The AI Revolution is Here. Discover its Dynamic Applications in Networking, Cybersecurity, and More. AI is having a profound impact on nearly every sector of the workforce. Huge professional and financial opportunities await in the key domains of computer networking, cybersecurity, IoT, and cloud computing. The AI Revolution in Networking, Cybersecurity, and Emerging Technologies will give you the edge you need to harness AI for your benefit. Learn how AI can efficiently identify shadow data, fortify security measures, generate predictive analytics in real time, and so much more. In this…mehr
The AI Revolution is Here. Discover its Dynamic Applications in Networking, Cybersecurity, and More. AI is having a profound impact on nearly every sector of the workforce. Huge professional and financial opportunities await in the key domains of computer networking, cybersecurity, IoT, and cloud computing. The AI Revolution in Networking, Cybersecurity, and Emerging Technologies will give you the edge you need to harness AI for your benefit. Learn how AI can efficiently identify shadow data, fortify security measures, generate predictive analytics in real time, and so much more. In this comprehensive guide, Cisco professionals Omar Santos, Samer Salam, and Hazim Dahir engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow. You'll discover how AI is building robust bridges in collaboration tools and turning IoT into a super-intelligent network of devices so you can quickly identify and resolve network security threats while enhancing network performance. This book will show you how AI can help you modernize and fortify your operations and make yourself a key asset to your company. Are you ready to join The AI Revolution in Networking, Cybersecurity, and Emerging Technologies? * Gain industry-specific knowledge from experienced professionals * Discover new capabilities like self-healing networks and predictive analytics * Learn how AI can save time by detecting and correcting issues in real time * Master techniques for security monitoring and alerting * Understand potential security and privacy pitfalls of using AI, and how to guard against them * Understand how AI works for you and with you Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Omar Santos is a cybersecurity thought leader with a passion for driving industry-wide initiatives to enhance the security of critical infrastructures. Omar is the lead of the DEF CON Red Team Village, chair of the Common Security Advisory Framework (CSAF) technical committee, and board member of the OASIS Open standards organization. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is a renowned expert in ethical hacking, vulnerability research, and incident response. He employs his deep understanding of these disciplines to help organizations stay ahead of emerging threats. His dedication to cybersecurity has made a significant impact on businesses, academic institutions, law enforcement agencies, and other entities striving to bolster their security measures. With over twenty books, video courses, white papers, and technical articles under his belt, Omar's expertise is widely recognized and respected. As a principal engineer at Cisco's Product Security Incident Response Team (PSIRT), Omar not only leads engineers and incident managers in investigating and resolving cybersecurity vulnerabilities, but also actively mentors the next generation of security professionals. Samer Salam is a technology architect and software engineering leader in the computer networking industry with over 23 years of experience. In his role as a Distinguished Engineer at Cisco Systems, he focuses on identifying disruptive technologies based on market transitions, incubating and mainstreaming emerging technologies, in addition to defining the system and software architecture for networking products. His work spans the areas of Intent Based Networking, Artificial Intelligence, Machine Reasoning, Semantic Technologies and Immersive Visualization. Previously at Cisco, he held multiple technical leadership and software development positions working on IoT, Layer 2 VPN / EVPN, Carrier/Metro Ethernet services, OAM, network resiliency, system scalability, software quality, multi-service edge, broadband, MPLS and dial solutions. Samer was awarded the International Society of Service Innovation Professionals (ISSIP) 2022 Excellence in Service Innovation Award for the Impact to Innovation category. He holds over 95 US and international patents and is co-author of The Internet of Things From Hype to Reality: The Road to Digitization. He authored thirteen IETF RFCs, and multiple articles in academic and industry journals. He is also a speaker at CiscoLive, and blogs on networking technology. He holds an M.S. degree in Computer Engineering from the University of Southern California in Los Angeles and a B.E. degree in Computer and Communications Engineering, with Distinction, from the American University of Beirut, where he received the Faculty of Engineering and Architecture Deans Award for Creative Achievement. Hazim Dahir, is a Distinguished Engineer at the Cisco Technology Enablement and Acceleration Office. He is working to define and influence next-generation digital transformation architectures across multiple technologies and verticals. Hazim started his Cisco tenure in 1996 as a software engineer and subsequently moved into the services organization focusing on large-scale and emerging technology network architectures. He is currently focusing on developing architectures utilizing security, collaboration, Edge computing, and AI technologies addressing future of work and hybrid cloud requirements for large enterprises. Through his passion for engineering and sustainability, Hazim is currently working on advanced software solutions for electric and autonomous vehicles with global automotive manufacturers. Hazim is a frequent presenter at multiple US and global conferences and standards bodies. He's the vice-chair for the IEEE Edge Computing workgroup. He has more than 20 issued and pending US and International patents, a number of R&D publications, and is the co-author of three technical books.
