Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 9 of 9 matches in All Departments
This book addresses the growing need for machine learning and data mining in neuroscience. The book offers a basic overview of the neuroscience, machine learning and the required math and programming necessary to develop reliable working models. The material is presented in a easy to follow user-friendly manner and is replete with fully working machine learning code. Machine Learning for Neuroscience: A Systematic Approach, tackles the needs of neuroscience researchers and practitioners that have very little training relevant to machine learning. The first section of the book provides an overview of necessary topics in order to delve into machine learning, including basic linear algebra and Python programming. The second section provides an overview of neuroscience and is directed to the computer science oriented readers. The section covers neuroanatomy and physiology, cellular neuroscience, neurological disorders and computational neuroscience. The third section of the book then delves into how to apply machine learning and data mining to neuroscience and provides coverage of artificial neural networks (ANN), clustering, and anomaly detection. The book contains fully working code examples with downloadable working code. It also contains lab assignments and quizzes, making it appropriate for use as a textbook. The primary audience is neuroscience researchers who need to delve into machine learning, programmers assigned neuroscience related machine learning projects and students studying methods in computational neuroscience.
This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and sbilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management.
Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.
All you need to know about defending networks, in one book * Clearly explains concepts, terminology, challenges, tools, and skills * Covers key security standards and models for business and government * The perfect introduction for all network/computer security professionals and students Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective. Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learned-in the classroom and in your career. Learn How To * Evaluate key network risks and dangers * Choose the right network security approach for your organization * Anticipate and counter widespread network attacks, including those based on "social engineering" * Successfully deploy and apply firewalls and intrusion detection systems * Secure network communication with virtual private networks * Protect data with cryptographic public/private key systems, digital signatures, and certificates * Defend against malware, including ransomware, Trojan horses, and spyware * Harden operating systems and keep their security up to date * Define and implement security policies that reduce risk * Explore leading security standards and models, including ISO and NIST standards * Prepare for an investigation if your network has been attacked * &nb
Expert Security+ SY0-501 exam preparation, endorsed by CompTIA, Now with 25 Online Lab Modules The seventh edition of CompTIA Security+ Study Guide offers invaluable preparation for Exam SY0-501. Written by a team of expert authors, the book covers 100% of the exam objectives with clear and concise explanations. Discover how to handle threats, attacks, and vulnerabilities using industry-standard tools and technologies, while gaining and understanding the role of architecture and design. Spanning topics from everyday tasks like identity and access management to complex subjects such as risk management and cryptography, this study guide helps you consolidate your knowledge base in preparation for the Security+ exam. Illustrative examples show how these processes play out in real-world scenarios, allowing you to immediately translate essential concepts to on-the-job application. Coverage of 100% of all exam objectives in this Study Guide means you'll be ready for: Managing Risk Designing and Diagnosing Networks Understanding Devices and Infrastructure Identify and Access Management Protecting Wireless Networks Securing the Cloud Data, Privacy, and Security Practices Cryptography and PKI Wiley has partnered up with Practice Labs, the IT Competency Hub, to give IT learners discounted access to their live, virtual Practice Labs. Connect to real devices using actual hardware and software straight from a web browser. Practice Labs allow you to cement your theoretical studies with practical, hands-on experience. Master your IT skills and gain virtual work experience to increase your employability. Each purchase provides 6 months' unlimited access. Ready to practice your IT skills? Interactive learning environment Take your exam prep to the next level with Sybex's superior interactive online study tools. To access our learning environment, simply visit www.wiley.com/go/sybextestprep, type in your unique PIN, and instantly gain one year of FREE access to: Interactive test bank with 2 bonus exams and 12 chapter tests. Practice questions help you identify areas where further review is needed. 325 questions total! 100 Electronic Flashcards to reinforce learning and last-minute prep before the exam. Comprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared. ABOUT THE PRACTICE LABS SECURITY+ LABS So you can practice with hands-on learning in a real environment, Sybex has bundled Practice Labs virtual labs that run from your browser. The registration code is included with the book and gives you 6 months unlimited access to Practice Labs CompTIA Security+ Exam SY0-501 Labs with 25 unique lab modules to practice your skills.
