Detection  [本・雑誌・コミック]
 
楽天市場検索

本・雑誌・コミック
  小説・エッセイ (2) (Detection)
  資格・検定 (0)
  ライフスタイル (0)
  ホビー・スポーツ・美術 (0)
  絵本・児童書・図鑑 (0)
  語学・辞典・年鑑 (0)
  学習参考書・問題集 (0)
  旅行・留学 (0)
  人文・地歴・社会 (0)
  ビジネス・経済・就職 (0)
  PC・システム開発 (1) (Detection)
  科学・医学・技術 (0)
  コミック (32) (Detection)
  ライトノベル (0)
  ボーイズラブ (0)
  ティーンズラブ (0)
  エンターテインメント (0)
  写真集 (0)
  古書・希少本 (5) (Detection)
  楽譜 (0)
  雑誌 (0)
  新聞 (0)
  洋書 (1193) (Detection)
  カレンダー (0)
  ポスター (0)
  パンフレット (0)
  その他 (16) (Detection)
 
1249件中 151件 - 180件  1 2 3 4 5 6 7 8 9 10 11
商品説明価格

Simplified Robust Adaptive Detection and Beamforming for Wireless Communications【電子書籍】[ Ayman ElNashar ]

楽天Kobo電子書籍ストア
<p>This book presents an alternative and simplified approaches for the robust adaptive detection and beamforming in wireless communications. It adopts several systems models including DS/CDMA, OFDM/MIMO with antenna array, and general antenna arrays beamforming model. It presents and analyzes recently developed detection and beamforming algorithms with an emphasis on robustness. In addition, simplified and efficient robust adaptive detection and beamforming techniques are presented and compared with exiting techniques. Practical examples based on the above systems models are provided to exemplify the developed detectors and beamforming algorithms. Moreover, the developed techniques are implemented using MATLABーand the relevant MATLAB scripts are provided to help the readers to develop and analyze the presented algorithms.</p> <p><em>Simplified Robust Adaptive Detection and Beamforming for Wireless Communications starts by introducing readers to adaptive signal processing and robust adaptive detection. It then goes on to cover Wireless Systems Models. The robust adaptive detectors and beamformers are implemented using the well-known algorithms including LMS, RLS, IQRD-RLS, RSD, BSCMA, CG, and SD. The robust detection and beamforming are derived based on the existing detectors/beamformers including MOE, PLIC, LCCMA, LCMV, MVDR, BSCMA, and MBER. The adopted cost functions include MSE, BER, CM, MV, and SINR/SNR.</em></p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 20,603円

Heteroskedasticity in Regression Detection and Correction【電子書籍】[ Robert L. Kaufman ]

楽天Kobo電子書籍ストア
<p>This volume covers the commonly ignored topic of heteroskedasticity (unequal error variances) in regression analyses and provides a practical guide for how to proceed in terms of testing and correction. Emphasizing how to apply diagnostic tests and corrections for heteroskedasticity in actual data analyses, the book offers three approaches for dealing with heteroskedasticity:</p> <ul> <li>variance-stabilizing transformations of the dependent variable;</li> <li>calculating robust standard errors, or heteroskedasticity-consistent standard errors; and</li> <li>generalized least squares estimation coefficients and standard errors.</li> </ul> <p>The detection and correction of heteroskedasticity is illustrated with three examples that vary in terms of sample size and the types of units analyzed (individuals, households, U.S. states). Intended as a supplementary text for graduate-level courses and a primer for quantitative researchers, the book fills the gap between the limited coverage of heteroskedasticity provided in applied regression textbooks and the more theoretical statistical treatment in advanced econometrics textbooks.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 5,675円

Powers of Detection Stories of Mystery & Fantasy【電子書籍】

楽天Kobo電子書籍ストア
<p>Investigations of a Different Kind</p> <p>Conjured from the minds of today’s most innovative authors, <em>Powers of Detection</em> features a dozen tales of mystery and fantasy, set in worlds where sleuths may wield wands instead of firearmsーand criminals may be as inhuman as the crimes they commit.</p> <p>From a magical boarding school murder to a courtroom where a witch stands trial, from ancient legends of Alaska and Egypt to stories featuring such familiar faces as Sookie Stackhouse and such familiar places as the Nightside, these paranormal procedurals reveal the mysterious behind the mystery…</p> <p>Includes stories by…</p> <p>Donna Andrews ? Michael Armstrong ? Anne Bishop ? Jay Caselberg ? Mike Doogan ? Laura Anne Gilman ? Simon R. Green ? Charlaine Harris ? Anne Perry ? Sharon Shinn ? Dana Stabenow ? John Straley</p> <p>“Highly original tales.”ー<em>Publishers Weekly</em></p> <p>“Everyone’s heart is in the right place and, in the best stories, their tongues are firmly in their cheeks.”ー<em>Mystery Scene</em></p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 945円

