This book includes selected peer-reviewed papers presented at the International Conference on Computing and Communication Networks (ICCCN 2021), held at Manchester Metropolitan University, United Kingdom, during 19-20 November 2021.
This book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2021, held in Kolkata, India, in December 2021.
This book features a collection of high-quality, peer-reviewed papers presented at the Fifth International Conference on Intelligent Computing and Communication (ICICC 2021) organized by the Department of Computer Science and Engineering and Department of Computer Science and Technology, Dayananda Sagar University, Bengaluru, India, on November 26 - 27, 2021.
The book features original papers from International Conference on Pervasive Computing and Social Networking (ICPCSN 2022), organized by NSIT, Salem, India during 3 - 4 March 2022.
This book gathers selected papers presented at the International Conference on Innovations in Information and Communication Technologies (ICIICT 2022), held in Thailand during April 15-16, 2022.
This book presents high-quality research papers presented at 3rd International Conference on Sustainable and Innovative Solutions for Current Challenges in Engineering and Technology (ICSISCET 2021) held at Madhav Institute of Technology & Science (MITS), Gwalior, India, from November 13-14, 2021.
This book constitutes the refereed proceedings of the 9th International Conference On Secure Knowledge Management In Artificial Intelligence Era, SKM 2021, held in San Antonio, TX, USA, in 2021.
This fully updated self-study guide delivers 100% coverage of all topics on the current version of the CCSP examThoroughly revised for the 2022 edition of the exam, this highly effective test preparation guide covers all six domains within the CCSP Body of Knowledge.
The book is a collection of best selected research papers presented at the International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications (ICMISC 2022) held during 28 - 29 March 2022 at CMR Institute of Technology, Hyderabad, Telangana, India.
This book covers a variety of topics in the field of industrial engineering, with a special focus on research and industrial applications aimed at both improving quality of processes and products and contributing to a sustainable economy.
This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security.
This book includes original, peer-reviewed research articles from International Conference on Advances in Computer Engineering and Communication Systems (ICACECS 2021), held in VNR Vignana Jyoythi Institute of Engineering and Technology (VNR VJIET), Hyderabad, Telangana, India, during 13-14 August 2021.
This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2022 and CBT 2022, which took place in Copenhagen, Denmark, during September 26-30, 2022.
This book provides a broad understanding of the fundamental tools and methods from information theory and mathematical programming, as well as specific applications in 6G and beyond system designs.
The book presents high-quality research papers presented at the International Conference on Computational Intelligence and Data Analytics (ICCIDA 2022), organized by the Department of Information Technology, Vasavi College of Engineering, Hyderabad, India in January 2022.
This book describes an extensive and consistent soft error assessment of convolutional neural network (CNN) models from different domains through more than 14.
This book gathers outstanding papers presented at the International Conference on Data Science and Applications (ICDSA 2022), organized by Soft Computing Research Society (SCRS) and Jadavpur University, Kolkata, India, from 26 to 27 March 2022.
This book constitutes the refereed proceedings of the 18th European Workshop on Computer Performance Engineering, EPEW 2022, held in Santa Pola, Spain, in September 2022.
This book offers an alternative for encrypting and decrypting messages using objects called integer and fractional-order estimators or observers, by means of security codes.
This book presents the proceedings of 2nd EAI International Conference on Smart Technology (MTYMEX), which took place April 27th, 2021, online and in Monterrey, Mexico.
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022.
This book focuses on cellular Vehicle-to-Everything (C-V2X), currently the most promising wireless communication technology for Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), Vehicle-to-Pedestrian (V2P), Vehicle-to-Network (V2N) and Vehicle-to-Cloud (V2C) communications.
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods.
This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic of Finite Field, WAIFI 2022, held in Chengdu, China, in August - September 2022.
The complete guide for system administrators to install, manage, secure, and squeeze return on investment from their Windows Server 2022 infrastructurePurchase of the print or Kindle book includes a free eBook in PDF format.
31 Days Before Your CCNA Exam: A Day-By-Day Review Guide for the CCNA 200-301 Certification Exam Second Edition is the friendliest, most practical way to understand the CCNA Routing and Switching certification process; to commit to taking your CCNA 200-301 exam; and to finish your preparation using a variety of primary and supplemental study resources.
This book provides comprehensive coverage of different aspects of low-power circuit synthesis for IoT applications at various levels of the design hierarchy, starting from the layout level to the system level.
This book includes the proceedings of the International Conference on Emerging Trends in IoT and Computing Technologies (ICEICT-2022) held at Goel Institute of Technology & Management, Lucknow, India.
Start from scratch and develop the essential skills needed to create, deploy, and manage cloud-native applications using Docker with the latest edition of Docker Deep DiveKey FeaturesGet a solid understanding of Docker and containersOvercome common problems while containerizing an applicationMaster Docker commands needed for creating, deploying, and running applicationsBook DescriptionMost applications, even the funky cloud-native microservices ones, need high-performance, production-grade infrastructure to run on.
Avoid MFA pitfalls-learn how to choose, implement, and troubleshoot MFA in your companyKey FeaturesGain proficiency in using solutions like Okta, Ping Identity, and ForgeRock within the IAM domainThwart authentication breaches using pragmatic strategies and lessons derived from real-world scenariosChoose the right MFA solutions to enhance your organization's securityBook DescriptionMFA has emerged as an essential defense strategy in the wide-ranging landscape of cybersecurity.
This book provides an overview of current hardware security problems and highlights how these issues can be efficiently addressed using computer-aided design (CAD) tools.
This book includes the proceedings of the International Conference on Emerging Trends in IoT and Computing Technologies (ICEICT-2022) held at Goel Institute of Technology & Management, Lucknow, India.
Die Einführung des Buches legt den Grundstein für die nachfolgenden Kapitel, indem sie die Definitionen und Grundlagen der Wirtschaftskriminalität klärt und ein solides Verständnis für die Dimensionen und die Tragweite dieser Herausforderung schafft.
This book provides an overview of current hardware security problems and highlights how these issues can be efficiently addressed using computer-aided design (CAD) tools.
This textbook explores the different protocols and technologies that are key to supporting the most important Internet of Things (IoT) networking scenarios.