Описание: This book is about creating usable products. The techniques, taken from the worlds of human-computer interaction, marketing, and many of the social sciences, help you know who your users are, and to make security a natural outcome of the requirements and design phase of the authentication method development life cycle.
Название: Case Studies in Intelligent Computing ISBN: 1138034126 ISBN-13(EAN): 9781138034129 Издательство: Taylor&Francis Рейтинг: Цена: 8420.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Filling this need, Case Studies in Intelligent Computing: Achievements and Trends provides an up-to-date introduction to intelligent systems.
This edited book captures the state of the art in intelligent computing research through case studies that examine recent developments, developmental tools, programming, and approaches related to artificial intelligence (AI). The case studies illustrate successful machine learning and AI-based applications across various industries, including:
A non-invasive and instant disease detection technique based upon machine vision through the image scanning of the eyes of subjects with conjunctivitis and jaundice
Semantic orientation-based approaches for sentiment analysis
An efficient and autonomous method for distinguishing application protocols through the use of a dynamic protocol classification system
Nonwavelet and wavelet image denoising methods using fuzzy logic
Using remote sensing inputs based on swarm intelligence for strategic decision making in modern warfare
Rainfall-runoff modeling using a wavelet-based artificial neural network (WANN) model
Illustrating the challenges currently facing practitioners, the book presents powerful solutions recently proposed by leading researchers. The examination of the various case studies will help you develop the practical understanding required to participate in the advancement of intelligent computing applications.
The book will help budding researchers understand how and where intelligent computing can be applied. It will also help more established researchers update their skills and fine-tune their approach to intelligent computing.
Автор: Schoenfield Название: Insider`s Guide to Cyber Security Architecture ISBN: 1498741991 ISBN-13(EAN): 9781498741996 Издательство: Taylor&Francis Рейтинг: Цена: 9492.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"?
Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him.
Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers:
What security architecture is and the areas of expertise a security architect needs in practice
The relationship between attack methods and the art of building cyber defenses
Why to use attacks and how to derive a set of mitigations and defenses
Approaches, tricks, and manipulations proven successful for practicing security architecture
Starting, maturing, and running effective security architecture programs
Secrets of the trade for the practicing security architecture
Tricks to surmount typical problems
Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.
Автор: Das, Ravindra, Название: The science of biometrics : ISBN: 1498761240 ISBN-13(EAN): 9781498761246 Издательство: Taylor&Francis Рейтинг: Цена: 8573.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The Science of Biometrics covers technical aspects of iris and facial recognition, focusing primarily on mathematical and statistical algorithms that run the verification and identification processes in these modalities.
Автор: Reis Catarina I., Maximiano Marisa Da Silva Название: Internet of Things and Advanced Application in Healthcare ISBN: 1522518207 ISBN-13(EAN): 9781522518204 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 30631.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The ubiquitous nature of the Internet of Things allows for enhanced connectivity between people in modern society. When applied to various industries, these current networking capabilities create opportunities for new applications.Internet of Things and Advanced Application in Healthcare is a critical reference source for emerging research on the implementation of the latest networking and technological trends within the healthcare industry. Featuring in-depth coverage across the broad scope of the Internet of Things in specialized settings, such as context-aware computing, reliability, and healthcare support systems, this publication is an ideal resource for professionals, researchers, upper-level students, practitioners, and technology developers seeking innovative material on the Internet of Things and its distinct applications.Topics Covered:Assistive TechnologiesContext-Aware Computing SystemsHealth Risk ManagementHealthcare Support SystemsReliability ConcernsSmart HealthcareWearable Sensors
Автор: Rudra, Bhawana Название: Flexible network architectures security issues and principles ISBN: 1138505439 ISBN-13(EAN): 9781138505438 Издательство: Taylor&Francis Рейтинг: Цена: 11176.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The future of Internet security does not lie in doing more of the same. It requires not only a new architecture, but the means of securing that architecture. This book examines the new security architectures from organizations such as FIArch, GENI, and IETF and how they will contribute to a more secure Internet.
Автор: Tevfik Bultan; Fang Yu; Muath Alkhalaf; Abdulbaki Название: String Analysis for Software Verification and Security ISBN: 3319686682 ISBN-13(EAN): 9783319686684 Издательство: Springer Рейтинг: Цена: 11878.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis using symbolic automata representation, constraint-based string analysis, string constraint solvers, relational string analysis, vulnerability detection using string analysis, string abstractions, differential string analysis, and automated sanitization synthesis using string analysis.
String manipulation is a crucial part of modern software systems; for example, it is used extensively in input validation and sanitization and in dynamic code and query generation. The goal of string-analysis techniques and this book is to determine the set of values that string expressions can take during program execution. String analysis can be used to solve many problems in modern software systems that relate to string manipulation, such as: (1) Identifying security vulnerabilities by checking if a security sensitive function can receive an input string that contains an exploit; (2) Identifying possible behaviors of a program by identifying possible values for dynamically generated code; (3) Identifying html generation errors by computing the html code generated by web applications; (4) Identifying the set of queries that are sent to back-end database by analyzing the code that generates the SQL queries; (5) Patching input validation and sanitization functions by automatically synthesizing repairs illustrated in this book.
Like many other program-analysis problems, it is not possible to solve the string analysis problem precisely (i.e., it is not possible to precisely determine the set of string values that can reach a program point). However, one can compute over- or under-approximations of possible string values. If the approximations are precise enough, they can enable developers to demonstrate existence or absence of bugs in string manipulating code. String analysis has been an active research area in the last decade, resulting in a wide variety of string-analysis techniques.
This book will primarily target researchers and professionals working in computer security, software verification, formal methods, software engineering and program analysis. Advanced level students or instructors teaching or studying courses in computer security, software verification or program analysis will find this book useful as a secondary text.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru