Cyb 電子書籍 and  [本・雑誌・コミック]
キーワード:

Cyb
電子書籍
and
 
楽天市場検索

本・雑誌・コミック
  小説・エッセイ (0)
  資格・検定 (0)
  ライフスタイル (0)
  ホビー・スポーツ・美術 (8) (Cyb 電子書籍 and)
  絵本・児童書・図鑑 (0)
  語学・辞典・年鑑 (0)
  学習参考書・問題集 (0)
  旅行・留学 (0)
  人文・地歴・社会 (0)
  ビジネス・経済・就職 (0)
  PC・システム開発 (0)
  科学・医学・技術 (0)
  コミック (3) (Cyb 電子書籍 and)
  ライトノベル (0)
  ボーイズラブ (0)
  ティーンズラブ (0)
  エンターテインメント (0)
  写真集 (17) (Cyb 電子書籍 and)
  古書・希少本 (0)
  楽譜 (0)
  雑誌 (0)
  新聞 (0)
  洋書 (2862) (Cyb 電子書籍 and)
  カレンダー (0)
  ポスター (0)
  パンフレット (0)
  その他 (0)
 
2890件中 1件 - 30件  1 2 3 4 5 6
商品説明価格

Cisco Certified CyberOps Associate 200-201 Certification Guide Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents【電子書籍】[ Glen D. Singh ]

楽天Kobo電子書籍ストア
<p>Begin a successful career in cybersecurity operations by achieving Cisco Certified CyberOps Associate 200-201 certification Key Features ? Receive expert guidance on how to kickstart your career in the cybersecurity industry ? Gain hands-on experience while studying for the Cisco Certified CyberOps Associate certification exam ? Work through practical labs and exercises mapped directly to the exam objectives Book Description Achieving the Cisco Certified CyberOps Associate 200-201 certification helps you to kickstart your career in cybersecurity operations. This book offers up-to-date coverage of 200-201 exam resources to fully equip you to pass on your first attempt. The book covers the essentials of network security concepts and shows you how to perform security threat monitoring. You'll begin by gaining an in-depth understanding of cryptography and exploring the methodology for performing both host and network-based intrusion analysis. Next, you'll learn about the importance of implementing security management and incident response strategies in an enterprise organization. As you advance, you'll see why implementing defenses is necessary by taking an in-depth approach, and then perform security monitoring and packet analysis on a network. You'll also discover the need for computer forensics and get to grips with the components used to identify network intrusions. Finally, the book will not only help you to learn the theory but also enable you to gain much-needed practical experience for the cybersecurity industry. By the end of this Cisco cybersecurity book, you'll have covered everything you need to pass the Cisco Certified CyberOps Associate 200-201 certification exam, and have a handy, on-the-job desktop reference guide. What you will learn ? Incorporate security into your architecture to prevent attacks ? Discover how to implement and prepare secure designs ? Identify access control models for digital assets ? Identify point of entry, determine scope, contain threats, and remediate ? Find out how to perform malware analysis and interpretation ? Implement security technologies to detect and analyze threats Who this book is for This book is for students who want to pursue a career in cybersecurity operations, threat detection and analysis, and incident response. IT professionals, network security engineers, security operations center (SOC) engineers, and cybersecurity analysts looking for a career boost and those looking to get certified in Cisco cybersecurity technologies and break into the cybersecurity industry will also benefit from this book. No prior knowledge of IT networking and cybersecurity industries is needed.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 4,932円

Permutation City The incredible, mind-bending look at cyberspace, afterlife and immortality from one of the greats of science fiction【電子書籍】[ Greg Egan ]

楽天Kobo電子書籍ストア
<p><strong>Immortality can be yours . . . at a price</strong></p> <p>Permutation city is the tale of a man with a vision - how to create immortality - and how that vision becomes grows beyond his control. Encompassing the lives and struggles of an artificial life junkie desperate to save her dying mother, a billionaire banker scarred by a terrible crime, the lovers for whom, in their timeless virtual world, love is not enough - and much more - Permutation city is filled with the sense of wonder and dread.</p> <p>Can what makes you human be distilled into data? And what happens if you can't afford to pay?</p> <p><strong>Readers are having their minds blown by PERMUTATION CITY:</strong></p> <p>"<strong>Egan tells the story masterfully</strong>. I can only marvel at how he finds his inspiration for a high-tech tale in an ancient wisdom like Kabbalah, and then proceeds to out-Kabbalah even the Kabbalists with his creativity" - Goodreads reviewer, ? ? ? ? ?</p> <p>"Egan questions what it really means to be human in <strong>a way that it's quite unsurpassed in my mind</strong>" - Goodreads reviewer, ? ? ? ? ?</p> <p>"THIS is why I read SF. THIS is the sense of wonder I'm looking for in a SF story. Forget everything you read about virtual reality, artificial life & consciousness - <strong>nothing compares to the concepts and the worldbuilding in this book</strong>. This is ultimate postcyberpunk ever" - Goodreads reviewer, ? ? ? ? ?</p> <p>"I can say without qualification that <strong>Greg Egan is the greatest science fiction author I've ever read</strong>" - Goodreads reviewer, ? ? ? ? ?</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 1,805円

