This book gathers a collection of high-quality peer-reviewed research papers presented at the 3rd International Conference on Data and Information Sciences (ICDIS 2021), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on May 14 - 15, 2021.
Broadband networks, such as asynchronous transfer mode (ATM), frame relay, and leased lines, allow us to easily access multimedia services (data, voice, and video) in one package.
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012.
The proven Study Guide that prepares you for this new Google Cloud exam The Google Cloud Certified Professional Data Engineer Study Guide, provides everything you need to prepare for this important exam and master the skills necessary to land that coveted Google Cloud Professional Data Engineer certification.
Learn to build, secure, deploy, and manage your serverless application in Golang with AWS Lambda Key FeaturesImplement AWS lambda to build scalable and cost-efficient applications in GoDesign and set the data flow between cloud services and custom business logicLearn to design Lambda functions using real-world examples and implementation scenariosBook DescriptionServerless architecture is popular in the tech community due to AWS Lambda.
Although software development is one of the most complex activities carried out by man, sound development processes and proper project management can help ensure your software projects are delivered on time and under budget.
Sniffer Network Optimization and Troubleshooting Handbook introduces the reader to the vast functionality of the suite of Sniffer Solutions from Network Associates but ultimately focuses on the affordable and most widely used Sniffer Product - Sniffer Pro LAN Network Analyzer.
This book constitutes the refereed proceedings of the 5th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2021, held in Be'er Sheva, Israel, in July 2021.
This book presents recent advances in the field of scalable distributed computing including state-of-the-art research in the field of Cloud Computing, the Internet of Things (IoT), and Blockchain in distributed environments along with applications and findings in broad areas including Data Analytics, AI, and Machine Learning to address complex real-world problems.
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets.
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2020) held at the University of Engineering & Management, Kolkata, India, during July 2020.
This book constitutes the proceedings of the 7th International Workshop on Graphical Models for Security, GramSec 2020, which took place on June 22, 2020.
Computer Networks: A Systems Approach, Fifth Edition, explores the key principles of computer networking, with examples drawn from the real world of network and protocol design.
Anyone who has ever bought a car, rented an apartment, had a job or conversation that they would rather not see in their employee review may find this book of interest.
TCP/IP Illustrated, an ongoing series covering the many facets of TCP/IP, brings a highly-effective visual approach to learning about this networking protocol suite.
This book argues that security and defense have never been true priorities in the European Union, and have constantly been marginalized by the elites since the Soviet Union collapsed and the Warsaw Pact disintegrated.
Exploit and defend against the latest wireless network attacksLearn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide.
The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information Privacy and Security of the School of C- munication and Information at Rutgers University, was held on May 12, 2008 at the Hyatt Regency, New Brunswick, New Jersey, USA.
The four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023.
This book reports on cutting-edge research on social and occupational ergonomics, presenting innovative contributions to the optimization of sociotechnical management systems related to organizational, policy, and logistical issues.
This book constitutes the refereed proceedings of the 18th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2017, held in Antwerp, Belgium, in September 2017.
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.
This book fills a gap in the existing literature by combining a plethora of WSN-based emerging technologies into a single source so that reviewers can form opinions regarding these technologies.
A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems.
This book constitutes the revised selected post conference proceedings of the 15th International Workshop on Data Privacy Management, DPM 2020, and the 4th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2020, held in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020, held in Guildford, UK in September 2020.
This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2016, held in Aksaray, Turkey, in September 2016.
This book includes extended and revised versions of selected papers from the 7th and 8th edition of the International Conference on Information Systems Security and Privacy (ICISSP 2021 and ICISSP 2022).
This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017.
This book constitutes the refereed post-conference proceedings of the 8th International Conference on Mobile Networks and Management, MONAMI 2016, held in Abu Dhabi, United Arab Emirates, in October 2016.