This textbook introduces linear algebra and optimization in the context of machine learning. Examples and exercises are provided throughout the book. A solution manual for the exercises at the end of each chapter is available to teaching instructors. This textbook targets graduate level students and professors in computer science, mathematics and data science. Advanced undergraduate students ca…
This book addresses the latest approaches to holistic Cyber-Physical System (CPS) resilience in real-world industrial applications. Ensuring the resilience of CPSs requires cross-discipline analysis and involves many challenges and open issues, including how to address evolving cyber-security threats. The book describes emerging paradigms and techniques from two main viewpoints: CPSs' exposu…
Table of Contents Acknowledgments xi Part I: The Linux Command Line 1 Chapter 1: Starting with Linux Shells 3 Chapter 2: Getting to the Shell 21 Chapter 3: Basic Bash Shell Commands 47 Chapter 4: More Bash Shell Commands 85 Chapter 5: Understanding the Shell 113 Chapter 6: Using Linux Environment Variables 137 Chapter 7: Understanding Linux File Permissions 163 Chapter 8: Managing…
Table of Contents About the Authors xi Acknowledgments xiii Introduction 1 Who is This Book For? 3 Let’s Do It! 3 Chapter 1: Prologues 5 A Wizard’s Tale 5 The Sorting of Wizards 5 The Call to Action 10 A Language Without 10 Our Strange Protagonists 10 (cons 'Apple 'Soft) 13 Tower of Babel 15 Confessions 16 Penances 17 A Language Within 17 Installing Languages 17 Writ…
This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to o…
This book approaches the HCI topic from the point of view that any individual working this field needs to have enough knowledge in all the different areas such as storage, storage networking, compute, virtualization, switching and routing and automation. The book will explain each area in the context of a legacy data center design, detailing the problem statement for the particular technology a…
Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This …
If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manager's guide offers a new approach to building an…
This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic op…
In this book, the editors explain how students enrolled in two digital forensic courses at their institution are exposed to experiential learning opportunities, where the students acquire the knowledge and skills of the subject-matter while also learning how to adapt to the ever-changing digital forensic landscape. Their findings (e.g., forensic examination of different IoT devices) are also pr…