Cover....1
Half Title....2
Title Page....4
Copyright Page....5
Contents....8
Preface....16
1 Introducing the Age of AI: Emergence, Growth, and Impact on Technology....22
The End of Human Civilization....23
Significant Milestones in AI Development (This Book Is Already Obsolete)....23
The AI Black Box Problem and Explainable AI....26
Whats the Difference Between Todays Large Language Models and Traditional Machine Learning?....27
Hugging Face Hub: A Game-Changer in Collaborative Machine Learning....33
AIs Expansion Across Different Industries: Networking, Cloud Computing, Security, Collaboration, and IoT....35
AIs Impacts on the Job Market....36
AIs Impacts on Security, Ethics, and Privacy....38
Prompt Injection Attacks....38
Insecure Output Handling....43
Training Data Poisoning.....43
Model Denial of Service....43
Supply Chain Vulnerabilities....44
Sensitive Information Disclosure....45
Insecure Plugin Design....46
Excessive Agency....46
Overreliance....47
Model Theft....47
Model Inversion and Extraction....47
Backdoor Attacks....48
MITRE ATLAS Framework....49
AI and Ethics....49
AI and Privacy....49
Summary....51
References....52
2 Connected Intelligence: AI in Computer Networking....54
The Role of AI in Computer Networking....55
AI for Network Management....58
Automating Network Planning....58
Automating Network Configuration....59
Automating Network Assurance....61
AI for Network Optimization....66
Routing Optimization....66
Radio Resource Management....68
Energy Optimization....69
AI for Network Security....70
Access Control....70
Anti-malware Systems....71
Firewalls....72
Behavioral Analytics....72
Software and Application Security....73
AI for Network Traffic Analysis....73
AI in Network Digital Twins.....75
Summary....76
References....77
3 Securing the Digital Frontier: AIs Role in Cybersecurity....80
AI in Incident Response: Analyzing Potential Indicators to Determine the Type of Attack....80
Predictive Analytics....81
Sentiment Analysis and Potential Threat Intelligence....86
Text-Based Anomaly Detection....88
Enhancing Human Expertise in the Security Operations Center Through AI....89
Integration with Other Models....92
AI in Vulnerability Management and Vulnerability Prioritization....92
AI in Security Governance, Policies, Processes, and Procedures....94
Using AI to Create Secure Network Designs....95
Role of AI in Secure Network Design....95
AI and Security Implications of IoT, OT, Embedded, and Specialized Systems.....96
AI and Physical Security....97
How AI Is Transforming Physical Security....97
Security Co-pilots....97
Enhanced Access Control....98
AI in Security Assessments, Red Teaming, and Penetration Testing....98
AI in Identity and Account Management....101
Intelligent Authentication....102
Automated Account Provisioning and Deprovisioning....104
Dynamic Access Control....105
Using AI for Fraud Detection and Prevention....107
AI and Cryptography....108
AI-Driven Cryptanalysis....108
Dynamic Cryptographic Implementations....109
Integration with Quantum Cryptography....109
AI in Secure Application Development, Deployment, and Automation....111
Dynamic Analysis....111
Intelligent Threat Modeling....112
Secure Configuration Management....112
Intelligent Patch Management While Creating Code....113
Summary....114
References....115
4 AI and Collaboration: Building Bridges, Not Walls....116
Collaboration Tools and the Future of Work....117
Innovations in Multimedia and Collaboration....118
What Is Hybrid Work and Why Do We Need It?.....120
AI for Collaboration....122
Authentication, Verification, or Authorization Through Voice or Speech Recognition....122
Reducing Language Barriers with Real-Time Translation....122
Virtual Assistants....123
Task Management....123
Context and Intent Analysis....124
Workflow Automation....124
Prescriptive Analytics....125
Learning and Development....126
Physical Collaboration Spaces....127
Virtual Collaboration Spaces....127
Team Dynamics....128
Document Management....129
The Contact Center: A Bridge to Customers....130
Virtual Agents....132
Call Routing Optimization....132
24 7 365 Support....132
Multilanguage Support....132
Customer Sentiment....133
Quality Assurance and Agent Coaching.....133
Large Case Volume Handling....133
Predictive Analytics....134
Upgrading and Upselling....134
ARVR: A Closer Look....134
Interactive Learning....135
AI-Assisted Real-Time Rendering....135
