Handbook of e-Business Security by João Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman, Manju Khari Requirements: .PDF reader, 8 mb Overview: There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems. Genre: Non-Fiction > Tech & Devices /Business
Mathematics for Computer Graphics and Game Programming: A Self-Teaching Introduction by D. P. Kothari, G. K. Awari, D. D. Shrimankar, A. R. Bhende Requirements: .PDF reader, 15 mb Overview: Designed to explain the mathematical concepts involved in computer graphics and its entities, this book is ideal for courses in computer graphics, engineering, game development, as well as for professionals in industry. It begins with simple concepts such as how an image is generated on the screen and then moves to cover the different algorithms for the generation of simple geometry on the screen. The following chapters include two-dimensional and three-dimensional transformations, parametric representation of planar curves and parametric representation of space curves such as cubic splines, Bezier curves, etc. In addition to programming in C, OpenGL, and several other topics, it includes a final chapter on the methods of generating 3D models. Genre: Non-Fiction > Tech & Devices
Cyber Arms: Security in Cyberspace by Stanislav Abaimov, Maurizio Martellini Requirements: .ePUB reader, 2.6 MB Overview: This book will raise awareness on emerging challenges of AIempowered cyber arms used in weapon systems and stockpiled in the global cyber arms race. Based on real life events, it provides a comprehensive analysis of cyber offensive and defensive landscape, analyses the cyber arms evolution from prank malicious codes into lethal weapons of mass destruction, reveals the scale of cyber offensive conflicts, explores cyber warfare mutation, warns about cyber arms race escalation and use of Artificial Intelligence (AI) for military purposes. It provides an expert insight into the current and future malicious and destructive use of the evolved cyber arms, AI and robotics, with emphasis on cyber threats to CBRNe and critical infrastructure.
The book highlights international efforts in regulating the cyber environment, reviews the best practices of the leading cyber powers and their controversial approaches, recommends responsible state behaviour. It also proposes information security and cyber defence solutions and provides definitions for selected conflicting cyber terms. The disruptive potential of cyber tools merging with military weapons is examined from the technical point of view, as well as legal, ethical, and political perspectives. Genre: Non-Fiction > Tech & Devices
The Secret Story of the Dark Web: The Illegal Internet Exposed! by Derek Mailhiot Requirements: .ePUB reader, 14 MB Overview: What are all those users doing on the Dark Web? Some people just feel strongly about their privacy, and prefer to hang out where they can’t be watched by anyone, even if they’re just playing online chess. In fact, the Dark Web is all about privacy. Everyone from activists, whistleblowers, journalists, businesses, militaries, and everyday people use the Dark Web to block tracking and be anonymous. Genre: Non-Fiction > Tech & Devices
Beginners’ Artificial Intelligence and Python Programming: For Grades 4 to 8 by Olubayo Adekanmbi Requirements: .ePUB, .PDF reader, 39 MB Overview: The book demystifies the concept of Artificial Intelligence (AI) in a friendly manner to kids, with the goal of stimulating their curiosity and driving their interest in learning about AI. After the generic introductions to the core concepts like machine learning, deep learning and reinforcement learning, the students are guided into step-by-step programming with Python. The intention is to transit beyond the traditional code-first approach to understanding broad concepts that will sufficiently motivate a desire to learn coding.
The book is useful to any beginner, kids or adult, who desires to build basic knowledge in the general concept of Artificial Intelligence. Genre: Non-Fiction > Tech & Devices
Handbook of System Safety and Security by Edward Griffor Requirements: .PDF reader, 14 mb Overview:
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world’s increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences.