Psycho-Cybernetics (Updated and Expanded)【電子書籍】[ Maxwell Maltz ]

楽天Kobo電子書籍ストア
<p><strong>The landmark self-help bestseller that has inspired and enhanced the lives of more than 30 million readers.</strong></p> <p>In this updated edition, with a new introduction and editorial commentary by Matt Furey, president of the Psycho-Cybernetics Foundation, the original 1960 text has been annotated and amplified to make Maxwell Maltz's message even more relevant for the contemporary reader.</p> <p>Maltz was the first researcher and author to explain how the self-image (a term he popularized) has complete control over an individual's ability to achieve, or fail to achieve, any goal. He developed techniques for improving and managing self-image visualization, mental rehearsal and relaxation which have informed and inspired countless motivational gurus, sports psychologists, and self-help practitioners for more than sixty years.</p> <p>Rooted in solid science, the classic teachings in <em>Psycho-Cybernetics</em> continue to provide a prescription for thinking and acting that lead to life-enhancing, quantifiable results.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 1,628円

Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing【電子書籍】[ Peter Bradley ]

楽天Kobo電子書籍ストア
<p>Are you fascinated by the idea of hacking?</p> <p>Do you want to learn the secrets of ethical hackers?</p> <p>This practical, step by step guide book will teach you all you need to know!</p> <p>Hacking is a term that evokes ideas of criminals infiltrating your website or online bank account and either bleeding you dry or causing all sorts of mayhem with malware. But that's only half the story and there are hackers out there who are ethical and do a lot of good.</p> <p>In this book, <strong>Hacking With Kali Linux,</strong> you will discover that there is a lot more to hacking than you first thought, with chapters that look at:</p> <p>The Basics of Hacking and Using Kali Linux<br /> Penetration Testing<br /> How to Install Kali Linux<br /> Kali Tools<br /> The Process of Ethical Hacking</p> <p>Perfect for beginners, <strong>Hacking With Kali Linux</strong> is a comprehensive guide that will show you the easy way to overcoming cybersecurity, and is packed with practical examples and simple to follow instructions.</p> <p><strong>Get a copy NOW</strong> and start your ethical hacking today!</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 350円

Cyber Security and Privacy Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers【電子書籍】

楽天Kobo電子書籍ストア
<p>This book constitutes the thoroughly refereed, selected papers on Cyber Security and Privacy EU Forum 2013, held in Belgium, in April 2013. The 14 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on cloud computing, security and privacy management, security and privacy technology, security and privacy policy.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 6,076円

Balboa and the Cyborg science fiction romance【電子書籍】[ B. Sting ]

楽天Kobo電子書籍ストア
<p>She was a interstellar star--a heroine--living a virtual life in a theme park in another solar system, just like you. Then, at a sidewalk caf?, Balboa asks her to dance.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 150円

In the Shadow of the Member States Policy-Making Agency by the ASEAN Secretariat and Dialogue Partners【電子書籍】[ Lukas Maximilian M?ller ]

楽天Kobo電子書籍ストア
<p>This book provides practice-oriented insights into the agency of two previously underestimated actors in Southeast Asian regionalism: the ASEAN Secretariat and ASEAN’s dialogue partners. In doing so, it offers an inside view of the policy-making processes in the ASEAN Political-Security and the ASEAN Economic Community, analyzing the interplay and agency by both actors in agenda setting, formulation, decision making, implementation, and monitoring. Drawing on a trove of novel data, including never-before analyzed sources and numerous interviews with ASEAN insiders, the book showcases a number of concrete cases of policy making, including competition and counterterrorism policies. The chapters focusing on the ASEAN Secretariat address aspects related to institutional autonomy, capacity, and reforms within the bureaucracy. In the chapters on ASEAN‘s dialogue partners, the book provides insights into the bilateral management of institutional support programs, as wellas the impacts of support on ASEAN‘s policy-making processes.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 17,016円

Cyber Mayday and the Day After A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions【電子書籍】[ Daniel Lohrmann ]

楽天Kobo電子書籍ストア
<p><strong>Successfully lead your company through the worst crises with this first-hand look at emergency leadership</strong></p> <p>Cyber security failures made for splashy headlines in recent years, giving us some of the most spectacular stories of the year. From the Solar Winds hack to the Colonial Pipeline ransomware event, these incidents highlighted the centrality of competent crisis leadership.</p> <p><em>Cyber Mayday and the Day After</em> offers readers a roadmap to leading organizations through dramatic emergencies by mining the wisdom of C-level executives from around the globe. It’s loaded with interviews with managers and leaders who've been through the crucible and survived to tell the tale.</p> <p>From former FBI agents to Chief Information Security Officers, these leaders led their companies and agencies through the worst of times and share their hands-on wisdom. In this book, you’ll find out:</p> <ul> <li>What leaders wish they'd known before an emergency and how they've created a crisis game plan for future situations</li> <li>How executive-level media responses can maintain ? or shatter ? consumer and public trust in your firm</li> <li>How to use communication, coordination, teamwork, and partnerships with vendors and law enforcement to implement your crisis response</li> </ul> <p><em>Cyber Mayday and the Day After</em> is a must-read experience that offers managers, executives, and other current or aspiring leaders a first-hand look at how to lead others through rapidly evolving crises.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 2,853円

