|
801件中 1件 - 30件
1 2 3 4 5 6
商品 | 説明 | 価格 |

Learn OpenCV 4.5 with Python 3.7 by Examples Implement Computer Vision Algorithms Provided by OpenCV with Python for Image Processing, Object Detection and Machine Learning【電子書籍】[ James Chen ]
楽天Kobo電子書籍ストア
|
<p><strong>What This Book is About</strong></p> <p>When you searched for this book, you have already known the importance of the OpenCV/Python in the fields of computer vision, image processing and machine learning. This book begins with step-by-step instructions of installation as well as a simple Hello World, then gets into the OpenCV Basics, Image Processing, Object Detection and finally Machine Learning.</p> <p><strong>Key Features</strong></p> <p>Example for every topic, all the source codes are available in Github.</p> <p>Line by line explanation of the source codes.</p> <p>Focus mainly on implementation of algorithms, rather than mathematical theories.</p> <p><strong>Whom This Book Is For</strong></p> <p>This book is for people with a variety of computer programming levels, from those with very limited knowledge of computer vision to the experienced ones. The readers do not need to have previous experiences of Python/OpenCV. No matter you are a beginner or experienced programmer, as long as you want to learn OpenCV with Python, you will benefit from this book.</p> <p><strong>Table of Contents</strong></p> <p><strong>1. Introduction</strong></p> <ol> <li>What Is OpenCV</li> <li>Whom This Book Is For</li> <li>How to Get the Source Codes for This Book</li> <li>Hardware Requirements and Software Versions</li> <li>How This Book Is Organized</li> </ol> <p><strong>2. Installation</strong></p> <ol> <li>Install on Windows</li> <li>Install Python on Ubuntu</li> <li>Configure PyCharm and Install OpenCV</li> </ol> <p><strong>3. OpenCV Basics</strong></p> <ol> <li>Load and Display Images</li> <li>Load and Display Videos</li> <li>Display Webcam</li> <li>Play Youtube Video</li> <li>Image Fundamentals</li> <li>Draw Shapes</li> <li>Draw Texts</li> <li>Draw an OpenCV-like Icon</li> </ol> <p><strong>4. User Interaction</strong></p> <ol> <li>Mouse Operations</li> <li>Draw Circles with Mouse</li> <li>Draw Polygon with Mouse</li> <li>Crop an Image with Mouse</li> <li>Input Values with Trackbars</li> </ol> <p><strong>5. Image Processing</strong></p> <ol> <li>Change Color Spaces</li> <li>Resize, Crop and Rotate an Image</li> <li>Adjust Contrast and Brightness of an Image</li> <li>Adjust Hue, Saturation and Value</li> <li>Blend Image</li> <li>Bitwise Operation</li> <li>Warp Image</li> <li>Blur Image</li> <li>Histogram</li> </ol> <p><strong>6. Object Detection</strong></p> <ol> <li>Canny Edge Detection</li> <li>Dilation and Erosion</li> <li>Shape Detection</li> <li>Color Detection</li> <li>Text Recognition with Tesseract</li> <li>Human Detection</li> <li>Face and Eye Detection</li> <li>Remove Background</li> <li>Blur Background</li> </ol> <p><strong>7. Machine Learning</strong></p> <ol> <li>K-Means Clustering</li> <li>K-Nearest Neighbors</li> <li>Support Vector Machine</li> <li>Artificial Neural Network (ANN)</li> </ol> <p><strong>About the Author</strong></p> <p><strong>Index</strong></p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
2,280円
|

Bodies from the Library 2: Lost Tales of Mystery and Suspense from the Golden Age of Detection【電子書籍】[ Agatha Christie ]
楽天Kobo電子書籍ストア
|
<p>This anthology of rare stories of crime and suspense brings together 15 tales from the Golden Age of Detective Fiction for the first time in book form, including a newly discovered Gervase Fen novella by Edmund Crispin that has never previously been published.</p> <p>With the Golden Age of detective fiction shining ever more brightly thanks to the recent reappearance of many forgotten crime novels, Bodies from the Library offers a rare opportunity to read lost stories from the first half of the twentieth century by some of the genre’s most accomplished writers.</p> <p>This second volume is a showcase for popular figures of the Golden Age, in stories that even their most ardent fans will not be aware of. It includes uncollected and unpublished stories by acclaimed queens and kings of crime fiction, from Helen Simpson, Ethel Lina White, E.C.R. Lorac, Christianna Brand, Agatha Christie and Dorothy L. Sayers, to S.S. Van Dine, Jonathan Latimer, Clayton Rawson, Cyril Alington and Antony and Peter Shaffer (writing as Peter Antony).</p> <p>This book also features two highly readable radio scripts by Margery Allingham (involving Jack the Ripper) and John Rhode, plus two full-length novellas ? one from a rare magazine by Q Patrick, the other an unpublished Gervase Fen mystery by Edmund Crispin, written at the height of his career. It concludes with another remarkable discovery: ‘The Locked Room’ by Dorothy L. Sayers, a never-before-published case for Lord Peter Wimsey!</p> <p>Selected and introduced by Tony Medawar, who also provides fascinating pen portraits of each author, Bodies from the Library 2 is an indispensable collection for any bookshelf.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
1,714円
|

Early Detection and Early Intervention in Developmental Motor Disorders: From Neuroscience to Participation【電子書籍】
楽天Kobo電子書籍ストア
|
<p>The book aims to provide a comprehensive overview of assessments and interventions applied in young children with, or at high risk, for developmental motor disorders. It provides an evidence-based practical guide for health professionals working in the field of early detection and early intervention (e.g., paediatricians and paediatric physiotherapists). Parts I & II provide an overview of the clinical picture of early detection and early intervention and the neurodevelopmental mechanisms occurring in early life are discussed, including vulnerability and plasticity. In Parts III & IV basic principles and features governing typical and atypical motor development are explained, covering not only motor development but also sensory and cognitive development. Part V summarises the methods available for assessments, including information on technical details of the tools and psychometric properties. Finally, Part VI discusses early intervention, including evidence on effectiveness, together with the application of equipment in young children with developmental motor disorders. Special attention is paid to the family and environmental adaptations.</p> <p>? Summaries of key facts enable fast decisions at point of care</p> <p>? Tables provide quick overviews of applicability of assessment tools and summarize features of early intervention methods</p> <p>? Provides practical clinical strategies to improve care of children with or at risk of developmental motor disorders</p> <p>? Video-clips are included to illustrate typical and atypical movements</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
14,183円
|