Each chapter is authored by one of the leading contributors to the current research and development on the topic. The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system’s performance. Genre: Non-Fiction > Tech & Devices
20 Easy Raspberry Pi Projects by Rui Santos Requirements: .ePUB reader, 33 MB Overview: After a crash course to get you set up with your Raspberry Pi, you’ll learn how to build interactive projects like a digital drum set; a WiFi controlled robot; a Pong game; an intruder alarm and more. Along the way, you’ll work with core components like LCD screens, cameras, sensors, and even learn how to set up your own server. Each project provides step-by-step instructions, full-color photos and circuit diagrams, and the complete code to bring your build to life. If you re ready to hit the ground running and make something interesting, let Raspberry Pi Project Handbook be your guide. Genre: Non-Fiction > Tech & Devices
Multicore Programming Using the ParC Language by Yosi Ben-Asher (Undergraduate Topics in Computer Science) Requirements: .ePUB, .PDF reader, 8 mb Overview: Multicore Programming Using the ParC Language discusses principles of practical parallel programming using shared memory. It is unique in its approach to writing parallel programs for shared memory machines. It uses a simple yet powerful parallel dialect of C called ParC as the basic programming language, which was co-developed by author Yosi Ben-Asher. Designed to be used in an introductory course in parallel programming and covering basic and advanced concepts of parallel programming via ParC examples, the book combines a mixture of research directions, covering issues in parallel operating systems, and compilation techniques relevant for shared memory and multicore machines. It also provides a basis through which to evaluate parallel programming performance versus overheads and other resource expenditure.
Multicore Programming Using the ParC Language provides a firm basis for the ‘delicate art’ of creating efficient parallel programs. Students can exercise parallel programming using a simulation software, which is portable on PC/Unix multicore computers, to gain experience without requiring specialist hardware. Readers can also tackle numerous exciting and challenging exercises at the end of each chapter. Genre: Non-Fiction > Tech & Devices
Hands-on Natural Language Processing with PyTorch 1.x by Thomas Dop Requirements: .ePUB, .PDF reader, 15 mb Overview: In the internet age, where an increasing volume of text data is generated daily from social media and other platforms, being able to make sense of that data is a crucial skill. With this book, you’ll learn how to extract valuable insights from text by building deep learning models for natural language processing (NLP) tasks.
Starting by understanding how to install PyTorch and using CUDA to accelerate the processing speed, you’ll explore how the NLP architecture works with the help of practical examples. This PyTorch NLP book will guide you through core concepts such as word embeddings, CBOW, and tokenization in PyTorch. You’ll then learn techniques for processing textual data and see how deep learning can be used for NLP tasks. The book demonstrates how to implement deep learning and neural network architectures to build models that will allow you to classify and translate text and perform sentiment analysis. Finally, you’ll learn how to build advanced NLP models, such as conversational chatbots.
By the end of this book, you’ll not only have understood the different NLP problems that can be solved using deep learning with PyTorch, but also be able to build models to solve them. Genre: Non-Fiction > Tech & Devices
Learn Kubernetes Security by Kaizhe Huang, Pranjal Jumde Requirements: .ePUB, .PDF reader, 9 mb, 6 mb Overview: Kubernetes is an open source orchestration platform for managing containerized applications. Despite widespread adoption of the technology, DevOps engineers might be unaware of the pitfalls of containerized environments. With this comprehensive book, you’ll learn how to use the different security integrations available on the Kubernetes platform to safeguard your deployments in a variety of scenarios.
Learn Kubernetes Security starts by taking you through the Kubernetes architecture and the networking model. You’ll then learn about the Kubernetes threat model and get to grips with securing clusters. Throughout the book, you’ll cover various security aspects such as authentication, authorization, image scanning, and resource monitoring. As you advance, you’ll learn about securing cluster components (the kube-apiserver, CoreDNS, and kubelet) and pods (hardening image, security context, and PodSecurityPolicy). With the help of hands-on examples, you’ll also learn how to use open source tools such as Anchore, Prometheus, OPA, and Falco to protect your deployments.
By the end of this Kubernetes book, you’ll have gained a solid understanding of container security and be able to protect your clusters from cyberattacks and mitigate cybersecurity threats. Genre: Non-Fiction > Tech & Devices