Increasingly global and online social interactions and financial transactions involve digital data, computing devices and the internet. With cloud computing, remote computing, enterprise mobility and e-commerce on the rise, network security has become a priority. Selecting an appropriate...
Wireless Networks, IoT, and Mobile Devices Hacking provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also...
Overview
Enterprise Penetration Testing and Continuous Monitoring LiveLessons, part of The Art of Hacking video series, provides step-by-step, real-life complex scenarios of performing security assessments (penetration testing) of enterprise networks using internal/external reconnaissance...
Lanham Micheal - Evolutionary Deep Learning. Genetic algorithms and neural networks
Discover one-of-a-kind AI strategies never before seen outside of academic papers! Learn how the principles of evolutionary computation overcome deep learning’s common pitfalls and deliver adaptable model...
A Fresh Concept of Software-resemblant Hardware to Leap to 6G and Future Networks: Micro/Nanotechnologies as Enablers of Pervasivity
For a decade, with the uptake of 4G, we have become accustomed to the relentless increase in data and services on the move. The deployment of 5G is advancing...
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation / Attacking networks at the protocol level [RU]
This book is about network protocol security. James Forshaw, a world-renowned bug bounty expert, looks at the network from an attacker's perspective to help...
Create networks using data points and information
Learn to visualize and analyze networks to better understand communities
Explore the use of network data in both - supervised and unsupervised machine learning projects
Book Description
Network analysis is often taught with tiny or toy data sets...
"Mossad Agent" - provides services to search for information about a person based on minimal initial data and digital footprints.
We work with professionals who have access to official sources and contacts in various structures, which allows us to ensure high speed and accuracy of results.
We...
For a decade, with the uptake of 4G, we have become accustomed to the relentless increase in data and services on the move. The deployment of 5G is advancing crucial key performance indicators (KPIs), along with quality of service (QoS). Setting the horizon to 2030 and later, 6G will take the...
Traditional wireless sensor networks (WSNs) capture scalar data such as temperature, vibration, pressure, or humidity. Motivated by the success of WSNs and also with the emergence of new technology in the form of low-cost image sensors, researchers have proposed combining image and audio sensors...
Master neural networks to build modern artificial intelligence systems.
Book Description
This book is a practical guide to the world of artificial intelligence (AI), covering the mathematics and principles behind applications such as Google Maps and Amazon.
The book begins with an introduction...
Master effective navigation of neural networks, including convolutions and transformers, to tackle computer vision and NLP tasks using Python
Key Features
Understand the theory, mathematical foundations and the structure of deep neural networks
Become familiar with transformers, large language...
Wireless Penetration Testing
Pentesting of the wireless systems is easier task than doing that on the wired network. You cannot really apply good physical security measures against a wireless medium, if you are located close enough, you are able to “hear” (or at least your wireless adapter is...