"I Used to Be a Highbrow but Look at Me Now" Phrenology, Detection, and Cultural Hierarchy in S. S. Van Dine【電子書籍】[ Brooks E. Hefner ]
楽天Kobo電子書籍ストア
|
<p>This article reads Willard Huntington Wright's work against his anxieties about cultural hierarchy and value, utilizing archival work in Wright's papers at the University of Virginia and unearthing a previously unknown series of crime stories that he published under another pseudonym a decade before his success as bestselling detective novelist S. S. Van Dine. The author argues that Wright's work in popular fiction provides a special opportunity for interrogating the highbrow/lowbrow divide and its phrenological roots. This article originally appeared in <em>Clues: A Journal of Detection, Volume 30, Issue 1</em>.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
429円
|

X-Ray Physics (X-Ray and Radiology) Includes Fundamentals of X-Ray Physics, Basic Concepts of Matter, Energy, Electricity, Magnets, Electric Circuits, Generators, Motors, Magnetism, Tubes, Safety, Electrical Hazards, Detection, Measureme【電子書籍】
楽天Kobo電子書籍ストア
|
<p>X-Ray Physics</p> <p>X-rays were discovered as a result of investigations relating to electricity and magnetism. When these electrical and magnetic phenomena are properly utilized and controlled, x-rays can be produced. If an x-ray specialist is to function efficiently, they need a clear understanding of these factors. While you may be able to rely only on charts in routine work, unusual cases and situations will undoubtedly present themselves. When this happens, you will need to understand the principles involved. The purpose of this course is to acquaint you with those principles.</p> <p>One lesson of this course deals with basic concepts of atomic structure and energy. Another covers electricity, the general principles of electrical circuits, and various electrical devices. Another lesson covers x-ray machine circuits and the all-important x-ray tube. Knowledge of this material will enable the x-ray specialist to understand how these devices work together to produce and control x-rays so that good quality diagnostic radiographs will result. The final lesson discusses radiation safety for yourself and your patients.</p> <p>This course is part of our X-Ray and Radiology series.</p> <p>Includes a questions and answers section at the end of each lesson.</p> <p>Full illustrations and diagrams included.</p> <p>Lessons:</p> <p>- Matter and Energy<br /> - Electricity, Magnets, and Circuits<br /> - X-Ray Circuits and Tubes<br /> - X-Ray Safety</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
450円
|

Bodies from the Library: Lost Tales of Mystery and Suspense from the Golden Age of Detection【電子書籍】[ Agatha Christie ]
楽天Kobo電子書籍ストア
|
<p>This anthology of rare stories of crime and suspense brings together 16 tales by masters of the Golden Age of Detective Fiction for the first time in book form, including a newly discovered Agatha Christie crime story that has not been seen since 1922.</p> <p>At a time when crime and thriller writing has once again overtaken the sales of general and literary fiction, <em>Bodies from the Library</em> unearths lost stories from the Golden Age, that period between the World Wars when detective fiction captured the public’s imagination and saw the emergence of some of the world’s cleverest and most popular storytellers.</p> <p>This anthology brings together 16 forgotten tales that have either been published only once before ? perhaps in a newspaper or rare magazine ? or have never before appeared in print. From a previously unpublished 1917 script featuring Ernest Bramah’s blind detective Max Carrados, to early 1950s crime stories written for London’s Evening Standard by Cyril Hare, Freeman Wills Crofts and A.A. Milne, it spans five decades of writing by masters of the Golden Age.</p> <p>Most anticipated of all are the contributions by women writers: the first detective story by Georgette Heyer, unseen since 1923; an unpublished story by Christianna Brand, creator of Nanny McPhee; and a dark tale by Agatha Christie published only in an Australian journal in 1922 during her ‘Grand Tour’ of the British Empire.</p> <p>With other stories by Detection Club stalwarts Anthony Berkeley, H.C. Bailey, J.J. Connington, John Rhode and Nicholas Blake, plus Vincent Cornier, Leo Bruce, Roy Vickers and Arthur Upfield, this essential collection harks back to a time before forensic science ? when murder was a complex business.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
1,714円
|

The Android Malware Handbook Detection and Analysis by Human and Machine【電子書籍】[ Qian Han ]
楽天Kobo電子書籍ストア
|
<p><strong>Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android operating system.</strong></p> <p>This groundbreaking guide to Android malware distills years of research by machine learning experts in academia and members of Meta and Google’s Android Security teams into a comprehensive introduction to detecting common threats facing the Android eco-system today.</p> <p>Explore the history of Android malware in the wild since the operating system first launched and then practice static and dynamic approaches to analyzing real malware specimens. Next, examine machine learning techniques that can be used to detect malicious apps, the types of classification models that defenders can implement to achieve these detections, and the various malware features that can be used as input to these models. Adapt these machine learning strategies to the identifica-tion of malware categories like banking trojans, ransomware, and SMS fraud.</p> <p>You’ll:</p> <ul> <li>Dive deep into the source code of real malware</li> <li>Explore the static, dynamic, and complex features you can extract from malware for analysis</li> <li>Master the machine learning algorithms useful for malware detection</li> <li>Survey the efficacy of machine learning techniques at detecting common Android malware categories</li> </ul> <p><em>The Android Malware Handbook</em>’s team of expert authors will guide you through the Android threat landscape and prepare you for the next wave of malware to come.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
5,401円
|

