ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies

دانلود کتاب فناوری های نوظهور ICT و امنیت سایبری: از هوش مصنوعی و ML تا سایر فناوری های آینده نگر

Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies

مشخصات کتاب

Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies

ویرایش:  
نویسندگان: , ,   
سری:  
ISBN (شابک) : 9783031277641, 9783031277658 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 290
[291] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 5 Mb 

قیمت کتاب (تومان) : 38,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 2


در صورت تبدیل فایل کتاب Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب فناوری های نوظهور ICT و امنیت سایبری: از هوش مصنوعی و ML تا سایر فناوری های آینده نگر نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Preface
Contents
About the Authors
1 An Overview of ICT Technology Advancement
	Introduction
	An Overview of ICT Advanced Technologies
	Main Areas of ICT Technologies
	Hardware Technologies
		Data Processing Hardware
		Data Input Hardware
		Data Output Hardware
		Data Transmission Hardware
		Data Storage Hardware
	Software Technologies
		Firmware
		Operating Systems (OSs)
		IT Protocols
		Programming Languages
		Software Development Methodologies
	Evolution of Information Technology
	Computer Generations
		Zero Generation (1642–1945)
		First Generation (1945–1954)
		Second Generation (1954–1963)
		Third Generation (1963–1973)
		Fourth Generation (1973–1985)
		Fifth Generation (1985–Present)
	Operating System Generations
		First Generation (1940–1950)
		Second Generation (1955–1965)
		Third Generation (1965–1980)
		Fourth Generation (1980–Present)
	Application Software Generations
		First Generation
		Second Generation
		Third Generation
		Fourth Generation
		Fifth Generation
	Programming Language Generations
		First Generation
		Second Generation
		Third Generation
		Fourth Generation
		Fifth Generation
	Wireless/Cellular Technology Generations
		Zero Generation
		First Generation
		Second Generation
		Third Generation
		Fourth Generation
		Fifth Generation
	WWW Generations
		Web 1.0
		Web 2.0
		Web 3.0
		Web 4.0
	Evolution of Storage Technologies
		Initial Storage Technologies
		Magnetic Tape-Based Technologies
		Magnetic Disk-Based Technologies
		Semiconductor-Based Storage Technologies
		Optical-Based Storage Technologies
	Advanced Storage Technologies
		Direct Attached Storage (DAS)
		Network Attached Storage (NAS)
		Storage Area Network (SAN)
	Futuristic Storage Technologies
		Software Defined Storage (SDS)
		Storage Virtualization
	Software Development Generations
		Conventional Era—(1960–1970)
		Transition Era—(1980–1990)
		Modern Era—(2000–Present)
	Types of ICT Services
		Software Development
		Computer Networking
		IT Infrastructure Management
		Telecommunication
		Data Storage Service
		Storage Transfer Service (STS)
		Database Management
		Process Automation and Monitoring
		Data Analytics
		Cloud Computing Service
		Application Programming Interface (API) Service
		Cybersecurity Service
		Digital Entertainment Services
		Content Delivery Network (CDN)
	A Peep into Next Generation Technologies
2 Artificial Intelligence Technology
	Introduction
	What Is Artificial Intelligence (AI)?
	What Is Neural Network?
	Major Approaches Used in Artificial Intelligence Research
		Symbolic Approach
		Connectionist Approach
	Objectives of Artificial Intelligence
		Reasoning
		Problem Solving
		Natural Language Processing
		Learning
		Planning
		Knowledge Representation
		Motion and Manipulation
		Artificial General Intelligence
		Social Intelligence
		Business Intelligence
		Machine Perception
	An Overview of the History of AI
	Main Areas of AI Application
		Natural Language Processing
		Computer Vision
		Expert Systems
		Speech Recognition
		Robotics
		Text Recognition
		Voice Recognition
		Voice-to-Text and Text-to-Voice Conversion
		Chatbot
	Types of Artificial Intelligence
		Reactive Machines
		Limited Memory
		Theory of Mind
		Self-Awareness
		Artificial Narrow Intelligence (ANI)
		Artificial General Intelligence (AGI)
		Artificial Super Intelligence (ASI)
	Intelligent Agent and Environment
