![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 7 of 7 matches in All Departments
This book presents that explainable artificial intelligence (XAI) is going to replace the traditional artificial, machine learning, deep learning algorithms which work as a black box as of today. To understand the algorithms better and interpret the complex networks of these algorithms, XAI plays a vital role. In last few decades, we have embraced AI in our daily life to solve a plethora of problems, one of the notable problems is cyber security. In coming years, the traditional AI algorithms are not able to address the zero-day cyber attacks, and hence, to capitalize on the AI algorithms, it is absolutely important to focus more on XAI. Hence, this book serves as an excellent reference for those who are working in cyber security and artificial intelligence.
This book presents that explainable artificial intelligence (XAI) is going to replace the traditional artificial, machine learning, deep learning algorithms which work as a black box as of today. To understand the algorithms better and interpret the complex networks of these algorithms, XAI plays a vital role. In last few decades, we have embraced AI in our daily life to solve a plethora of problems, one of the notable problems is cyber security. In coming years, the traditional AI algorithms are not able to address the zero-day cyber attacks, and hence, to capitalize on the AI algorithms, it is absolutely important to focus more on XAI. Hence, this book serves as an excellent reference for those who are working in cyber security and artificial intelligence.
As the application of smart technologies for monitoring environmental activities becomes more widespread, there is a growing demand for solutions that can help analyze the risk factors and impacts on the environment by focusing on energy consumption, storage, and management. This book is designed to serve as a knowledge-sharing platform, focusing on the emerging models, architectures, and algorithms being developed for smart computational technologies that can lead to efficient energy conservation and environmental sustainability.
Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam-a qualification that tests the cybersecurity professional's baseline knowledge of security threats, risks, and countermeasures through lectures and hands-on labs. You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting. The book covers policies for penetration testing and requirements for documentation. This book uses a unique "lesson" format with objectives and instruction to succinctly review each major topic, including: footprinting and reconnaissance and scanning networks, system hacking, sniffers and social engineering, session hijacking, Trojans and backdoor viruses and worms, hacking webservers, SQL injection, buffer overflow, evading IDS, firewalls, and honeypots, and much more. What You Will learn Understand the concepts associated with Footprinting Perform active and passive reconnaissance Identify enumeration countermeasures Be familiar with virus types, virus detection methods, and virus countermeasures Know the proper order of steps used to conduct a session hijacking attack Identify defensive strategies against SQL injection attacks Analyze internal and external network traffic using an intrusion detection system Who This Book Is For Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors/penetration testers, security specialists, security consultants, security engineers, and more
This book, from the series Primary Sources: Historical Books of the World (Asia and Far East Collection), represents an important historical artifact on Asian history and culture. Its contents come from the legions of academic literature and research on the subject produced over the last several hundred years. Covered within is a discussion drawn from many areas of study and research on the subject. From analyses of the varied geography that encompasses the Asian continent to significant time periods spanning centuries, the book was made in an effort to preserve the work of previous generations.
As the application of smart technologies for monitoring environmental activities becomes more widespread, there is a growing demand for solutions that can help analyze the risk factors and impacts on the environment by focusing on energy consumption, storage, and management. This book is designed to serve as a knowledge-sharing platform, focusing on the emerging models, architectures, and algorithms being developed for smart computational technologies that can lead to efficient energy conservation and environmental sustainability.
|
You may like...
Modern Developments In Catalysis, Volume…
Graham J. Hutchings, Matthew G. Davidson, …
Hardcover
R4,505
Discovery Miles 45 050
Visualizing Digital Discourse…
Crispin Thurlow, Christa Durscheid, …
Hardcover
R3,539
Discovery Miles 35 390
Sol Plaatje's Mhudi - History…
Sabata-Mpho Mokae, Brian Willan
Paperback
Glory of the Lord VOL 1 - Seeing The…
Hans Urs Von Balthasar
Hardcover
R5,311
Discovery Miles 53 110
|