Your one-stop guide to designing, building, managing, and operating Industrial Internet of Things (IIoT) applicationsKey FeaturesBuild IIoT applications and deploy them on Platform as a Service (PaaS)Learn data analytics techniques in IIoT using Spark and TensorFlowUnderstand and combine Predix services to accelerate your developmentBook DescriptionThe Industrial Internet refers to the integration of complex physical machines with networked sensors and software.
Design and implement a secure end-to-end desktop management solution with Microsoft Endpoint ManagerKey FeaturesLearn everything you need to know about deploying and managing Windows on physical and cloud PCsSimplify remote working for cloud-managed cloud PCs via new service Windows 365Benefit from the authors' experience of managing physical endpoints and traditional virtual desktop infrastructures (VDI)Book DescriptionMicrosoft Modern Workplace solutions can simplify the management layer of your environment remarkably if you take the time to understand and implement them.
Protect your organization's security at all levels by introducing the latest strategies for securing DevOpsKey FeaturesIntegrate security at each layer of the DevOps pipelineDiscover security practices to protect your cloud services by detecting fraud and intrusionExplore solutions to infrastructure security using DevOps principlesBook DescriptionDevOps has provided speed and quality benefits with continuous development and deployment methods, but it does not guarantee the security of an entire organization.
Get hands-on experience in using Burp Suite to execute attacks and perform web assessmentsKey FeaturesExplore the tools in Burp Suite to meet your web infrastructure security demandsConfigure Burp to fine-tune the suite of tools specific to the targetUse Burp extensions to assist with different technologies commonly found in application stacksBook DescriptionBurp Suite is a Java-based platform for testing the security of your web applications, and has been adopted widely by professional enterprise testers.
Securing Enterprise Networks with Cisco Meraki Discover the Power of Cisco Meraki Unlock the full potential of Cisco Meraki with this in-depth guide, designed to help you build and secure modern, cloud-managed networks.
The book presents selected papers from NIELIT's International Conference on Communication, Electronics and Digital Technology (NICEDT-2024) held during 16-17 February 2024 in Guwahati, India.
The book presents selected papers from NIELIT's International Conference on Communication, Electronics and Digital Technology (NICEDT-2024) held during 16-17 February 2024 in Guwahati, India.
This book constitutes the proceedings of the 17th International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2020, held as part of the 22nd International Conference, HCI International 2020, which took place in Copenhagen, Denmark, in July 2020.
The proceedings set LNCS 11727, 11728, 11729, 11730, and 11731 constitute the proceedings of the 28th International Conference on Artificial Neural Networks, ICANN 2019, held in Munich, Germany, in September 2019.
This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT.
This book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA, USA, in September 2018.
This book constitutes the refereed proceedings of the 9th International Conference on Advances in Brain Inspired Cognitive Systems, BICS 2018, held in Xi'an, China, in July 2018.
This book constitutes the proceedings of the 15th IFIP International Conference on Network and Parallel Computing, NPC 2018, held in Muroran, Japan, in November/December 2018.
This book constitutes the thoroughly refereed proceedings of the First International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019.
This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today's industry, also known as the Industry Internet of Things (IIoT).
This book constitutes the refereed proceedings of the 10th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2018, held in Nanning, China, in October 2018.
This book constitutes the proceedings of the 14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019, held in Honolulu, HI, USA, in June 2019.
This book contains revised selected papers from the 26th International Conference on Selected Areas in Cryptography, SAC 2019, held in Waterloo, ON, Canada, in August 2019.
This book constitutes the joint refereed proceedings of the 18th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2018, the 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018.
The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019.
This three-volume set LNCS 11139-11141 constitutes the refereed proceedings of the 27th International Conference on Artificial Neural Networks, ICANN 2018, held in Rhodes, Greece, in October 2018.
This book constitutes the refereed post-conference proceedings of the 11th International Conference on Wireless Internet , WiCON 2018, held in Taipei, Taiwan, in October 2018.
This book constitutes the proceedings of the 22nd International Conference on Information Security, ISC 2019, held in New York City, NY, USA, in September 2019.
This book constitutes the proceedings of the 14th International Workshop on Communication Technologies for Vehicles, Nets4Cars/Nets4Trains/Nets4Aircraft 2019, held in Colmar, France, in May 2019.
This book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019.
This two-volume set LNCS 12131 and LNCS 12132 constitutes the refereed proceedings of the 17th International Conference on Image Analysis and Recognition, ICIAR 2020, held in Povoa de Varzim, Portugal, in June 2020.
This book constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2018, held in Ho Chi Minh City, Vietnam, in December 2018.
This book constitutes the thoroughly refereed proceedings of the 26th International Conference on Computer Networks, CN 2019, held in Gliwice, Poland, in June 2019.
This book constitutes the refereed proceedings of the 25th International Conference on Information and Software Technologies, ICIST 2019, held in Vilnius, Lithuania, in October 2019.
This book constitutes the refereed proceedings of the 4th International Conference on Security Standardisation Research, SSR 2018, held in Darmstadt, Germany, in November 2018.
This book constitutes the refereed proceedings of the First International Workshop, IOSec 2018, sponsored by CIPSEC, held in Heraklion, Crete, Greece, in September 2018.
This volume constitutes the refereed proceedings of the 6th Workshop on Engineering Applications, WEA 2019, held in Santa Marta, Colombia, in October 2019.
This book constitutes the proceedings of the 16th IFIP International Conference on Wired/Wireless Internet Communications, WWIC 2018, held in Boston, MA, USA, in June 2018.
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2019, held in Atlanta, GA, USA in July 2019.
This book constitutes the proceedings of the Second International Conference on Science of Cyber Security, SciSec 2019, held in Nanjing, China, in August 2019.
The proceedings set LNCS 11727, 11728, 11729, 11730, and 11731 constitute the proceedings of the 28th International Conference on Artificial Neural Networks, ICANN 2019, held in Munich, Germany, in September 2019.
This book constitutes the proceedings of the 15th International Conference on Modeling Decisions for Artificial Intelligence, MDAI 2018, held in Mallorca, Spain, in October 2018.
This book constitutes the proceedings of the 16th International Conference on Distributed Computing and Internet Technology, ICDCIT 2020, held in Bhubaneswar, India, in January 2020.
This book constitutes the refereed conference proceedings of the 14th International Workshop on Data Privacy Management, DPM 2019, and the Third International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2019, held in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019, held in Luxembourg in September 2019.
This book constitutes the refereed post-conference proceedings of the International Conferences ICCASA and ICTCC 2018, held in November 2018 in Viet Tri City, Vietnam.
This book constitutes the proceedings of the 21st International Conference on Technology Enhanced Assessment, TEA 2018, held in Amsterdam, The Netherlands, in December 2018.
This book constitutes the proceedings of the 14th International Workshop on Security and Trust Management, STM 2018, held in Barcelona, Spain, in September 2018, and co-located with the 23rd European Symposium Research in Computer Security, ESORICS 2018.
This book constitutes the thoroughly refereed post-workshop proceedings of the workshops that were held in conjunction with the 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2019, in Macau, China, in April 2019.