Practical Cloud Native Security with Falco Risk and Threat Detection for Containers, Kubernetes, and Cloud【電子書籍】[ Loris Degioanni ]
楽天Kobo電子書籍ストア
|
<p>As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution. Protecting modern, cloud native applications from threats requires the ability to defend them at runtime, when they're most vulnerable to attacks.</p> <p>This practical guide introduces you to Falco, the open source standard for continuous risk and threat detection across Kubernetes, containers, and the cloud. Falco creator Loris Degioanni and core maintainer Leonardo Grasso bring you up to speed on threat detection and show you how to get Falco up and running, plus advanced topics such as deploying Falco in production and writing your own security rules.</p> <p>You'll learn how to:</p> <ul> <li>Leverage runtime security in cloud native environments</li> <li>Detect configuration changes and unexpected behavior in the cloud</li> <li>Protect containers, Kubernetes, and cloud applications using Falco</li> <li>Run, deploy, and customize Falco</li> <li>Deploy, configure, and maintain Falco in a production environment</li> <li>Improve your compliance</li> </ul>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
4,611円
|

Bodies from the Library 3: Lost Tales of Mystery and Suspense from the Golden Age of Detection【電子書籍】[ Agatha Christie ]
楽天Kobo電子書籍ストア
|
<p><strong>This anthology of rare stories of crime and suspense brings together 18 tales from the Golden Age of Detective Fiction for the first time in book form, including uncollected stories by Ngaio Marsh and John Dickson Carr.</strong></p> <p>The Golden Age of detective fiction had begun inauspiciously with the publication of E.C. Bentley’s schismatic <em>Trent’s Last Case</em> in 1913, but it hit its stride in 1920 when both Agatha Christie and Freeman Wills Crofts ? latterly crowned queen and king of the genre ? had crime novels published for the first time. They ushered in two decades of exemplary mystery writing, the era of the whodunit, the impossible crime and the locked-room mystery, with stories that have thrilled and baffled generations of readers.</p> <p>This new volume in the <em>Bodies from the Library</em> series features the work of 18 prolific authors who, like Christie and Crofts, saw their popularity soar during the Golden Age. Aside from novels, they all wrote short fiction ? stories, serials and plays ? and although most of them have been collected in books over the last 100 years, here are the ones that got away…</p> <p>In this book you will encounter classic series detectives including Colonel Gore, Roger Sheringham, Hildegarde Withers and Henri Bencolin; Hercule Poirot solves ‘The Incident of the Dog’s Ball’; Roderick Alleyn returns to New Zealand in a recently discovered television drama by Ngaio Marsh; and Dorothy L. Sayers’ chilling ‘The House of the Poplars’ is published for the first time.</p> <p>With a full-length novella by John Dickson Carr and an unpublished radio script by Cyril Hare, this diverse collection concludes with some early ‘flash fiction’ commissioned by Collins’ Crime Club in 1938. Each mini story had to feature an orange, resulting in six very different tales from Peter Cheyney, Ethel Lina White, David Hume, Nicholas Blake, John Rhode and ? in his only foray into writing detective fiction ? the publisher himself, William Collins.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
1,825円
|

Bodies from the Library 4: Lost Tales of Mystery and Suspense from the Golden Age of Detection【電子書籍】[ Ngaio Marsh ]
楽天Kobo電子書籍ストア
|
<p><strong>This annual anthology of rare stories of crime and suspense brings together tales from the Golden Age of Detective Fiction for the first time in book form, including a short novel by Christianna Brand.</strong></p> <p>Mystery stories have been around for centuriesーthere are whodunits, whydunits and howdunits, including locked-room puzzles, detective stories without detectives, and crimes with a limited choice of suspects.</p> <p>Countless volumes of such stories have been published, but some are still impossible to find: stories that appeared in a newspaper, magazine or an anthology that has long been out of print; ephemeral works such as plays not aired, staged or screened for decades; and unpublished stories that were absorbed into an author’s archive when they died . . .</p> <p>Here for the first time are three never-before-published mysteries by Edmund Crispin, Ngaio Marsh and Leo Bruce, and two pieces written for radio by Gladys Mitchell and H. C. Baileyーthe latter featuring Reggie Fortune.</p> <p>Together with a newly unearthed short story by Ethel Lina White that inspired Hitchcock’s <em>The Lady Vanishes</em>, and a complete short novel by Christianna Brand, this diverse mix of tales by some of the world’s most popular classic crime writers contains something for everyone.</p> <p>Complete with indispensable biographies by Tony Medawar of all the featured authors, the fourth volume in the series <em>Bodies from the Library</em> once again brings into the daylight the forgotten, the lost and the unknown.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
1,825円
|

Advanced Deep Learning with TensorFlow 2 and Keras Apply DL, GANs, VAEs, deep RL, unsupervised learning, object detection and segmentation, and more, 2nd Edition【電子書籍】[ Rowel Atienza ]
楽天Kobo電子書籍ストア
|
<p><strong>Updated and revised second edition of the bestselling guide to advanced deep learning with TensorFlow 2 and Keras</strong></p> <h4>Key Features</h4> <ul> <li>Explore the most advanced deep learning techniques that drive modern AI results</li> <li>New coverage of unsupervised deep learning using mutual information, object detection, and semantic segmentation</li> <li>Completely updated for TensorFlow 2.x</li> </ul> <h4>Book Description</h4> <p>Advanced Deep Learning with TensorFlow 2 and Keras, Second Edition is a completely updated edition of the bestselling guide to the advanced deep learning techniques available today. Revised for TensorFlow 2.x, this edition introduces you to the practical side of deep learning with new chapters on unsupervised learning using mutual information, object detection (SSD), and semantic segmentation (FCN and PSPNet), further allowing you to create your own cutting-edge AI projects.</p> <p>Using Keras as an open-source deep learning library, the book features hands-on projects that show you how to create more effective AI with the most up-to-date techniques.</p> <p>Starting with an overview of multi-layer perceptrons (MLPs), convolutional neural networks (CNNs), and recurrent neural networks (RNNs), the book then introduces more cutting-edge techniques as you explore deep neural network architectures, including ResNet and DenseNet, and how to create autoencoders. You will then learn about GANs, and how they can unlock new levels of AI performance.</p> <p>Next, you'll discover how a variational autoencoder (VAE) is implemented, and how GANs and VAEs have the generative power to synthesize data that can be extremely convincing to humans. You'll also learn to implement DRL such as Deep Q-Learning and Policy Gradient Methods, which are critical to many modern results in AI.</p> <h4>What you will learn</h4> <ul> <li>Use mutual information maximization techniques to perform unsupervised learning</li> <li>Use segmentation to identify the pixel-wise class of each object in an image</li> <li>Identify both the bounding box and class of objects in an image using object detection</li> <li>Learn the building blocks for advanced techniques - MLPss, CNN, and RNNs</li> <li>Understand deep neural networks - including ResNet and DenseNet</li> <li>Understand and build autoregressive models ? autoencoders, VAEs, and GANs</li> <li>Discover and implement deep reinforcement learning methods</li> </ul> <h4>Who this book is for</h4> <p>This is not an introductory book, so fluency with Python is required. The reader should also be familiar with some machine learning approaches, and practical experience with DL will also be helpful. Knowledge of Keras or TensorFlow 2.0 is not required but is recommended.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
4,160円
|