		Intelligent (or, Intelligence) Agent (IA)
		Artificial Intelligence Environments
	Future of Artificial Intelligence
3 Machine Learning Technology
	Introduction to Machine Learning
	Importance of Machine Learning in Modern World
	How Does Machine Learning Work?
	Types of Machine Learning
	Supervised Machine Learning
	Unsupervised Machine Learning
	Semi-supervised Machine Learning
	Reinforcement Machine Learning
	What Is Deep Machine Learning?
		Artificial Neural Network
	Major Methods/Techniques of Machine Learning
		Regression Model
		Decision Trees
		Clustering
		Classification
		Anomaly Detection
		Neural Network Method
		Dimensionality Reduction
		Ensemble Methods
		Transfer Learning
	Natural Language Processing (NLP)
		Word Embedding
	What Is a Machine Learning Algorithm?
	Common Categories of Machine Learning Algorithms
	Classification Algorithms
		Naïve Bayes
		Decision Tree
		Random Forest
		Support Vector Machines
		K Nearest Neighbors
	Clustering Algorithms
		K-Means Clustering
		Expectation Maximization (EM) Algorithm
		Agglomerative Hierarchical Clustering
		Fuzzy C-Means Algorithm
	Regression Algorithms
		Linear Regression
		Multiple Linear Regression
		Multivariate Regression
		Logistic Regression
		Lasso Regression
		Other Regression algorithms
	What Is AI Training Data?
	Types of Training Data
		Text Training Data
		Audio Training Data
		Video Training Data
		Image Training Data
		Sensory Training Data
	What Is AI Training Dataset?
	Major Processes Used in Building Training Datasets for AI Training
		Data Collection
		Data Cleaning
		Data Classification
		Data Categorization
		Data Annotation and Labeling
	What are the Major Categories of Data Annotation?
	Image Data Annotation
		Bounding Box Annotation
		3D Cuboids Annotation
		Polygon Annotation
		Lines and Splines
		Semantic Segmentation
	Text Data Annotation
		Entity Annotation
		Entity Linking
		Sentiment Annotation
		Text Classification
	Audio Data Annotation
		Sound Labeling
		Event Tracking
		Speech to Text Transcription
		Audio Classification
		Multi-labeling
	Video Data Annotation
		Key Points Annotation/Landmarks
		Object Localization
		Object Tracking
		Gradient Boosting
	Top Uses of Machine Learning in Today’s World
		Big Data
		Data Analytics
		Cybersecurity
		Digital Marketing
		Business Intelligence
		Process Automation
		Automobiles
		e-Commerce
	Impact of Machine Learning on Cybersecurity
		Positive Impact
		Negative Impact
4 Blockchain Technology
	Introduction to Blockchain Technology
		Top Features of Blockchain Technology
	History of Blockchain Technology
	Major Terms Used in Blockchain Technology
		Cryptographic Hash
		Transaction
		Proof of Work
		Block
		Mining
		Timestamp
	Stack of Technologies Forming Blockchain
		Cryptographic Keys
		Peer-to-Peer Network with Shared Ledger
		Computing Resources to Store Transactions and Network Records
	How Does Blockchain Technology Work?
		Node
		Block
	What Is Distributed Ledger Technology (DLT)?
	Types of Blockchain Technology
		Public Blockchain
		Private Blockchain
		Consortium Blockchain
		Hybrid Blockchains
	Typical Uses of Blockchain Technology
		Cryptocurrency
		Non-Fungible Token (NFT)
		Smart Contracts
		Financial Markets
		Electronic Voting
		Record Maintenance
		Supply Chain
		Government
	Impact of Blockchain Technology on Cybersecurity
5 5th Generation Wireless Technology
	An Introduction to 5G Technology
	Importance of 5G Technology
	Evolution of Cellular Networks
		First Generation (1G)
		Second Generation (2G)
		Third Generation (3G)
		Fourth Generation (4G)
		Fifth Generation (5G)
		Sixth Generation (6G)
	Key Features and Capabilities of 5G Technology
	Architecture of 5G Network
	Top Protocols Used in 5G Networks
		3GPP
		New Radio (NR)
		NextGen Core
		LTE Advanced Pro
		EPC Evolution
	Impact of 5G Technology on Cybersecurity
6 Internet of Things (IoT)
	Introduction to Internet of Things (IoT)
		Importance of IoT
		Main Features of Internet of Things
	History of Internet of Things
	What Is Ambient Intelligence in IoT?
	Autonomous Control in IoT
	Range of Enabling Technologies Behind Internet of Things
