Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and cheaper to build, deploy, and maintain. In this hands-on, highly accessible book, two leading honeypot pioneers systematically introduce virtual honeypot technology. One step at a time, you’ll learn exactly how to implement, configure, use, and maintain virtual honeypots in your own environment, even if you’ve never deployed a honeypot before. You’ll learn through examples, including Honeyd, the acclaimed virtual honeypot created by coauthor Niels Provos. The authors also present multiple real-world applications for virtual honeypots, including network decoy, worm detection, spam prevention, and network simulation. After reading this book, you will be able to Compare high-interaction honeypots that provide real systems and services and the low-interaction honeypots that emulate them Install and configure Honeyd to simulate multiple operating systems, services, and network environments Use virtual honeypots to capture worms, bots, and other malware Create high-performance "hybrid" honeypots that draw on technologies from both low- and high-interaction honeypots Implement client honeypots that actively seek out dangerous Internet locations Understand how attackers identify and circumvent honeypots Analyze the botnets your honeypot identifies, and the malware it captures Preview the future evolution of both virtual and physical honeypots
Eine Übersicht für Architekten, die auch die Bedeutung der Baustoffwahl für die sinnliche Wahrnehmung von Architektur wie Haptik, Geruch, Farbe, Oberflächenstruktur berücksichtigt, gab es bisher nicht. Mit dem Baustoff Atlas wird diese Lücke nun geschlossen. Als ein auf die Interessen von Architekten und Bauingenieuren gleichermassen abgestimmtes Grundlagenwerk wird er alle genannten Betrachtungsebenen vereinen. Dabei werden sowohl grundsätzliche Nachhaltigkeitsfragen wie Lebensdauer, Umweltbelastung und Stoffkreisläufe erörtert als auch Materialinnovationen vorgestellt. Alle wesentlichen herkömmlichen und neuartigen Baustoffe werden hinsichtlich Herstellung, Verarbeitung, Oberflächen, Anschlüssen und Kenndaten umfassend dokumentiert. Internationale Beispiele, deren Erscheinungsbild sich häufig aus jeweils einem Material definiert, veranschaulichen die Anwendung in der Architektur. Der Baustoff Atlas unterstützt damit die tägliche Arbeit von Architekten und Ingenieuren bei der Baustoffauswahl auf eine umfassende, zugleich anschauliche und anregende Weise.
This important monograph is based on the results of a study on the identification of conceptual lumped rainfall-runoff models for gauged and ungauged catchments. The task of model identification remains difficult despite decades of research. A detailed problem analysis and an extensive review form the basis for the development of a Matlab? modelling toolkit consisting of two components: a Rainfall-Runoff Modelling Toolbox (RRMT) and a Monte Carlo Analysis Toolbox (MCAT). These are subsequently applied to study the tasks of model identification and evaluation. A novel dynamic identifiability approach has been developed for the gauged catchment case. The theory underlying the application of rainfall-runoff models for predictions in ungauged catchments is studied, problems are highlighted and promising ways to move forward are investigated. Modelling frameworks for both gauged and ungauged cases are developed. This book presents the first extensive treatment of rainfall-runoff model identification in gauged and ungauged catchments.
The aim of the current work was the analysis of temperatures in the milling process in order to understand causal and statistical relationships between process parameters and thermal state variables. The first step included fundamental empirical investigations in the form of orthogonal cuts in order to estimate the heat partitioning depending on the process parameters. Based on the empirical data from the orthogonal cuts temperature fields in the milling process were modelled analytically and validated.
