The AI Revolution in Networking, Cybersecurity, and Emerging Technologies

The AI Revolution in Networking, Cybersecurity, and Emerging Technologies

The AI Revolution in Networking, Cybersecurity, and Emerging Technologies
Автор: Dahir Hazim, Salam Samer, Santos Omar
Дата выхода: 2024
Издательство: Addison-Wesley
Количество страниц: 221
Размер файла: 2,5 МБ
Тип файла: PDF
Добавил: codelibs
 Проверить на вирусы

Cover....1

Half Title....2

Title Page....4

Copyright Page....5

Contents....8

Preface....16

1 Introducing the Age of AI: Emergence, Growth, and Impact on Technology....22

The End of Human Civilization....23

Significant Milestones in AI Development (This Book Is Already Obsolete)....23

The AI Black Box Problem and Explainable AI....26

Whats the Difference Between Todays Large Language Models and Traditional Machine Learning?....27

Hugging Face Hub: A Game-Changer in Collaborative Machine Learning....33

AIs Expansion Across Different Industries: Networking, Cloud Computing, Security, Collaboration, and IoT....35

AIs Impacts on the Job Market....36

AIs Impacts on Security, Ethics, and Privacy....38

Prompt Injection Attacks....38

Insecure Output Handling....43

Training Data Poisoning.....43

Model Denial of Service....43

Supply Chain Vulnerabilities....44

Sensitive Information Disclosure....45

Insecure Plugin Design....46

Excessive Agency....46

Overreliance....47

Model Theft....47

Model Inversion and Extraction....47

Backdoor Attacks....48

MITRE ATLAS Framework....49

AI and Ethics....49

AI and Privacy....49

Summary....51

References....52

2 Connected Intelligence: AI in Computer Networking....54

The Role of AI in Computer Networking....55

AI for Network Management....58

Automating Network Planning....58

Automating Network Configuration....59

Automating Network Assurance....61

AI for Network Optimization....66

Routing Optimization....66

Radio Resource Management....68

Energy Optimization....69

AI for Network Security....70

Access Control....70

Anti-malware Systems....71

Firewalls....72

Behavioral Analytics....72

Software and Application Security....73

AI for Network Traffic Analysis....73

AI in Network Digital Twins.....75

Summary....76

References....77

3 Securing the Digital Frontier: AIs Role in Cybersecurity....80

AI in Incident Response: Analyzing Potential Indicators to Determine the Type of Attack....80

Predictive Analytics....81

Sentiment Analysis and Potential Threat Intelligence....86

Text-Based Anomaly Detection....88

Enhancing Human Expertise in the Security Operations Center Through AI....89

Integration with Other Models....92

AI in Vulnerability Management and Vulnerability Prioritization....92

AI in Security Governance, Policies, Processes, and Procedures....94

Using AI to Create Secure Network Designs....95

Role of AI in Secure Network Design....95

AI and Security Implications of IoT, OT, Embedded, and Specialized Systems.....96

AI and Physical Security....97

How AI Is Transforming Physical Security....97

Security Co-pilots....97

Enhanced Access Control....98

AI in Security Assessments, Red Teaming, and Penetration Testing....98

AI in Identity and Account Management....101

Intelligent Authentication....102

Automated Account Provisioning and Deprovisioning....104

Dynamic Access Control....105

Using AI for Fraud Detection and Prevention....107

AI and Cryptography....108

AI-Driven Cryptanalysis....108

Dynamic Cryptographic Implementations....109

Integration with Quantum Cryptography....109

AI in Secure Application Development, Deployment, and Automation....111

Dynamic Analysis....111

Intelligent Threat Modeling....112

Secure Configuration Management....112

Intelligent Patch Management While Creating Code....113

Summary....114

References....115

4 AI and Collaboration: Building Bridges, Not Walls....116

Collaboration Tools and the Future of Work....117

Innovations in Multimedia and Collaboration....118

What Is Hybrid Work and Why Do We Need It?.....120

AI for Collaboration....122

Authentication, Verification, or Authorization Through Voice or Speech Recognition....122