Aspects of Explosives Detection【電子書籍】

楽天Kobo電子書籍ストア
<p>Detection and quantification of trace chemicals is a major thrust of analytical chemistry. In recent years much effort has been spent developing detection systems for priority pollutants. Less mature are the detections of substances of interest to law enforcement and security personnel:in particular explosives. This volume will discuss the detection of these, not only setting out the theoretical fundamentals, but also emphasizing the remarkable developments in the last decade. Terrorist eventsーairplanes blown out of the sky (PanAm 103 over Lockerbie) and attacks on U.S. and European cities (Trade Center in New York and the Murrah Federal Building in Oklahoma City, railways in London and Madrid)--emphasize the danger of concealed explosives. However, since most explosives release little vapor, it was not possible to detect them by technology used on most organic substances. After PanAm 103 was downed over Scotland, the U.S. Congress requested automatic explosive detection equipment be placed in airports. This volume outlines the history of explosive detection research, the developments along the way, present day technologies, and what we think the future holds. - Written by experts in the field who set out both the scientific issues and the practical context with authority - Discusses and describes the threat - Describes the theoretical background and practical applications of both trace and bulk explosives detection</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 21,676円

Healthcare Fraud Auditing and Detection Guide【電子書籍】[ Rebecca S. Busch ]

楽天Kobo電子書籍ストア
<p><strong>An invaluable tool equipping healthcare professionals, auditors, and investigators to detect every kind of healthcare fraud</strong></p> <p>According to private and public estimates, billions of dollars are lost per hour to healthcare waste, fraud, and abuse. A must-have reference for auditors, fraud investigators, and healthcare managers, <em>Healthcare Fraud, Second Edition</em> provides tips and techniques to help you spotーand preventーthe "red flags" of fraudulent activity within your organization. Eminently readable, it is your "go-to" resource, equipping you with the necessary skills to look for and deal with potential fraudulent situations.</p> <ul> <li>Includes new chapters on primary healthcare, secondary healthcare, information/data management and privacy, damages/risk management, and transparency</li> <li>Offers comprehensive guidance on auditing and fraud detection for healthcare providers and company healthcare plans</li> <li>Examines the necessary background that internal auditors should have when auditing healthcare activities</li> </ul> <p>Managing the risks in healthcare fraud requires an understanding of how the healthcare system works and where the key risk areas are. With health records now all being converted to electronic form, the key risk areas and audit process are changing. Read <em>Healthcare Fraud, Second Edition</em> and get the valuable guidance you need to help combat this critical problem.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 6,912円

Plant Pathogen Detection and Disease Diagnosis【電子書籍】[ P. Narayanasamy ]

楽天Kobo電子書籍ストア
<p>This work provides information on the detection, identification, and differentiation of all microbial plant pathogens - presenting modern protocols for rapid diagnosis of diseases based on biological, physical, chemical and molecular properties. It contains methods for the selection of disease-free seeds and vegetatively propagated planting materia</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 14,013円

Beginning Anomaly Detection Using Python-Based Deep Learning Implement Anomaly Detection Applications with Keras and PyTorch【電子書籍】[ Suman Kalyan Adari ]

楽天Kobo電子書籍ストア
<p>This beginner-oriented book will help you understand and perform anomaly detection by learning cutting-edge machine learning and deep learning techniques. This updated second edition focuses on supervised, semi-supervised, and unsupervised approaches to anomaly detection. Over the course of the book, you will learn how to use Keras and PyTorch in practical applications. It also introduces new chapters on GANs and transformers to reflect the latest trends in deep learning.</p> <p><em>Beginning Anomaly Detection Using Python-Based Deep Learning</em> begins with an introduction to anomaly detection, its importance, and its applications. It then covers core data science and machine learning modeling concepts before delving into traditional machine learning algorithms such as OC-SVM and Isolation Forest for anomaly detection using scikit-learn. Following this, the authors explain the essentials of machine learning and deep learning, and how to implement multilayer perceptrons for supervised anomaly detection in both Keras and PyTorch. From here, the focus shifts to the applications of deep learning models for anomaly detection, including various types of autoencoders, recurrent neural networks (via LSTM), temporal convolutional networks, and transformers, with the latter three architectures applied to time-series anomaly detection. This edition has a new chapter on GANs (Generative Adversarial Networks), as well as new material covering transformer architecture in the context of time-series anomaly detection.</p> <p>After completing this book, you will have a thorough understanding of anomaly detection as well as an assortment of methods to approach it in various contexts, including time-series data. Additionally, you will have gained an introduction to scikit-learn, GANs, transformers, Keras, and PyTorch, empowering you to create your own machine learning- or deep learning-based anomaly detectors.</p> <p><strong>What You Will Learn</strong></p> <ul> <li>Understand what anomaly detection is, why it it is important, and how it is applied</li> <li>Grasp the core concepts of machine learning.</li> <li>Master traditional machine learning approaches to anomaly detection using scikit-kearn.</li> <li>Understand deep learning in Python using Keras and PyTorch</li> <li>Process data through pandas and evaluate your model's performance using metrics like F1-score, precision, and recall</li> <li>Apply deep learning to supervised, semi-supervised, and unsupervised anomaly detection tasks for tabular datasets and time series applications</li> </ul> <p><strong>Who This Book Is For</strong></p> <p>Data scientists and machine learning engineers of all levels of experience interested in learning the basics of deep learning applications in anomaly detection.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 6,685円

