You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This open access book provides cybersecurity practitioners with the knowledge needed to understand the risks of the increased availability of powerful large language models (LLMs) and how they can be mitigated. It attempts to outrun the malicious attackers by anticipating what they could do. It also alerts LLM developers to understand their work's risks for cybersecurity and provides them with tools to mitigate those risks. The book starts in Part I with a general introduction to LLMs and their main application areas. Part II collects a description of the most salient threats LLMs represent in cybersecurity, be they as tools for cybercriminals or as novel attack surfaces if integrated into e...
This open access book reports the results of a study conducted in Switzerland in 2022 to provide an overview of the changing landscape of encryption and data protection technologies and their global usage trends. The Swiss Confederation tasked the Cyber-Defence Campus (CYD Campus) to identify the 38 most relevant encryption and data protection technologies, analyze their expected evolution until 2025, and derive implications for the military, civil society, and economy sectors. Fifty experts from academia, government, and industry have contributed to this study and provided their viewpoints on the different technologies and trends. This comprehensive collection of factsheets provides a refer...
This book explores fundamental principles for securing IT systems and illustrates them with hands-on experiments that may be carried out by the reader using accompanying software. The experiments highlight key information security problems that arise in modern operating systems, networks, and web applications. The authors explain how to identify and exploit such problems and they show different countermeasures and their implementation. The reader thus gains a detailed understanding of how vulnerabilities arise and practical experience tackling them. After presenting the basics of security principles, virtual environments, and network services, the authors explain the core security principles...
Does a mystic, divine formula lie behind everything that is beautiful? For centuries the golden mean has been a subject of endless fascination. The ratio of the proportion can be seen in Nature; it runs through artistic design processes and it affects our perception of our surroundings. But how much of this apparent 'world formula' is true, and how much of it is myth? The history of the golden mean begins with Euclid in the 3rd century BC. But it was only in the 19th century that it was raised to the universal constant of beauty. From this point onwards the 'golden section' was described in flora and fauna; the famous Fibonacci number. It determines the growth of the pineapple; and Le Corbus...
To be competitive, companies must develop capabilities that allow them to react rapidly to market demands. The innovation methods of the past are not adapted to the turbulence of the modern world. In the last decade, increasing globalization of markets and Industry 4.0 have caused profound changes in the best way to manage the innovation process. This book includes a collection of thirteen papers that discuss theoretical approaches, case studies, and surveys focused on issues related to open innovation and its mechanisms.