The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
Securely harness the full potential of OpenAI s artificial intelligence tools in Azure Securing Microsoft Azure OpenAI is an accessible guide to leveraging the comprehensive AI capabilities of Microsoft Azure while ensuring the utmost data security.
This book provides a comprehensive overview of advanced digital disruptive technologies that can be used or currently used in Construction, and Smart Infrastructures.
This book provides a comprehensive overview of advanced digital disruptive technologies that can be used or currently used in Construction, and Smart Infrastructures.
This proceedings volume contains papers presented at the 2014 International Conference on Management and Technology in Knowledge, Service, Tourism & Hospitality (SERVE 2014), covering a wide range of topics in the fields of knowledge and service management, web intelligence, tourism and hospitality.
Use MFC, ActiveX, ATL, ADO and COM+ to develop COM applications Implement client/server applications with ease with this example-oriented approach to the details and implementation of COM technology in network applications.
The aim of this book is to delineate the challenges faced by new generation mobile networks, such as 5G and forthcoming 6G, and introduce the concept of addressing these challenges through the development of a novel Distributed AI (DAI) framework.
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications unravels the mystery of cloud computing and explains how it can transform the operating contexts of business enterprises.
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly.
This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3 - 4 January 2024.
This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3 - 4 January 2024.
The goals of an IT balanced scorecard include the alignment of IT plans with business objectives, the establishment of measures of IT effectiveness, the directing of employee efforts toward IT objectives, the improved performance of technology, and the achievement of balanced results across stakeholder groups.
This book gathers selected high-quality research papers presented at the Second International Conference on Intelligent System (ICIS 2023), organized by Industrial University of Ho Chi Minh City, Vietnam during September 29-30, 2023.
This book gathers selected high-quality research papers presented at the Second International Conference on Intelligent System (ICIS 2023), organized by Industrial University of Ho Chi Minh City, Vietnam during September 29-30, 2023.
Enterprise Fortress is a comprehensive guide to building secure and resilient enterprise architectures, aimed at professionals navigating the complex world of cybersecurity.
A presentation of state-of-the-art approaches from an industrial applications perspective, Communication Architectures for Systems-on-Chip shows professionals, researchers, and students how to attack the problem of data communication in the manufacture of SoC architectures.
This book presents peer-reviewed articles from the 18th Conference of the Associated Research Centers for the Urban Underground Space (ACUUS 2023) held in Singapore from November 1 to 4, 2023.