Programming Massively Parallel Processors: A Hands-on Approach, Third Edition shows both student and professional alike the basic concepts of parallel programming and GPU architecture, exploring, in detail, various techniques for constructing parallel programs.
IT Essentials: PC Hardware and Software Companion Guide, Fifth Edition IT Essentials: PC Hardware and Software Companion Guide, Fifth Edition, supports the Cisco Networking Academy IT Essentials: PC Hardware and Software version 5 course.
Practical design and performance solutions for every ad hoc wireless network Ad Hoc Wireless Networks comprise mobile devices that use wireless transmission for communication.
Recent advances in VoIP (Voice over IP) technology have made it the solution of choice for voice service because of its low cost and increased reliability.
Use Cisco Intersight to streamline, unify, and secure IT operations across data centers, clouds, and the edge The Cisco Intersight cloud operations platform delivers intelligent visualization, optimization, and orchestration for applications and infrastructure across any hybrid cloud environment.
TCP/IP Illustrated, an ongoing series covering the many facets of TCP/IP, brings a highly-effective visual approach to learning about this networking protocol suite.
This volume constitutes the refereed proceedings of the 10th International Conference on Multimedia Communications, Services and Security, MCSS 2020, held in Krakow, Poland, in October 2020.
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security.
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021.
The book features original papers from International Conference on Expert Clouds and Applications (ICOECA 2022), organized by GITAM School of Technology, Bangalore, India, during 3-4 February 2022.
This essential guide covers all aspects of Linux system administration, from user maintenance, backups, filesystem housekeeping, storage management, and network setup to hardware and software troubleshooting and some application management.
This book constitutes the refereed proceedings of the 7th International Conference on E-Democracy, E-Democracy 2017, held in Athens, Greece, in December 2017.
Efficiently manage and administer enterprise environments using Microsoft Windows Server 2019Key FeaturesLeverage Windows Server 2019 to improve enterprise workflow efficiency and increase productivityDeliver enterprise-grade cloud services that can be applied in your infrastructureGet up and running with PowerShell and the all-new Hyper-V improvementsBook DescriptionDo you want to get up and running with essential administrative tasks in Windows Server 2019?
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.
This two-volume set LNCS 12861 and LNCS 12862 constitutes the refereed proceedings of the 16th International Work-Conference on Artificial Neural Networks, IWANN 2021, held virtually, in June 2021.
This book constitutes thoroughly reviewed, revised and selected papers from the 4th International Conference on Human Centered Computing, HCC 2018, held in Merida, Mexico, in December 2018.
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018.
This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020.
This book presents select proceedings of the International Conference on Evolution in Manufacturing (ICEM 2020), and examines a range of areas including internet-of-things for cyber manufacturing, data analytics for manufacturing systems and processes and materials.
Learn from the AWS subject-matter experts, apply real-world scenarios and clear the AWS Certified Solutions Architect -Associate examKey FeaturesBuild highly reliable and scalable workloads on the AWS platformPass the exam in less time and with confidenceGet up and running with building and managing applications on the AWS platformBook DescriptionAmazon Web Services (AWS) is currently the leader in the public cloud market.
This book presents cutting-edge research, advanced techniques, and practical applications of the integration of Cloud Computing and Internet of Things (IoT).
This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016.
In this book, the protection of personal data is compared for eight EU member states,namely France, Germany, the United Kingdom, Ireland, Romania, Italy, Sweden andthe Netherlands.
This book constitutes the proceedings of the Third International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2020, held in Guildford, UK, in September 2020.
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021.
This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2020, held in Cairo, Egypt, in July 2020.
This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2020, held in Bratislava, Slovakia, in September 2020.
This two-volume set LNCS 10305 and LNCS 10306 constitutes the refereed proceedings of the 15th International Work-Conference on Artificial Neural Networks, IWANN 2019, held at Gran Canaria, Spain, in June 2019.
This book argues that security and defense have never been true priorities in the European Union, and have constantly been marginalized by the elites since the Soviet Union collapsed and the Warsaw Pact disintegrated.
Design, develop, and deploy innovative forensic solutions using PythonKey FeaturesDiscover how to develop Python scripts for effective digital forensic analysisMaster the skills of parsing complex data structures with Python librariesSolve forensic challenges through the development of practical Python scriptsBook DescriptionDigital forensics plays an integral role in solving complex cybercrimes and helping organizations make sense of cybersecurity incidents.
This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, held in Amalfi, Italy, in September 2020*.