Knowledge-Based Intelligent System Advancements: Systemic and Cybernetic Approaches: Systemic and Cybernetic Approaches

IGI Global
Free sample

The integration of artificial intelligence and knowledge based methods and technologies as well as computer based information systems has created the next generation of information systems – intelligent information systems. This connection enables these new information systems to demonstrate novel capabilities, in particular: supporting users in decision making, processing data, discovering and processing knowledge, and reasoning under uncertainty.

Knowledge-Based Intelligent System Advancements: Systemic and Cybernetic Approaches presents selected new AI–based ideas and methods for analysis and decision making in intelligent information systems derived using systemic and cybernetic approaches. This book is useful for researchers, practitioners and students interested intelligent information retrieval and processing, machine learning and adaptation, knowledge discovery, applications of fuzzy based methods and neural networks.

Read more

About the author

Jerzy Józefczyk graduated in automatic control systems from the Wroclaw University of Technology, in 1980. He received the Ph.D. degree in computer science from the Poznan University of Technology, in 1987, and Dr. Sc. degree in automation and robotics from the Systems Research Institute of the Polish Academy of Sciences, Warsaw, in 1996. Presently, he is a full professor in the Wroclaw University of Technology, and a head of the Department of Intelligent Decision Making Systems. His research interests include operations research, complex control systems, uncertain systems and artificial intelligence which resulted in more than 100 publications. He was a Scientific Secretary of the Committee of Automation and Robotics of the Polish Academy of Sciences in 1988–2006 and a member of this Committee from 1988. He is currently a member of a Board of Directors of the World Organisation of Systems and Cybernetics.

Donat Orski received M.Sc. and Ph.D. degrees in computer science from the Wroclaw University of Technology (WUT), in 1995 and 2000, respectively. Currently, he is an assistant professor in the Department of Intelligent Decision Making Systems in WUT. His research interests include knowledge-based systems, expert systems, uncertain systems, neural networks, learning systems, and their applications to decision making in complex operation systems. He is an author or co-author of more than 30 conference papers, journal articles and book chapters on these topics. [Editor]

Read more

Additional Information

IGI Global
Read more
Published on
Aug 31, 2010
Read more
Read more
Read more
Read more
Best For
Read more
Read more
Computers / Computer Science
Computers / Cybernetics
Computers / General
Read more
Content Protection
This content is DRM protected.
Read more

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
******** More than 1,000 copies sold in first month of launch *********

According to Einstein, “There are two things which have no end, one is UNIVERSE and the second is Human's STUPIDITY”. So, don't be fooled, never click on any file sent through chatting. And keep one thing in mind that "Hacking can only be done through your mistakes”.

This book is written for both technical and non-technical persons, and layman terminologies are used, so as anyone can easily understand. This will NOT teach you to be a hacker, but will teach you what hackers do, how do they think, and how they perform hacking. If you know their intention, you can prevent yourself from being hacked. Please keep in mind that you can’t prevent fully but can minimize the chances of being a victim.

It will also discuss about the most used hacking methodologies, what leakage in system let it gets performed and how can you prevent yourself from it. Play safe, Stay safe!

I'm sure this book is going to help you in your day to day cyber life. Please do read, and leave a lovely comment.


Contents Overview:


Classification of Hackers

Why do they hack?

Phases of Hacking

Methods of Hacking and Preventive Actions

Digital Foot-printing

Social Engineering

Password Cracking

Passive Attacks


Denial of Service (Dos Attack)

SQL Injection

XSS (Cross site Scripting)

Cross Site Request Forgery, CSRF



Man In The Middle, MITM


Bonus: Google Hacking Tools that assist Hackers

Prevention from Hackers

Laws and Liabilities in India

Case Study

Aadhaar data breach – January

Facebook data breach – March

Facebook data breach – Sep

Yahoo! Data breaches – August

LinkedIn breach – May

©2019 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.