Protocols for Cyanobacteria Sampling and Detection of Cyanotoxin【電子書籍】

楽天Kobo電子書籍ストア
<p>This protocol book provides detailed procedures for the isolation of cyanobacteria, extraction, quantification, and detection of cyanotoxins. It illustrates the sampling and processing of toxin-producing cyanobacteria in water and aquatic animal samples, detection of cyanotoxins from Anabaena, Anabaenopsis, Cylindrospermopsis, Microsystis, Microcystis, Nodularia, Nostoc, Schizotrix, Lyngbya, Raphidiopsis, Oscillatoria, Planktothrix in aquatic resources. It also covers toxicity analysis by various bioassay protocols, and in vitro and insilico analysis methods. The book also reviews the methods for cyanotoxin extraction, detection, and quantification by various tools including LC-MS/MS, HPLC, NMR, PCR, and HESI-MS/MS. A separate section is dedicated to the advanced methods in Cyanotoxin analysis including the Molecular Imprinting Method (MIM), Cellular signaling biosensor, Electrochemical sensor, Nanosensors, and screening of Polyketide synthase gene. The analysis of various toxin-producing genes like sxtA and mcy is also accounted for in this book.</p> <p>In a nutshell, the book gives comprehensive procedures about the basics and preliminary processes that are involved in sample collection to advanced methods incorporated into the well-explored and unexplored Cyanobacterial toxin.</p> <p>Consequently, this manual is useful for both beginners and advanced researchers, including postgraduate students, academicians, researchers, and scientists in the field of Cyanobacterial research.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 26,343円

Intelligent Beam Control in Accelerators INTELLIGENT BEAM CONTROL IN AC (Particle Acceleration and Detection) [ Zheqiao Geng ]

楽天ブックス
INTELLIGENT BEAM CONTROL IN AC Particle Acceleration and Detection Zheqiao Geng Stefan Simrock SPRINGER NATURE2023 Hardcover 2023 English ISBN:9783031285967 洋書 Computers & Science(コンピューター&科学) Science 38,192円

Deep Learning and XAI Techniques for Anomaly Detection Integrate the theory and practice of deep anomaly explainability【電子書籍】[ Cher Simon ]

楽天Kobo電子書籍ストア
<p><strong>Create interpretable AI models for transparent and explainable anomaly detection with this hands-on guide</strong></p> <p><strong>Purchase of the print or Kindle book includes a free PDF eBook</strong></p> <h4>Key Features</h4> <ul> <li>Build auditable XAI models for replicability and regulatory compliance</li> <li>Derive critical insights from transparent anomaly detection models</li> <li>Strike the right balance between model accuracy and interpretability</li> </ul> <h4>Book Description</h4> <p>Despite promising advances, the opaque nature of deep learning models makes it difficult to interpret them, which is a drawback in terms of their practical deployment and regulatory compliance.</p> <p>Deep Learning and XAI Techniques for Anomaly Detection shows you state-of-the-art methods that'll help you to understand and address these challenges. By leveraging the Explainable AI (XAI) and deep learning techniques described in this book, you'll discover how to successfully extract business-critical insights while ensuring fair and ethical analysis.</p> <p>This practical guide will provide you with tools and best practices to achieve transparency and interpretability with deep learning models, ultimately establishing trust in your anomaly detection applications. Throughout the chapters, you'll get equipped with XAI and anomaly detection knowledge that'll enable you to embark on a series of real-world projects. Whether you are building computer vision, natural language processing, or time series models, you'll learn how to quantify and assess their explainability.</p> <p>By the end of this deep learning book, you'll be able to build a variety of deep learning XAI models and perform validation to assess their explainability.</p> <h4>What you will learn</h4> <ul> <li>Explore deep learning frameworks for anomaly detection</li> <li>Mitigate bias to ensure unbiased and ethical analysis</li> <li>Increase your privacy and regulatory compliance awareness</li> <li>Build deep learning anomaly detectors in several domains</li> <li>Compare intrinsic and post hoc explainability methods</li> <li>Examine backpropagation and perturbation methods</li> <li>Conduct model-agnostic and model-specific explainability techniques</li> <li>Evaluate the explainability of your deep learning models</li> </ul> <h4>Who this book is for</h4> <p>This book is for anyone who aspires to explore explainable deep learning anomaly detection, tenured data scientists or ML practitioners looking for Explainable AI (XAI) best practices, or business leaders looking to make decisions on trade-off between performance and interpretability of anomaly detection applications. A basic understanding of deep learning and anomaly detection?related topics using Python is recommended to get the most out of this book.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 5,165円

NAFLD and NASH Biomarkers in Detection, Diagnosis and Monitoring【電子書籍】

楽天Kobo電子書籍ストア
<p>This book provides a comprehensive overview of the diagnosis and management of Non-alcoholic Fatty Liver Disease (NAFLD) and Non-Alcoholic Steatohepatis (NASH). Basic principles of disease progression, the genetic and nutritional basis of NAFLD and NASH are explained along with the proteomic principles underlying biomarker development. Chapters cover both biochemical and imaging biomarkers used in elastrography and ultrasound and discuss how these are applicable to early diagnosis and monitoring of NASH and NAFLD.</p> <p>This is a useful resource for hepatologists, primary care providers with an interest in metabolic disease, diabetologists and endocrinologists in their daily clinical practice.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 10,331円

Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks【電子書籍】[ Muhammad Usman ]

楽天Kobo電子書籍ストア
<p>This book presents the latest developments regarding a detailed mobile agent-enabled anomaly detection and verification system for resource constrained sensor networks; a number of algorithms on multi-aspect anomaly detection in sensor networks; several algorithms on mobile agent transmission optimization in resource constrained sensor networks; an algorithm on mobile agent-enabled in situ verification of anomalous sensor nodes; a detailed Petri Net-based formal modeling and analysis of the proposed system, and an algorithm on fuzzy logic-based cross-layer anomaly detection and mobile agent transmission optimization. As such, it offers a comprehensive text for interested readers from academia and industry alike.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 6,076円

Physical Methods for Microorganisms Detection【電子書籍】[ W. H. Nelson ]

楽天Kobo電子書籍ストア
<p>This volume presents detection and identification methods for bacteria and yeast. Chapters are written by expert laboratory practitioners and instrument makers and focuses on those methods that show widespread practical application, such as ATP luminescence. Food applications include rapid detection and quantitation of bacteria in raw milk, pasteurized milk, other dairy products, and raw meat. Other topics include brewing applications for beverages, starter culture monitoring, clinical analyses, blood and urine analysis procedures, analysis of aerosols, bioprocess safety, and biodeterioration. This book is a must for microbiologists in food quality labs and clinical labs.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 11,817円

Detection Theory Applications and Digital Signal Processing【電子書籍】[ Ralph D. Hippenstiel ]

楽天Kobo電子書籍ストア
<p>Using simplified notation and a practical approach, Detection Theory: Applications and Digital Signal Processing introduces the principles of detection theory, the necessary mathematics, and basic signal processing methods along with some recently developed statistical techniques. Throughout the book, the author keeps the needs of practicing engineers firmly in mind. His presentation and choice of topics allows students to quickly become familiar with the detection and signal processing fields and move on to more advanced study and practice. The author also presents many applications and wide-ranging examples that demonstrate how to apply the concepts to real-world problems.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 11,817円

Structural Health Monitoring and Damage Detection, Volume 7 Proceedings of the 33rd IMAC, A Conference and Exposition on Structural Dynamics, 2015【電子書籍】

楽天Kobo電子書籍ストア
<p><em>Structural Health Monitoring & Damage Detection, Volume 7: Proceedings of the 33rd IMAC, A Conference and Exposition on Structural Dynamics, 2015,</em> the seventh volume of ten from the Conference brings together contributions to this important area of research and engineering. The collection presents early findings and case studies on fundamental and applied aspects of Structural Dynamics, including papers on:</p> <p>Structural Health Monitoring</p> <p>Damage Detection</p> <p>Energy Harvesting</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 18,231円

The Lying Brain Lie Detection in Science and Science Fiction【電子書籍】[ Melissa M. Littlefield ]

楽天Kobo電子書籍ストア
<p>"<em>The Lying Brain</em> is a study to take seriously. Its argument is timely, clear, and of particular importance to the enlargement of our understanding of the relationships among science studies, literary studies, and technology studies."<br /> ---Ronald Schleifer, University of Oklahoma</p> <p>Real and imagined machines, including mental microscopes, thought translators, and polygraphs, have long promised to detect deception in human beings. Now, via fMRI and EEG, neuroscientists seem to have found what scientists, lawyers, and law enforcement officials have sought for over a century: foolproof lie detection. But are these new lie detection technologies any different from their predecessors? <em>The Lying Brain</em> is the first book to explore the cultural history of an array of lie detection technologies: their ideological assumptions, the scientific and fictional literatures that create and market them, and the literacies required for their interpretation.</p> <p>By examining a rich archive of materials about lie detection---from science to science fiction---<em>The Lying Brain</em> demonstrates the interconnections of science, literature, and popular culture in the development and dissemination of deception detection in the American cultural imagination. As Melissa Littlefield demonstrates, neuroscience is not building a more accurate lie detector; it is simply recycling centuries-old ideologies about deception and its detection.</p> <p>Cover art: "Human Brain" ? Denis Barbulet, courtesy of Shutterstock.com</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 4,181円

