Dieses kompakte Grundlagen-Lehrbuch orientiert sich in Inhalt und Aufbau an einer einführenden Vorlesung zum Thema Mensch-Maschine-Interaktion und lehnt sich an das von der Association for Computing Machinery (ACM) vorgeschlagene Curriculum des Gebiets an.
This conference proceedings summarizes invited publications from the two IDES (Institute of Doctors Engineers and Scientists) International conferences, both held in Bangalore/ India.
The focus of this book is an application of Digital Twin as a concept and an approach, based on the most accurate view on a physical production system and its digital representation of complex engineering products and systems.
This book aims to show that modern socio-economic and entrepreneurial systems are on the path to the increase of security and to determine the obstacles they face on this path, as well as determine the opportunities for overcoming these obstacles.
This book provides a comprehensive and self-contained introduction to federated learning, ranging from the basic knowledge and theories to various key applications.
This book presents an overview on security and privacy issues in dynamic sensor networks and Internet of Things (IoT) networks and provides a novel tamper evident technique to counter and defend against these security related issues.
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation.
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation.
This collection of research papers provides extensive information on deploying services, concepts, and approaches for using open linked data from libraries and other cultural heritage institutions.
This book covers the basics of semantic web technologies and indexing languages, and describes their contribution to improve methods of formal knowledge representation and reasoning.
This contributed volume tells the story of the establishment of a cybersecurity awareness framework for organizations, and how it was piloted in two public sector municipal contexts.
This book contains practical steps business users can take to implement data management in a number of ways, including data governance, data architecture, master data management, business intelligence, and others.
In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications.
This book covers the basics of semantic web technologies and indexing languages, and describes their contribution to improve methods of formal knowledge representation and reasoning.
This collection of research papers provides extensive information on deploying services, concepts, and approaches for using open linked data from libraries and other cultural heritage institutions.
This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics.
This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT).
This three-volume set LNCS 12452, 12453, and 12454 constitutes the proceedings of the 20th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2020, in New York City, NY, USA, in October 2020.
This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017.
In 2016, Germany's government presented its third cybersecurity strategy, which aims to strengthen the national cyber defence architecture, cooperation between the state and industry, and individual users' agency.
Transparent Artificial Intelligence (AI) systems facilitate understanding of the decision-making process and provide opportunities in various aspects of explaining AI models.
Explore network automation with Ansible by configuring network infrastructure fast, reliably, and repeatedly, all while creating a lab utilizing open and available network operating systems and toolsKey FeaturesDesign, build, and automate network devices and cloud networking resources using AnsibleOrchestrate workflows with AWX and integrate Nautobot as a Source of TruthStart with Event-Driven Ansible and manage Terraform workflows seamlesslyPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionNetwork Automation Cookbook, now in its second edition, is your essential guide to building robust network automation workflows across modern hybrid infrastructures.