Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 10 of 10 matches in All Departments
This book presents that explainable artificial intelligence (XAI) is going to replace the traditional artificial, machine learning, deep learning algorithms which work as a black box as of today. To understand the algorithms better and interpret the complex networks of these algorithms, XAI plays a vital role. In last few decades, we have embraced AI in our daily life to solve a plethora of problems, one of the notable problems is cyber security. In coming years, the traditional AI algorithms are not able to address the zero-day cyber attacks, and hence, to capitalize on the AI algorithms, it is absolutely important to focus more on XAI. Hence, this book serves as an excellent reference for those who are working in cyber security and artificial intelligence.
Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam-a qualification that tests the cybersecurity professional's baseline knowledge of security threats, risks, and countermeasures through lectures and hands-on labs. You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting. The book covers policies for penetration testing and requirements for documentation. This book uses a unique "lesson" format with objectives and instruction to succinctly review each major topic, including: footprinting and reconnaissance and scanning networks, system hacking, sniffers and social engineering, session hijacking, Trojans and backdoor viruses and worms, hacking webservers, SQL injection, buffer overflow, evading IDS, firewalls, and honeypots, and much more. What You Will learn Understand the concepts associated with Footprinting Perform active and passive reconnaissance Identify enumeration countermeasures Be familiar with virus types, virus detection methods, and virus countermeasures Know the proper order of steps used to conduct a session hijacking attack Identify defensive strategies against SQL injection attacks Analyze internal and external network traffic using an intrusion detection system Who This Book Is For Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors/penetration testers, security specialists, security consultants, security engineers, and more
This book presents that explainable artificial intelligence (XAI) is going to replace the traditional artificial, machine learning, deep learning algorithms which work as a black box as of today. To understand the algorithms better and interpret the complex networks of these algorithms, XAI plays a vital role. In last few decades, we have embraced AI in our daily life to solve a plethora of problems, one of the notable problems is cyber security. In coming years, the traditional AI algorithms are not able to address the zero-day cyber attacks, and hence, to capitalize on the AI algorithms, it is absolutely important to focus more on XAI. Hence, this book serves as an excellent reference for those who are working in cyber security and artificial intelligence.
As the application of smart technologies for monitoring environmental activities becomes more widespread, there is a growing demand for solutions that can help analyze the risk factors and impacts on the environment by focusing on energy consumption, storage, and management. This book is designed to serve as a knowledge-sharing platform, focusing on the emerging models, architectures, and algorithms being developed for smart computational technologies that can lead to efficient energy conservation and environmental sustainability.
This book, from the series Primary Sources: Historical Books of the World (Asia and Far East Collection), represents an important historical artifact on Asian history and culture. Its contents come from the legions of academic literature and research on the subject produced over the last several hundred years. Covered within is a discussion drawn from many areas of study and research on the subject. From analyses of the varied geography that encompasses the Asian continent to significant time periods spanning centuries, the book was made in an effort to preserve the work of previous generations.
The basic idea of the projects is to build a human machine interface which can be used to control mouse using head-tilt and eye-blink. This mouse-emulating device can be found to be most useful by physically handicapped people who can no longer control the computers using their hands. Since the device relies on user's head and eye movement, it can be used even by patient who are paralyzed from shoulder downward. Simple head movement doesn't require too much energy and neither does eye blinking. Therefore user won't get tired from using this device. In this device or goggle we are using 2D-accelerometer for detecting the movement of the head according to this, the movement of the cursor has been done. A photo sensor detects eye blinking. The Infrared transceiver consists of a 935nm IR transmitter and a phototransistor mounted on the same unit. This detects a strong increase in the reflected signal upon intentional long blink as compared to normal eye blink.
Numerical simulations of flow induced vibration has gained a great of attention over the past decade. With the advancement in the field of aero-elasticity it is now possible to obtain computational prediction of vibrations due to the flow conditions. However challenges are due to complexities in the description of flow physics and non-linearity.
As the application of smart technologies for monitoring environmental activities becomes more widespread, there is a growing demand for solutions that can help analyze the risk factors and impacts on the environment by focusing on energy consumption, storage, and management. This book is designed to serve as a knowledge-sharing platform, focusing on the emerging models, architectures, and algorithms being developed for smart computational technologies that can lead to efficient energy conservation and environmental sustainability.
|
You may like...
Quantum Gases: Finite Temperature And…
Nick P Proukakis, Simon A Gardiner, …
Hardcover
R5,300
Discovery Miles 53 000
On Quanta, Mind and Matter - Hans Primas…
Harald Atmanspacher, A. Amann, …
Hardcover
R2,484
Discovery Miles 24 840
Concept and Formalization of…
Albrecht von Muller, Elias Zafiris
Hardcover
R3,946
Discovery Miles 39 460
Discoveries at the Frontiers of Science…
Johannes Kirsch, Stefan Schramm, …
Hardcover
R4,525
Discovery Miles 45 250
Quantum Information Processing - Theory…
Janos A. Bergou, Mark Hillery, …
Hardcover
R2,737
Discovery Miles 27 370
|