Mastering Malware Analysis The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks【電子書籍】[ Alexey Kleymenov ]

楽天Kobo電子書籍ストア
<p><strong>Master malware analysis to protect your systems from getting infected</strong></p> <h4>Key Features</h4> <ul> <li>Set up and model solutions, investigate malware, and prevent it from occurring in future</li> <li>Learn core concepts of dynamic malware analysis, memory forensics, decryption, and much more</li> <li>A practical guide to developing innovative solutions to numerous malware incidents</li> </ul> <h4>Book Description</h4> <p>With the ever-growing proliferation of technology, the risk of encountering malicious code or malware has also increased. Malware analysis has become one of the most trending topics in businesses in recent years due to multiple prominent ransomware attacks. Mastering Malware Analysis explains the universal patterns behind different malicious software types and how to analyze them using a variety of approaches. You will learn how to examine malware code and determine the damage it can possibly cause to your systems to ensure that it won't propagate any further. Moving forward, you will cover all aspects of malware analysis for the Windows platform in detail. Next, you will get to grips with obfuscation and anti-disassembly, anti-debugging, as well as anti-virtual machine techniques. This book will help you deal with modern cross-platform malware. Throughout the course of this book, you will explore real-world examples of static and dynamic malware analysis, unpacking and decrypting, and rootkit detection. Finally, this book will help you strengthen your defenses and prevent malware breaches for IoT devices and mobile platforms. By the end of this book, you will have learned to effectively analyze, investigate, and build innovative solutions to handle any malware incidents.</p> <h4>What you will learn</h4> <ul> <li>Explore widely used assembly languages to strengthen your reverse-engineering skills</li> <li>Master different executable file formats, programming languages, and relevant APIs used by attackers</li> <li>Perform static and dynamic analysis for multiple platforms and file types</li> <li>Get to grips with handling sophisticated malware cases</li> <li>Understand real advanced attacks, covering all stages from infiltration to hacking the system</li> <li>Learn to bypass anti-reverse engineering techniques</li> </ul> <h4>Who this book is for</h4> <p>If you are an IT security administrator, forensic analyst, or malware researcher looking to secure against malicious software or investigate malicious code, this book is for you. Prior programming experience and a fair understanding of malware attacks and investigation is expected.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 5,070円

True Names and the Opening of the Cyberspace Frontier【電子書籍】[ Vernor Vinge ]

楽天Kobo電子書籍ストア
<p>Since its first publication in 1981, the short novel <em>True Names</em> by Vernor Vinge has been considered one of the most seminal science fiction works to present a fully fleshed-out concept of cyberspace. A finalist for the Hugo and Nebula Awards for best novella and winner of the Prometheus Hall of Fame Award, <em>True Names</em> was an inspiration to many innovators who have helped shape the world wide web as we know it today.<br /> The paperback edition of <em>True Names and the Opening of the Cyberspace Frontier,</em> published in 2001, also contained a feast of articles by computer scientists on the cutting edge of digital science, including Danny Hillis, the founder of Thinking Machines and the first Disney Fellow; Timothy C. May, former chief scientist at Intel; Marvin Minsky, co-founder of the MIT Artificial Intelligence Lab, considered by many to be the "father" of AI; Chip Morningstar and F. Randall Farmer, co-developers of habitat, the first real computer interactive environment; Mark Pesce, co-creator of VRML and the author of the <em>Playful World: How Technology Transforms Our Imagination</em>; and others.<br /> This first e-book edition includes all this, plus:</p> <p>a preface written especially for this edition by editor James Frenkel.<br /> an article on the difficulty of keeping information secure by Internet security expert Bruce Schneier.<br /> a passionate plea regarding the right to privacy by Richard Stallman, founder of the project to develop the free/libre GNU operating system and one of the most important advocates of free/libre software.</p> <p><em>True Names</em> itself is the heart of this important book: an exciting, suspenseful science fiction tale still as fresh and intriguing as when it was first published nearly thirty-five years ago.</p> <p>At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 1,533円

Blockchain Cybersecurity, Trust and Privacy【電子書籍】

楽天Kobo電子書籍ストア
<p>This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace.</p> <p>Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data.</p> <p>Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP’s issues in the digital world. Topics of interest for this book include but not limited to:</p> <ul> <li>Blockchain-based authentication, authorization and accounting mechanisms</li> <li>Applications of blockchain technologies in digital forensic and threat hunting</li> <li>Blockchain-based threat intelligence and threat analytics techniques</li> <li>Formal specification of smart contracts</li> <li>Automated tools for outsmarting smart contracts</li> <li>Security and privacy aspects of blockchain technologies</li> <li>Vulnerabilities of smart contracts</li> <li>Blockchain for securing cyber infrastructure and internet of things networks</li> <li>Blockchain-based cybersecurity education systems</li> </ul> <p>This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data willfind this book useful as well.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 20,662円