Bodies from the Library 5: Forgotten Stories of Mystery and Suspense from the Golden Age of Detection【電子書籍】
楽天Kobo電子書籍ストア
|
<p><strong>Classic crime fiction's 'Indiana Jones' Tony Medawar unearths more unpublished and uncollected stories from the Golden Age of suspense, including John Bude, John Dickson Carr, Dorothy L. Sayers and Julian Symons.</strong></p> <p><strong>‘Five books in, and the selection here might well be the strongest yet. This series continues to delight with the high standard of forgotten gems that Medawar uncovers, and there’s sufficient range to ensure that all fans of the genre will find something to enjoy. Book 6 can’t come soon enough.’</strong><br /> <strong>Jim Noy, author of <em>The Red Death Murders</em></strong></p> <p>The end of the First World War saw the rise of an insatiable public appetite for clever and thrilling mystery fiction and a new kind of hero ? the modern crime writer. As the genre soared in popularity, so did the inventiveness of its best authors, ushering in a “Golden Age” of detective fiction ? two decades of exemplary mystery writing: the era of the whodunit, the impossible crime and the locked-room mystery, with stories that have thrilled and baffled generations of readers.</p> <p>The Golden Age still casts a long shadow, with many of the authors who were published at that time still hugely popular today. Aside from novels, they all wrote short fiction ? stories, serials and plays ? and although many have been republished in books over the last 100 years, <em>Bodies from the Library</em> collects the ones that are impossible to find: stories that appeared in a newspaper, magazine or an anthology that has long been out of print; ephemeral works such as plays not aired, staged or screened for decades; and unpublished stories that were absorbed into an author’s archive when they died . . .</p> <p>Complete with fascinating biographies by Tony Medawar of all the featured authors, this latest volume in the annual <em>Bodies from the Library</em> series once again brings into the daylight the forgotten, the lost and the unknown, and is an indispensable collection for any bookshelf.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
2,105円
|

Evading Edr: The Definitive Guide to Defeating Endpoint Detection Systems. EVADING EDR [ Matt Hand ]
楽天ブックス
|
EVADING EDR Matt Hand NO STARCH PR2023 Paperback English ISBN:9781718503342 洋書 Computers & Science(コンピューター&科学) Computers
|
9,504円
|

Evading EDR The Definitive Guide to Defeating Endpoint Detection Systems.【電子書籍】[ Matt Hand ]
楽天Kobo電子書籍ストア
|
<p><strong>EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the attack-detection software running on Microsoft systemsーand how to evade it.</strong></p> <p>Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how these systems actually work. This book demystifies EDR, taking you on a deep dive into how EDRs detect adversary activity. Chapter by chapter, you’ll learn that EDR is not a magical black boxーit’s just a complex software application built around a few easy-to-understand components.</p> <p>The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
6,482円
|

Intrusion Detection Honeypots【電子書籍】[ Chris Sanders ]
楽天Kobo電子書籍ストア
|
<p>When an attacker breaks into your network, you have a home-field advantage. But how do you use it?</p> <p><em>Intrusion Detection Honeypots</em> is the foundational guide to building, deploying, and monitoring honeypots -- security resources whose value lies in being probed and attacked. These fake systems, services, and tokens lure attackers in, enticing them to interact. Unbeknownst to the attacker, those interactions generate logs that alert you to their presence and educate you about their tradecraft.</p> <p><em>Intrusion Detection Honeypots</em> teaches you how to:</p> <ul> <li>Use the See-Think-Do framework to integrate honeypots into your network and lure attackers into your traps.</li> <li>Leverage honey services that mimic HTTP, SSH, and RDP.</li> <li>Hide honey tokens amongst legitimate documents, files, and folders.</li> <li>Entice attackers to use fake credentials that give them away.</li> <li>Create honey commands, honey tables, honey broadcasts, and other unique detection tools that leverage deception</li> <li>Monitor honeypots for interaction and investigate the logs they generate</li> </ul> <p>With the techniques in this book, you can safely use honeypots inside your network to detect adversaries before they accomplish their goals.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
5,739円
|

Against Heresies On the Detection and Overthrow of the So-Called Gnosis【電子書籍】[ Irenaeus ]
楽天Kobo電子書籍ストア
|
<p>In his seminal work, 'Against Heresies,' Irenaeus combats various Gnostic beliefs that threatened early Christian doctrine in the second century. This text is a cornerstone of patristic literature, characterized by its rhetorical vigor and systematic approach. Irenaeus employs a dialectical style, engaging in careful analysis and refutation of heretical teachings, while reaffirming the legitimacy of apostolic tradition and the unity of God. His intricate arguments are enriched by scriptural references and historical insights, reflecting the turbulent theological debates of the time. Irenaeus of Lyons, a prominent church father, was deeply influenced by his early experiences as a disciple of Polycarp, a student of the Apostle John. This lineage greatly informed Irenaeus's theological framework and commitment to orthodoxy. He wrote 'Against Heresies' not only to clarify Christian beliefs but also to guide a community beset by competing ideologies, aiming to strengthen the faith of believers amid growing uncertainties. 'Against Heresies' is essential reading for those interested in early Christianity, theology, and the development of heresiology. It serves as a critical text for understanding the formation of Christian doctrine and the early church's struggle against divergent beliefs. Scholars and lay readers alike will find Irenaeus's arguments both illuminating and foundational for contemporary theological discussions.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
318円
|