- Presents the latest in-depth engineering and mathematical studies - Gives an overview of recent research and clinical evaluation results - Contributions from international medical and engineering experts
Inhaltsangabe:Abstract: The report describes the building of a simple resonant converter with a series resonant circuit as load. This work is a subject in the field of power electronics. The report includes a complete describtion of the analytical fundamentals of a DC/AC converter with a resonant circuit as load. Modern semiconductor devices like IGBTs, MBGTs, MOSFETs, Thyristors, ... are also tested for a succesfull using in converter circuits. The most important thing in this work is the minimizing of the switching losses in the semiconductor devices. For that purpose the switching point lays near the current and voltage zero. The special difficulties for the dimensioning of the components are commented. The practical building of the resonant converter is descripted with all details: dimensioning of the components-, circuit diagrams; breadboard arrangement; ... The function of the constructed resonant converter is tested by measurements. In addition there is a comparison of the measurements and the caIculations made before. The report ends with a detailed bibliography. Zusammenfassung: Die Diplomarbeit befaßt sich mit einem Thema aus der elektrischen Leistungselektronik: Dem Aufbau eines simplen Schwingkreisumrichters mit Reihenschwingkreis. Neben einer ausführlichen analytischen Betrachtung der Grundlagen eines Wechselumrichters mit Reihenschwingkreises, werden auch moderne Halbleiterschalter wie IGBT, MBGT, MOSFET, Thyristoren,.... auf ihre Tauglichkeit für den gegebenen Verwendungszweck untersucht. Das Hauptaugenmerk wird bei dieser Arbeit auf die Minimierung der Schaltverluste in den Halbleiterbauelementen gelegt. Dazu ist der Schaltpunkt in die Nähe des Strom- und Spannungsnulldurchgangs gelegt. Die besonderen Schwierigkeiten, die sich daher für die Bauteileauswahl ergeben, sind kommentiert, Für den praktischen Aufbau eines Schwingkreisumrichters sind alle notwendigen Dimensionierungen für die Bauteile, Stromlaufpläne, Platinenaufbaupläne,.... in der Arbeit zu finden. Die Funktion des dimensionierten und aufgebauten Schwingkreisumrichters wird durch abschließende Messungen überprüft. Im Anschluß werden die Meßergebnisse mit den zuvor durchgeführten Berechnungen verglichen. Die Arbeit enthält darüberhinaus ein ausführliches Literaturverzeichnis. Inhaltsverzeichnis:Table of Contents: ABSTRACT 2 CHAPTER 1 1.NOMENCLATURE 8 CHAPTER 2 2.INTRODUCTION 10 2.1GENERAL 10 2.2APPLICATIONS FOR RESONANT INVERTERS [...]
Dramatically improve your decisions with data and AI In Decision Intelligence: Transform Your Team and Organization with AI-Driven Decision-Making, a team of pioneering decision and AI strategists delivers a digestible and hands-on resource for professionals at every part of the decision-making journey. The book discusses the latest technology and approaches that bridge the gap between behavioral science, data science, and technological innovation. Discover how leaders from various industries and environments are using data and AI to make better future decisions, taking both human as well as business factors into account. This book covers: A demystifying behind-the-scenes peek inside how AI models, forecasts, and optimization for business challenges really work, and why they open up entirely new possibilities. A business-ready introduction to decision intelligence, exploring why traditional decision-making strategies are outdated and how to transition to decision-intelligence. The evolution of Decision Intelligence, coming from analytics and modern techniques like process mining and robotic process automation An examination of decision intelligence at the organizational level, including discussions of agile transformation, transparent organizational culture, and why psychological safety is a crucial enabler for new ways of decision-making in modern companies An overview of why (and where exactly) AI still needs human expertise and how to incorporate this topic in daily planning and decision making Decision Intelligence is essential reading for managers, executives, board members, other business leaders and soon-to-be leaders looking to improve the quality, adaptability, and speed of their decision-making. Praise for Decision Intelligence "In Decision Intelligence, Thorsten Heilig and Ilhan Scheer build a compelling case for the world of tomorrow’s version of decision-making.” ―Martin Lindstrom, New York Times best-selling author "Decision Intelligence will be one of the big topics for this decade and completely change the way organizations manage, plan, and operate. This book provides a comprehensive guide from the basics to the applications." ―Niklas Jansen, Entrepreneur and Tech Investor, Founding Partner Interface Capital and Co-Founder Blinkist "The book impressively demonstrates the potential and entry points into the world of AI-powered decision making. A very valuable reading for managers and their organizations". ―Michael Kleinemeier, Member of the Merck KG Board of Partners, former Member of the SAP SE Executive Board “The AI hype perfectly captured, easy to understand, de-mystified and mapped to clear use cases - a must-read for today's managers.” ―Dr. Daniela Gerd tom Markotten, Member of the Management Board for Digitalization and Technology, Deutsche Bahn AG