Medicinal Mushrooms: The Complete Guide to Grow Psilocybin Mushrooms and Medicinal Properties Mushrooms, #1【電子書籍】[ Elia Friedenthal ]

楽天Kobo電子書籍ストア
<p><strong>MUSHROOMS THAT ACT AS TURBO-SHOTS FOR YOUR IMMUNE SYSTEM</strong></p> <p><strong>THE MAGIC OF MEDICINAL MUSHROOMS</strong></p> <p>Does the thought of medicinal mushrooms scare you off? Take a deep breath and stay with us. Yes, we're going to tell you to put mushrooms in your coffee (among other things). But there's a good reason for this, we swear.</p> <p>Medicinal mushrooms have been used in Eastern medicine for thousands of years and have gained even more popularity as of late. Destined to be taken as powders (they're never meant to be eaten raw or whole), you can find these fungi in all different forms, including ultra-trendy Los Angeles lattes. One of the easiest ways to get your mushroom fix, though? Simply add a spoonful to whatever's on the menu ー be it your morning smoothie, veggie stir-fry, or a cup of java.</p> <p>The list of health benefits medicinal mushrooms provide is lengthy (think: brain booster, hormone helper, an antioxidant powerhouse).</p> <p><strong>BUT EACH MUSHROOM IS</strong> <strong>UNIQUE AND PROVIDES ITS OWN DISTINCT HEALTH ADVANTAGES.</strong></p> <p>Note that these shrooms aren't a cure-all. In fact, shroom studies are still new to Western medicine, and solid evidence for humans still needs far more research. So, think of them more like sidekicks for your immune system or mini-vaccines against stress, inflammation, and cancer. If you want to get in tune with the power of mushrooms, let's get to know the top and what makes them so great.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 600円

Practical Industrial Cybersecurity ICS, Industry 4.0, and IIoT【電子書籍】[ Charles J. Brooks ]

楽天Kobo電子書籍ストア
<p><strong>A practical roadmap to protecting against cyberattacks in industrial environments</strong></p> <p>In <em>Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT</em>, veteran electronics and computer security author Charles J. Brooks and electrical grid cybersecurity expert Philip Craig deliver an authoritative and robust discussion of how to meet modern industrial cybersecurity challenges. The book outlines the tools and techniques used by practitioners in the industry today, as well as the foundations of the professional cybersecurity skillset required to succeed on the SANS Global Industrial Cyber Security Professional (GICSP) exam.</p> <p>Full of hands-on explanations and practical guidance, this book also includes:</p> <ul> <li>Comprehensive coverage consistent with the National Institute of Standards and Technology guidelines for establishing secure industrial control systems (ICS)</li> <li>Rigorous explorations of ICS architecture, module and element hardening, security assessment, security governance, risk management, and more</li> </ul> <p><em>Practical Industrial Cybersecurity</em> is an indispensable read for anyone preparing for the Global Industrial Cyber Security Professional (GICSP) exam offered by the Global Information Assurance Certification (GIAC). It also belongs on the bookshelves of cybersecurity personnel at industrial process control and utility companies.</p> <p><em>Practical Industrial Cybersecurity</em> provides key insights to the Purdue ANSI/ISA 95 Industrial Network Security reference model and how it is implemented from the production floor level to the Internet connection of the corporate network. It is a valuable tool for professionals already working in the ICS/Utility network environment, IT cybersecurity personnel transitioning to the OT network environment, and those looking for a rewarding entry point into the cybersecurity field.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 4,412円

Hacking : A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking with Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing【電子書籍】[ Peter Bradley ]

楽天Kobo電子書籍ストア
<p>As we become more and more reliant on wireless networks to live and work, learning how to protect your system has become vital, if only to save yourself from the pain of identity theft, of all the problems caused by having your system hacked and your data stolen.</p> <p>Thankfully, there is a solution and it lies in penetration testing. A form of ethical hacking, penetration testing is a skill that you should learn, especially wireless-penetration testing and this has become more important than ever as new ways are being discovered to break into WPA2-encrypted networks.</p> <p>With Kali Linux, you have all the tools you need and in Hacking : A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing, you will learn, with detailed step-by-step practical examples how to protect your network from being hacked.</p> <p>Buy my guide and learn:</p> <ul> <li>How to set up a wireless lab to test your system</li> <li>What the KRACK attack is</li> <li>How to sniff out hidden networks, wireless packets and SSIDs</li> <li>How to capture WPA-2 keys and crack them</li> <li>How to attack a radius authentication system</li> <li>How to sniff traffic on a wireless network</li> <li>How to use stolen keys to decrypt encrypted traffic</li> <li>What the Honeypot and Deauthentication attacks are</li> <li>What Man-In-The-Middle and DoS attacks are</li> <li>How to secure your own wireless network</li> </ul> <p><strong>What are you waiting for?</strong> Buy <strong>Now</strong> to get started today to learn how to protect your system from the latest and most sophisticated attacks.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 450円

Query Store for SQL Server 2019 Identify and Fix Poorly Performing Queries【電子書籍】[ Tracy Boggiano ]

