Book picks similar to
Artificial Intelligence and Intelligent Systems by N.P. Padhy
ai
artificial-intelligence
np-padhy
oug-parklane-white
CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide
Darril Gibson - 2014
The SY0-301 version covers every aspect of the SY0-301 exam, and includes the same elements readers raved about in the previous version. Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. The author uses many of the same analogies and explanations he’s honed in the classroom that have helped hundreds of students master the Security+ content. You’ll understand the important and relevant security topics for the Security+ exam, without being overloaded with unnecessary details. Additionally, each chapter includes a comprehensive review section to help you focus on what’s important. Over 400 realistic practice test questions with in-depth explanations will help you test your comprehension and readiness for the exam. The book includes a 100 question pre-test, a 100 question post-test, and practice test questions at the end of every chapter. Each practice test question includes a detailed explanation to help you understand the content and the reasoning behind the question. You’ll be ready to take and pass the exam the first time you take it. If you plan to pursue any of the advanced security certifications, this guide will also help you lay a solid foundation of security knowledge. Learn this material, and you’ll be a step ahead for other exams. This SY0-401 study guide is for any IT or security professional interested in advancing in their field, and a must read for anyone striving to master the basics of IT systems security. The author also posts related blogs to supplement the book at http://blogs.getcertifiedgetahead.com/.
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks
The Fear Index
Robert Harris - 2011
His hedge fund, based in Geneva, makes billions.But then in the early hours of the morning, while he lies asleep with his wife, a sinister intruder breaches the elaborate security of their lakeside house. So begins a waking nightmare of paranoia and violence as Hoffmann attempts, with increasing desperation, to discover who is trying to destroy him.His quest forces him to confront the deepest questions of what it is to be human. By the time night falls over Geneva, the financial markets will be in turmoil and Hoffmann's world - and ours - transformed forever.
Advanced Computer Architecture: Parallelism, Scalability, Programmability
Kai Hwang - 1992
It deals with advanced computer architecture and parallel processing systems and techniques, providing an integrated study of computer hardware and software systems, and the material is suitable for use on courses found in computer science, computer engineering, or electrical engineering departments.
What To Do When Machines Do Everything: How to Get Ahead in a World of AI, Algorithms, Bots, and Big Data
Malcolm Frank - 2017
When systems running on Artificial Intelligence can drive our cars, diagnose medical patients, and manage our finances more effectively than humans it raises profound questions on the future of work and how companies compete. Illustrated with real-world cases, data, and insight, the authors provide clear strategic guidance and actionable steps to help you and your organization move ahead in a world where exponentially developing new technologies are changing how value is created. Written by a team of business and technology expert practitioners—who also authored Code Halos: How the Digital Lives of People, Things, and Organizations are Changing the Rules of Business—this book provides a clear path to the future of your work. The first part of the book examines the once in a generation upheaval most every organization will soon face as systems of intelligence go mainstream. The authors argue that contrary to the doom and gloom that surrounds much of IT and business at the moment, we are in fact on the cusp of the biggest wave of opportunity creation since the Industrial Revolution. Next, the authors detail a clear-cut business model to help leaders take part in this coming boom; the AHEAD model outlines five strategic initiatives—Automate, Halos, Enhance, Abundance, and Discovery—that are central to competing in the next phase of global business by driving new levels of efficiency, customer intimacy and innovation. Business leaders today have two options: be swallowed up by the ongoing technological evolution, or ride the crest of the wave to new profits and better business. This book shows you how to avoid your own extinction event, and will help you; Understand the untold full extent of technology's impact on the way we work and live. Find out where we're headed, and how soon the future will arrive Leverage the new emerging paradigm into a sustainable business advantage Adopt a strategic model for winning in the new economy The digital world is already transforming how we work, live, and shop, how we are governed and entertained, and how we manage our money, health, security, and relationships. Don't let your business—or your career—get left behind. What To Do When Machines Do Everything is your strategic roadmap to a future full of possibility and success. Or peril.
Michael Vey Complete Collection Books 1-7: Michael Vey; Michael Vey 2; Michael Vey 3; Michael Vey 4; Michael Vey 5; Michael Vey 6; Michael Vey 7
Richard Paul Evans - 2018
But in truth, Michael is extremely special—he has electric powers. And he’s not the only one, either… Join Michael, Taylor, Ostin, and the rest of the Electroclan as they use their powers and wits to prevent a dangerous organization from achieving its sinister goal of global domination. This boxed set includes: Michael Vey: The Prisoner of Cell 25 Michael Vey 2: Rise of the Elgen Michael Vey 3: Battle of the Ampere Michael Vey 4: Hunt for Jade Dragon Michael Vey 5: Storm of Lightning Michael Vey 6: Fall of Hades Michael Vey 7: The Final Spark
The Google Way: How One Company Is Revolutionizing Management as We Know It
Bernard Girard - 2006
In the 1980s, Toyota stood out for combining quality with continuous refinement. Today, Google is reinventing business yet again-the way we work, how organizations are controlled, and how employees are managed.Management consultant Bernard Girard has been analyzing Google since its founding in 1998, and now in The Google Way, he explores Google's innovations in depth-many of which are far removed from the best practices taught at the top business schools.As you read, you'll see how much of Google's success is due to its focus on users and automation. You'll also learn how eCommerce has profoundly changed the relationship between businesses and their customers, for the first time giving customers an important role to play in a major corporation's growth. Finally, Girard speculates about the limits of Google's business model and discusses the challenges it will face as it continues to grow.Google's culture is one of innovation. Why not make that spirit of innovation your own?
