Kryptografia
Digital Ethics in the Age of AI. Navigating the ethical frontier today and beyond
IT Governance Publishing, Dr. Julie E. Mehan
Digital Ethics in the Age of AI explores the profound ethical challenges posed by the rise of artificial intelligence and its integration into our daily lives. The book covers AI’s disruptive effects across various sectors, including misinformation, privacy, and job displacement, offering clear explanations and real-world examples. The author delves into the role of AI in spreading misinformation and disinformation, including the creation of deepfakes, and highlights the increasing risk of online disinhibition driven by AI-powered interactions. The book also addresses the cognitive biases embedded within AI systems and the growing concerns over privacy, data security, and surveillance in an age of ubiquitous AI technologies. Finally, the book explores the potential for AI-driven job displacement, particularly in the cognitive class, and the societal implications of such disruptions. It also covers intellectual property challenges in the age of AI and the complexities surrounding generative AI’s impact on privacy and digital ownership. Offering solutions for mitigating these risks, Digital Ethics in the Age of AI provides a roadmap for navigating the ethical and regulatory landscape of AI today and in the future.
Disaster Recovery and Business Continuity. A quick guide for organisations and business managers
IT Governance Publishing, Thejendra B.S
This book delves into disaster recovery (DR) and business continuity (BC), offering practical strategies for organizations to prepare for and manage disruptions. It starts by defining core concepts of DR and BC, highlighting their role in crisis management. Early chapters explore business impact analysis, data protection, and risk assessment, while examining common IT and non-IT disasters like data loss, cyberattacks, and communication failures.Later sections focus on specific disaster scenarios, such as virus attacks, software failures, and data center risks, offering prevention methods and recovery plans. It also addresses human factors in DR, covering IT staff and contractor management, and the risks tied to outsourcing and project failures.In addition to IT risks, the book explores non-IT disasters, including health crises, financial challenges, and natural events, with strategies for mitigation. The final chapters provide guidance on creating and testing contingency plans, featuring checklists and mock run procedures. This book empowers readers to design, implement, and maintain effective DR and BC plans for their organization’s needs.
Mercury Learning and Information, Alexander I. Kheyfits
This book offers a comprehensive guide to discrete mathematics and its applications to cryptography. It is designed for students and professionals in fields such as discrete mathematics and finite mathematics, with all necessary prerequisites clearly explained and illustrated. The text introduces key concepts in number theory, coding theory, and information theory, which are essential for understanding cryptography.Understanding discrete mathematics is crucial for anyone working in cryptography and related fields. The book begins with a survey of elementary functions and moves on to propositional algebra, set theory, and algebraic structures like groups, rings, and fields. It covers binary relations, combinatorics, and elements of number theory, which are fundamental to cryptographic methods.Readers will explore topics such as Boolean functions, hashing functions, cryptographic maps, combinatorial circuits, and graph theory. The book also delves into advanced areas like finite automata, game theory, and Turing machines. Through numerous examples, problems, and solutions, readers will gain a solid foundation in discrete mathematics and its cryptographic applications.
Docker Deep Dive. Zero to Docker in a single book - Third Edition
Nigel Poulton
Embark on a transformative journey into the world of Docker and containers with this expertly crafted course. Starting with a high-level overview, you'll gain a solid understanding of containers and the significance of Docker in modern software development. Delve into Docker's core components, exploring essential standards, projects, and the intricacies of the Docker Engine, ensuring a robust foundation.As you progress, practical hands-on modules will guide you through working with images and containers, containerizing applications, and managing multi-container setups using Docker Compose. You'll learn to deploy applications efficiently with Docker Swarm and Docker Stacks, enhancing your ability to manage and scale containerized applications. The course also introduces Docker's integration with WebAssembly, offering a glimpse into cutting-edge container technologies.Concluding with advanced topics, you'll master Docker networking, including overlay networks and persistent data management with volumes. Emphasis on Docker security ensures you can safeguard your applications and data effectively. By the end of this course, you'll possess the skills and knowledge to leverage Docker's full capabilities, from development to deployment, ensuring you remain at the forefront of container technology.
Manoj P R
Ethereum and Blockchain will change the way software is built for business transactions. Most industries have been looking to leverage these new technologies to gain efficiencies and create new business models and opportunities.The Ethereum Cookbook covers various solutions such as setting up Ethereum, writing smart contracts, and creating tokens, among others. You’ll learn about the security vulnerabilities, along with other protocols of Ethereum.Once you have understood the basics, you’ll move on to exploring various design decisions and tips to make your application scalable and secure. In addition to this, you’ll work with various Ethereum packages such as Truffle, Web3, and Ganache.By the end of this book, you’ll have comprehensively grasped the Ethereum principles and ecosystem.
Mayukh Mukhopadhyay
Ethereum is a public, blockchain-based distributed computing platform featuring smart contract functionality. This book is your one-stop guide to blockchain and Ethereum smart contract development. We start by introducing you to the basics of blockchain. You'll learn about hash functions, Merkle trees, forking, mining, and much more. Then you'll learn about Ethereum and smart contracts, and we'll cover Ethereum virtual machine (EVM) in detail. Next, you'll get acquainted with DApps and DAOs and see how they work. We'll also delve into the mechanisms of advanced smart contracts, taking a practical approach.You'll also learn how to develop your own cryptocurrency from scratch in order to understand the business behind ICO. Further on, you'll get to know the key concepts of the Solidity programming language, enabling you to build decentralized blockchain-based applications. We'll also look at enterprise use cases, where you'll build a decentralized microblogging site. At the end of this book, we discuss blockchain-as-a-service, the dark web marketplace, and various advanced topics so you can get well versed with the blockchain principles and ecosystem.
James Leyte-Vidal
Whether you’re looking to crack passwords as part of a thorough security audit or aiming to recover vital information, this book will equip you with the skills to accomplish your goals. Written by a cybersecurity expert with over fifteen years of experience in penetration testing, Ethical Password Cracking offers a thorough understanding of password protection and the correct approach to retrieving password-protected data.As you progress through the chapters, you first familiarize yourself with how credentials are stored, delving briefly into the math behind password cracking. Then, the book will take you through various tools and techniques to help you recover desired passwords before focusing on common cracking use cases, hash recovery, and cracking. Real-life examples will prompt you to explore brute-force versus dictionary-based approaches and teach you how to apply them to various types of credential storage.By the end of this book, you'll understand how passwords are protected and how to crack the most common credential types with ease.
EU General Data Protection Regulation (GDPR). An implementation and compliance guide
IT Governance Publishing, IT Governance Privacy Team
This book provides a thorough exploration of the EU General Data Protection Regulation (GDPR). It starts with the core principles of GDPR, explaining its purpose, key concepts, and how it impacts data controllers and processors. The book covers essential features like data subject rights, data processing principles, and privacy compliance frameworks. It also explores the role of the Data Protection Officer (DPO) and the importance of conducting data protection impact assessments (DPIAs).Focusing on practical implementation, the book highlights the need for robust information security measures to meet GDPR standards. It provides actionable advice on best practices, including managing data breaches, ensuring lawful consent, and processing subject access requests. The guide also addresses the complexities of international data transfers in line with GDPR requirements.Finally, the book outlines GDPR enforcement mechanisms, detailing the powers of supervisory authorities and the steps to demonstrate compliance. This resource offers organizations a comprehensive roadmap to align with GDPR, laying the groundwork for effective data protection and compliance.