AI for Disease Surveillance and Pandemic Intelligence Intelligent Disease Detection in Action【電子書籍】
楽天Kobo電子書籍ストア
|
<p>This book aims to highlight the latest achievements in the use of artificial intelligence for digital disease surveillance, pandemic intelligence, as well as public and clinical health surveillance. The edited book contains selected papers presented at the 2021 Health Intelligence workshop, co-located with the Association for the Advancement of Artificial Intelligence (AAAI) annual conference, and presents an overview of the issues, challenges, and potentials in the field, along with new research results. While disease surveillance has always been a crucial process, the recent global health crisis caused by COVID-19 has once again highlighted our dependence on intelligent surveillance infrastructures that provide support for making sound and timely decisions. This book provides information for researchers, students, industry professionals, and public health agencies interested in the applications of AI in population health and personalized medicine.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
19,447円
|

Nanomaterials for Cancer Detection Using Imaging Techniques and Their Clinical Applications【電子書籍】
楽天Kobo電子書籍ストア
|
<p>This book presents nanomaterials for cancer detection using a variety of state-of-the-art imaging techniques. Clinical applications are also highlighted. The unique size-dependent properties and convenient surfaces for molecular assembly make these nanomaterials essential for a variety of innovative imaging techniques. This book covers important imaging modalities, synthesis of nanoparticles with specific functional properties, and clinical applications including the development of anticancer drugs. The information presented here involves contributions from chemistry, materials science, materials characterization, cell engineering, and clinical testing.</p> <p>The book will be essential reading to experienced clinicians as well as a wide range of scholars and researchers interested in nanotechnology and imaging techniques for cancer detection.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
24,309円
|

Terahertz Wave Detection and Imaging with a Hot Rydberg Vapour【電子書籍】[ Christopher G. Wade ]
楽天Kobo電子書籍ストア
|
<p>This book details groundbreaking experiments for the sensing and imaging of terahertz-frequency electromagnetic radiation (THz) using Rydberg atoms. The major advances described include the development and implementation of a new technique for THz imaging using atomic fluorescence; the demonstration of a THz-driven phase transition in room-temperature atomic vapour; and a novel method for probing the excited-state dynamics of atoms using quantum beats. The work has formed the basis for several articles published in journals including Nature Photonics and the Physical Review, and has sparked industry interest, becoming the subject of ongoing collaborative research and development. This exceptionally well-written book provides a definitive account of terahertz sensing with Rydberg atoms.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
12,154円
|

Detection and Estimation Research of High-speed Railway Catenary【電子書籍】[ Zhigang Liu ]
楽天Kobo電子書籍ストア
|
<p>This book describes the wave characteristics of contact lines taking wind into consideration and discusses new methods for detecting catenary geometry, pantograph slide fault, and catenary support system faults. It also introduces wire-irregularity detection methods for catenary estimation, and discusses modern spectrum estimation tools for catenary.</p> <p>It is organized in three parts: the first discusses statistical characteristics of pantograph-catenary data, such as stationarity, periodicity, correlation, high-order statistical properties and wave characteristics of contact lines, which are the basis of pantograph-catenary relationship analysis. The second part includes geometry parameter detection and support-system fault detection in catenary, as well as slide-fault detection in pantographs, and presents some new detection algorithms and plans. The final part addresses catenary estimation, including detection of contact-line wire irregularities and estimation of catenary based on spectrum, and presents detection methods for contact-line irregularity and modern spectrum estimation tools for catenary.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
12,154円
|

Implementation of Personalized Precision Medicine Expanding the Clinical Vision towards Prevention, Early Detection and Precision Treatment of Disease to Drive Extended Healthspan【電子書籍】
楽天Kobo電子書籍ストア
|
<p><em>Implementation of Personalized Precision Medicine: Expanding the Clinical Vision towards Prevention, Early Detection, and Precision Treatment of Disease to Drive Extended Healthspan</em> establishes the landscape of precision medicine as it stands in relation to implementation of individualized approaches based on the patient’s unique genomic and biochemical make-up to facilitate prevention, early detection and personalized interventions. This reference details how these lofty goals are now achievable with the science of today (and tomorrow) and provides the context and blueprint allowing researchers and clinicians to avoid, and more effectively treat, complex chronic disease.At the heart of precision medicine lies one concept that has been missing from modern medicine?the unique genetic and biochemical make-up of each individual patient. Uniquely organized, this reference reflects this concept and provides insights into patient constitution, genetic inherited risk, current epigenetic modifications, and current biochemical state, making this reference valuable to researchers and science-minded providers who modified, reverse or prevent disease progression.</p> <ul> <li>Explores the expanding paradigm of Precision Medicine application highlighting full personalization in precision medicine.</li> <li>Explores the gap between precision medicine implementation and medical policy, showing the integration and implementation of technologies in primary care for chronic disease.</li> <li>Provides fresh viewpoints and perspectives for researchers and science-minded providers on the forefront of implementation, to be informed of the best available tools and approaches for each individual patient.</li> </ul>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
19,192円
|

Preparation, Conduct and Evaluation of Exercises for Detection of and Response to Acts Involving Nuclear and Other Radioactive Material out of Regulatory Control【電子書籍】[ IAEA ]
楽天Kobo電子書籍ストア
|
<p>This publication presents detailed concepts and procedures for the preparation, conduct and evaluation of exercises to test relevant nuclear security systems and measures, and provides useful templates and checklists that can be used to assist the exercise development process. The technical guidance provided is targeted at States and their competent authorities to assist them in establishing and sustaining an effective infrastructure to strengthen detection of and response to material out of regulatory control and evaluate the effectiveness of their plans by presenting a structured methodology for the consistent development of exercises.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
3,078円
|