Rise of the Robots: Technology and the Threat of a Jobless Future
Martin Ford - 2015
In Rise of the Robots, Silicon Valley entrepreneur Martin Ford argues that this is absolutely not the case. As technology continues to accelerate and machines begin taking care of themselves, fewer people will be necessary. Artificial intelligence is already well on its way to making “good jobs” obsolete: many paralegals, journalists, office workers, and even computer programmers are poised to be replaced by robots and smart software. As progress continues, blue and white collar jobs alike will evaporate, squeezing working- and middle-class families ever further. At the same time, households are under assault from exploding costs, especially from the two major industries—education and health care—that, so far, have not been transformed by information technology. The result could well be massive unemployment and inequality as well as the implosion of the consumer economy itself.In Rise of the Robots, Ford details what machine intelligence and robotics can accomplish, and implores employers, scholars, and policy makers alike to face the implications. The past solutions to technological disruption, especially more training and education, aren't going to work, and we must decide, now, whether the future will see broad-based prosperity or catastrophic levels of inequality and economic insecurity. Rise of the Robots is essential reading for anyone who wants to understand what accelerating technology means for their own economic prospects—not to mention those of their children—as well as for society as a whole.
Raspberry Pi Cookbook
Simon Monk - 2013
In this cookbook, prolific hacker and author Simon Monk provides more than 200 practical recipes for running this tiny low-cost computer with Linux, programming it with Python, and hooking up sensors, motors, and other hardware—including Arduino.You’ll also learn basic principles to help you use new technologies with Raspberry Pi as its ecosystem develops. Python and other code examples from the book are available on GitHub. This cookbook is ideal for programmers and hobbyists familiar with the Pi through resources such as Getting Started with Raspberry Pi (O’Reilly).Set up and manage your Raspberry PiConnect the Pi to a networkWork with its Linux-based operating systemUse the Pi’s ready-made softwareProgram Raspberry Pi with PythonControl hardware through the GPIO connectorUse Raspberry Pi to run different types of motorsWork with switches, keypads, and other digital inputsHook up sensors for taking various measurementsAttach different displays, such as an LED matrixCreate dynamic projects with Raspberry Pi and Arduino Make sure to check out 10 of the over 60 video recipes for this book at: http://razzpisampler.oreilly.com/ You can purchase all recipes at:
Microprocessors and Interfacing: Programming and Hardware
Douglas V. Hall - 1986
Students begin with a brief introduction to computer hardware which leads to an in-depth look at how microprocessor-based computers are programmed to do real tasks. They also cover assembly language programming of 8086-based systems. Throughout the text, the emphasis is on writing assembly language programs in a top-down, structured manner. Included are comparisons between CISC and RISC microcomputer architectures and their trade-offs. 1990 HC 000pp
Head First Design Patterns
Eric Freeman - 2004
At any given moment, somewhere in the world someone struggles with the same software design problems you have. You know you don't want to reinvent the wheel (or worse, a flat tire), so you look to Design Patterns--the lessons learned by those who've faced the same problems. With Design Patterns, you get to take advantage of the best practices and experience of others, so that you can spend your time on...something else. Something more challenging. Something more complex. Something more fun. You want to learn about the patterns that matter--why to use them, when to use them, how to use them (and when NOT to use them). But you don't just want to see how patterns look in a book, you want to know how they look "in the wild". In their native environment. In other words, in real world applications. You also want to learn how patterns are used in the Java API, and how to exploit Java's built-in pattern support in your own code. You want to learn the real OO design principles and why everything your boss told you about inheritance might be wrong (and what to do instead). You want to learn how those principles will help the next time you're up a creek without a design pattern. Most importantly, you want to learn the "secret language" of Design Patterns so that you can hold your own with your co-worker (and impress cocktail party guests) when he casually mentions his stunningly clever use of Command, Facade, Proxy, and Factory in between sips of a martini. You'll easily counter with your deep understanding of why Singleton isn't as simple as it sounds, how the Factory is so often misunderstood, or on the real relationship between Decorator, Facade and Adapter. With Head First Design Patterns, you'll avoid the embarrassment of thinking Decorator is something from the "Trading Spaces" show. Best of all, in a way that won't put you to sleep! We think your time is too important (and too short) to spend it struggling with academic texts. If you've read a Head First book, you know what to expect--a visually rich format designed for the way your brain works. Using the latest research in neurobiology, cognitive science, and learning theory, Head First Design Patterns will load patterns into your brain in a way that sticks. In a way that lets you put them to work immediately. In a way that makes you better at solving software design problems, and better at speaking the language of patterns with others on your team.
Authenticity: What Consumers Really Want
James H. Gilmore - 2007
Disingenuous. Phony. Inauthentic. Do your customers use any of these words to describe what you sell—or how you sell it? If so, welcome to the club. Inundated by fakes and sophisticated counterfeits, people increasingly see the world in terms of real or fake. They would rather buy something real from someone genuine rather than something fake from some phony. When deciding to buy, consumers judge an offering's (and a company's) authenticity as much as—if not more than—price, quality, and availability. In Authenticity, James H. Gilmore and B. Joseph Pine II argue that to trounce rivals companies must grasp, manage, and excel at rendering authenticity. Through examples from a wide array of industries as well as government, nonprofit, education, and religious sectors, the authors show how to manage customers' perception of authenticity by: recognizing how businesses "fake it;" appealing to the five different genres of authenticity; charting how to be "true to self" and what you say you are; and crafting and implementing business strategies for rendering authenticity. The first to explore what authenticity really means for businesses and how companies can approach it both thoughtfully and thoroughly, this book is a must-read for any organization seeking to fulfill consumers' intensifying demand for the real deal.