This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing.
This book-consisting of four parts-brings forth a comprehensive evaluation of information and communication technologies (ICTs) utilization in engineering and infrastructures.
This book-consisting of four parts-brings forth a comprehensive evaluation of information and communication technologies (ICTs) utilization in engineering and infrastructures.
This book analyzes the concept, theory, rules, and impact of the reform of the international monetary system and Crypto-SDRs and provides a feasibility analysis of the combination of blockchain technology and SDRs.
This book analyzes the concept, theory, rules, and impact of the reform of the international monetary system and Crypto-SDRs and provides a feasibility analysis of the combination of blockchain technology and SDRs.
This book is a collection of best-selected research papers presented at the International Conference on Advances in Data-driven Computing and Intelligent Systems (ADCIS 2023) held at BITS Pilani, K.
This book is a collection of best-selected research papers presented at the International Conference on Advances in Data-driven Computing and Intelligent Systems (ADCIS 2023) held at BITS Pilani, K.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
This book features high-quality research papers presented at the Third International Conference on Data Science and Big Data Analytics (IDBA 2023), organized by Sri Aurobindo Institute of Technology, Indore, India, in association with ACM and IEEE Computer Society in hybrid mode during June 16-17, 2023.
This book features high-quality research papers presented at the Third International Conference on Data Science and Big Data Analytics (IDBA 2023), organized by Sri Aurobindo Institute of Technology, Indore, India, in association with ACM and IEEE Computer Society in hybrid mode during June 16-17, 2023.
This book focuses on the subject area of Network Systems and Control Theory, providing a comprehensive examination of the dynamic behavior of networked systems operating under communication constraints.
This book focuses on the subject area of Network Systems and Control Theory, providing a comprehensive examination of the dynamic behavior of networked systems operating under communication constraints.
This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc.
This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc.
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities.
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities.
This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice.
This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice.
These days the term Real-Time Operating System (RTOS) is used when referring to an operating system designed for use in embedded microprocessors or controllers.
Learn, prepare, and practice for CompTIA Security+ SY0-701 exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.
Die IT-Welt befindet sich in einem ständigen Wandel, und Unternehmen stehen vor der Herausforderung, ihre IT-Services agil, effizient und zukunftssicher zu gestalten.
The Cybersecurity Guide to Governance, Risk, and Compliance Understand and respond to a new generation of cybersecurity threats Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks.
This handbook provides a detailed description and analysis of the concepts, processes, and technologies used in the development and implementation of an effective customer relationship (CRM) strategy.
Emphasizing that it's much easier and more cost effective to make changes in the planning phases of a project rather than later on, Project Management Tools and Techniques for Success provides an accessible introduction to project management fundamentals.
While global sourcing has expanded dramatically in terms of activities, consistent challenges remain for organizations that choose such a business decision.
Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts.
Explaining how going green can pay for itself, Green Computing: Tools and Techniques for Saving Energy, Money, and Resources ties the green agenda in IT to the broader corporate agenda in risk management, brand management, and reputation management.
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science.
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science.
The ideas of this book originate from the mobile WAVE approach which allowed us, more than a half century ago, to implement citywide heterogeneous computer networks and solve distributed problems on them well before the internet.