The 10th IFIP International Conference on Personal Wireless Communications covers a wide spectrum: wireless sensors, signalization, traffic and QoA in wireless networks, Ad-Hoc, IEEE 802.
This book presents a selective collection of papers from the 20th International Symposium on Computer and Information Sciences, held in Istanbul, Turkey.
This book provides an authoritative guide for postgraduate students and academic researchers in electronics, computer and network engineering, telecommunications, energy technology and home automation, as well as R&D managers in industrial sectors such as wireless technology, consumer electronics, telecommunications and networking, information technology, energy technology and home automation.
Lay the foundations for data center virtualization using VMware vSphere 6 and strengthen your understanding of its powerAbout This BookLearn how server virtualization is achieved and how a virtual infrastructure is built using VMware's products and solutions.
Master the art of efficiently composing Azure services and implement them in real-world scenariosAbout This BookBuild an effective development environment in Azure using the right set of technologies.
Improve cloud security within your organization by leveraging AWS's Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework.
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and wireless sensor networks (WSN) technologies.
Become a security automation expert and build solutions that save time while making your organization more secureKey FeaturesWhat's insideAn exploration of the SOAR platform's full features to streamline your security operationsLots of automation techniques to improve your investigative abilityActionable advice on how to leverage the capabilities of SOAR technologies such as incident management and automation to improve security postureBook DescriptionWhat your journey will look likeWith the help of this expert-led book, you ll become well versed with SOAR, acquire new skills, and make your organization's security posture more robust.
Strengthen your ability to implement, assess, evaluate, and enhance the effectiveness of information security controls based on ISO/IEC 27001/27002:2022 standardsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesFamiliarize yourself with the clauses and control references of ISO/IEC 27001:2022Define and implement an information security management system aligned with ISO/IEC 27001/27002:2022Conduct management system audits to evaluate their effectiveness and adherence to ISO/IEC 27001/27002:2022Book DescriptionISO 27001 and ISO 27002 are globally recognized standards for information security management systems (ISMSs), providing a robust framework for information protection that can be adapted to all organization types and sizes.
At a time when technology and healthcare are colliding to alter lives, Digital Twin Technology for Better Health: A Healthcare Odyssey throws open the revolutionary possibilities of digital twins in changing patient care, medical research, and healthcare operations.
Quickly and productively build complex Kotlin-based Spring applications and microservices out of the box, with minimal concern over things such as configurations.
Build a strong and efficient IoT infrastructure at industrial and enterprise level by mastering Industrial IoT network Key FeaturesGain hands-on experience working with industrial architectureExplore the potential of cloud-based Industrial IoT platforms, analytics, and protocolsImprove business models and transform your workforce with Industry 4.
Why Intranets Fail (and How to Fix Them) is a practical guide to some of the common problems associated with Intranets, and solutions to those problems.
Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls.
Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls.
Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scaleKey FeaturesUse the ethical hacking methodology and thought process to perform a successful ethical hackExplore the various stages of an ethical hack and the tools related to each phasePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.
Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threatsPurchase of the print or Kindle book includes a free eBook in PDF format.
Technology is rapidly moving into our bodies, writes cyber expert Keenan, and this book gives a chilling look ahead into where that road may lead us on a one way trip to the total surrender of privacy and the commoditization of intimacy.
This book presents a comprehensive analysis of the transformative impact of artificial intelligence (AI) on legal frameworks within the European Union and beyond.
Build your expertise in Windows incident analysis by mastering artifacts and techniques for efficient cybercrime investigation with this comprehensive guideKey FeaturesGain hands-on experience with reputable and reliable tools such as KAPE and FTK ImagerExplore artifacts and techniques for successful cybercrime investigation in Microsoft Teams, email, and memory forensicsUnderstand advanced browser forensics by investigating Chrome, Edge, Firefox, and IE intricaciesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIn this digitally driven era, safeguarding against relentless cyber threats is non-negotiable.
Explore network automation with Ansible by configuring network infrastructure fast, reliably, and repeatedly, all while creating a lab utilizing open and available network operating systems and toolsKey FeaturesDesign, build, and automate network devices and cloud networking resources using AnsibleOrchestrate workflows with AWX and integrate Nautobot as a Source of TruthStart with Event-Driven Ansible and manage Terraform workflows seamlesslyPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionNetwork Automation Cookbook, now in its second edition, is your essential guide to building robust network automation workflows across modern hybrid infrastructures.
Communities serve as basic structural building blocks for understanding the organization of many real-world networks, including social, biological, collaboration, and communication networks.
As the structure of contemporary communication networks grows more complex, practical networked distributed systems become prone to component failures.
The sensor cloud is a new model of computing paradigm for Wireless Sensor Networks (WSNs), which facilitates resource sharing and provides a platform to integrate different sensor networks where multiple users can build their own sensing applications at the same time.
This historical survey of parallel processing from 1980 to 2020 is a follow-up to the authors' 1981 Tutorial on Parallel Processing, which covered the state of the art in hardware, programming languages, and applications.