Reducing Language Barriers with Real-Time Translation....122

Virtual Assistants....123

Task Management....123

Context and Intent Analysis....124

Workflow Automation....124

Prescriptive Analytics....125

Learning and Development....126

Physical Collaboration Spaces....127

Virtual Collaboration Spaces....127

Team Dynamics....128

Document Management....129

The Contact Center: A Bridge to Customers....130

Virtual Agents....132

Call Routing Optimization....132

24 7 365 Support....132

Multilanguage Support....132

Customer Sentiment....133

Quality Assurance and Agent Coaching.....133

Large Case Volume Handling....133

Predictive Analytics....134

Upgrading and Upselling....134

ARVR: A Closer Look....134

Interactive Learning....135

AI-Assisted Real-Time Rendering....135

Content Generation....135

Personalization of Interaction....136

Virtual AssistantSelling....136

NLP and NLU....136

Sentiments and Emotions....136

Affective Computing....137

Summary....137

References....138

5 AI in the Internet of Things (AIoT)....140

Understanding the IoT Landscape....141

AI for Data Analytics and Decision-Making....143

Data Processing....143

Anomaly Detection....144

Predictive Maintenance....144

Advanced Data Analytics....145

AI for IoT Resource Optimization....146

AI for IoT in Supply Chains....148

AI for IoT Security....151

AI and Threat Detection in IoT....152

AI and Vulnerability Detection in IoT Environments....153

AI and Authentication in IoT....153

AI and Physical Safety and Security....154

AI for IoT in Sustainability....154

Water Management and Preservation....155

Energy Management....155

Sustainable Waste Management and Recycling....155

Wildlife Conservation....156

Circular Economy....156

Summary....158

References....158

6 Revolutionizing Cloud Computing with AI....160

Understanding the Cloud Computing Environment....160

Virtualization....161

Application Mobility....163

Cloud Services....164

Deployment Models....164

Cloud Orchestration....165

AI in Cloud Infrastructure Management....166

Workload and VM Placement....166

Demand Prediction and Load-Balancing....167

Anomaly Detection....167

AI for Cloud Security....168

Vulnerabilities and Attacks....169

How Can AI Help?....170

Challenges for AI....171

AI for Cloud Optimization....172

Cloud Service Optimization....172

Cloud Infrastructure Optimization....173

AI and Machine Learning as a Service....174

AI Infrastructure Services....175

AI Developer Services: AutoML and Low-CodeNo-Code AI....175

AI Software Services....176

Advantages of AIaaS....177

Challenges of AI and Machine Learning in the Cloud....179

What Lies Ahead....179

Summary....180

References....180

7 Impact of AI in Other Emerging Technologies....182

Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence....183

AI in Quantum Computing....184

Quantum Algorithm Development....185

Algorithmic Tuning and Automated Circuit Synthesis....187

Hyperparameter Optimization, Real-Time Adaptation, and Benchmarking for Performance Analysis....187

How AI Can Revolutionize Quantum Hardware Optimization....13

Control Operation and Resource Optimization....13

Data Analysis and Interpretation....189

Quantum Machine Learning: Leveraging AI Research to Uncover Quantum Advantages in ML Tasks.....189

AI in Blockchain Technologies....190

Automating the Execution of Smart Contracts with AI....190

Could We Optimize Blockchain Mining Through AI Algorithms?....191

Additional Use Cases in Healthcare, Supply Chain Management, Financial Services....192

AI in Autonomous Vehicles and Drones....196

AI in Edge Computing....196

Extending the Cloud: Edge and Fog....197

Taking AI to the Edge....198

Lightweight AI and Tiny ML....199

Applications and Use Cases....201

Web 3.0....203

Summary....204

References....205

Index....206

A....206

B....207

C....208

D....209

E....210

F....211

G....211

H....211

I....211

J....212

K....212

L....212

M....213

N....214

O....214

P....215

Q....215

R....216

S....216

T....218

U....218

V....219

W....219

X....219

U....219

Z....219

The AI Revolution is Here. Discover its Dynamic Applications in Networking, Cybersecurity, and More.

AI is having a profound impact on nearly every sector of the workforce. Huge professional and financial opportunities await in the key domains of computer networking, cybersecurity, IoT, and cloud computing. The AI Revolution in Networking, Cybersecurity, and Emerging Technologies will give you the edge you need to harness AI for your benefit. Learn how AI can efficiently identify shadow data, fortify security measures, generate predictive analytics in real time, and so much more.

In this comprehensive guide, Cisco professionals Omar Santos, Samer Salam, and Hazim Dahir engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow.

You'll discover how AI is building robust bridges in collaboration tools and turning IoT into a super-intelligent network of devices so you can quickly identify and resolve network security threats while enhancing network performance. This book will show you how AI can help you modernize and fortify your operations and make yourself a key asset to your company.

Are you ready to join The AI Revolution in Networking, Cybersecurity, and Emerging Technologies?



Похожее:

Список отзывов:

Нет отзывов к книге.