Structural Health Monitoring & Damage Detection, Volume 7 Proceedings of the 35th IMAC, A Conference and Exposition on Structural Dynamics 2017【電子書籍】

楽天Kobo電子書籍ストア
<p><em>Structural Health Monitoring & Damage Detection, Volume 7: Proceedings of the 35th IMAC, A Conference and Exposition on Structural Dynamics, 2017,</em> the seventh volume of ten from the Conference brings together contributions to this important area of research and engineering. The collection presents early findings and case studies on fundamental and applied aspects of Structural Health Monitoring & Damage Detection, including papers on:</p> <p>Structural Health Monitoring</p> <p>Damage Detection</p> <p>System Identification</p> <p>Active Controls</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 18,231円

The Invention of Murder: How the Victorians Revelled in Death and Detection and Created Modern Crime INVENTION OF MURDER [ Judith Flanders ]

楽天ブックス
INVENTION OF MURDER Judith Flanders GRIFFIN2014 Paperback English ISBN:9781250048530 洋書 Social Science(社会科学) History 3,484円

Alzheimer’s Disease Early Detection A Deep Learning Approach with 3D-CNNs and Attention Mechanisms【電子書籍】[ Bolakale Aremu ]

楽天Kobo電子書籍ストア
<p>This book offers a groundbreaking exploration of how advanced machine learning techniques are revolutionizing the diagnosis of Alzheimer's disease. In this comprehensive guide, you will uncover the powerful role that deep learning, particularly 3D Convolutional Neural Networks (3D-CNNs) and Attention Mechanisms, can play in early detectionーpaving the way for faster, more accurate diagnoses.</p> <p>This book is ideal for researchers, students, and professionals in artificial intelligence, neuroscience, and healthcare technology. It provides a detailed, step-by-step breakdown of the algorithms and models used to analyze brain imaging data, specifically focusing on how these techniques outperform traditional diagnostic methods.</p> <p><strong>You’ll dive into key topics such as:</strong></p> <p>The application of deep learning to brain scans for identifying Alzheimer’s at its earliest stages.<br /> The mechanics behind 3D-CNNs and attention mechanisms, which allow for a deeper understanding of brain structures and cognitive decline.<br /> Real-world case studies and cutting-edge research that demonstrate the practical implementation of these techniques.</p> <p>By the end of this book, you’ll gain a comprehensive understanding of how artificial intelligence is reshaping Alzheimer's diagnostics, and how it can be used to improve patient outcomes. Whether you’re an AI enthusiast or a healthcare professional, this book is an invaluable resource for those seeking to stay at the forefront of technological advancements in Alzheimer’s disease research.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 1,686円

Practical Threat Intelligence and Data-Driven Threat Hunting Elevate your cybersecurity efforts, enhance detection, and defend with ATT&CK? & open tools【電子書籍】[ Valentina Costa-Gazc?n ]

楽天Kobo電子書籍ストア
<p><b>Strengthen your cybersecurity approach through hands-on threat intelligence and data-driven hunting method</b></p><h2>Key Features</h2><ul><li>Set up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat hunting</li><li>Dive into the world of data-driven threat hunting by mastering the process of collecting, modeling, and analyzing data</li><li>Explore advanced threat hunting techniques using the MITRE ATT&CK Framework</li></ul><h2>Book Description</h2>Practical Threat Intelligence and Data-Driven Threat Hunting, 2nd edition" is more than just a bookーit's your roadmap to becoming a proficient threat hunter and a valuable asset to your organization's cybersecurity efforts. Whether you're looking to start a career in cyber intelligence or seeking to enhance your existing skills, this book equips you with the knowledge and practical insights needed to proactively detect and thwart cyber threats. With a strong focus on hands-on learning and open-source tools, it's your ultimate guide to staying ahead in the ever-changing world of cybersecurity. You'll start by unraveling the core concepts of cyber threat intelligence, diving into the intricacies of threat intelligence cycles and understanding the nuances of advanced persistent threats. From there, you'll learn how to collect and analyze indicators of compromise, set up a centralized threat hunting environment using open-source tools, and develop hypotheses for hunting campaigns. The book will also guide you through the MITRE ATT&CK Framework, providing practical examples and hands-on experience. Don't wait for threats to knock on your door. Be the hunter, not the hunted. Get your copy of "Practical Threat Intelligence and Data-Driven Threat Hunting, 2nd edition" and empower yourself to defend against cyber adversaries effectively.<h2>What you will learn</h2><ul><li>Gain a comprehensive understanding of cyber threat intelligence and its role in safeguarding your organization against threats</li><li>Explore the various stages of the threat hunting process</li><li>Master the art of collecting and analyzing threat data</li><li>Familiarize yourself with the MITRE ATT&CK Framework</li><li>Set up a research environment using open-source tools</li><li>Query and analyze data to carry out atomic tests and identify potential threats</li><li>Discover the power of threat actor emulation</li></ul><h2>Who this book is for</h2><p>If you are looking to start out in the cyber intelligence and threat hunting domains and want to know more about how to implement a threat hunting division with open-source tools, then this cyber threat intelligence book is for you.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 3,874円