楽天Kobo電子書籍ストア
<p>Apply the new Query Store feature to identify and fix poorly performing queries in SQL Server.</p> <p>Query Store is an important and recent feature in SQL Server that provides insight into the details of query execution and how that execution has changed over time. Query Store helps to identify queries that aren’t performing well, or that have regressed in their performance. Query Store provides detailed information such as wait stats that you need to resolve root causes, and it allows you to force the use of a known good execution plan. With SQL Server 2017 and later you can automate the correction of regressions in performance.</p> <p><em><strong>Query Store for SQL Server 2019</strong></em> helps you protect your database’s performance during upgrades of applications or version of SQL Server. The book provides fundamental information on how Query Store works and best practices for implementation and use. You will learn to run and interpret built-in reports, configure automatic plan correction, and troubleshoot queries using Query Store when needed. <em><strong>Query Store for SQL Server 2019</strong></em> helps you master Query Store and bring value to your organization through consistent query execution times and automate correction of regressions.</p> <p><strong>What You'll Learn</strong></p> <ul> <li> <p>Apply best practices in implementing Query Store on production servers</p> </li> <li> <p>Detect and correct regressions in query performance</p> </li> <li> <p>Lower the risk of performance degradation following an upgrade</p> </li> <li> <p>Use tools and techniques to get the most from Query Store</p> </li> <li> <p>Automate regression correction and other uses of Query Store</p> </li> </ul> <p><strong>Who This Book Is For</strong></p> <p>SQL Server developers and administrators responsible for query performance on SQL Server. Anyone responsible for identifying poorly performing queries will be able to use Query Store to find these queries and resolve the underlying issues.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 5,469円

Shirley Homes and the Cyber Thief Level 1 Oxford Bookworms Library【電子書籍】[ Jennifer Bassett ]

楽天Kobo電子書籍ストア
<p>A level 1 Oxford Bookworms Library graded reader. Written for Learners of English by Jennifer Bassett. Shirley Homes, private investigator. Like Sherlock Holmes a hundred years ago, she lives in London, enjoys working on difficult cases, and has some helpful friends. She understands people, is a good listener, and of course, she is clever with computers. In today's world that is important, because a lot of crime is cyber crime. In this second Shirley Homes detective story, Shirley must catch a cyber thief. But how? You can't see a cyber thief, you can't hear a cyber thief. Only the computer knows, and the computer isn't talking . . .</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 1,158円

The Perfect Weapon War, Sabotage, and Fear in the Cyber Age【電子書籍】[ David E. Sanger ]

楽天Kobo電子書籍ストア
<p><strong>NOW AN HBO? DOCUMENTARY FROM AWARD-WINNING DIRECTOR JOHN MAGGIO ? “An importantーand deeply soberingーnew book about cyberwarfare” (Nicholas Kristof, <em>New York Times</em>), now updated with a new chapter.</strong></p> <p><em>The Perfect Weapon</em> is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidentsーBush and Obamaーdrew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump’s first year, turned back on the United States and its allies. And if Obama would begin his presidency by helping to launch the new era of cyberwar, he would end it struggling unsuccessfully to defend the 2016 U.S. election from interference by Russia, with Vladimir Putin drawing on the same playbook he used to destabilize Ukraine.</p> <p>Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, <em>New York Times</em> national security correspondent David Sanger reveals a world coming face-to-face with the perils of technological revolution, where everyone is a target.</p> <p><strong>“Timely and bracing . . . With the deep knowledge and bright clarity that have long characterized his work, Sanger recounts the cunning and dangerous development of cyberspace into the global battlefield of the twenty-first century.”</strong><em><strong>ーWashington Post</strong></em></p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 2,193円

A Defence of Poetry and Other Essays The Power of Poetry: A Call to Action for Social Change【電子書籍】[ Percy Bysshe Shelley ]

楽天Kobo電子書籍ストア
<p>In "A Defence of Poetry and Other Essays," Percy Bysshe Shelley articulates a passionate examination of the role of poetry in society and its profound connection to human emotion and moral truth. Shelley's literary style is characterized by its lyrical eloquence, employing vivid imagery and philosophical discourse that seamlessly weave together aesthetics and ethics. Written in the wake of the Romantic movement, this collection offers critical reflections on the transformative power of art, the nature of imagination, and the poet's responsibility to awaken the human spirit amidst the tumult of political upheaval in early 19th-century England. Percy Bysshe Shelley (1792-1822) was a pivotal figure in the Romantic era, experiencing personal and political turbulence that shaped his belief in the revolutionary potential of art. His radical ideals, advocacy for social change, and belief in the inherent goodness of humanity reflect his tumultuous upbringing and experiences of alienation, fueling his quest to redefine the societal role of poetry. Shelley's encounters with fellow poets and thinkers, coupled with his commitment to idealism, form the backdrop to this compelling exploration of poetic philosophy. This remarkable collection is essential reading for anyone seeking to understand not only the philosophy of poetry, but also the significance of art in igniting social consciousness. Shelley's insights serve as a timeless reminder of the poet's vital role in challenging the status quo and fostering empathy, making this book a worthwhile addition to the library of any reader engaged with literature's profound impact on society.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 310円

