Information security primarily serves these six distinct purposes-authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation.
The book presents selected papers from NIELIT's International Conference on Communication, Electronics and Digital Technology (NICEDT-2024) held during 16-17 February 2024 in Guwahati, India.
The book presents selected papers from NIELIT's International Conference on Communication, Electronics and Digital Technology (NICEDT-2024) held during 16-17 February 2024 in Guwahati, India.
Discover over 70 real-world examples to overcome the most complex concepts you will face developing with VisualforceAbout This BookThis book provides an enhanced user experience with dynamically-generated, reactive pagesAccess data over additional channels via public web sites and mobile pagesPacked with easy-to-follow recipes, including step-by-step instructions and Apex/Visualforce code downloads this title is the all in one package you need to get more from Visualforce.
Explore the core functionality of containerizing your applications and making them production-readyKey FeaturesGrasp basic to advanced Docker concepts with this comprehensive guideGet acquainted with Docker containers, Docker images, orchestrators, cloud integration, and networkingLearn to simplify dependencies and deploy and test containers in productionBook DescriptionContainers enable you to package an application with all the components it needs, such as libraries and other dependencies, and ship it as one package.
Take your Java programming skills to the next level and learn to overcome real-world challenges to optimize application performanceKey FeaturesLeverage key features of the Java Virtual Machine to maximize runtime performanceUnlock optimization strategies to effectively manage objects and memory useApply your knowledge to utilize frameworks and libraries ripe for increasing program performancePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionBuilding high performance into your applications is key to creating an optimal user experience, although it is not the only consideration for the performant nature of your apps.
It is with immense pleasure that we extend a warm welcome to all of you to the recently concluded conference, international conference on Advances in Science, Technology and Management (ICOSTEM 2023) which took place from November 24 - 27, 2023, in the picturesque Maldives, Male.
Written by security experts at the forefront of this dynamic industry, this book teaches state-of-the-art smart contract security principles and practices.
This book constitutes the proceedings of the 17th International Conference on Engineering Psychology and Cognitive Ergonomics, EPCE 2020, held as part of the 22nd International Conference, HCI International 2020, which took place in Copenhagen, Denmark, in July 2020.
The proceedings set LNCS 11727, 11728, 11729, 11730, and 11731 constitute the proceedings of the 28th International Conference on Artificial Neural Networks, ICANN 2019, held in Munich, Germany, in September 2019.
This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT.
This book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA, USA, in September 2018.
This book constitutes the refereed proceedings of the 9th International Conference on Advances in Brain Inspired Cognitive Systems, BICS 2018, held in Xi'an, China, in July 2018.
This book constitutes the proceedings of the 15th IFIP International Conference on Network and Parallel Computing, NPC 2018, held in Muroran, Japan, in November/December 2018.
This book constitutes the thoroughly refereed proceedings of the First International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019.
This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today's industry, also known as the Industry Internet of Things (IIoT).
This book constitutes the refereed proceedings of the 10th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2018, held in Nanning, China, in October 2018.
This book constitutes the proceedings of the 14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019, held in Honolulu, HI, USA, in June 2019.
This book contains revised selected papers from the 26th International Conference on Selected Areas in Cryptography, SAC 2019, held in Waterloo, ON, Canada, in August 2019.
This book constitutes the joint refereed proceedings of the 18th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2018, the 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018.
The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019.
This three-volume set LNCS 11139-11141 constitutes the refereed proceedings of the 27th International Conference on Artificial Neural Networks, ICANN 2018, held in Rhodes, Greece, in October 2018.
This book constitutes the refereed post-conference proceedings of the 11th International Conference on Wireless Internet , WiCON 2018, held in Taipei, Taiwan, in October 2018.
This book constitutes the proceedings of the 22nd International Conference on Information Security, ISC 2019, held in New York City, NY, USA, in September 2019.
This book constitutes the proceedings of the 14th International Workshop on Communication Technologies for Vehicles, Nets4Cars/Nets4Trains/Nets4Aircraft 2019, held in Colmar, France, in May 2019.
This book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019.
This two-volume set LNCS 12131 and LNCS 12132 constitutes the refereed proceedings of the 17th International Conference on Image Analysis and Recognition, ICIAR 2020, held in Povoa de Varzim, Portugal, in June 2020.
This book constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2018, held in Ho Chi Minh City, Vietnam, in December 2018.
This book constitutes the thoroughly refereed proceedings of the 26th International Conference on Computer Networks, CN 2019, held in Gliwice, Poland, in June 2019.
This book constitutes the refereed proceedings of the 25th International Conference on Information and Software Technologies, ICIST 2019, held in Vilnius, Lithuania, in October 2019.
This book constitutes the refereed proceedings of the 4th International Conference on Security Standardisation Research, SSR 2018, held in Darmstadt, Germany, in November 2018.
This book constitutes the refereed proceedings of the First International Workshop, IOSec 2018, sponsored by CIPSEC, held in Heraklion, Crete, Greece, in September 2018.
This volume constitutes the refereed proceedings of the 6th Workshop on Engineering Applications, WEA 2019, held in Santa Marta, Colombia, in October 2019.
This book constitutes the proceedings of the 16th IFIP International Conference on Wired/Wireless Internet Communications, WWIC 2018, held in Boston, MA, USA, in June 2018.
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2019, held in Atlanta, GA, USA in July 2019.
This book constitutes the proceedings of the Second International Conference on Science of Cyber Security, SciSec 2019, held in Nanjing, China, in August 2019.
The proceedings set LNCS 11727, 11728, 11729, 11730, and 11731 constitute the proceedings of the 28th International Conference on Artificial Neural Networks, ICANN 2019, held in Munich, Germany, in September 2019.
This book constitutes the proceedings of the 15th International Conference on Modeling Decisions for Artificial Intelligence, MDAI 2018, held in Mallorca, Spain, in October 2018.
This book constitutes the proceedings of the 16th International Conference on Distributed Computing and Internet Technology, ICDCIT 2020, held in Bhubaneswar, India, in January 2020.
This book constitutes the refereed conference proceedings of the 14th International Workshop on Data Privacy Management, DPM 2019, and the Third International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2019, held in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019, held in Luxembourg in September 2019.
This book constitutes the refereed post-conference proceedings of the International Conferences ICCASA and ICTCC 2018, held in November 2018 in Viet Tri City, Vietnam.
This book constitutes the proceedings of the 21st International Conference on Technology Enhanced Assessment, TEA 2018, held in Amsterdam, The Netherlands, in December 2018.
This book constitutes the proceedings of the 14th International Workshop on Security and Trust Management, STM 2018, held in Barcelona, Spain, in September 2018, and co-located with the 23rd European Symposium Research in Computer Security, ESORICS 2018.
This book constitutes the thoroughly refereed post-workshop proceedings of the workshops that were held in conjunction with the 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2019, in Macau, China, in April 2019.