洋書 Little, Brown Spark Paperback, The Autism Book: What Every Parent Needs to Know About Early Detection, Treatment, , and Prevention (Sears Parenting Library)
Glomarket
|
*** We ship internationally, so do not use a package forwarding service. We cannot ship to a package forwarding company address because of the Japanese customs regulation. If it is shipped and customs office does not let the package go, we do not make a refund. 【注意事項】 *** 特に注意してください。 *** ・個人ではない法人・団体名義での購入はできません。この場合税関で滅却されてもお客様負担になりますので御了承願います。 ・お名前にカタカナが入っている場合法人である可能性が高いため当店システムから自動保留します。カタカナで記載が必要な場合はカタカナ変わりローマ字で記載してください。 ・お名前またはご住所が法人・団体名義(XX株式会社等)、商店名などを含めている場合、または電話番号が個人のものではない場合、税関から法人名義でみなされますのでご注意ください。 ・転送サービス会社への発送もできません。この場合税関で滅却されてもお客様負担になりますので御了承願います。 *** ・注文後品切れや価格変動でキャンセルされる場合がございますので予めご了承願います。 ・当店でご購入された商品は、原則として、「個人輸入」としての取り扱いになり、すべてニュージャージからお客様のもとへ直送されます。 ・ご注文後、30営業日以内(通常2~3週間)に配送手続きをいたします。配送作業完了後、2週間程度でのお届けとなります。 ・まれに商品入荷状況や国際情勢、運送、通関事情により、お届けが2ヶ月までかかる場合がありますのでお急ぎの場合は注文をお控えください。 ・個人輸入される商品は、すべてご注文者自身の「個人使用・個人消費」が前提となりますので、ご注文された商品を第三者へ譲渡・転売することは法律で禁止されております。 ・関税・消費税が課税される場合があります。詳細はこちらをご確認下さい。PC販売説明文
|
6,594円
|

Endpoint Detection And Response A Complete Guide - 2020 Edition【電子書籍】[ Gerardus Blokdyk ]
楽天Kobo電子書籍ストア
|
<p>Has a vulnerability analysis and resolution strategy been developed? What is the average time to detect a security breach across incident types? What does it take to become a cyber security superhero? Is the threat intelligence validated? Do you have a response plan for cyberattacks in place at your organization?</p> <p>Defining, designing, creating, and implementing a process to solve a challenge or meet an objective is the most valuable role… In EVERY group, company, organization and department.</p> <p>Unless you are talking a one-time, single-use project, there should be a process. Whether that process is managed and implemented by humans, AI, or a combination of the two, it needs to be designed by someone with a complex enough perspective to ask the right questions. Someone capable of asking the right questions and step back and say, 'What are we really trying to accomplish here? And is there a different way to look at it?'</p> <p>This Self-Assessment empowers people to do just that - whether their title is entrepreneur, manager, consultant, (Vice-)President, CxO etc... - they are the people who rule the future. They are the person who asks the right questions to make Endpoint Detection And Response investments work better.</p> <p>This Endpoint Detection And Response All-Inclusive Self-Assessment enables You to be that person.</p> <p>All the tools you need to an in-depth Endpoint Detection And Response Self-Assessment. Featuring 2202 new and updated case-based questions, organized into seven core areas of process design, this Self-Assessment will help you identify areas in which Endpoint Detection And Response improvements can be made.</p> <p>In using the questions you will be better able to:</p> <p>- diagnose Endpoint Detection And Response projects, initiatives, organizations, businesses and processes using accepted diagnostic standards and practices</p> <p>- implement evidence-based best practice strategies aligned with overall goals</p> <p>- integrate recent advances in Endpoint Detection And Response and process design strategies into practice according to best practice guidelines</p> <p>Using a Self-Assessment tool known as the Endpoint Detection And Response Scorecard, you will develop a clear picture of which Endpoint Detection And Response areas need attention.</p> <p>Your purchase includes access details to the Endpoint Detection And Response self-assessment dashboard download which gives you your dynamically prioritized projects-ready tool and shows your organization exactly what to do next. You will receive the following contents with New and Updated specific criteria:</p> <p>- The latest quick edition of the book in PDF</p> <p>- The latest complete edition of the book in PDF, which criteria correspond to the criteria in...</p> <p>- The Self-Assessment Excel Dashboard</p> <p>- Example pre-filled Self-Assessment Excel Dashboard to get familiar with results generation</p> <p>- In-depth and specific Endpoint Detection And Response Checklists</p> <p>- Project management checklists and templates to assist with implementation</p> <p>INCLUDES LIFETIME SELF ASSESSMENT UPDATES</p> <p>Every self assessment comes with Lifetime Updates and Lifetime Free Updated Books. Lifetime Updates is an industry-first feature which allows you to receive verified self assessment updates, ensuring you always have the most accurate information at your fingertips.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
6,818円
|

Microbial Plant Pathogens-Detection and Disease Diagnosis: Viral and Viroid Pathogens, Vol.3【電子書籍】[ P. Narayanasamy ]
楽天Kobo電子書籍ストア
|
<p>The need for the development of techniques based on the characteristics of the viral proteins and genomic nucleic acids was realized in order to detect, identify, differentiate and quantify viruses in the infected plants/planting materials with or without symptoms of infection. Immunoassays have been successfully applied for the detection of viruses in crop and weed host plant species as well as in the vectors. Nucleic acid-based techniques have been demonstrated to be the most reliable and sensitive tests for detection, identification and differentiation of viruses and viroids present in plants and planting materials.. Inclusion of numerous protocols in appropriate chapters as appendix is a unique feature of this volume.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
18,231円
|