A Machine-Learning Approach to Phishing Detection and Defense【電子書籍】[ O.A. Akanbi ]

楽天Kobo電子書籍ストア
<p>Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats. - Discover novel research into the uses of machine-learning principles and algorithms to detect and prevent phishing attacks - Help your business or organization avoid costly damage from phishing sources - Gain insight into machine-learning strategies for facing a variety of information security threats</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 7,397円

IoT Signal Detection【電子書籍】[ Rui Han ]

楽天Kobo電子書籍ストア
<p><strong>Comprehensive reference covering signal detection for random access in IoT systems from the beginner to expert level</strong></p> <p>With a carefully balanced blend of theoretical elements and applications, <em>IoT Signal Detection</em> is an easy-to-follow presentation on signal detection for IoT in terms of device activity detection, sparse signal detection, collided signal detection, round-trip delay estimation, and backscatter signal division, building progressively from basic concepts and important background material up to an advanced understanding of the subject. Various signal detection and estimation techniques are explained, e.g., variational inference algorithm and compressive sensing reconstruction algorithm, and a number of recent research outcomes are included to provide a review of the state of the art in the field.</p> <p>Written by four highly qualified academics, <em>IoT Signal Detection</em> discusses sample topics such as:</p> <ul> <li>ML, ZF, and MMSE detection, Markov chain Monte Carlo-based detection, variational inference-based detection, compressive sensing-based detection</li> <li>Sparse signal detection for multiple access, covering Bayesian compressive sensing algorithm and structured subspace pursuit algorithm</li> <li>Collided signal detection for multiple access using automatic modulation classification algorithm, round-trip delay estimation for collided signals</li> <li>Signal detection for backscatter signals, covering central limited theorem-based detection including detection algorithms, performance analysis, and simulation results</li> <li>Signal design for multi-cluster coordination, covering successive interference cancellation design, device grouping and power control, and constructive interference-aided multi-cluster coordination</li> </ul> <p>With seamless coverage of the subject presented in a linear and easy-to-understand way, <em>IoT Signal Detection</em> is an ideal reference for both graduate students and practicing engineers in wireless communications.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 15,473円

The Survival Guide to Maintaining Access and Evading Detection Post-Exploitation【電子書籍】[ Josh Luberisse ]

楽天Kobo電子書籍ストア
<p>In the intricate dance of cyber warfare, the act of gaining unauthorized access is merely the first step. The real artistry lies in staying undetected, maintaining that access, and achieving objectives without raising alarms. "The Survival Guide to Maintaining Access and Evading Detection Post-Exploitation" delves deep into this complex and ever-evolving realm of post-exploitation in cybersecurity.</p> <p>From the renowned experts at Greyhat Intelligence & Investigative Solutions, this comprehensive guide reveals the hidden nuances of post-exploitation activities. Learn how threat actors secure their foothold, escalate privileges, and maneuver through networks undetected. Discover the tactics, techniques, and procedures (TTPs) that distinguish an amateur attacker from a seasoned professional.</p> <p>Each chapter of the guide offers a meticulously researched look into distinct aspects of post-exploitation:</p> <p>- Grasp the importance of maintaining access within compromised systems and the myriad methods employed to persist through reboots, updates, and other adversities.</p> <p>- Delve into the art of evading detection, a critical skill in a world where enterprises are investing heavily in fortifying their cyber defenses.</p> <p>- Explore the "live off the land" philosophy, leveraging legitimate tools and native system features for clandestine operations, sidestepping the common detection avenues.</p> <p>- Navigate through advanced realms of cyber-attacks, such as tunneling, pivoting, and memory-resident malware, and understand the counter-forensic measures that elite hackers employ.</p> <p>- Equip yourself with the latest strategies to defend against these surreptitious techniques. Learn how to harden systems, enhance detection capabilities, and respond effectively when breaches occur.</p> <p>- Reflect on the ethical dimensions of post-exploitation and the evolving global legal landscape that shapes this domain. Plus, anticipate the future challenges and opportunities that emerging technologies bring to the post-exploitation scene.</p> <p>Bolstered by real-world case studies, detailed toolkits, and a glossary of terms, this book is an essential resource for cybersecurity professionals, digital forensics experts, and IT personnel. Whether you're looking to safeguard your organization's digital assets, enhance your penetration testing skills, or understand the adversary's playbook, "The Survival Guide to Maintaining Access and Evading Detection Post-Exploitation" is the definitive compendium you need in your arsenal.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 1,500円

