Kirjojen hintavertailu. Mukana 12 299 008 kirjaa ja 12 kauppaa.

Kirjailija

Chuck Easttom

Kirjat ja teokset yhdessä paikassa: 16 kirjaa, julkaisuja vuosilta 2007-2026, suosituimpien joukossa Windows Forensics. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

16 kirjaa

Kirjojen julkaisuhaarukka 2007-2026.

Machine Learning for Neuroscience

Machine Learning for Neuroscience

Chuck Easttom

TAYLOR FRANCIS LTD
2025
nidottu
This book addresses the growing need for machine learning and data mining in neuroscience. The book offers a basic overview of the neuroscience, machine learning and the required math and programming necessary to develop reliable working models. The material is presented in a easy to follow user-friendly manner and is replete with fully working machine learning code. Machine Learning for Neuroscience: A Systematic Approach, tackles the needs of neuroscience researchers and practitioners that have very little training relevant to machine learning. The first section of the book provides an overview of necessary topics in order to delve into machine learning, including basic linear algebra and Python programming. The second section provides an overview of neuroscience and is directed to the computer science oriented readers. The section covers neuroanatomy and physiology, cellular neuroscience, neurological disorders and computational neuroscience. The third section of the book then delves into how to apply machine learning and data mining to neuroscience and provides coverage of artificial neural networks (ANN), clustering, and anomaly detection. The book contains fully working code examples with downloadable working code. It also contains lab assignments and quizzes, making it appropriate for use as a textbook. The primary audience is neuroscience researchers who need to delve into machine learning, programmers assigned neuroscience related machine learning projects and students studying methods in computational neuroscience.
Hardware for Quantum Computing

Hardware for Quantum Computing

Chuck Easttom

Springer International Publishing AG
2024
sidottu
This book covers extensively the physical implementation of qubits and quantum architecture. The author demonstrates how quantum computing is implemented by the underlying physical implementation of qubits, including trapped ions, nitrogen vacancy centers, frozen neon, and other implementations. The book shows how, ultimately, the physical implementation of the qubit is the foundation of quantum computing, and that the choice of physical qubit will impact such things as decoherence times, computational efficiency, and even error rate. The book explores all the current approaches to physical qubit implementation and includes appendices that review basic quantum computing and physics.
Machine Learning for Neuroscience

Machine Learning for Neuroscience

Chuck Easttom

TAYLOR FRANCIS LTD
2023
sidottu
This book addresses the growing need for machine learning and data mining in neuroscience. The book offers a basic overview of the neuroscience, machine learning and the required math and programming necessary to develop reliable working models. The material is presented in a easy to follow user-friendly manner and is replete with fully working machine learning code. Machine Learning for Neuroscience: A Systematic Approach, tackles the needs of neuroscience researchers and practitioners that have very little training relevant to machine learning. The first section of the book provides an overview of necessary topics in order to delve into machine learning, including basic linear algebra and Python programming. The second section provides an overview of neuroscience and is directed to the computer science oriented readers. The section covers neuroanatomy and physiology, cellular neuroscience, neurological disorders and computational neuroscience. The third section of the book then delves into how to apply machine learning and data mining to neuroscience and provides coverage of artificial neural networks (ANN), clustering, and anomaly detection. The book contains fully working code examples with downloadable working code. It also contains lab assignments and quizzes, making it appropriate for use as a textbook. The primary audience is neuroscience researchers who need to delve into machine learning, programmers assigned neuroscience related machine learning projects and students studying methods in computational neuroscience.
Networking Fundamentals

Networking Fundamentals

Chuck Easttom

Goodheart-Wilcox Publisher
2023
nidottu
This Lab Manual complements the Networking Fundamentals textbook and classroom-related studies. The laboratory activities in this manual are designed with the novice or entry-level student in mind as well as the new professional. The activities provide the valuable skills needed to obtain or retain a job in the networking environment. Laboratory activities should be an essential part of your training because they link the concepts and related knowledge presented in the Networking Fundamentals textbook to on-the-job performance. A network technician cannot be trained simply through textbooks, lectures, and demonstrations.
An In-Depth Guide to Mobile Device Forensics
Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.
An In-Depth Guide to Mobile Device Forensics
Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.
Digital Forensics, Investigation, and Response

Digital Forensics, Investigation, and Response

Chuck Easttom

JONES AND BARTLETT PUBLISHERS, INC
2021
nidottu
Digital Forensics, Investigation, and Response, Fourth Edition begins by examining the fundamentals of system forensics: what forensics is, an overview of computer crime, the challenges of system forensics, and forensics methods and labs. The second part of this book addresses the tools, techniques, and methods used to perform computer forensics and investigation. These include collecting evidence, investigating information hiding, recovering data, and scrutinizing email. It also discusses how to perform forensics in Windows, Linux, Macintosh operating systems, mobile devices, and networks. Finally, the third part explores incident and intrusion response, emerging technologies and future directions of this field, and additional system forensics resources.Each new print copy includes Navigate eBook Access enabling you to read your digital textbook online or offline from your computer, tablet, or mobile device.Want to learn more about using this book and its Cloud Labs in your class? Check out what Art McFadden, Digital Forensics Instructor in Kentucky, has to say about his experience with the Digital Forensics, Investigation, and Response, Fourth Edition book and Cloud Labs in this blog post.
Digital Forensics, Investigation, and Response + Cloud Labs

