This book constitutes the proceedings of the Second International Conference on Cloud and Network Computing, ICCNC 2025, which was held in Fuzhou, China, during June 20–22, 2025.
This book constitutes the proceedings of the Second International Conference on Cloud and Network Computing, ICCNC 2025, which was held in Fuzhou, China, during June 20–22, 2025.
Event-driven microservices offer an optimal approach to harnessing event streams, reacting and responding to changes as they occur across your company.
Event-driven microservices offer an optimal approach to harnessing event streams, reacting and responding to changes as they occur across your company.
Cloud computing continues to drive innovation across industries, fueling advancements like digital transformation, scalability, and the rise of artificial intelligence.
The metaverse is sweeping the global thanks to its fundamentally innovative concepts of physical-virtual blended reality and years of industrial efforts on relevant hardware development.
The metaverse is sweeping the global thanks to its fundamentally innovative concepts of physical-virtual blended reality and years of industrial efforts on relevant hardware development.
Unlock the power of Oracle Database 23AI and Autonomous Database Serverless (ADB-S) with this comprehensive guide to the latest innovations in performance, security, automation, and AI-driven optimization.
Implementing Security with AI in GCP is a detailed guide designed to help professionals harness the power of artificial intelligence within Google Cloud Platform (GCP) to strengthen cloud security.
Implementing Security with AI in GCP is a detailed guide designed to help professionals harness the power of artificial intelligence within Google Cloud Platform (GCP) to strengthen cloud security.
Unlock the power of Oracle Database 23AI and Autonomous Database Serverless (ADB-S) with this comprehensive guide to the latest innovations in performance, security, automation, and AI-driven optimization.
This book focuses on applying intelligent computing techniques for sustainable development in precision agriculture, digital healthcare, renewable energy, smart cities, and autonomous systems.
This book focuses on applying intelligent computing techniques for sustainable development in precision agriculture, digital healthcare, renewable energy, smart cities, and autonomous systems.
This book discusses how Cloud, Fog, and Edge computing, alongside federated learning and blockchain, are revolutionizing healthcare systems by addressing the challenges of data management, privacy, and efficiency.
This book discusses how Cloud, Fog, and Edge computing, alongside federated learning and blockchain, are revolutionizing healthcare systems by addressing the challenges of data management, privacy, and efficiency.
The four-volume set CCIS 2416, 2417, 2418 and 2419 constitutes the refereed post-conference proceedings of the Third International Conference on Information Processing and Network Provisioning, ICIPNP 2024 Spring, held in Beijing, China, during June 14–16, 2024.
The four-volume set CCIS 2416, 2417, 2418 and 2419 constitutes the refereed post-conference proceedings of the Third International Conference on Information Processing and Network Provisioning, ICIPNP 2024 Spring, held in Beijing, China, during June 14–16, 2024.
Moving Target Defense (MTD) has been proposed as an innovative defense framework, which aims to introduce the dynamics, diversity and randomization into static network by the shuffling, heterogeneity and redundancy.
Learn the most important topics in securing AWS environments through a strategic combination of fundamental principles, real-case studies, and hands-on practice to battle new generations of cyber-attacks.
Moving Target Defense (MTD) has been proposed as an innovative defense framework, which aims to introduce the dynamics, diversity and randomization into static network by the shuffling, heterogeneity and redundancy.
Learn the most important topics in securing AWS environments through a strategic combination of fundamental principles, real-case studies, and hands-on practice to battle new generations of cyber-attacks.
The proceedings set CCIS 2593 until CCIS 2596 constitutes the proceedings of the Third International Conference on Information Processing and Network Provisioning, ICIPNP 2024, which took place in Qingdao, China, during November 8-10, 2024.
The proceedings set CCIS 2593 until CCIS 2596 constitutes the proceedings of the Third International Conference on Information Processing and Network Provisioning, ICIPNP 2024, which took place in Qingdao, China, during November 8-10, 2024.
The proceedings set CCIS 2593 until CCIS 2596 constitutes the proceedings of the Third International Conference on Information Processing and Network Provisioning, ICIPNP 2024, which took place in Qingdao, China, during November 8-10, 2024.
The proceedings set CCIS 2593 until CCIS 2596 constitutes the proceedings of the Third International Conference on Information Processing and Network Provisioning, ICIPNP 2024, which took place in Qingdao, China, during November 8-10, 2024.
The proceedings set CCIS 2593 until CCIS 2596 constitutes the proceedings of the Third International Conference on Information Processing and Network Provisioning, ICIPNP 2024, which took place in Qingdao, China, during November 8-10, 2024.
The proceedings set CCIS 2593 until CCIS 2596 constitutes the proceedings of the Third International Conference on Information Processing and Network Provisioning, ICIPNP 2024, which took place in Qingdao, China, during November 8-10, 2024.
The proceedings set CCIS 2593 until CCIS 2596 constitutes the proceedings of the Third International Conference on Information Processing and Network Provisioning, ICIPNP 2024, which took place in Qingdao, China, during November 8-10, 2024.
The proceedings set CCIS 2593 until CCIS 2596 constitutes the proceedings of the Third International Conference on Information Processing and Network Provisioning, ICIPNP 2024, which took place in Qingdao, China, during November 8-10, 2024.
This book explores emerging interdisciplinary themes and applications reflecting advancements in Computational Intelligence (CI) for IoT and 5G networks.
This book explores emerging interdisciplinary themes and applications reflecting advancements in Computational Intelligence (CI) for IoT and 5G networks.
This edited book aims to comprehensively examine the current research trend, state-of-the-art IoT applications, deployment issues, potential challenges, and future research scopes related to Industry 5.
This book explains cloud computing and microservices from the perspective of technological evolution, showing the ins and outs as well as the causes and consequences of cloud computing and microservices.