Although recent advances in technology have made life easier for individuals, societies, and states, they have also led to the emergence of new and different problems in the context of security.
Antennas are an important component of every communication systems, including radio, television, satellite, radar, and cellular networks which transmits and receive radio waves over the wireless channel.
Das Standard-Datenschutzmodell (SDM) gilt spätestens seit 2020 deutschlandweit als etabliert, um normative Anforderungen der DSGVO in funktionale Anforderungen an die Praxis der Datenverarbeitungen zu transformieren.
This book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology, held in London, on February 19-22, 2024.
Service-oriented architecture (SOA) uses services as the baseline for developing new architectures and applications, as networks are built specifically to satisfy service requirements.
This book is a collection of high-quality peer-reviewed research papers presented at the Ninth International Conference on Cyber-Security, Privacy in Communication Networks (ICCS 2023) held at Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff, UK, during 11-12 December 2023.
This book is a collection of high-quality peer-reviewed research papers presented at the Ninth International Conference on Cyber-Security, Privacy in Communication Networks (ICCS 2023) held at Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff, UK, during 11-12 December 2023.
Learn, prepare, and practice for CompTIA Network+ N10-009 exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.
Crafting Museum Social Media for Social Inclusion Work investigates if and how social media can be integrated into the social inclusion initiatives of museums, and the contextual factors that impact this integration.
Focusing on a data-centric perspective, this book provides a complete overview of data mining: its uses, methods, current technologies, commercial products, and future challenges.
This book features selected research papers presented at the Fifth International Conference on Computing, Communications, and Cyber-Security (IC4S'05) Volume 2, organized in India, during 8th-9th April, 2024.
This book features selected research papers presented at the Fifth International Conference on Computing, Communications, and Cyber-Security (IC4S'05) Volume 2, organized in India, during 8th-9th April, 2024.
Whether you're an IT professional, a telecom professional, an office administrator, or just starting out in the business world, this book provides you with an organized, easy-to-use introduction to business telecommunications systems and services.
Handbook of Inclusive Knowledge Management: Ensuring Inclusivity, Diversity, and Equity in Knowledge Processing Activities examines the role that diversity, equity and inclusivity (DEI) plays in the field and discipline of knowledge management (KM).
This book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments.
Master network security and cryptography with this in-depth guide covering essential concepts, techniques, and advanced topics for protecting data and networks.
This book explores the applications and advancements of federated learning across diverse sectors, focusing on its integration with cutting- edge technologies like Internet of Things (IoT), artificial intelligence (AI), blockchain, and digital twins.