Digital Forensics, Investigation, and Response + Cloud Labs

Chuck Easttom

JONES AND BARTLETT PUBLISHERS, INC
2021
nidottu
Print Textbook amp Cloud Lab Access: 8 -day subscription.The cybersecurity Cloud Labs for Digital Forensics, Investigation, and Response provide fully immersive mock IT infrastructures with live virtual machines and real software, where students will learn and practice the foundational information security skills they will need to excel in their future careers. Unlike simulations, these hands-on virtual labs reproduce the complex challenges of the real world, without putting an institution's assets at risk. Available as a standalone lab solution or bundled with Jones amp Bartlett Learning textbooks, these cybersecurity Cloud Labs are an essential tool for mastering key course concepts through hands-on training.Labs:Lab : Applying the Daubert Standard to Forensic EvidenceLab 2: Recognizing the Use of Steganography in Forensic EvidenceLab 3: Recovering Deleted and Damaged FilesLab 4: Conducting an Incident Response InvestigationLab 5: Conducting Forensic Investigations on Windows SystemsLab : Conducting Forensic Investigations on Linux SystemsLab 7: Conducting Forensic Investigations on Email and Chat LogsLab 8: Conducting Forensic Investigations on Mobile DevicesLab 9: Conducting Forensic Investigations on Network InfrastructureLab : Conducting Forensic Investigations on System MemoryWant to learn more about using this book and its Cloud Labs in your class? Check out what Art McFadden, Digital Forensics Instructor in Kentucky, has to say about his experience with the Digital Forensics, Investigation, and Response, Fourth Edition book and Cloud Labs in this blog post.
The NICE Cyber Security Framework

The NICE Cyber Security Framework

Izzat Alsmadi; Chuck Easttom; Lo’ai Tawalbeh

Springer Nature Switzerland AG
2021
nidottu
This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and sbilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management.
Security Policies and Implementation Issues with Theory Labs

Security Policies and Implementation Issues with Theory Labs

Robert Johnson; Chuck Easttom

JONES AND BARTLETT PUBLISHERS, INC
2020
muu
Theory Lab Access.Security Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by industry experts, the new Third Edition presents an effective balance between technical knowledge and soft skills, while introducing many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks.Labs:Lab : Creating an Acceptable Use PolicyLab 2: Developing a Security Policy Framework Implementation PlanLab 3: Defining a Security Policy FrameworkLab 4: Creating a Separation of Duties PolicyLab 5: Creating a Security Awareness PolicyLab : Creating a Remote Access PolicyLab 7: Creating a Business Continuity Plan PolicyLab 8: Creating an Incident Response PolicyLab 9: Implementing an Information Security PolicyLab : Enabling Audit Trails to Monitor Policy Compliance
Security Policies and Implementation Issues

Security Policies and Implementation Issues

Robert Johnson; Chuck Easttom

Jones and Bartlett Publishers, Inc
2020
nidottu
PART OF THE NEW JONES amp BARTLETT LEARNING INFORMATION SYSTEMS SECURITY amp ASSURANCE SERIESSecurity Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by industry experts, the new Third Edition presents an effective balance between technical knowledge and soft skills, while introducing many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks. Instructor Materials for Security Policies and Implementation Issues include: PowerPoint Lecture Slides Instructor's Guide Sample Course Syllabus Quiz amp Exam Questions Case Scenarios/Handouts About the SeriesThis book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking—putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well.
The NICE Cyber Security Framework

The NICE Cyber Security Framework

Izzat Alsmadi; Chuck Easttom; Lo’ai Tawalbeh

Springer Nature Switzerland AG
2020
sidottu
This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and sbilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management.
CCFP Certified Cyber Forensics Professional All-in-One Exam Guide
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Get complete coverage of all six CCFP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. Written by a leading computer security expert, this authoritative guidefully addresses cyber forensics techniques, standards, technologies, and legal and ethical principles. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease,this definitive volume also serves as an essential on-the-job reference.COVERS ALL SIX EXAM DOMAINS:Legal and ethical principlesInvestigationsForensic scienceDigital forensicsApplication forensicsHybrid and emerging technologiesELECTRONIC CONTENT INCLUDES:250 practice exam questionsTest engine that provides full-length practice examsand customized quizzes by chapter or by exam domainPDF copy of the book
Advanced Javascript

Advanced Javascript

Chuck Easttom

Jones and Bartlett Publishers, Inc
2007
nidottu
Advanced JavaScript, Third Edition provides an in-depth examination of the most important features of JavaScript. Beginning with an overview of JavaScript, the book quickly moves into more advanced features needed for complex yet robust JavaScript scripts, such as objects, arrays, and date and time functions. Additionally, various features of JavaScript that are essential for modern web pages are discussed, including manipulating the status bar, creating dynamic calendars, and working with forms, images, and the Document Object Model. Numerous examples illustrate how to implement various techniques. Topics covered how to enhance your web pages with LED signs, banners, and images; implementing cookies to store and retrieve information; the structure of the Document Object Model and how it can be used to view, access, and change an HTML document; Security measures to protect private information while using the Internet.