This book includes peer reviewed articles from the 6th International Conference on Data Science, Machine Learning and Applications, 2024, held at Tirupati on 13-14th December, in India.
This book constitutes the refereed proceedings of the 19th International Conference on Network and System Security, NSS 2025, held in Wuhan, China, during December 5–7, 2025.
This book constitutes the refereed proceedings of the 19th International Conference on Network and System Security, NSS 2025, held in Wuhan, China, during December 5–7, 2025.
This book includes peer reviewed articles from the 6th International Conference on Data Science, Machine Learning and Applications, 2024, held at Tirupati on 13-14th December, in India.
A hands-on toolkit for securing contemporary cloud environments In Cloud Security Fundamentals: Building the Foundations for Secure Cloud Platforms, cybersecurity leader and educator, Jason Edwards, delivers a comprehensive guide to safeguarding data, applications, and infrastructure in the cloud.
A hands-on toolkit for securing contemporary cloud environments In Cloud Security Fundamentals: Building the Foundations for Secure Cloud Platforms, cybersecurity leader and educator, Jason Edwards, delivers a comprehensive guide to safeguarding data, applications, and infrastructure in the cloud.
This book constitutes the refereed proceedings of the 6th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2025, held in Istanbul, Turkey, during September 1–2, 2025.
This book constitutes the refereed proceedings of the 6th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2025, held in Istanbul, Turkey, during September 1–2, 2025.
This book comprehensively examines the communication challenges posted by regulating large-scale flexible loads These challenges include high access demands, explosive data volume, frequent data transmission, realistic performance-based impact analysis, and security concerns.
This book constitutes the proceedings of the 15th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2025, held in Guwahati, India, during December 16–19, 2025.
This book constitutes the proceedings of the 15th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2025, held in Guwahati, India, during December 16–19, 2025.
This book provides an in-depth exploration of Kubernetes, focusing on container orchestration and cluster communication between master and worker nodes.
Dieses Buch zeigt Ihnen Schritt fur Schritt, wie der Instagram-Algorithmus wirklich funktioniert - verstandlich erklart, praxisnah und direkt umsetzbar.
This three-volume set CCIS 2854-2856 constitutes the refereed proceedings of the Third International Conference on Optimization and Data Science in Industrial Engineering, ODSIE 2025, held in Istanbul, Turkey, during November 20–22, 2025.
This book constitutes the refereed proceedings of the 22nd International Conference on Distributed Computing and Intelligent Technology, ICDCIT 2026, held in Bhubaneswar, India during January 16–19, 2026.
This book constitutes the refereed proceedings of the 22nd International Conference on Distributed Computing and Intelligent Technology, ICDCIT 2026, held in Bhubaneswar, India during January 16–19, 2026.
This three-volume set CCIS 2854-2856 constitutes the refereed proceedings of the Third International Conference on Optimization and Data Science in Industrial Engineering, ODSIE 2025, held in Istanbul, Turkey, during November 20–22, 2025.
This book constitutes the revised selected papers of the 21st European Workshop on Computer Performance Engineering, EPEW 2025, held in Catania, Italy, on June 26, 2025.
This book constitutes the revised selected papers of the 21st European Workshop on Computer Performance Engineering, EPEW 2025, held in Catania, Italy, on June 26, 2025.
This book explores the distinct problems, trends, and future trajectories for constructing cohesive, sustainable data infrastructures that correspond with the United Nations Sustainable Development Goals (SDGs).
Build a modern security intelligence program with Sumo Logic that combines DevSecOps practices, Cloud SIEM insights, and automation to detect, investigate, and respond faster while ensuring complianceFree with your book: DRM-free PDF version + access to Packt's next-gen Reader*Key FeaturesMaster essential skills for security monitoring and analytics using Sumo LogicPerform advanced threat hunting using Cloud SIEM in Sumo LogicGet up to speed quickly and easily with this practical guide for security analystsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionModernize your security operations with Sumo Logic s Continuous Intelligence Platform that delivers real-time detection, analysis, and response to threats, and find out how it enables security teams to unify monitoring, apply advanced analytics, and strengthen defenses across diverse environments.
Humans, Robots and Virtual Worlds in the Tactile Internet is a groundbreaking, comprehensive guide to this innovative communication platform that merges the physical and digital worlds, transforming how we experience the Metaverse and interact with robots and other cyber-physical systems.
6G-life: Unveiling the Future of Technological Sovereignty, Sustainability, and Trustworthiness takes the reader on a journey into the multifaceted landscape of 6G technologies.
MetaConstructs: The Evolution of Digital Twins in the Metaverse Era provides information on emerging fields of next-generation digital twins, with a special emphasis on developments and applications in IoT, artificial intelligence, deep learning techniques, virtual reality, augmented reality, internet of medical things (IoMT), optimization techniques, decision-making, and cloud computing.
This three-volume set CCIS 2854-2856 constitutes the refereed proceedings of the Third International Conference on Optimization and Data Science in Industrial Engineering, ODSIE 2025, held in Istanbul, Turkey, during November 20–22, 2025.
This book, structured as an edited volume, consists of 12 chapters organized into four key themes: Theoretical Foundations, Human Factors, Application Domains, and Future Challenges.
This book comprehensively examines the communication challenges posted by regulating large-scale flexible loads These challenges include high access demands, explosive data volume, frequent data transmission, realistic performance-based impact analysis, and security concerns.
This comprehensive collection presents cutting-edge research at the intersection of cybersecurity, artificial intelligence, and emerging technologies for critical infrastructure protection.
This book provides an in-depth exploration of Kubernetes, focusing on container orchestration and cluster communication between master and worker nodes.
MetaConstructs: The Evolution of Digital Twins in the Metaverse Era provides information on emerging fields of next-generation digital twins, with a special emphasis on developments and applications in IoT, artificial intelligence, deep learning techniques, virtual reality, augmented reality, internet of medical things (IoMT), optimization techniques, decision-making, and cloud computing.
This three-volume set CCIS 2854-2856 constitutes the refereed proceedings of the Third International Conference on Optimization and Data Science in Industrial Engineering, ODSIE 2025, held in Istanbul, Turkey, during November 20–22, 2025.
Build a modern security intelligence program with Sumo Logic that combines DevSecOps practices, Cloud SIEM insights, and automation to detect, investigate, and respond faster while ensuring complianceFree with your book: DRM-free PDF version + access to Packt's next-gen Reader*Key FeaturesMaster essential skills for security monitoring and analytics using Sumo LogicPerform advanced threat hunting using Cloud SIEM in Sumo LogicGet up to speed quickly and easily with this practical guide for security analystsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionModernize your security operations with Sumo Logic s Continuous Intelligence Platform that delivers real-time detection, analysis, and response to threats, and find out how it enables security teams to unify monitoring, apply advanced analytics, and strengthen defenses across diverse environments.
This book, structured as an edited volume, consists of 12 chapters organized into four key themes: Theoretical Foundations, Human Factors, Application Domains, and Future Challenges.
This comprehensive collection presents cutting-edge research at the intersection of cybersecurity, artificial intelligence, and emerging technologies for critical infrastructure protection.
This book explores the distinct problems, trends, and future trajectories for constructing cohesive, sustainable data infrastructures that correspond with the United Nations Sustainable Development Goals (SDGs).