This Open Access proceedings presents a good overview of the current research landscape of assembly, handling and industrial robotics. The objective of MHI Colloquium is the successful networking at both academic and management level. Thereby, the colloquium focuses an academic exchange at a high level in order to distribute the obtained research results, to determine synergy effects and trends, to connect the actors in person and in conclusion, to strengthen the research field as well as the MHI community. In addition, there is the possibility to become acquatined with the organizing institute. Primary audience is formed by members of the scientific society for assembly, handling and industrial robotics (WGMHI). The Editors Prof. Dr.-Ing. Thorsten Schüppstuhl is head of the Institute of Aircraft Production Technology (IFPT) at the Hamburg University of Technology. Prof. Dr.-Ing. Kirsten Tracht is head of the Bremen Institute for Mechanical Engineering (bime) at the University of Bremen. Prof. Dr.-Ing. Annika Raatz is head of the Institute of Assembly Technology (match) at the Leibniz University Hannover.
This book offers a comprehensive guide to implementing SAP and HANA on private, public and hybrid clouds. Cloud computing has transformed the way organizations run their IT infrastructures: the shift from legacy monolithic mainframes and UNIX platforms to cloud based infrastructures offering ubiquitous access to critical information, elastic provisioning and drastic cost savings has made cloud an essential part of every organization’s business strategy. Cloud based services have evolved from simple file sharing, email and messaging utilities in the past, to the current situation, where their improved technical capabilities and SLAs make running mission-critical applications such as SAP possible. However, IT professionals must take due care when deploying SAP in a public, private or hybrid cloud environment. As a foundation for core business operations, SAP cloud deployments must satisfy stringent requirements concerning their performance, scale and security, while delivering measurable improvements in IT efficiency and cost savings. The 2nd edition of “SAP on the Cloud” continues the work of its successful predecessor released in 2013, providing updated guidance for deploying SAP in public, private and hybrid clouds. To do so, it discusses the technical requirements and considerations necessary for IT professionals to successfully implement SAP software in a cloud environment, including best-practice architectures for IaaS, PaaS and SaaS deployments. The section on SAP’s in-memory database HANA has been significantly extended to cover Suite on HANA (SoH) and the different incarnations of HANA Enterprise Cloud (HEC) and Tailored Datacenter Integration (TDI). As cyber threats are a significant concern, it also explores appropriate security models for defending SAP cloud deployments against modern and sophisticated attacks. The reader will gain the insights needed to understand the respective benefits and drawbacks of various deployment models and how SAP on the cloud can be used to deliver IT efficiency and cost-savings in a secure and agile manner.
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and cheaper to build, deploy, and maintain. In this hands-on, highly accessible book, two leading honeypot pioneers systematically introduce virtual honeypot technology. One step at a time, you’ll learn exactly how to implement, configure, use, and maintain virtual honeypots in your own environment, even if you’ve never deployed a honeypot before. You’ll learn through examples, including Honeyd, the acclaimed virtual honeypot created by coauthor Niels Provos. The authors also present multiple real-world applications for virtual honeypots, including network decoy, worm detection, spam prevention, and network simulation. After reading this book, you will be able to Compare high-interaction honeypots that provide real systems and services and the low-interaction honeypots that emulate them Install and configure Honeyd to simulate multiple operating systems, services, and network environments Use virtual honeypots to capture worms, bots, and other malware Create high-performance "hybrid" honeypots that draw on technologies from both low- and high-interaction honeypots Implement client honeypots that actively seek out dangerous Internet locations Understand how attackers identify and circumvent honeypots Analyze the botnets your honeypot identifies, and the malware it captures Preview the future evolution of both virtual and physical honeypots
This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011. The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intial submissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.