Inhaltsangabe
Preface xix
Chapter 1. Introducing the Age of AI: Emergence, Growth, and Impact on Technology 1 The End of Human Civilization 2 Significant Milestones in AI Development (This Book Is Already Obsolete) 2 The AI Black Box Problem and Explainable AI 5 What's the Difference Between Large Language Models and Traditional Machine Learning? 6 Hugging Face Hub: A Game-Changer in Collaborative Machine Learning 12 AI's Expansion Across Industries: Networking, Cloud Computing, Security, Collaboration, and IoT 14 AI's Impacts on the Job Market 15 AI's Impacts on Security, Ethics, and Privacy 17 Summary 30 References 31 Chapter 2. Connected Intelligence: AI in Computer Networking 33 The Role of AI in Computer Networking 34 AI for Network Management 37 AI for Network Optimization 45 AI for Network Security 49 AI for Traffic Classification and Prediction 52 AI in Network Digital Twins 54 Summary 55 References 56
Chapter 3. Securing the Digital Frontier: AI's Role in Cybersecurity 59 AI in Incident Response: Analyzing Potential Indicators to Determine the Type of Attack 59 AI in Vulnerability Management and Vulnerability Prioritization 71 AI in Security Governance, Policies, Processes, and Procedures 73 Using AI to Create Secure Network Designs 74 AI and Security Implications of IoT, OT, Embedded, and Specialized Systems 75 AI and Physical Security 76 AI in Security Assessments, Red Teaming, and Penetration Testing 77 AI in Identity and Account Management 80 Using AI for Fraud Detection and Prevention 86 AI and Cryptography 87 AI in Secure Application Development, Deployment, and Automation 90 Summary 93 References 94
Chapter 4. AI and Collaboration Building Bridges, Not Walls 95 Collaboration Tools and the Future of Work 96 AI for Collaboration 101 The Contact Center: A Bridge to Customers 109 AR/VR: A Closer Look 113 Affective Computing 116 Summary 116 References 117
Chapter 5. AI in the Internet of Things (AIoT) 119 Understanding the IoT Landscape 120 AI for Data Analytics and Decision Making 122 AI for IoT Resource Optimization 125 AI for IoT in Supply Chain 127 AI for IoT Security 130 AI for IoT in Sustainability 133 Summary 137 References 137
Chapter 6. Revolutionizing Cloud Computing with AI 139 Understanding the Cloud Computing Environment 139 AI in Cloud Infrastructure Management 145 AI for Cloud Security 147 AI for Cloud Optimization 151 AI and Machine Learning as a Service 153 Challenges of AI and Machine Learning in the Cloud 158 What Lies Ahead 158 References 159
Chapter 7. Impact of AI in Other Emerging Technologies 161 Executive Order on the Development and Use of Artificial Intelligence 162 AI in Quantum Computing 163 How AI Can Revolutionize Quantum Hardware Optimization 167 Data Analysis and Interpretation 168 AI in Blockchain Technologies 169 AI in Autonomous Vehicles and Drones 175 AI in Edge Computing 175 Summary 183 References 184
Chapter 1. Introducing the Age of AI: Emergence, Growth, and Impact on Technology 1 The End of Human Civilization 2 Significant Milestones in AI Development (This Book Is Already Obsolete) 2 The AI Black Box Problem and Explainable AI 5 What's the Difference Between Large Language Models and Traditional Machine Learning? 6 Hugging Face Hub: A Game-Changer in Collaborative Machine Learning 12 AI's Expansion Across Industries: Networking, Cloud Computing, Security, Collaboration, and IoT 14 AI's Impacts on the Job Market 15 AI's Impacts on Security, Ethics, and Privacy 17 Summary 30 References 31 Chapter 2. Connected Intelligence: AI in Computer Networking 33 The Role of AI in Computer Networking 34 AI for Network Management 37 AI for Network Optimization 45 AI for Network Security 49 AI for Traffic Classification and Prediction 52 AI in Network Digital Twins 54 Summary 55 References 56
Chapter 3. Securing the Digital Frontier: AI's Role in Cybersecurity 59 AI in Incident Response: Analyzing Potential Indicators to Determine the Type of Attack 59 AI in Vulnerability Management and Vulnerability Prioritization 71 AI in Security Governance, Policies, Processes, and Procedures 73 Using AI to Create Secure Network Designs 74 AI and Security Implications of IoT, OT, Embedded, and Specialized Systems 75 AI and Physical Security 76 AI in Security Assessments, Red Teaming, and Penetration Testing 77 AI in Identity and Account Management 80 Using AI for Fraud Detection and Prevention 86 AI and Cryptography 87 AI in Secure Application Development, Deployment, and Automation 90 Summary 93 References 94
Chapter 4. AI and Collaboration Building Bridges, Not Walls 95 Collaboration Tools and the Future of Work 96 AI for Collaboration 101 The Contact Center: A Bridge to Customers 109 AR/VR: A Closer Look 113 Affective Computing 116 Summary 116 References 117
Chapter 5. AI in the Internet of Things (AIoT) 119 Understanding the IoT Landscape 120 AI for Data Analytics and Decision Making 122 AI for IoT Resource Optimization 125 AI for IoT in Supply Chain 127 AI for IoT Security 130 AI for IoT in Sustainability 133 Summary 137 References 137
Chapter 6. Revolutionizing Cloud Computing with AI 139 Understanding the Cloud Computing Environment 139 AI in Cloud Infrastructure Management 145 AI for Cloud Security 147 AI for Cloud Optimization 151 AI and Machine Learning as a Service 153 Challenges of AI and Machine Learning in the Cloud 158 What Lies Ahead 158 References 159
Chapter 7. Impact of AI in Other Emerging Technologies 161 Executive Order on the Development and Use of Artificial Intelligence 162 AI in Quantum Computing 163 How AI Can Revolutionize Quantum Hardware Optimization 167 Data Analysis and Interpretation 168 AI in Blockchain Technologies 169 AI in Autonomous Vehicles and Drones 175 AI in Edge Computing 175 Summary 183 References 184
Index 185
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der Steintor 70. V V GmbH (zukünftig firmierend: buecher.de internetstores GmbH)
Geschäftsführung: Monica Sawhney | Roland Kölbl
Sitz der Gesellschaft: Hannover
Amtsgericht Hannover HRB 227001
Steuernummer: 321/neu