Water Safety, Security and Sustainability Threat Detection and Mitigation【電子書籍】

楽天Kobo電子書籍ストア
<p>This book focuses on threats, especially contaminants, to drinking water and the supply system, especially in municipalities but also in industrial and even residential settings. The safety, security, and suitability landscape can be described as dynamic and complex stemming from necessity and hence culpability due to the emerging threats and risks, vis-a-vis globalization resulting in new forms of contaminants being used due to new technologies. The book provides knowledge and guidance for engineers, scientists, designers, researchers, and students who are involved in water, sustainability, and study of security issues. This book starts out with basics of water usage, current statistics, and an overview ofwater resources. The book then introduces different scenarios of safety and security and areas that researchers need to focus. Following that, the book presents different types of contaminants ? inadvertent, intentional, or incidental. The next section presents different methodologies of contamination sensing/detection and remediation strategies as per guidance and standards set globally. The book then concludes with selected chapters on water management, including critical infrastructure that is critical to maintaining safe water supplies to cities and municipalities. Each chapter includes descriptive information for professionals in their respective fields. The breadth of chapters offers insights into how science (physical, natural, and social) and technology can support new developments to manage the complexity resident within the evolving threat and risk landscape.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 18,231円

Gravity's Kiss The Detection of Gravitational Waves【電子書籍】[ Harry Collins ]

楽天Kobo電子書籍ストア
<p>**Written in real time, this fascinating account takes you inside a landmark scientific discovery, long in the making: the first detection of gravitational waves.</p> <p>“Thrilling like a spy story.” ーCarlo Rovelli, author of <em>Seven Brief Lessons on Physics</em>**</p> <p>Scientists have been trying to confirm the existence of gravitational waves for more than 50 years. Then, in September 2015, came a “very interesting event” (as the cautious subject line in a physicist’s email read) that proved to be the first detection of gravitational waves. In <em>Gravity's Kiss,</em> Harry Collinsーwho has been following the science for decades and has written three previous books about itーoffers a final, fascinating account, written in real time, of the unfolding of one of the most remarkable scientific discoveries ever made.</p> <p>Predicted by Einstein in his theory of general relativity, gravitational waves carry energy from the collision or explosion of stars. Dying binary stars, for example, rotate faster and faster around each other until they merge, emitting a burst of gravitational waves. It is only with the development of extraordinarily sensitive, highly sophisticated detectors that physicists can now confirm Einstein's prediction. This is the story that Collins tells.</p> <p>Collins, a sociologist of science who has been embedded in the gravitational wave community since 1972, traces the detection, the analysis, the confirmation, and the public presentation and the reception of the discoveryーfrom the first email to the final published paper and the response of professionals and the public. Collins shows that science today is collaborative, far-flung (with the physical location of the participants hardly mattering), and sometimes secretive, but still one of the few institutions that has integrity built into it.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 2,695円

Network Traffic Anomaly Detection and Prevention Concepts, Techniques, and Tools【電子書籍】[ Monowar H. Bhuyan ]

楽天Kobo電子書籍ストア
<p>This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on how to design an intrusion detection technique and incorporate it into a system, as well as on how to analyze and correlate alerts without prior information.</p> <p>Topics and features: introduces the essentials of traffic management in high speed networks, detailing types of anomalies, network vulnerabilities, and a taxonomy of network attacks; describes a systematic approach to generating large network intrusion datasets, and reviews existing synthetic, benchmark, and real-life datasets; provides a detailed study of network anomaly detection techniques and systems under six different categories: statistical, classification, knowledge-base, cluster and outlier detection, soft computing, and combination learners; examines alert management and anomaly prevention techniques, including alert preprocessing, alert correlation, and alert post-processing; presents a hands-on approach to developing network traffic monitoring and analysis tools, together with a survey of existing tools; discusses various evaluation criteria and metrics, covering issues of accuracy, performance, completeness, timeliness, reliability, and quality; reviews open issues and challenges in network traffic anomaly detection and prevention.</p> <p>This informative work is ideal for graduate and advanced undergraduate students interested in network security and privacy, intrusion detection systems, and data mining in security. Researchers and practitioners specializing in network security will also find the book to be a useful reference.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 6,928円

Detection of Bacteria, Viruses, Parasites and Fungi Bioterrorism Prevention【電子書籍】

