Software Telemetry shows you how to efficiently collect, store, and analyze system and application log data so you can monitor and improve your systems.
Build and use systems that safely automate software delivery from testing through release with this jargon-busting guide to continuous delivery pipelines.
SummaryServerless Architectures on AWS teaches you how to build, secure and manage serverless architectures that can power the most demanding web and mobile apps.
GraphQL in Action gives you the tools to get comfortable with the GraphQL language, build and optimize a data API service, and use it in a front-end client application.
Summary Docker in Action, Second Edition teaches you the skills and knowledge you need to create, deploy, and manage applications hosted in Docker containers.
SummaryReactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic.
Understanding Java from the JVM up gives you a solid foundation to grow your expertise and take on advanced techniques for performance, concurrency, containerization, and more.
The two-volume set LNICST 570 and 571 constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime, ICDF2C 2023, held in New York City, NY, USA, during November 30, 2023.
This book constitutes the proceedings of the 20th International Conference on Foundations of Computer Science, FCS 2024, and the 20th International Conference on Frontiers in Education, FECS 2024, held as part of the 2024 World Congress in Computer Science, Computer Engineering and Applied Computing, in Las Vegas, USA, during July 22 to July 25, 2024.
This Festschrift, dedicated to Wolfgang Reif on the occasion of his 65th birthday, collects contributions written by many of his closest research colleagues and many of his former students.
This book constitutes the refereed proceedings of two long-running events held along with the CAiSE conference and related to the areas of enterprise, business-process and information systems modeling: - the 26th International Conference on Business Process Modeling, Development and Support, BPMDS 2025 and - the 30th International Conference on Exploring Modeling Methods for Systems Analysis and Development, EMMSAD 2025.
Edge computing has emerged as a powerful technology for efficiently executing tasks by pushing cloud computing capabilities to the edge of the network.
This book constitutes the jointly proceedings of the 3rd International Conference on Intelligent Edge Processing in the IoT Era, Edge-IoT 2022, and the 4th International Conference on Smart Governance for Sustainable Smart Cities, SmartGov 2022.
This contributed volume consists of 11 chapters that specifically cover the security aspects of the latest technologies such as Blockchain, IoT, and DevOps, and how to effectively deal with them using Intelligent techniques.
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 28th European Symposium on Research in Computer Security, ESORICS 2023, in The Hague, The Netherlands, during September 25-29, 2023.
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 28th European Symposium on Research in Computer Security, ESORICS 2023, in The Hague, The Netherlands, during September 25-29, 2023.
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 28th European Symposium on Research in Computer Security, ESORICS 2023, in The Hague, The Netherlands, during September 25-29, 2023.
This two-volume set LNCS 14398 and LNCS 14399 constitutes the refereed proceedings of eleven International Workshops which were held in conjunction with the 28th European Symposium on Research in Computer Security, ESORICS 2023, in The Hague, The Netherlands, during September 25-29, 2023.
This book compiles artificial intelligence (AI) applications in new communication technologies such as the cognitive radio networks, internet of things (IoT), internet of drones (IoD), internet of vehicles (IoV), and autonomous underwater vehicles (AUV), which are expected to increase the amount of data traffic.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems.