Ebooki
857
Ebook
858
Ebook

Advances in biomedical engineering

Jolanta Pauk, Agnieszka Dardzińska-Głębocka, Piotr Mrozek, Zbigniew Oksiuta

Over the thirty years, as the discipline of biomedical engineering has evolved at the Bialystok University of Technology, it has become clear that it is a youthful and developing interdisciplinary field. Biomedical engineers provide innovative technological solutions for the medical industry by designing prosthetic limbs and artificial organs, the material that is used to manufacture them, and the software that's used for medical equipment. Although it is not possible to cover all of the biomedical engineering domains in this book, we have made an effort to focus on most of the major fields of activity in which scientists at Bialystok University Technology are engaged. The chapters throughout the book feature current research and developments in, for example, biomechanics, mechanobiology, design of medical structures, technical rehabilitation measures, modern engineering materials and their production, biomedical signal processing, acquisition and exploration of information from medical databases, and medical 3D printing. This book is dedicated to students of biomedical engineering and high school students interested in studying the interdisciplinary course of Biomedical Engineering. Our aim is to help young people understand the nature of biomedical engineering, which links engineering techniques with biological sciences and medicine to improve the quality of human health and well-being.

859
Ebook

Adventure

Jack London

“Adventure” is a book by Jack London, an American novelist. A pioneer of commercial fiction and an innovator in the genre that would later become known as science fiction.   The novel explores the themes of domination of one people over the others, the differences between races, emancipation of women, and the strength of the human spirit, strengthened in a struggle with the nature and society.  

860
Ebook

Adventure

Jack London

The novel Adventure in an acute, exciting form tells about the life of American and European settlers on the tropical islands of the Pacific Ocean. The main characters are no less pathos than villains who are so colorful in their villainy that they set their teeth together. Jack London, in the preface, writes that this book came out of the movie script. And truly, it is full of adventure, changing locations, colorful descriptions of snow-white beaches.

861
Ebook

Adventures of Buffalo Bill. From Boyhood to Manhood

Prentiss Ingraham

Adventures of Buffalo Bill from Boyhood to Manhood is one of the masterpieces by Colonel Prentiss Ingraham, who was a prolific American author of dime fiction. Deeds of daring, thrilling peril and romantic incidents in the early life of W.F. Cody, the Monarch of Bordermen. It is a depiction of life and the ups and downs that are major influencing factors. The novel honestly portrays how fate plays with mankind and the turmoil that follow them. Thought-provoking! The author of The Masked Spy and over twenty Buffalo Bill titles, Ingraham plausibly claimed in 1900 to have written over 600 novels. Known as the King of Dime Novels, Prentiss Ingraham is an author who will be forever remembered for the image he created of the American West.

862
Ebook

Adventures of Huckleberry Finn

Mark Twain

The Adventures of Huckleberry Finn is about a young boy, Huck, in search of freedom and adventure. He meets a run away slave named Jim and the two undertake a series of adventures based on the Picaresque novel by Mark Twain. As the story progresses the duo exploit an array of episodic enterprises, while Huckleberry slowly changes his views of bigotry. Along the way, Huck and Jim meet the King and Duke, who ultimately send the protagonists towards a different route on their journey. As Huck begins to have a change of heart, he gradually begins to distinguish between right and wrong, and conclusively, Huck is faced with the moral dilemma between the worlds prejudice, of which hes grown up with, and the lessons Jim has taught him throughout the story about the evils of racism. The complexity of his character is enhanced by his ability to relate so easily with nature and the river.

863
Ebook

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps

John Sotiropoulos

Adversarial attacks trick AI systems with malicious data, creating new security risks by exploiting how AI learns. This challenges cybersecurity as it forces us to defend against a whole new kind of threat. This book demystifies adversarial attacks and equips cybersecurity professionals with the skills to secure AI technologies, moving beyond research hype or business-as-usual strategies.The strategy-based book is a comprehensive guide to AI security, presenting a structured approach with practical examples to identify and counter adversarial attacks. This book goes beyond a random selection of threats and consolidates recent research and industry standards, incorporating taxonomies from MITRE, NIST, and OWASP. Next, a dedicated section introduces a secure-by-design AI strategy with threat modeling to demonstrate risk-based defenses and strategies, focusing on integrating MLSecOps and LLMOps into security systems. To gain deeper insights, you’ll cover examples of incorporating CI, MLOps, and security controls, including open-access LLMs and ML SBOMs. Based on the classic NIST pillars, the book provides a blueprint for maturing enterprise AI security, discussing the role of AI security in safety and ethics as part of Trustworthy AI.By the end of this book, you’ll be able to develop, deploy, and secure AI systems effectively.

864
Ebook

Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict

Dan Borges

Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse.This book contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place.Throughout this book, you will learn how to gain an advantage over opponents by disappearing from what they can detect. You will further understand how to blend in, uncover other actors’ motivations and means, and learn to tamper with them to hinder their ability to detect your presence. Finally, you will learn how to gain an advantage through advanced research and thoughtfully concluding an operation.By the end of this book, you will have achieved a solid understanding of cyberattacks from both an attacker’s and a defender’s perspective.