|
|
Books > Computing & IT > General theory of computing > General
Up-to-date coverage of every topic on the CEH v11 exam This
effective self-study guide covers 100% of the EC Council's
Certified Ethical Hacker Version 11 exam objectives. The book
discusses the latest ethical hacking tools, techniques, and
exploits. Readers will find learning objectives at the beginning of
each chapter, step-by-step exercises, exam tips, practice exam
questions, and in-depth explanations. An integrated test
preparation system based on proven pedagogy, CEH Certified Ethical
Hacker All-in-One Exam Guide, Fifth Edition covers all five phases
of ethical hacking: reconnaissance, gaining access, enumeration,
maintaining access, and covering tracks. Readers will learn about
malware, hacking Web applications and mobile platforms, cloud
computing vulnerabilities, and more. Designed to help candidates
pass the exam with ease, this authoritative resource also serves as
an essential on-the-job reference. Complete coverage of all CEH v11
exam objectives Includes online access to the Total Tester
customizable practice exam software containing 300 practice
questions Written by an experienced educator with more than 20
years of experience in the field
Quantum computing is radically different from the conventional
approach of transforming bits strings from one set of 0's and 1's
to another. With quantum computing, everything changes. The physics
that we use to understand bits of information and the devices that
manipulate them are totally different. The way in which we build
such devices is different, requiring new materials, new design
rules and new processor architectures. Finally, the way we program
these systems is entirely different. Quantum engineering is a
revolutionary approach to quantum technology. It encompasses both
fundamental physics and the broad engineering skill-set necessary
to meet the practical challenges of the future. The proposed book
will cover the high-quality reviewed book chapters on original
research & innovations and compelling insights in Quantum
Computing and Engineering. Data scientists, Engineers, Industry,
researchers and students working in the field of quantum computing
and its allied research will benefit greatly from this publication.
Each Student Book and ActiveBook have has clearly laid out pages
with a range of supportive features to aid learning and teaching:
Getting to know your unit sections ensure learners understand the
grading criteria and unit requirements. Getting ready for
Assessment sections focus on preparation for external assessment
with guidance for learners on what to expect. Hints and tips will
help them prepare for assessment and sample answers are provided
for a range of question types including, short and long answer
questions, all with a supporting commentary. Learners can also
prepare for internal assessment using this feature. A case study of
a learner completing the internal assessment for that unit covering
'How I got started', 'How I brought it all together' and 'What I
got from the experience'. Pause Point feature provide opportunities
for learners to self-evaluate their learning at regular intervals.
Each Pause Point point feature gives learners a Hint or Extend
option to either revisit and reinforce the topic or to encourage
independent research or study skills. Case Study and Theory into
Practice features enable development of problem-solving skills and
place the theory into real life situations learners could
encounter. Assessment Activity/Practice provide scaffolded
assessment practice activities that help prepare learners for
assessment. Within each assessment practice activity, a Plan, Do
and Review section supports learners' formative assessment by
making sure they fully understand what they are being asked to do,
what their goals are and how to evaluate the task and consider how
they could improve. Dedicated Think Future pages provide case
studies from the industry, with a focus on aspects of skills
development that can be put into practice in a real work
environment and further study.
Semantic computing is critical for the development of semantic
systems and applications that must utilize semantic analysis,
semantic description, semantic interfaces, and semantic integration
of data and services to deliver their objectives. Semantic
computing has enormous capabilities to enhance the efficiency and
throughput of systems that are based on key emerging concepts and
technologies such as semantic web, internet of things, blockchain
technology, and knowledge graphs. Thus, research that expounds
advanced concepts, methods, technologies, and applications of
semantic computing for solving challenges in real-world domains is
vital. Advanced Concepts, Methods, and Applications in Semantic
Computing is a scholarly reference book that provides a sound
theoretical foundation for the application of semantic methods,
concepts, and technologies for practical problem solving. It is
designed as a comprehensive and reliable resource on how
semantic-oriented approaches can be used to aid new emergent
technologies and tackle real-world problems. Covering topics that
include deep learning, machine learning, blockchain technology, and
semantic web services, this book is ideal for professionals,
academicians, researchers, and students working in the field of
semantic computing in various disciplines, including but not
limited to software engineering, systems engineering, knowledge
engineering, electronic commerce, computer science, and information
technology.