		Low Power Sensors
		Cloud Computing
		Artificial Intelligence (AI)
		Machine Learning
		Data Analytics
		Big Data
		Short Range Wireless Technologies
		Medium and Long-Range Wireless Technologies
		Effective Communication Protocols
		Internet Protocol V6
	Architecture of Internet of Things Ecosystem
		Three Layer Architecture
		Four Layer Architecture
		Five Layer Architecture
	What Is Decentralized Internet of Things Concept?
	What Is Industrial Internet of Things?
	Industrial Internet of Things Standard Bodies
	Important Industrial Internet of Things IIoT Platforms
		Azure IoT
		Oracle IoT Cloud
		IBM Watson IoT
		AWS IoT
		Siemens Mind Sphere
		Flutura Cerebra
		Thing Worx
		GE Predix
	IIoT Use Cases in Different Industries
		Smart Cities
		Smart Home
		Manufacturing
		Process Automation
		Energy Management
		Supply Chain
		Healthcare
		Agriculture
		Military
		Transportation
	Challenges Posed by Internet of Things
		Cybersecurity
		Privacy
		Complex Operations and Management
		Environment Impact
		Bulky Data
	Impact of IoT on Cybersecurity
7 Distributed Cloud Computing
	An Introduction to Distributed Cloud Computing
	What Is Edge Computing?
	Advantages of Distributed Cloud
	Working Principle of Distributed Cloud
	Distributed Cloud Architecture
	Top Use Cases of Distributed Cloud in Industries
		Content Delivery Network (CDN)
		Internet of Things (IoT) and Edge
		Software Defined Infrastructure (SDI)
		Big Data Processing
		Multi-cloud Unification
		Centralized Management
	Challenges of Distributed Cloud Computing
	Impact of Distributed Cloud Computing on Cybersecurity
8 Quantum Computing
	An Introduction to Quantum Computing
	Salient Features of Quantum Computing
	Short History of Quantum Computing
	What Is Quantum Physics?
		Theory of Quantum Computing
	Working Principle of Quantum Computing
	How Many States Are Used in Quantum Computing?
	What Are Superimposition and Entanglement in Quantum Computing?
	Difference Between Traditional Computing and Quantum Computing
	Real-World Quantum Applications
	Major Projects on Quantum Computing
		IBM
		Honeywell
		Google
		Microsoft
	Main Terminologies Used in Quantum Computing
		Superconductors
		Superfluid
		Quantum Mechanics
		Qubits
		Quantum Logic Gate
		Quantum Counting
		Grover’s Algorithm
		Shor’s Algorithm
		Josephson Junction
9 Tactile Virtual Reality
	An Introduction to Tactile Virtual Reality
	Augmented Reality and Virtual Reality
	History and Evolution of Tactile Virtual Reality
	Types of Virtual Reality
		Non-immersive VR
		Fully-Immersive VR
		Semi-immersive VR
	Neurophysiological Tactile Measurement Techniques
		Electroencephalography (EEG)
		Magnetoencephalography (MEG)
		Functional Magnetic Resonance Imaging (fMRI)
	Somatosensation and Its Types
		Active Somatosensation
		Passive Somatosensation
	Major VR Terms with Definitions
		Head Mounted Display (HMD)
		Haptics
		360 Videos
		Interactive VR
		Stereoscopy
		4D Virtual Reality
		Field of View (FOV)
		Image/Video Stitching
		Simulator Sickness
		Cave Automatic Virtual Environment
		Mixed Reality
	Real-Word Applications of Tactile Virtual Reality
		Video Games
		Education and Training
		Product Development
10 An Overview of Top Futuristic Technologies
	What Is Futuristic Technology?
	Top Futuristic Technologies
		3D Printing Technology
		4D Printing
		6G Technology
		Autonomous Robots
		Artificial Neurons
		Artificial General Intelligence (AGI)
		Artificial Super Intelligence (ASI)
		Mind Uploading
		Driverless Vehicles
		Infrastructure Hacking
		Regenerative Medicine
		Digital Twin (DT) Technology
		Human Augmentation
		Intelligent Process Automation (IPA)
		Space Elevator
		Rotating Skyhook
		Light Sail
11 Impact of Advanced and Futuristic Technologies on Cybersecurity
	Overview of Impact of Modern Technologies on Cybersecurity
	Major Cybersecurity Challenges Due to Advanced Technologies
		Risk to National Security
		Breach of Privacy
		Increased Burden of Cybersecurity on Businesses
		Shortage of Cybersecurity Specialists
		Risk of Extensive Data Exposure
		Society and Business Manipulation
Bibliography




نظرات کاربران