Marginal Space Learning for Medical Image Analysis Efficient Detection and Segmentation of Anatomical Structures【電子書籍】[ Dorin Comaniciu ]
楽天Kobo電子書籍ストア
|
<p>Automatic detection and segmentation of anatomical structures in medical images are prerequisites to subsequent image measurements and disease quantification, and therefore have multiple clinical applications. This book presents an efficient object detection and segmentation framework, called Marginal Space Learning, which runs at a sub-second speed on a current desktop computer, faster than the state-of-the-art. Trained with a sufficient number of data sets, Marginal Space Learning is also robust under imaging artifacts, noise and anatomical variations. The book showcases 35 clinical applications of Marginal Space Learning and its extensions to detecting and segmenting various anatomical structures, such as the heart, liver, lymph nodes and prostate in major medical imaging modalities (CT, MRI, X-Ray and Ultrasound), demonstrating its efficiency and robustness.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
6,076円
|

Breast Cancer: Origins, Detection, and Treatment Proceedings of the International Breast Cancer Research Conference London, United Kingdom ー March 24?28, 1985【電子書籍】
楽天Kobo電子書籍ストア
|
<p>The control of breast cancer, a leading cause of cancer death in women, will depend ultimately on our understanding of the disease--its origin, and progression which in turn will permit the effective management of its treatment, its detection, and perhaps even its prevention. It is for a better understanding of this spectrum of biological processes crossing back and forth across scientific and clinical disciplines that this volume strives. Several broad topics have been addressed in organizing a large mass of work representing state of the art updates from many of the major breast cancer research groups around the world. The chapters in the first section speak to the factors affecting the growth and development of normal and malignant mammary epithelium. Special emphasis is placed on insights drawn from developmental biology, the cellular interactions that occur in the mammary gland during growth and differentiation; and the study of hormones and growth factors in the regulation of growth and differentiation of normal and malignant breast tissues. In the section on the biology of breast cancer, there is a characterization of relevant model systems for the study of breast cancer and their contribution to our understanding of preneoplasia and progression in mammary cancer. Included as well is the current status of major studies on the immunological aspects of breast cancer and the latest efforts in the development of markers for metastasis in breast cancer.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
12,154円
|

Analyzing Mathematical Patterns ー Detection & Formulation Inductive Approach to Recognition, Analysis and Formulations of Patterns【電子書籍】[ Michael A Radin ]
楽天Kobo電子書籍ストア
|
<p>The book's objectives are to expose students to analyzing and formulating various patterns such as linear, quadratic, geometric, piecewise, alternating, summation-type, product-type, recursive and periodic patterns. The book will present various patterns graphically and analytically and show the connections between them. Graphical presentations include patterns at same scale, patterns at diminishing scale and alternating patterns.</p> <p>The book's goals are to train and expand students' analytical skills by presenting numerous repetitive-type problems that will lead to formulating results inductively and to the proof by induction method. These will start with formulating basic sequences and piecewise functions and transition to properties of Pascal's Triangle that are horizontally and diagonally oriented and formulating solutions to recursive sequences. The book will start with relatively straight forward problems and gradually transition to more challenging problems and open-ended research questions.</p> <p>The book's aims are to prepare students to establish a base of recognition and formulation of patterns that will navigate to study further mathematics such as Calculus, Discrete Mathematics, Matrix Algebra, Abstract Algebra, Difference Equations, and to potential research projects. The primary aims out of all are to make mathematics accessible and multidisciplinary for students with different backgrounds and from various disciplines.</p> <p><strong>Contents:</strong></p> <ul> <li> <p><em><strong>Introduction to Patterns:</strong></em></p> <ul> <li>Geometrical Arrangements</li> <li>Piecewise Functions</li> <li>Analytical Formulations</li> <li>Recursive Sequences</li> <li>Piece-wise Sequences</li> <li>Periodic Cycles</li> <li>Exercises</li> </ul> </li> <li> <p><em><strong>Geometrical Configurations:</strong></em></p> <ul> <li>Patterns at Same Scale</li> <li>Patterns at Different Scales</li> <li>Alternating and Piecewise Patterns</li> <li>Summation of Areas</li> <li>Exercises</li> </ul> </li> <li> <p><em><strong>Sequences, Products and Summations:</strong></em></p> <ul> <li>Linear Sequences</li> <li>Quadratic Sequences</li> <li>Summation?Type Sequences</li> <li>Geometric Sequences</li> <li>Product?Type Sequences</li> <li>Alternating and Piecewise Sequences</li> <li>Exercises</li> </ul> </li> <li> <p><em><strong>Summations and Proof by Induction:</strong></em></p> <ul> <li>Linear and Geometric Summations</li> <li>Proof by Induction</li> <li>Exercises</li> </ul> </li> <li> <p><em><strong>Traits of Pascal's Triangle:</strong></em></p> <ul> <li>Horizontal Identities</li> <li>Diagonal Identities</li> <li>Binomial Expansion</li> <li>Exercises</li> </ul> </li> <li> <p><em><strong>Recursive Relations:</strong></em></p> <ul> <li>Formulating a Recursive Relation</li> <li>Obtaining an Explicit Solution</li> <li>Non-Autonomous Recursive Sequences</li> <li>Exercises</li> </ul> </li> <li> <p><em><strong>Periodic Traits:</strong></em></p> <ul> <li>Autonomous Recursive Sequences</li> <li>Multiplicative Formof Eq. (7.1)</li> <li>Additive Form of Eq. (7.1)</li> <li>Additive and Multiplicative Forms of Eq. (7.1)</li> <li>Special Case of Eq. (7.1)</li> <li>Exercises</li> </ul> </li> <li> <p><em><strong>Answers to Chapter Exercises:</strong></em></p> <ul> <li>Answers to Chapter 1 Exercises</li> <li>Answers to Chapter 2 Exercises</li> <li>Answers to Chapter 3 Exercises</li> <li>Answers to Chapter 4 Exercises</li> <li>Answers to Chapter 5 Exercises</li> <li>Answers to Chapter 6 Exercises</li> <li>Answers to Chapter 7 Exercises</li> </ul> </li> <li> <p><em><strong>Appendices:</strong></em></p> <ul> <li>Right Triangles</li> <li>Isosceles Triangle</li> <li>Equilateral Triangle</li> <li>Area of Figures</li> <li>Patterns (Sequences)</li> <li>Alternating Patterns (Sequences)</li> <li>Summation Properties</li> <li>Finite Summations</li> <li>Laws of Exponents</li> <li>Factoring Methods</li> <li>Binomial Expansion</li> </ul> </li> </ul> <p><strong>Readership:</strong> High school and undergraduate levels in mathematics for Non-STEM disciplines, Pattern Recognition, Discrete Mathematics, Difference Equations.<br /> <strong>Key Features:</strong></p> <ul> <li>The book provides several repetitive-type guided examples that navigate to deeper fundamentals and to solving more challenging problems</li> <li>These practice problems lead to formulating patterns, to inductive reasoning and to proof by induction</li> <li>The book introduces the inductive approach to grasp the concepts</li> <li>The book presents each concept graphically and analytically and the connection between the two methods</li> <li>The book also emphasizes the similarities and contrasts between assorted patterns and widens the readers' analytical skills and welcomes them to unfold more mathematical essences</li> </ul>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
6,602円
|

