This book offers a novel multi-portfolio approach and stochastic programming formulations for modeling and solving contemporary supply chain risk management problems.
This book aims to explore the next generation of online learning challenges including the security and privacy issues of digital transformation strategies that is required in teaching and learning.
This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques.
The book explores the convergence of healthcare and cutting-edge technology, making it a captivating subject for readers interested in future research.
Aid organizations usually embrace the idea of digitalization, both in terms of using diverse technologies and processing data digitally for improving their services, making their operations more efficient and even mitigating various risks.
In today's digital transformation environments, a rigorous cybersecurity approach to effective risk management - including contingency planning, outlining immediate actions, preparing post-breach responses - is central to defending organizations' interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks.
This book explores the dynamics of how AI (Artificial Intelligence) technology intersects with cybersecurity challenges and threat intelligence as they evolve.
This book constitutes the refereed proceedings of the 5th EAI International Conference on Cognitive Computing and Cyber Physical Systems, IC4S 2024, held in Bhimavaram, India, during April 5-7, 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
Innovative Management Science Practices: Bridging Theory and Applied Research delves into the dynamic interplay between theoretical frameworks and practical applications in management.
Artificial Intelligence (AI) has become a linchpin in modern security strategies, thanks to its ability to process vast amounts of data, identify patterns, and make data-driven predictions.
In the rapidly evolving world of data and analytics, professionals face the challenge of navigating complex platforms in order to build more efficient solutions.
Data Analysis for Business Students: A Mind-Mapping Approach is an innovative educational resource that guides business students in mastering the essential concepts and methodologies of data analysis.
Towards Unmanned Surface Vehicles: Methods and Practices presents the latest overview, methodologies, design practices, and applications of unmanned surface vehicles (USVs).
This book discusses the multifaceted nature of organizational excellence and proceeds to consider the roles played by data, technological advances leading to innovation and value-based leadership in guiding an organization in its journey towards excellence.