Gamification is being used everywhere; despite its apparent
plethora of benefits, the unbalanced use of its main mechanics can
end up in catastrophic results for a company or institution.
Currently, there is a lack of knowledge of what it is, leading to
its unregulated and ad hoc use without any prior planning. This
unbalanced use prejudices the achievement of the initial goals and
impairs the user's evolution, bringing potential negative
reflections. Currently, there are few specifications and modeling
languages that allow the creation of a system of rules to serve as
the basis for a gamification engine. Consequently, programmers
implement gamification in a variety of ways, undermining any
attempt at reuse and negatively affecting interoperability.
Next-Generation Applications and Implementations of Gamification
Systems synthesizes all the trends, best practices, methodologies,
languages, and tools that are used to implement gamification. It
also discusses how to put gamification in action by linking
academic and informatics researchers with professionals who use
gamification in their daily work to disseminate and exchange the
knowledge, information, and technology provided by the
international communities in the area of gamification throughout
the 21st century. Covering topics such as applied and cloud
gamification, chatbots, deep learning, and certifications and
frameworks, this book is ideal for programmers, computer
scientists, software engineers, practitioners of technological
companies, managers, academicians, researchers, and students.
Multinational organizations have begun to realize that sentiment
mining plays an important role for decision making and market
strategy. The revolutionary growth of digital marketing not only
changes the market game, but also brings forth new opportunities
for skilled professionals and expertise. Currently, the
technologies are rapidly changing, and artificial intelligence (AI)
and machine learning are contributing as game-changing
technologies. These are not only trending but are also increasingly
popular among data scientists and data analysts. New Opportunities
for Sentiment Analysis and Information Processing provides
interdisciplinary research in information retrieval and sentiment
analysis including studies on extracting sentiments from textual
data, sentiment visualization-based dimensionality reduction for
multiple features, and deep learning-based multi-domain sentiment
extraction. The book also optimizes techniques used for sentiment
identification and examines applications of sentiment analysis and
emotion detection. Covering such topics as communication networks,
natural language processing, and semantic analysis, this book is
essential for data scientists, data analysts, IT specialists,
scientists, researchers, academicians, and students.
Advances in Mathematics for Industry 4.0 examines key tools,
techniques, strategies, and methods in engineering applications. By
covering the latest knowledge in technology for engineering design
and manufacture, chapters provide systematic and comprehensive
coverage of key drivers in rapid economic development. Written by
leading industry experts, chapter authors explore managing big data
in processing information and helping in decision-making, including
mathematical and optimization techniques for dealing with large
amounts of data in short periods.
With the far-reaching global impact of the COVID-19 pandemic, the
demand and the necessity for digital enterprise transformation have
accelerated exponentially. Management and strategies for the
adoption and wider usage of newer digital technologies for the
transformation of an enterprise through digital tools such as
real-time video communications have shown that people no longer
need to be required to be physically present in the same place;
rather, they can be geographically dispersed. Technologies such as
artificial intelligence, cloud computing, digital banking, and
cloud data have taken over tasks that were initially done by human
hands and have increased both the automation and efficiency of
tasks and the accessibility of information and services. Inclusion
of all these newer technologies has shown the fast pace at which
the digital enterprise transformation is rapidly evolving and how
new ecosystems are reshaping the digital enterprise model.