SCADA Security Machine Learning Concepts for Intrusion Detection and Prevention【電子書籍】[ Abdulmohsen Almalawi ]
楽天Kobo電子書籍ストア
|
<p><strong>Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems</strong></p> <p>Cyber-attacks on SCADA systems-the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory management-can lead to costly financial consequences or even result in loss of life. Minimizing potential risks and responding to malicious actions requires innovative approaches for monitoring SCADA systems and protecting them from targeted attacks. <em>SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention</em> is designed to help security and networking professionals develop and deploy accurate and effective Intrusion Detection Systems (IDS) for SCADA systems that leverage autonomous machine learning.</p> <p>Providing expert insights, practical advice, and up-to-date coverage of developments in SCADA security, this authoritative guide presents a new approach for efficient unsupervised IDS driven by SCADA-specific data. Organized into eight in-depth chapters, the text first discusses how traditional IT attacks can also be possible against SCADA, and describes essential SCADA concepts, systems, architectures, and main components. Following chapters introduce various SCADA security frameworks and approaches, including evaluating security with virtualization-based SCADAVT, using SDAD to extract proximity-based detection, finding a global and efficient anomaly threshold with GATUD, and more. This important book:</p> <ul> <li>Provides diverse perspectives on establishing an efficient IDS approach that can be implemented in SCADA systems</li> <li>Describes the relationship between main components and three generations of SCADA systems</li> <li>Explains the classification of a SCADA IDS based on its architecture and implementation</li> <li>Surveys the current literature in the field and suggests possible directions for future research</li> </ul> <p><em>SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention</em> is a must-read for all SCADA security and networking researchers, engineers, system architects, developers, managers, lecturers, and other SCADA security industry practitioners.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
15,295円
|

Endpoint Detection And Response A Complete Guide - 2021 Edition【電子書籍】[ Gerardus Blokdyk ]
楽天Kobo電子書籍ストア
|
<p>Do the technologies also give you the ability to swiftly contain and respond to threats?</p> <p>Do you report progress to your management and hold system and business owners accountable?</p> <p>Does the provider have integrated automated response for known threats available via APIs?</p> <p>Have you ever been kept awake at night worrying about your organizations cybersecurity?</p> <p>How successful do you consider your organization at overall endpoint / systems management?</p> <p>Is there a preference of manufacturer for the Anti-Virus & Endpoint Protection software?</p> <p>What activities are most important to achieving the objectives of your organizations SOC?</p> <p>What investments have you made in Response Technology, Human Expertise, and Intelligence?</p> <p>What type of technology does your organization currently invest in for endpoint security?</p> <p>What types of attacks do you believe your organization is most likely to be targeted by?</p> <p><strong>This Endpoint Detection And Response Guide is unlike books you're used to. If you're looking for a textbook, this might not be for you. This book and its <em>included digital components</em> is for you who understands the importance of asking great questions. This gives you the questions to uncover the Endpoint Detection And Response challenges you're facing and generate better solutions to solve those problems.</strong></p> <p>Defining, designing, creating, and implementing a process to solve a challenge or meet an objective is the most valuable role… In EVERY group, company, organization and department.</p> <p>Unless you're talking a one-time, single-use project, there should be a process. That process needs to be designed by someone with a complex enough perspective to ask the right questions. Someone capable of asking the right questions and step back and say, 'What are we really trying to accomplish here? And is there a different way to look at it?'</p> <p>This Self-Assessment empowers people to do just that - whether their title is entrepreneur, manager, consultant, (Vice-)President, CxO etc... - they are the people who rule the future. They are the person who asks the right questions to make Endpoint Detection And Response investments work better.</p> <p>This Endpoint Detection And Response All-Inclusive Self-Assessment enables You to be that person.</p> <p>INCLUDES all the tools you need to an in-depth Endpoint Detection And Response Self-Assessment. Featuring new and updated case-based questions, organized into seven core levels of Endpoint Detection And Response maturity, this Self-Assessment will help you identify areas in which Endpoint Detection And Response improvements can be made.</p> <p><strong>In using the questions you will be better able to:</strong></p> <p><strong>Diagnose Endpoint Detection And Response projects, initiatives, organizations, businesses and processes using accepted diagnostic standards and practices.</strong></p> <p><strong>Implement evidence-based best practice strategies aligned with overall goals.</strong></p> <p><strong>Integrate recent advances in Endpoint Detection And Response and process design strategies into practice according to best practice guidelines.</strong></p> <p>Using the Self-Assessment tool gives you the Endpoint Detection And Response Scorecard, enabling you to develop a clear picture of which Endpoint Detection And Response areas need attention.</p> <p>Your purchase includes access to the <strong>Endpoint Detection And Response self-assessment digital components</strong> which gives you your dynamically prioritized projects-ready tool that enables you to define, show and lead your organization exactly with what's important.</p>画面が切り替わりますので、しばらくお待ち下さい。 ※ご購入は、楽天kobo商品ページからお願いします。※切り替わらない場合は、こちら をクリックして下さい。 ※このページからは注文できません。
|
6,818円
|
|