E-Books
857
E-book
858
E-book

Advances in biomedical engineering

Jolanta Pauk, Agnieszka Dardzińska-Głębocka, Piotr Mrozek, Zbigniew Oksiuta

Over the thirty years, as the discipline of biomedical engineering has evolved at the Bialystok University of Technology, it has become clear that it is a youthful and developing interdisciplinary field. Biomedical engineers provide innovative technological solutions for the medical industry by designing prosthetic limbs and artificial organs, the material that is used to manufacture them, and the software that's used for medical equipment. Although it is not possible to cover all of the biomedical engineering domains in this book, we have made an effort to focus on most of the major fields of activity in which scientists at Bialystok University Technology are engaged. The chapters throughout the book feature current research and developments in, for example, biomechanics, mechanobiology, design of medical structures, technical rehabilitation measures, modern engineering materials and their production, biomedical signal processing, acquisition and exploration of information from medical databases, and medical 3D printing. This book is dedicated to students of biomedical engineering and high school students interested in studying the interdisciplinary course of Biomedical Engineering. Our aim is to help young people understand the nature of biomedical engineering, which links engineering techniques with biological sciences and medicine to improve the quality of human health and well-being.

859
E-book

Adventure

Jack London

The novel Adventure in an acute, exciting form tells about the life of American and European settlers on the tropical islands of the Pacific Ocean. The main characters are no less pathos than villains who are so colorful in their villainy that they set their teeth together. Jack London, in the preface, writes that this book came out of the movie script. And truly, it is full of adventure, changing locations, colorful descriptions of snow-white beaches.

860
E-book

Adventure

Jack London

“Adventure” is a book by Jack London, an American novelist. A pioneer of commercial fiction and an innovator in the genre that would later become known as science fiction.   The novel explores the themes of domination of one people over the others, the differences between races, emancipation of women, and the strength of the human spirit, strengthened in a struggle with the nature and society.  

861
E-book

Adventures of Buffalo Bill. From Boyhood to Manhood

Prentiss Ingraham

Adventures of Buffalo Bill from Boyhood to Manhood is one of the masterpieces by Colonel Prentiss Ingraham, who was a prolific American author of dime fiction. Deeds of daring, thrilling peril and romantic incidents in the early life of W.F. Cody, the Monarch of Bordermen. It is a depiction of life and the ups and downs that are major influencing factors. The novel honestly portrays how fate plays with mankind and the turmoil that follow them. Thought-provoking! The author of The Masked Spy and over twenty Buffalo Bill titles, Ingraham plausibly claimed in 1900 to have written over 600 novels. Known as the King of Dime Novels, Prentiss Ingraham is an author who will be forever remembered for the image he created of the American West.

862
E-book

Adventures of Huckleberry Finn

Mark Twain

The Adventures of Huckleberry Finn is about a young boy, Huck, in search of freedom and adventure. He meets a run away slave named Jim and the two undertake a series of adventures based on the Picaresque novel by Mark Twain. As the story progresses the duo exploit an array of episodic enterprises, while Huckleberry slowly changes his views of bigotry. Along the way, Huck and Jim meet the King and Duke, who ultimately send the protagonists towards a different route on their journey. As Huck begins to have a change of heart, he gradually begins to distinguish between right and wrong, and conclusively, Huck is faced with the moral dilemma between the worlds prejudice, of which hes grown up with, and the lessons Jim has taught him throughout the story about the evils of racism. The complexity of his character is enhanced by his ability to relate so easily with nature and the river.

863
E-book

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps

John Sotiropoulos

Adversarial attacks trick AI systems with malicious data, creating new security risks by exploiting how AI learns. This challenges cybersecurity as it forces us to defend against a whole new kind of threat. This book demystifies adversarial attacks and equips you with the skills to secure AI technologies, moving beyond research hype or business-as-usual activities. Learn how to defend AI and LLM systems against manipulation and intrusion through adversarial attacks such as poisoning, trojan horses, and model extraction, leveraging DevSecOps, MLOps, and other methods to secure systems.This strategy-based book is a comprehensive guide to AI security, combining structured frameworks with practical examples to help you identify and counter adversarial attacks. Part 1 introduces the foundations of AI and adversarial attacks. Parts 2, 3, and 4 cover key attack types, showing how each is performed and how to defend against them. Part 5 presents secure-by-design AI strategies, including threat modeling, MLSecOps, and guidance aligned with OWASP and NIST. The book concludes with a blueprint for maturing enterprise AI security based on NIST pillars, addressing ethics and safety under Trustworthy AI.By the end of this book, you’ll be able to develop, deploy, and secure AI systems against the threat of adversarial attacks effectively.

864
E-book

Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict

Dan Borges

Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse.This book contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place.Throughout this book, you will learn how to gain an advantage over opponents by disappearing from what they can detect. You will further understand how to blend in, uncover other actors’ motivations and means, and learn to tamper with them to hinder their ability to detect your presence. Finally, you will learn how to gain an advantage through advanced research and thoughtfully concluding an operation.By the end of this book, you will have achieved a solid understanding of cyberattacks from both an attacker’s and a defender’s perspective.