Disruptive Technology and Digital Transformation for Business and
Government presents interesting research on digital enterprise
transformation at different stages and across different settings
within government and industry, along with key issues and deeper
insights on the core problems and developing solutions and
recommendations for digital enterprise transformation. The chapters
examine the three core leaders of transformation: the people such
as managers, employees, and customers; the digital technology such
as artificial intelligence and robotics; and the digital
enterprise, including the products and services being transformed.
They unravel the underlying process for management and strategies
to fully incorporate new digital tools and technologies across all
aspects of an enterprise undergoing transformation. This book is
ideally intended for managers, executives, IT consultants, business
professionals, government officials, researchers, students,
practitioners, stakeholders, academicians, and anyone else looking
to learn about new developments in digital enterprise
transformation of business systems from a global perspective.
The amalgamation of post-quantum cryptography in cyber-physical
systems makes the computing system secure and also generates
opportunities in areas like smart contracts, quantum blockchain,
and smart security solutions. Sooner or later, all computing and
security systems are going to adopt quantum-proof cryptography to
safeguard these systems from quantum attacks. Post-quantum
cryptography has tremendous potential in various domains and must
be researched and explored further to be utilized successfully.
Advancements in Quantum Blockchain With Real-Time Applications
considers various concepts of computing such as quantum computing,
post-quantum cryptography, quantum attack-resistant blockchain,
quantum blockchains, and multidisciplinary applications and
real-world use cases. The book also discusses solutions to various
real-world problems within the industry. Covering key topics such
as cybersecurity, data management, and smart society, this
reference work is ideal for computer scientists, industry
professionals, academicians, practitioners, scholars, researchers,
instructors, and students.
Quantum technology has arrived as one of the most important new
topics of research, as it is the newest way to create computing
power, harness secure communications, and use sensitive measurement
methods that surpass the capabilities of modern supercomputers. If
successfully developed, quantum computers and technology will be
able to perform algorithms at impressively quick rates and solve
problems that were previously deemed impossible. This technology
will disrupt what is already known about computing and will be able
to reach new heights, speeds, and problem-solving capabilities not
yet seen. Beyond its inherent benefits comes the fact that quantum
technology will create improvements in many everyday gadgets as
well, spanning many industries. The Research Anthology on
Advancements in Quantum Technology presents the latest discoveries
in quantum technology itself along with providing its essential
uses, applications, and technologies that will impact computing in
modern times and far into the future. Along with this overview
comes a look at quantum technology in many different fields such as
healthcare, communications, aviation, automotive, forecasting, and
more. These industries will be looked at from the perspective of
data analytics, pattern matching, cryptography, algorithms, and
more. This book is essential for computer scientists, engineers,
professionals, researchers, students, and practitioners interested
in the latest information on quantum technology.
This book presents research on recent developments in collective
decision-making. With contributions from leading scholars from a
variety of disciplines, it provides an up-to-date overview of
applications in social choice theory, welfare economics, and
industrial organization. The contributions address, amongst others,
topics such as measuring power, the manipulability of collective
decisions, and experimental approaches. Applications range from
analysis of the complicated institutional rules of the European
Union to responsibility-basedĀ allocation of cartel
damagesĀ or the design of webpage rankings. With its
interdisciplinary focus, the book seeks to bridge the gap between
different disciplinary approaches by pointing to open questions
that can only be resolved through collaborative efforts.
This book serves as a guide to help the reader develop an awareness
of security vulnerabilities and attacks, and encourages them to be
circumspect when using the various computer resources and tools
available today. For experienced users, Computer Science Security
presents a wide range of tools to secure legacy software and
hardware. Computing has infiltrated all fields nowadays. No one can
escape this wave and be immune to security attacks, which continue
to evolve, gradually reducing the level of expertise needed by
hackers. It is high time for each and every user to acquire basic
knowledge of computer security, which would enable them to mitigate
the threats they may face both personally and professionally. It is
this combined expertise of individuals and organizations that will
guarantee a minimum level of security for families, schools, the
workplace and society in general.
|
|