The Future Policy of the Liberal Party Shaping the Liberal Party's Future: Insightful Analysis and Visionary Policy by a Political Pioneer【電子書籍】[ William Gladstone ]

楽天Kobo電子書籍ストア
<p>In "The Future Policy of the Liberal Party," William Gladstone offers a visionary discourse on political strategy and philosophy in the context of late 19th-century Britain. The book is characterized by its eloquent prose and systematic analysis, reflecting Gladstone's deep commitment to liberal ideals such as individual freedom, social justice, and economic reform. Written during a period of political transition, Gladstone's work argues for a progressive roadmap that emphasizes the importance of public policy reform to address socio-economic challenges, while also critiquing the potential pitfalls of complacency within the party. His arguments resonate with the ethos of the Liberal Party as a moral force for democracy and its capacity to adapt to an ever-evolving society. William Gladstone, a prominent statesman and four-time Prime Minister of the United Kingdom, drew upon his extensive political experience and moral convictions to craft this influential text. His career, marked by a sincere dedication to social reform and public service, shaped his perspective on the role of the Liberal Party in addressing the needs of the people. This book serves as a culmination of his thoughts and a clarion call for future leaders to embrace progressive governance as a means of uplifting society. I highly recommend "The Future Policy of the Liberal Party" to scholars and political enthusiasts alike. Its insightful analysis of liberal principles, combined with Gladstone's compelling rhetoric, provides a unique historical lens through which contemporary policy debates can be examined. This book not only enriches our understanding of British political history but also challenges readers to consider the relevance of liberal ideals in today's world.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 310円

Cybernetic Revolutionaries Technology and Politics in Allende's Chile【電子書籍】[ Eden Medina ]

楽天Kobo電子書籍ストア
<p><strong>A historical study of Chile's twin experiments with cybernetics and socialism, and what they tell us about the relationship of technology and politics.</strong></p> <p>In <em>Cybernetic Revolutionaries</em>, Eden Medina tells the history of two intersecting utopian visions, one political and one technological. The first was Chile's experiment with peaceful socialist change under Salvador Allende; the second was the simultaneous attempt to build a computer system that would manage Chile's economy. Neither vision was fully realizedーAllende's government ended with a violent military coup; the system, known as Project Cybersyn, was never completely implementedーbut they hold lessons for today about the relationship between technology and politics.</p> <p>Drawing on extensive archival material and interviews, Medina examines the cybernetic system envisioned by the Chilean governmentーwhich was to feature holistic system design, decentralized management, human-computer interaction, a national telex network, near real-time control of the growing industrial sector, and modeling the behavior of dynamic systems. She also describes, and documents with photographs, the network's Star Trek-like operations room, which featured swivel chairs with armrest control panels, a wall of screens displaying data, and flashing red lights to indicate economic emergencies.</p> <p>Studying project Cybersyn today helps us understand not only the technological ambitions of a government in the midst of political change but also the limitations of the Chilean revolution. This history further shows how human attempts to combine the political and the technological with the goal of creating a more just society can open new technological, intellectual, and political possibilities. Technologies, Medina writes, are historical texts; when we read them we are reading history.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 3,870円

Cyber-Vigilance and Digital Trust Cyber Security in the Era of Cloud Computing and IoT【電子書籍】

楽天Kobo電子書籍ストア
<p>Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today’s landscape, organizations need to acquire and develop effective security tools and mechanisms ? not only to keep up with cyber criminals, but also to stay one step ahead.</p> <p>Cyber-Vigilance and Digital Trust develops cyber security disciplines that serve this double objective, dealing with cyber security threats in a unique way. Specifically, the book reviews recent advances in cyber threat intelligence, trust management and risk analysis, and gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 22,504円

Cybersecurity Myths and Misconceptions Avoiding the Hazards and Pitfalls that Derail Us【電子書籍】[ Eugene Spafford ]

楽天Kobo電子書籍ストア
<p><strong>175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them</strong></p> <p>Elected into the Cybersecurity Canon Hall of Fame!</p> <p>Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isn't the user the weakest link?</p> <p>In <em><strong>Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us</strong></em>, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth.</p> <p>Whatever your cybersecurity role or experience, Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra will help you surface hidden dangers, prevent avoidable errors, eliminate faulty assumptions, and resist deeply human cognitive biases that compromise prevention, investigation, and research. Throughout the book, you'll find examples drawn from actual cybersecurity events, detailed techniques for recognizing and overcoming security fallacies, and recommended mitigations for building more secure products and businesses.</p> <ul> <li>Read over 175 common misconceptions held by users, leaders, and cybersecurity professionals, along with tips for how to avoid them.</li> <li>Learn the pros and cons of analogies, misconceptions about security tools, and pitfalls of faulty assumptions. What really is the weakest link? When aren't "best practices" best?</li> <li>Discover how others understand cybersecurity and improve the effectiveness of cybersecurity decisions as a user, a developer, a researcher, or a leader.</li> <li>Get a high-level exposure to why statistics and figures may mislead as well as enlighten.</li> <li>Develop skills to identify new myths as they emerge, strategies to avoid future pitfalls, and techniques to help mitigate them.</li> </ul> <p><em>"You are made to feel as if you would never fall for this and somehow this makes each case all the more memorable. . . . Read the book, laugh at the right places, and put your learning to work. You won't regret it."</em><br /> --From the Foreword by <strong>Vint Cerf</strong>, Internet Hall of Fame Pioneer</p> <p><em>Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.</em></p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 5,892円

