|
Showing 1 - 7 of
7 matches in All Departments
This book presents that explainable artificial intelligence (XAI)
is going to replace the traditional artificial, machine learning,
deep learning algorithms which work as a black box as of today. To
understand the algorithms better and interpret the complex networks
of these algorithms, XAI plays a vital role. In last few decades,
we have embraced AI in our daily life to solve a plethora of
problems, one of the notable problems is cyber security. In coming
years, the traditional AI algorithms are not able to address the
zero-day cyber attacks, and hence, to capitalize on the AI
algorithms, it is absolutely important to focus more on XAI. Hence,
this book serves as an excellent reference for those who are
working in cyber security and artificial intelligence.
Know the basic principles of ethical hacking. This book is designed
to provide you with the knowledge, tactics, and tools needed to
prepare for the Certified Ethical Hacker(CEH) exam-a qualification
that tests the cybersecurity professional's baseline knowledge of
security threats, risks, and countermeasures through lectures and
hands-on labs. You will review the organized certified hacking
mechanism along with: stealthy network re-con; passive traffic
detection; privilege escalation, vulnerability recognition, remote
access, spoofing; impersonation, brute force threats, and
cross-site scripting. The book covers policies for penetration
testing and requirements for documentation. This book uses a unique
"lesson" format with objectives and instruction to succinctly
review each major topic, including: footprinting and reconnaissance
and scanning networks, system hacking, sniffers and social
engineering, session hijacking, Trojans and backdoor viruses and
worms, hacking webservers, SQL injection, buffer overflow, evading
IDS, firewalls, and honeypots, and much more. What You Will learn
Understand the concepts associated with Footprinting Perform active
and passive reconnaissance Identify enumeration countermeasures Be
familiar with virus types, virus detection methods, and virus
countermeasures Know the proper order of steps used to conduct a
session hijacking attack Identify defensive strategies against SQL
injection attacks Analyze internal and external network traffic
using an intrusion detection system Who This Book Is For Security
professionals looking to get this credential, including systems
administrators, network administrators, security administrators,
junior IT auditors/penetration testers, security specialists,
security consultants, security engineers, and more
This book presents that explainable artificial intelligence (XAI)
is going to replace the traditional artificial, machine learning,
deep learning algorithms which work as a black box as of today. To
understand the algorithms better and interpret the complex networks
of these algorithms, XAI plays a vital role. In last few decades,
we have embraced AI in our daily life to solve a plethora of
problems, one of the notable problems is cyber security. In coming
years, the traditional AI algorithms are not able to address the
zero-day cyber attacks, and hence, to capitalize on the AI
algorithms, it is absolutely important to focus more on XAI. Hence,
this book serves as an excellent reference for those who are
working in cyber security and artificial intelligence.
As the application of smart technologies for monitoring
environmental activities becomes more widespread, there is a
growing demand for solutions that can help analyze the risk factors
and impacts on the environment by focusing on energy consumption,
storage, and management. This book is designed to serve as a
knowledge-sharing platform, focusing on the emerging models,
architectures, and algorithms being developed for smart
computational technologies that can lead to efficient energy
conservation and environmental sustainability.
This book, from the series Primary Sources: Historical Books of the
World (Asia and Far East Collection), represents an important
historical artifact on Asian history and culture. Its contents come
from the legions of academic literature and research on the subject
produced over the last several hundred years. Covered within is a
discussion drawn from many areas of study and research on the
subject. From analyses of the varied geography that encompasses the
Asian continent to significant time periods spanning centuries, the
book was made in an effort to preserve the work of previous
generations.
As the application of smart technologies for monitoring
environmental activities becomes more widespread, there is a
growing demand for solutions that can help analyze the risk factors
and impacts on the environment by focusing on energy consumption,
storage, and management. This book is designed to serve as a
knowledge-sharing platform, focusing on the emerging models,
architectures, and algorithms being developed for smart
computational technologies that can lead to efficient energy
conservation and environmental sustainability.
|
|