Search Results - (( Web observers Computer program. ) OR ( Web observer Computer program. ))

Refine Results
  1. 1
  2. 2

    Professional PHP design patterns by Saray, Aaron

    Published 2009
    Full text (MFA users only)
    Electronic eBook
  3. 3
  4. 4

    Ember. js Cookbook. by Hanchett, Erik

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  5. 5
  6. 6
  7. 7

    Advanced Guide to PHP on IBM i by Schroeder, Kevin

    Published 2014
    Full text (MFA users only)
    Electronic eBook
  8. 8
  9. 9
  10. 10

    Professional swift by Dippery, Michael

    Published 2015
    Table of Contents: “…-- Designing Concurrent Programs -- Concurrency in iOS and OS X -- Understanding Event Loops -- Understanding Run Loops -- Understanding Asynchronous Methods -- Understanding NSTimer -- Understanding NSThread -- Understanding Grand Central Dispatch -- Summary -- Chapter 5: Interfacing with Web Services -- Understanding Web Services -- Implementing a Web Services Client -- Signing Up for a Firebase Account -- Laying Out the User Interface -- Hooking Up the Add Album View Controller -- Adding the Album Creation View Controller -- Hooking Up the Segue -- Creating the Album Model -- Communicating with Firebase -- Creating the Firebase Connector -- Making Asynchronous Web Requests -- Processing JSON Data -- Creating New Albums -- Deleting Albums -- Wiring Up the View and Data Models -- Wiring Up the Segue -- Run the Application -- Summary -- Chapter 6: Storing Data with Core Data -- What Is Core Data? …”
    Full text (MFA users only)
    Electronic eBook
  11. 11
  12. 12
  13. 13

    Angular Services. by Salehi, Sohail

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  14. 14
  15. 15
  16. 16
  17. 17

    Cyber breach response that actually works : organizational approach to managing residual risk by Gorecki, Andrew

    Published 2020
    Table of Contents: “…Cyber Threat Intelligence -- Laws and Regulations -- Changing Business Objectives -- Incorporating Cyber Breach Response into a Cybersecurity Program -- Strategic Planning -- Designing a Program -- Implementing Program Components -- Program Operations -- Continual Improvement -- Strategy Development -- Strategic Assessment -- Strategy Definition -- Strategy Execution -- Roadmap Development -- Governance -- Establishing Policies -- Identifying Key Stakeholders -- Business Alignment -- Continual Improvement -- Summary -- Notes -- Chapter 2 Building a Cybersecurity Incident Response Team…”
    Full text (MFA users only)
    Electronic eBook
  18. 18
  19. 19