Digital Forensics, Investigation, and Response, Fourth Edition begins by examining the fundamentals of system forensics: what forensics is, an overview of computer crime, the challenges of system forensics, and forensics methods and labs. The second part of this book addresses the tools, techniques, and methods used to perform computer forensics and investigation. These include collecting evidence, investigating information hiding, recovering data, and scrutinizing email. It also discusses how to perform forensics in Windows, Linux, Macintosh operating systems, mobile devices, and networks. Finally, the third part explores incident and intrusion response, emerging technologies and future directions of this field, and additional system forensics resources. Each new print copy includes Navigate eBook Access enabling you to read your digital textbook online or offline from your computer, tablet, or mobile device.
ONE-VOLUME INTRODUCTION TO QUANTUM COMPUTING Clearly explains core concepts, terminology, and techniques Covers the foundational physics, math, and information theory you need Provides hands-on practice with quantum programming The perfect beginner's guide for anyone interested in a quantum computing career Dr. Chuck Easttom brings together complete coverage of basic quantum computing concepts, terminology, and issues, along with key skills to get you started. Drawing on 30+ years as a computer science instructor, consultant, and researcher, Easttom demystifies the field's underlying technical concepts and math, shows how quantum computing systems are designed and built, explains their implications for cyber security, and previews advances in quantum-resistant cryptography. Writing clearly and simply, he introduces two of today's leading quantum programming languages, Microsoft Q# and QASM, and guides you through sample projects. Throughout, tests, projects, and review questions help you deepen and apply your knowledge. Whether you're a student, professional, or manager, this guide will prepare you for the quantum computing revolution--and expand your career options, too. Master the linear algebra and other mathematical skills you'll need Explore key physics ideas such as quantum states and uncertainty Review data structures, algorithms, and computing complexity Work with probability and set theory in quantum computing Familiarize yourself with basic quantum theory and formulae Understand quantum entanglement and quantum key distribution Discover how quantum computers are architected and built Explore several leading quantum algorithms Compare quantum and conventional asymmetric algorithms See how quantum computing might break traditional cryptography Discover several approaches to quantum-resistant cryptography Start coding with Q#, Microsoft's quantum programming language Simulate quantum gates and algorithms with QASM
This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and sbilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management.
Join over 250,000 IT professionals who've earned Security+ certification If you're an IT professional hoping to progress in your career, then you know that the CompTIA Security+ exam is one of the most valuable certifications available. Since its introduction in 2002, over a quarter million professionals have achieved Security+ certification, itself a springboard to prestigious certifications like the CASP, CISSP, and CISA. The CompTIA Security+ Study Guide: SY0-401 covers 100% of the Security+ exam objectives, with clear and concise information on crucial security topics. You'll find everything you need to prepare for the 2014 version of the Security+ certification exam, including insight from industry experts on a wide range of IT security topics. Readers also get access to a robust set of learning tools, featuring electronic flashcards, assessment tests, robust practice test environment, with hundreds of practice questions, and electronic flashcards. CompTIA authorized and endorsed Includes updates covering the latest changes to the exam, including better preparation for real-world applications Covers key topics like network security, compliance and operational security, threats and vulnerabilities, access control and identity management, and cryptography Employs practical examples and insights to provide real-world context from two leading certification experts Provides the necessary tools to take that first important step toward advanced security certs like CASP, CISSP, and CISA, in addition to satisfying the DoD's 8570 directive If you're serious about jump-starting your security career, you need the kind of thorough preparation included in the CompTIA Security+ Study Guide: SY0-401.
|
You may like...
Batman v Superman - Dawn Of Justice…
Ben Affleck, Henry Cavill, …
Blu-ray disc
(16)
|