Content Generation....135
Personalization of Interaction....136
Virtual AssistantSelling....136
NLP and NLU....136
Sentiments and Emotions....136
Affective Computing....137
Summary....137
References....138
5 AI in the Internet of Things (AIoT)....140
Understanding the IoT Landscape....141
AI for Data Analytics and Decision-Making....143
Data Processing....143
Anomaly Detection....144
Predictive Maintenance....144
Advanced Data Analytics....145
AI for IoT Resource Optimization....146
AI for IoT in Supply Chains....148
AI for IoT Security....151
AI and Threat Detection in IoT....152
AI and Vulnerability Detection in IoT Environments....153
AI and Authentication in IoT....153
AI and Physical Safety and Security....154
AI for IoT in Sustainability....154
Water Management and Preservation....155
Energy Management....155
Sustainable Waste Management and Recycling....155
Wildlife Conservation....156
Circular Economy....156
Summary....158
References....158
6 Revolutionizing Cloud Computing with AI....160
Understanding the Cloud Computing Environment....160
Virtualization....161
Application Mobility....163
Cloud Services....164
Deployment Models....164
Cloud Orchestration....165
AI in Cloud Infrastructure Management....166
Workload and VM Placement....166
Demand Prediction and Load-Balancing....167
Anomaly Detection....167
AI for Cloud Security....168
Vulnerabilities and Attacks....169
How Can AI Help?....170
Challenges for AI....171
AI for Cloud Optimization....172
Cloud Service Optimization....172
Cloud Infrastructure Optimization....173
AI and Machine Learning as a Service....174
AI Infrastructure Services....175
AI Developer Services: AutoML and Low-CodeNo-Code AI....175
AI Software Services....176
Advantages of AIaaS....177
Challenges of AI and Machine Learning in the Cloud....179
What Lies Ahead....179
Summary....180
References....180
7 Impact of AI in Other Emerging Technologies....182
Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence....183
AI in Quantum Computing....184
Quantum Algorithm Development....185
Algorithmic Tuning and Automated Circuit Synthesis....187
Hyperparameter Optimization, Real-Time Adaptation, and Benchmarking for Performance Analysis....187
How AI Can Revolutionize Quantum Hardware Optimization....13
Control Operation and Resource Optimization....13
Data Analysis and Interpretation....189
Quantum Machine Learning: Leveraging AI Research to Uncover Quantum Advantages in ML Tasks.....189
AI in Blockchain Technologies....190
Automating the Execution of Smart Contracts with AI....190
Could We Optimize Blockchain Mining Through AI Algorithms?....191
Additional Use Cases in Healthcare, Supply Chain Management, Financial Services....192
AI in Autonomous Vehicles and Drones....196
AI in Edge Computing....196
Extending the Cloud: Edge and Fog....197
Taking AI to the Edge....198
Lightweight AI and Tiny ML....199
Applications and Use Cases....201
Web 3.0....203
Summary....204
References....205
Index....206
A....206
B....207
C....208
D....209
E....210
F....211
G....211
H....211
I....211
J....212
K....212
L....212
M....213
N....214
O....214
P....215
Q....215
R....216
S....216
T....218
U....218
V....219
W....219
X....219
U....219
Z....219
The AI Revolution is Here. Discover its Dynamic Applications in Networking, Cybersecurity, and More.
AI is having a profound impact on nearly every sector of the workforce. Huge professional and financial opportunities await in the key domains of computer networking, cybersecurity, IoT, and cloud computing. The AI Revolution in Networking, Cybersecurity, and Emerging Technologies will give you the edge you need to harness AI for your benefit. Learn how AI can efficiently identify shadow data, fortify security measures, generate predictive analytics in real time, and so much more.
In this comprehensive guide, Cisco professionals Omar Santos, Samer Salam, and Hazim Dahir engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow.
You'll discover how AI is building robust bridges in collaboration tools and turning IoT into a super-intelligent network of devices so you can quickly identify and resolve network security threats while enhancing network performance. This book will show you how AI can help you modernize and fortify your operations and make yourself a key asset to your company.
Are you ready to join The AI Revolution in Networking, Cybersecurity, and Emerging Technologies?