This book explores the foundational concepts and architecture of the Internet of Vehicles (IoV), including data acquisition, communication, security, and privacy.
This book explores the foundational concepts and architecture of the Internet of Vehicles (IoV), including data acquisition, communication, security, and privacy.
This book gathers high-quality peer-reviewed research papers presented at the International Conference on Advancement in Cyber Security and Digital Forensics (ICACSDF 2025), organized by University of Petroleum and Energy Studies (UPES), Dehradun, India, on April 11–12, 2025.
This book gathers high-quality peer-reviewed research papers presented at the International Conference on Advancement in Cyber Security and Digital Forensics (ICACSDF 2025), organized by University of Petroleum and Energy Studies (UPES), Dehradun, India, on April 11–12, 2025.
Red Hat Enterprise Linux 10 Essentials provides detailed information on installing, using, and administering the Red Hat Enterprise Linux 10 distribution.
This handbook delves into the multifaceted domain of blockchain technology and its applications, offering insights across technological, economic, and practical dimensions.
This book consists of a collection of the high-quality research articles in the field of computer vision and robotics which are presented at the International Conference on Computer Vision and Robotics (CVR 2025), organized by National Institute of Technology, Goa, India, during 25–26 April 2025.
This book consists of a collection of the high-quality research articles in the field of computer vision and robotics which are presented at the International Conference on Computer Vision and Robotics (CVR 2025), organized by National Institute of Technology, Goa, India, during 25–26 April 2025.
This handbook delves into the multifaceted domain of blockchain technology and its applications, offering insights across technological, economic, and practical dimensions.
As the deployment of AI technologies surges, the need to safeguard privacy and security in the use of large language models (LLMs) is more crucial than ever.
As the deployment of AI technologies surges, the need to safeguard privacy and security in the use of large language models (LLMs) is more crucial than ever.
This book explores the essential concepts and practical implementation of IPv6, the next-generation Internet Protocol designed to address the limitations of IPv4 and support the exponential growth of Internet-connected devices.
This book explores the essential concepts and practical implementation of IPv6, the next-generation Internet Protocol designed to address the limitations of IPv4 and support the exponential growth of Internet-connected devices.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
Quantum Communication, Quantum Networks and Quantum Sensing: An Applied Approach, Second Edition, is a self-contained and up-to date introduction to quantum communication, quantum error-correction, quantum networks, and quantum sensing.
This book presents a collection of high-quality, peer-reviewed research papers from First International Conference on Information Technology and Artificial Intelligence (ITAI 2025), organized by Soft Computing Research Society held in Gurgaon, India, from January 24–25, 2025.
This book presents a collection of high-quality, peer-reviewed research papers from First International Conference on Information Technology and Artificial Intelligence (ITAI 2025), organized by Soft Computing Research Society held in Gurgaon, India, from January 24–25, 2025.
This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 10th International Conference on ICT for Sustainable Development (ICT4SD 2025), held in Goa, India, on 17–19 July 2025.
This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 10th International Conference on ICT for Sustainable Development (ICT4SD 2025), held in Goa, India, on 17–19 July 2025.
This book is based on the best papers accepted for presentation during the AISMA-2025: International Workshop on Advanced in Information Security Management and Applications.
This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 10th International Conference on ICT for Sustainable Development (ICT4SD 2025), held in Goa, India, on 17–19 July 2025.
This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 10th International Conference on ICT for Sustainable Development (ICT4SD 2025), held in Goa, India, on 17–19 July 2025.
This volume constitutes the proceedings of 9th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2025, in Be'er Sheva, Israel, during December 4–5, 2025.
This volume constitutes the proceedings of 9th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2025, in Be'er Sheva, Israel, during December 4–5, 2025.
Microsoft Sentinel for Internet of Medical Things (IoMT) provides advanced threat detection, investigation, and automated response for connected medical devices, guaranteeing real-time protection in healthcare environments.
This book presents original, peer-reviewed research papers from the International Conference on Recent Trends in Artificial Intelligence and Data Sciences—CONFLUENCE 2025.
This book presents original, peer-reviewed research papers from the International Conference on Recent Trends in Artificial Intelligence and Data Sciences—CONFLUENCE 2025.
This book presents a collection of high-quality, peer-reviewed research papers from First International Conference on Information Technology and Artificial Intelligence (ITAI 2025), organized by Soft Computing Research Society held in Gurgaon, India, from January 24–25, 2025.
This book presents selected papers from the 20th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 19th ISME 2024, held on October 4–6, 2024, in Matsue, Japan.
This book presents selected papers from the 20th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 19th ISME 2024, held on October 4–6, 2024, in Matsue, Japan.
This book presents a collection of high-quality, peer-reviewed research papers from First International Conference on Information Technology and Artificial Intelligence (ITAI 2025), organized by Soft Computing Research Society held in Gurgaon, India, from January 24–25, 2025.
This book includes extended and revised versions of a set of selected papers presented at the 20th International Conference on Security and Cryptography, SECRYPT 2023, which took place in Rome, Italy, during July 10–12, 2023; and the 21st International Conference on Security and Cryptography, SECRYPT 2024, which was held in Dijon, France, during July 8-10, 2024.
Libro especializado que se ajusta al desarrollo de la cualificacion profesional y adquisicion del certificado de profesionalidad "e;IFCT0410 - ADMINISTRACION Y DISENO DE REDES DEPARTAMENTALES"e;.
The book is a collection of high-quality research papers presented at 8th Euro-China Conference on Intelligent Data Analysis and Applications, hosted by Minnan Science and Technology College, China and technically co-sponsored by Nanjing University of Information Science and Technology, China.
The book is a collection of high-quality research papers presented at 8th Euro-China Conference on Intelligent Data Analysis and Applications, hosted by Minnan Science and Technology College, China and technically co-sponsored by Nanjing University of Information Science and Technology, China.
This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 10th International Conference on ICT for Sustainable Development (ICT4SD 2025), held in Goa, India, on 17–19 July 2025.
This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 10th International Conference on ICT for Sustainable Development (ICT4SD 2025), held in Goa, India, on 17–19 July 2025.
This book constitutes the post-conference proceedings of the Second International Conference on Cybersecurity and Artificial Intelligence Strategies, CAIS 2025 held in Baghdad, Iraq during September 17-18, 2025.