    Artificial intelligence and data mining approaches in security frameworks

    Published 2021
    Table of Contents: “…Rashmi Agrawal -- 2.1 Introduction 11 -- 2.2 Data Mining Techniques and Their Role in Classification and Detection 14 -- 2.3 Clustering 19 -- 2.4 Privacy Preserving Data Mining (PPDM) 21 -- 2.5 Intrusion Detection Systems (IDS) 22 -- 2.5.1 Types of IDS 23 -- 2.5.1.1 Network-Based IDS 23 -- 2.5.1.2 Host-Based IDS 24 -- 2.5.1.3 Hybrid IDS 25 -- 2.6 Phishing Website Classification 26 -- 2.7 Attacks by Mitigating Code Injection 27 -- 2.7.1 Code Injection and Its Categories 27 -- 2.8 Conclusion 28 -- References 29 -- 3 Role of Artificial Intelligence in Cyber Security and Security Framework 33 Shweta Sharma -- 3.1 Introduction 34 -- 3.2 AI for Cyber Security 36 -- 3.3 Uses of Artificial Intelligence in Cyber Security 38 -- 3.4 The Role of AI in Cyber Security 40 -- 3.4.1 Simulated Intelligence Can Distinguish Digital Assaults 41 -- 3.4.2 Computer-Based Intelligence Can Forestall Digital Assaults 42 -- 3.4.3 Artificial Intelligence and Huge Scope Cyber Security 42 -- 3.4.4 Challenges and Promises of Artificial Intelligence in Cyber Security 43 -- 3.4.5 Present-Day Cyber Security and its Future with Simulated Intelligence 44 -- 3.4.6 Improved Cyber Security with Computer-Based Intelligence and AI (ML) 45 -- 3.4.7 AI Adopters Moving to Make a Move 45 -- 3.5 AI Impacts on Cyber Security 46 -- 3.6 The Positive Uses of AI Based for Cyber Security 48 -- 3.7 Drawbacks and Restrictions of Using Computerized Reasoning For Digital Security 49 -- 3.8 Solutions to Artificial Intelligence Confinements 50 -- 3.9 Security Threats of Artificial Intelligence 51 -- 3.10 Expanding Cyber Security Threats with Artificial Consciousness 52 -- 3.11 Artificial Intelligence in Cybersecurity – Current Use-Cases and Capabilities 55 -- 3.11.1 AI for System Danger Distinguishing Proof 56 -- 3.11.2 The Common Fit for Artificial Consciousness in Cyber Security 56 -- 3.11.3 Artificial Intelligence for System Danger ID 57 -- 3.11.4 Artificial Intelligence Email Observing 58 -- 3.11.5 Simulated Intelligence for Battling Artificial Intelligence Dangers 58 -- 3.11.6 The Fate of Computer-Based Intelligence in Cyber Security 59 -- 3.12 How to Improve Cyber Security for Artificial Intelligence 60 -- 3.13 Conclusion 61 -- References 62 -- 4 Botnet Detection Using Artificial Intelligence 65 Astha Parihar and Prof. …”
    Full text (MFA users only)
    Electronic eBook
  20. 20

    Machine learning in cognitive IoT by Kumar, Neeraj (Computer scientist), Makkar, Aaisha

    Published 2020
    Table of Contents: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Acknowledgements -- List of Figures -- List of Tables -- 1 Internet of Things -- 1.1 IoT History -- 1.2 IoT Architecture -- 1.3 IoT Elements -- 1.3.1 Wireless Sensor Networks (WSN) -- 1.3.2 Radio Frequency Identification (RFID) -- 1.3.2.1 RFID Applications -- 1.3.3 Data Storage -- 1.3.4 Challenging Issues -- 1.4 Data Analytics -- 1.4.1 IoT Data Sources -- 1.4.1.1 Industrial Data -- 1.4.1.2 Business Applications -- 1.4.1.3 Sensors and Devices -- 1.4.1.4 Smartphones -- 1.4.2 Data Processing -- 1.4.2.1 Data Acquisition -- 1.4.2.2 Data Transport -- 1.4.2.3 Data Preprocessing -- 1.4.3 IoT Technologies -- 1.4.3.1 Wireless Communication Technologies -- 1.4.3.2 Data Analysis Schemes -- 1.4.3.3 Machine Learning -- 1.4.4 Optimization Techniques -- 1.4.4.1 Edge Computing Technology -- 1.4.4.2 Refining the Results -- 1.5 Steps of Data Preprocessing -- 1.5.1 Data Formatting -- 1.5.2 Data Cleaning -- 1.5.2.1 Duplicate Observations -- 1.5.2.2 Irrelevant Observations -- 1.5.2.3 Handling Missing Data -- 1.5.2.4 Detecting Outliers -- 1.5.3 Data Reduction Schemes -- 1.5.3.1 Feature Extraction -- 1.5.3.2 Feature Selection -- 1.6 IoT Protocols -- 1.6.1 Infrastructure Layer (Network/Transport Layer) -- 1.6.2 Data Protocols -- 1.6.3 Physical Layer -- 1.6.4 LPWAN: Low Power Wide Area Network -- 1.7 IoT Applications -- 1.7.1 Logistics and Transportation -- 1.7.2 Home and Workplace -- 1.7.3 Personal and Social -- 1.7.4 Health Domain -- 1.8 Book Outline -- 1.9 Target Audience -- 1.10 Summary and What's Next? …”
    Full text (MFA users only)
    Electronic eBook