Principles of Object-Oriented Modeling and Simulation with Modelica 3.3 A Cyber-Physical Approach【電子書籍】[ Peter Fritzson ]

楽天Kobo電子書籍ストア
<p>Fritzson covers the Modelica language in impressive depth from the basic concepts such as cyber-physical, equation-base, object-oriented, system, model, and simulation, while also incorporating over a hundred exercises and their solutions for a tutorial, easy-to-read experience.</p> <ul> <li>The only book with complete Modelica 3.3 coverage</li> <li>Over one hundred exercises and solutions</li> <li>Examines basic concepts such as cyber-physical, equation-based, object-oriented, system, model, and simulation</li> </ul>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 17,353円

Go H*ck Yourself A Simple Introduction to Cyber Attacks and Defense【電子書籍】[ Bryson Payne ]

楽天Kobo電子書籍ストア
<p><strong>Learn firsthand just how easy a cyberattack can be.</strong></p> <p><em>Go Hack Yourself</em> is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach. As you perform common attacks against yourself, you’ll be shocked by how easy they are to carry outーand realize just how vulnerable most people really are.</p> <p>You’ll be guided through setting up a virtual hacking lab so you can safely try out attacks without putting yourself or others at risk. Then step-by-step instructions will walk you through executing every major type of attack, including physical access hacks, Google hacking and reconnaissance, social engineering and phishing, malware, password cracking, web hacking, and phone hacking. You’ll even hack a virtual car! You’ll experience each hack from the point of view of both the attacker and the target. Most importantly, every hack is grounded in real-life examples and paired with practical cyber defense tips, so you’ll understand how to guard against the hacks you perform.</p> <p>You’ll learn:</p> <p>How to practice hacking within a safe, virtual environment</p> <p>How to use popular hacking tools the way real hackers do, like Kali Linux, Metasploit, and John the Ripper</p> <p>How to infect devices with malware, steal and crack passwords, phish for sensitive information, and more</p> <p>How to use hacking skills for good, such as to access files on an old laptop when you can’t remember the password</p> <p>Valuable strategies for protecting yourself from cyber attacks</p> <p>You can’t truly understand cyber threats or defend against them until you’ve experienced them firsthand. By hacking yourself before the bad guys do, you’ll gain the knowledge you need to keep you and your loved ones safe.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 3,094円

Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE Developing Cyber-Physical Systems【電子書籍】[ Bran Selic ]

楽天Kobo電子書籍ストア
<p>Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE explains how to apply the complex MARTE standard in practical situations. This approachable reference provides a handy user guide, illustrating with numerous examples how you can use MARTE to design and develop real-time and embedded systems and software. Expert co-authors Bran Selic and S?bastien G?rard lead the team that drafted and maintain the standard and give you the tools you need apply MARTE to overcome the limitations of cyber-physical systems. The functional sophistication required of modern cyber-physical systems has reached a point where traditional code-centric development methods are proving less and less capable of delivering a reliable product in a timely manner. In Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE, you will learn how to take advantage of modern model-based engineering methods and corresponding industry standards to overcome these limitations. These methods take full advantage of computer-supported automation allowing timely detection of design flaws to reduce engineering risk, leading thereby to better overall product quality and greater productivity. - Understand the design rationale behind the MARTE standard needed to take full advantage of its many powerful modeling capabilities - Best apply the various MARTE features for the most common use cases encountered in the design of real-time and embedded software - Learn how MARTE can be used together with the SysML language for the design of complex cyber-physical systems - Discover how MARTE can be used for different kinds of computer-supported engineering analyses to predict key system characteristics early in development - Customize MARTE for a specific domain or project</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 6,233円

Cyber Insurance and Claims Investigation【電子書籍】[ Melanie Godinho ]

楽天Kobo電子書籍ストア
<p>This is an informative book that speaks about Cyber attacks around the globe, the role of CFAP’s and investigators in counterfeiting the attack, the way to tackle these attacks and the need to safeguard ourselves from cyber crime. This book is a must for each and everyone especially companies who store confidential data gathered from many years on their desktops or pc’s. It reveals defensive measures one can take to avoid cyber crime that occur through outsourcing of business, cloud computing, virtualization that carry greater amount of cyber risks that are unimaginable. Just as insuring ourself in today’s world has become a mandate, insuring our data from cyber thieves should be the priority too. This area of cyber crime is just the beginning, but promises to be the fastest growing area of need for the investigative industry. This book will help give rise to a bright future for forensic accountants who specialize in computer related investigations.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 744円