楽天Kobo電子書籍ストア
<p>This publication represents the result of the fruitful workshop organised with the aim to attract the attention on the possibility of bio terrorism attack, with the s- port of NATO funds. In the last years the attention was strongly concentrated on the terrorism view similar to “military type attacks:” bomb on the trains, kamikazes, airplanes etc. As consequence many devices studied are directed to prevent these attacks such as the control of the passengers before the flight. For the people terrorism is therefore equivalent to bomb or similar and nobody think that there is also other possible and sophisticated means that can be used by the terrorist. In 1995 Sarin gas in the Tokio subway killed 12 people and affected 5,000 persons. In the USA anthrax was sent by mail to many federal offices. These events and other cases attract the attention on these possible terrorist attacks and the first recommendations for preventing theses events were\elaborated in the United State and in Europe. The possible agents and the modality that can be used for the diffusion are analysed and food and water are considered the principal and more favourable way. The story and the principal decision about this were reported in the first article of this collection which introduces the concept of bio-terrorism.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 24,309円

Benzodiazepines and GHB Detection and Pharmacology【電子書籍】

楽天Kobo電子書籍ストア
<p>Prominent experts explain the pharmacology and metabolism of benzodiazepines (LDB) and g-hydroxybutyric acid (GHB) and offer powerful and effective methodologies that will enable better detection of these drugs in various body fluids, as well as in hair. The techniques include highly sensitive immunoassay detection of LDBs, the detection of Rohypnol? and other LDBs by mass spectrometry, and the ultrasensitive detection of GHB. State-of-the-art and highly practical, Benzodiazepines and GHB: Detection and Pharmacology offers toxicologists, forensic scientists, and clinical chemists today's most effective methods for detecting these widely abused drugs that are sometimes found associated with criminal acts.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 13,369円

Practical Machine Learning: A New Look at Anomaly Detection【電子書籍】[ Ted Dunning ]

楽天Kobo電子書籍ストア
<p><strong>Finding Data Anomalies You Didn't Know to Look For</strong></p> <p>Anomaly detection is the detective work of machine learning: finding the unusual, catching the fraud, discovering strange activity in large and complex datasets. But, unlike Sherlock Holmes, you may not know what the puzzle is, much less what “suspects” you’re looking for. This O’Reilly report uses practical examples to explain how the underlying concepts of anomaly detection work.</p> <p>From banking security to natural sciences, medicine, and marketing, anomaly detection has many useful applications in this age of big data. And the search for anomalies will intensify once the Internet of Things spawns even more new types of data. The concepts described in this report will help you tackle anomaly detection in your own project.</p> <ul> <li>Use probabilistic models to predict what’s normal and contrast that to what you observe</li> <li>Set an adaptive threshold to determine which data falls outside of the normal range, using the t-digest algorithm</li> <li>Establish normal fluctuations in complex systems and signals (such as an EKG) with a more adaptive probablistic model</li> <li>Use historical data to discover anomalies in sporadic event streams, such as web traffic</li> <li>Learn how to use deviations in expected behavior to trigger fraud alerts</li> </ul>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 1,716円

Fraud and Fraud Detection A Data Analytics Approach【電子書籍】[ Sunder Gee ]

楽天Kobo電子書籍ストア
<p><strong>Detect fraud fasterーno matter how well hiddenーwith IDEA automation</strong></p> <p><em>Fraud and Fraud Detection</em> takes an advanced approach to fraud management, providing step-by-step guidance on automating detection and forensics using CaseWare's IDEA software. The book begins by reviewing the major types of fraud, then details the specific computerized tests that can detect them. Readers will learn to use complex data analysis techniques, including automation scripts, allowing easier and more sensitive detection of anomalies that require further review. The companion website provides access to a demo version of IDEA, along with sample scripts that allow readers to immediately test the procedures from the book.</p> <p>Business systems' electronic databases have grown tremendously with the rise of big data, and will continue to increase at significant rates. Fraudulent transactions are easily hidden in these enormous datasets, but <em>Fraud and Fraud Detection</em> helps readers gain the data analytics skills that can bring these anomalies to light. Step-by-step instruction and practical advice provide the specific abilities that will enhance the audit and investigation process. Readers will learn to:</p> <ul> <li>Understand the different areas of fraud and their specific detection methods</li> <li>Identify anomalies and risk areas using computerized techniques</li> <li>Develop a step-by-step plan for detecting fraud through data analytics</li> <li>Utilize IDEA software to automate detection and identification procedures</li> </ul> <p>The delineation of detection techniques for each type of fraud makes this book a must-have for students and new fraud prevention professionals, and the step-by-step guidance to automation and complex analytics will prove useful for even experienced examiners. With datasets growing exponentially, increasing both the speed and sensitivity of detection helps fraud professionals stay ahead of the game. <em>Fraud and Fraud Detection</em> is a guide to more efficient, more effective fraud identification.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。 7,942円