Advanced

https://editorialia.com/wp-content/uploads/2020/06/cover-interpretable-machine-learning-1.jpg

Interpretable Machine Learning (A Guide for Making Black Box Models Explainable)

The book focuses on machine learning models for tabular data (also called relational or structured data) and less on computer vision and natural language processing tasks. Reading the book is recommended for machine learning practitioners, data scientists, statisticians, and anyone else interested in making machine learning models interpretable.

https://editorialia.com/wp-content/uploads/2020/06/unconventional-computer-arithmetic-for-emerging-applications-and-technologies.jpg

Unconventional Computer Arithmetic for Emerging Applications and Technologies

Arithmetic plays a major role in computing performance and efficiency. It is challenging to build platforms, ranging from embedded devices to high performance computers, supported on traditional binary arithmetic and silicon-based technologies that meet the requirements of today’s applications. In this talk, the state-of-the-art of non-conventional computer arithmetic is presented, considering alternative computing models and emerging technologies.

https://editorialia.com/wp-content/uploads/2020/06/trainings-for-cybersecurity-specialists-1.jpg

Trainings for Cybersecurity Specialists

“ENISA CSIRT training material was introduced in 2008. In 2012, 2013 and 2014 it was complemented with new exercise scenarios containing essential material for success in the CSIRT community and in the field of information security. In these pages you will find the ENISA CSIRT training material, containing Handbooks for teachers, Toolsets for students and Virtual Images to support hands on training sessions. ” The materials continue to be updated in 2020 and are appropriate for use by cybersecurity specialists and decision-makers.

https://editorialia.com/wp-content/uploads/2020/06/best-practives-in-dataviz_-an-r-perspective.jpg

Best Practices in Dataviz: An R Perspective

By the end of this you will have had a whirlwind tour of the very tip of the data visualization best-practices iceberg. We will go over a broad range of topics generally applicable to data science usecases but not dive too deep into any single one. One thing to keep in mind the whole time is none of this is absolutely set in stone, most often in the real world you have to bend or break some of these rules to do what you want.

https://editorialia.com/wp-content/uploads/2020/05/cumplimiento_normativo_y_seguridad_ti_en_iot-3.jpg

Cumplimiento normativo y seguridad TI en IoT

La conectividad y el tratamiento masivo de datos son dos pilares esenciales para el desarrollo de estos sistemas, los cuales, a su vez, introducen riesgos de seguridad y privacidad que deben ser tratados adecuadamente.

https://editorialia.com/wp-content/uploads/2020/05/csirts_and_criminal_justice_authorities_-council_europe_webinar-2.jpg

CSIRTs and criminal justice authorities

CSIRTs and criminal justice authorities – good practices of collaboration on cybercrime and electronic evidence (webinar, Council Europe)

https://editorialia.com/wp-content/uploads/2020/05/google_engineering_practices_documentation-1.jpg

Google Engineering Practices Documentation

Google has many generalized engineering practices that cover all languages and all projects. These documents represent their collective experience of various best practices that they have developed over time. It is possible that open source projects or other organizations would benefit from this knowledge.

https://editorialia.com/wp-content/uploads/2020/04/e74ee944-e7de-480c-9b60-665e97c78261.png

Encrypted Traffic Analysis

This report explores the current state of affairs in Encrypted Traffic Analysis and in particular discusses research and methods in 6 key use cases; viz. application identification, network analytics, user information identification, detection of encrypted malware, file/device/website/location fingerprinting and DNS tunnelling detection.

Cyber Europe 2020: Preparing healthcare sector to respond to cyber crises

In 2020, European countries and the EU Agency for Cybersecurity (ENISA) should have organised the 6th pan European cyber crisis exercise, Cyber Europe 2020 (CE2020). However, due to the current health crisis Cyber Europe will be shifted to a later date, yet to be announce. CE2020 is part of the bi-annual Cyber Europe series of exercises launched in 2010.