with ideas to further protect their organization's data.
Автор: Sudhanshu Chauhan Название: Hacking Web Intelligence ISBN: 0128018674 ISBN-13(EAN): 9780128018675 Издательство: Elsevier Science Рейтинг: Цена: 7409.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment--that is, reconnaissance--is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data.
Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods.
Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru