This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience.
Even though Six Sigma programs have successfully been implemented in practice, many IT departments remain skeptical of the process or are unaware of how the tools can be used to improve system development.
Protect the Digital Frontier with AIIn an age where cyber threats lurk behind every corner of the internet, safeguarding our digital assets has never been more critical.
In an era where vehicular networks and Location-Based Services (LBS) are rapidly expanding, safeguarding location privacy has become a critical challenge.
This is a collection of essays from key researchers in the field of project management who describe what they feel are the most impactful findings from research.
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations.
This book describes the methods and application of Visible Light Communication (VLC) and covers topics such as light sources, detectors, VLC systems, optical modulation schemes, optical multiple-access techniques, new VLC standards, and current applications including ubiquitous indoor information services, visible-light wireless LAN (LiFi), underwater optical wireless communications, and VLC with art.
This book describes the methods and application of Visible Light Communication (VLC) and covers topics such as light sources, detectors, VLC systems, optical modulation schemes, optical multiple-access techniques, new VLC standards, and current applications including ubiquitous indoor information services, visible-light wireless LAN (LiFi), underwater optical wireless communications, and VLC with art.
The book is a collection of best selected research papers presented at International Conference on Trends in Sustainable Computing and Machine Intelligence (ICTSM 2023) organized by Stamford International University, Bangkok, Thailand, during October 5-6, 2023.
All best practice recommendations and key success criteria point to the importance of developing soft skills as a project manager, but few sources exist about how to develop the power of influence for achieving better project and business results.
The digital subscriber line (DSL) industry is expanding rapidly and a technology once thought to be only transitional will soon clear $100 billion in total annual service revenue.
The book presents selected papers from NIELIT's International Conference on Communication, Electronics and Digital Technology (NICEDT-2024) held during 16-17 February 2024 in Guwahati, India.
This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining, and software analysis.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining, and software analysis.
The book presents selected papers from NIELIT's International Conference on Communication, Electronics and Digital Technology (NICEDT-2024) held during 16-17 February 2024 in Guwahati, India.
Performance Computing: Modern Systems and Practices is a fully comprehensive and easily accessible treatment of high performance computing, covering fundamental concepts and essential knowledge while also providing key skills training.