The Smartest Person in the Room The Root Cause and New Solution for Cybersecurity【電子書籍】[ Christian Espinosa ]

楽天Kobo電子書籍ストア
<p>Cyberattackーan ominous word that strikes fear in the hearts of nearly everyone, especially business owners, CEOs, and executives. With cyberattacks resulting in often devastating results, it's no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren't always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company's smartest minds to your benefit and theirs. Learn from Christian's own journey from cybersecurity engineer to company CEO. He describes why a high IQ is a lost superpower when effective communication, true intelligence, and self-confidence are not embraced. With his seven-step methodology and stories from the field, Christian helps you develop your team's technical minds so they become better humans and strong leaders who excel in every role. This book provides you with an enlightening perspective of how to turn your biggest unknown weakness into your strongest defense.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 1,610円

Lunch Lady and the Cyborg Substitute Lunch Lady #1【電子書籍】[ Jarrett J. Krosoczka ]

楽天Kobo電子書籍ストア
<p><strong>From the author of National Book Award finalist <em>Hey, Kiddo</em>.</strong></p> <p>Serving justice . . . and lunch!</p> <p>Hector, Terrence, and Dee have always wondered about their school lunch lady. What does she do when she isn’t dishing out the daily special? Where does she live? Does she have a lot of cats at home? Little do they know, Lunch Lady doesn’t just serve sloppy joesーshe serves justice! Whatever danger lies ahead, it’s no match for LUNCH LADY!</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 1,031円

Ultimate Microsoft Cybersecurity Architect SC-100 Exam Guide Master the SC-100 Exam with Practical Examples and Case Studies to Secure the Digital World with Microsoft Cybersecurity Expertise (English Edition)【電子書籍】[ Dr. K.V.N. Rajesh ]

楽天Kobo電子書籍ストア
<p>Master Cybersecurity with SC-100: Your Path to Becoming a Certified Architect!<br /> Book DescriptionUltimate Microsoft Cybersecurity Architect SC-100 Exam Guide is your definitive resource for mastering the SC-100 exam and advancing your career in cybersecurity. This comprehensive resource covers all exam objectives in detail, equipping you with the knowledge and skills needed to design and implement effective security solutions. Clear explanations and practical examples ensure you grasp key concepts such as threat modeling, security operations, and identity management. In addition to theoretical knowledge, the book includes real-world case studies and hands-on exercises to help you apply what you’ve learned in practical scenarios.<br /> Whether you are an experienced security professional seeking to validate your skills with the SC-100 certification or a newcomer aiming to enter the field, this resource is an invaluable tool. By equipping you with essential knowledge and practical expertise, it aids in your job role by enhancing your ability to protect and secure your organization’s critical assets. With this guide, you will be well on your way to becoming a certified cybersecurity architect.<br /> Table of Contents1. Zero Trust Frameworks and Best Practices Simplified2. Cloud Blueprint-Conforming Solutions3. Microsoft Security Framework-Compliant Solutions4. Cybersecurity Threat Resilience Design5. Compliance-Driven Solution Architecture6. Identity and Access Control Design7. Designing Access Security for High-Privilege Users8. Security Operations Design9. Microsoft 365 Security Design10. Application Security Design11. Data Protection Strategy Development12. Security Specifications for Cloud Services13. Hybrid and Multi-Cloud Security Framework14. Secure Endpoint Solution Design15. Secure Network Design Index</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 5,313円

Cyber-Physical-Human Systems Fundamentals and Applications【電子書籍】

楽天Kobo電子書籍ストア
<p><strong>Cyber?Physical?Human Systems</strong></p> <p><strong>A comprehensive edited volume exploring the latest in the interactions between cyber?physical systems and humans</strong></p> <p>In <em>Cyber?Physical?Human Systems: Fundamentals and Applications</em>, a team of distinguished researchers delivers a robust and up-to-date volume of contributions from leading researchers on Cyber?Physical?Human Systems, an emerging class of systems with increased interactions between cyber?physical, and human systems communicating with each other at various levels across space and time, so as to achieve desired performance related to human welfare, efficiency, and sustainability.</p> <p>The editors have focused on papers that address the power of emerging CPHS disciplines, all of which feature humans as an active component during cyber and physical interactions. Articles that span fundamental concepts and methods to various applications in engineering sectors of transportation, robotics, and healthcare and general socio-technical systems such as smart cities are featured. Together, these articles address challenges and opportunities that arise due to the emerging interactions between cyber?physical systems and humans, allowing readers to appreciate the intersection of cyber?physical system research and human behavior in large-scale systems.</p> <p>In the book, readers will also find:</p> <ul> <li>A thorough introduction to the fundamentals of cyber?physical?human systems</li> <li>In-depth discussions of cyber?physical?human systems with applications in transportation, robotics, and healthcare</li> <li>A comprehensive treatment of socio-technical systems, including social networks and smart cities</li> </ul> <p>Perfect for cyber?physical systems researchers, academics, and graduate students, <em>Cyber?Physical?Human Systems: Fundamentals and Applications</em> will also earn a place in the libraries of research and development professionals working in industry and government agencies.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 16,471円