The official guide to programming with the revolutionarydata-sharing technology The Common Warehouse Metamodel (CWM) is the new OMG standard thatmakes the sharing of data seamless.
This book constitutes revised and selected papers from the scientific satellite events held in conjunction with the18th International Conference on Service-Oriented Computing, ICSOC 2020.
This book presents Proceedings of the International Conference on Intelligent Systems and Networks, Hanoi, Vietnam, a collection of peer-reviewed articles accepted by ICISN 2024.
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures.
This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014, and the 3rd International Workshop on Quantitative Aspects in Security Assurance, held in Wroclaw, Poland, in September 2014, co-located with the 19th European Symposium on Research in Computer Security (ESORICS 2014).
This book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015.
This book introduces the basic theory and key technologies of MIMO multi-antenna system, the characteristics and applications of spatial multi-dimensional cooperative transmission in the Ground-based, Air-based and Space-based communication systems as well as several advanced technologies for spatial multidimensional cooperative transmission from theoretical and practical perspectives.
This book presents an in-depth description of the Arrowhead Framework and how it fosters interoperability between IoT devices at service level, specifically addressing application.
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map security challenges.
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities.
Written in a simple and developer-focused style, this book gives you the tools and knowledge you need to ace the GCP Professional Cloud Security Engineer certification exam.
Network Routing: Algorithms, Protocols, and Architectures, Second Edition, explores network routing and how it can be broadly categorized into Internet routing, circuit-switched routing, and telecommunication transport network routing.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
This book comprehensively discusses nature inspired algorithms, deep learning methods, applications of mathematical programming, and artificial intelligence techniques.
The definitive deep-dive guide to hardware and software troubleshooting on Cisco Nexus switches The Cisco Nexus platform and NX-OS switch operating system combine to deliver unprecedented speed, capacity, resilience, and flexibility in today's data center networks.
This two-volume constitutes the refereed proceedings of the First International Conference on Advancements in Smart Computing and Information Security, ASCIS 2022, held in Rajkot, India, in November 2022.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Smart Card Research and Advanced Applications, CARDIS 2019, held in Prague, Czech Republic, in November 2019.
This book explores how medical device integration (MDI) supports quality patient care and better clinical outcomes by reducing clinical documentation transcription errors, improving data accuracy and density within clinical records and ensuring the complete capture of medical device information on patients.
This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn's 80th birthday.
The Complete Guide to Building Cloud-Based Services Cloud Native Go shows developers how to build massive cloud applications that meet the insatiable demands of today's customers, and will dynamically scale to handle virtually any volume of data, traffic, or users.
Use the new, enticing, and highly portable event-driven runtime to simplify building resilient and scalable microservices for cloud and edge applicationsKey FeaturesBuild resilient, stateless, and stateful microservice applications that run on the cloud and edgeSolve common distributed systems such as low latency and scaling using any language and frameworkUse real-time and proactive monitoring tools to support a reliable and highly available systemBook DescriptionOver the last decade, there has been a huge shift from heavily coded monolithic applications to finer, self-contained microservices.
Programming Massively Parallel Processors: A Hands-on Approach, Third Edition shows both student and professional alike the basic concepts of parallel programming and GPU architecture, exploring, in detail, various techniques for constructing parallel programs.
This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field.
Perform cloud-based machine learning and deep learning using Amazon Web Services such as SageMaker, Lex, Comprehend, Translate, and PollyKey FeaturesExplore popular machine learning and deep learning services with their underlying algorithmsDiscover readily available artificial intelligence(AI) APIs on AWS like Vision and Language ServicesDesign robust architectures to enable experimentation, extensibility, and maintainability of AI appsBook DescriptionFrom data wrangling through to translating text, you can accomplish this and more with the artificial intelligence and machine learning services available on AWS.
Build a network security threat model with this comprehensive learning guideKey FeaturesDevelop a network security threat model for your organizationGain hands-on experience in working with network scanning and analyzing toolsLearn to secure your network infrastructureBook DescriptionThe tech world has been taken over by digitization to a very large extent, and so it's become extremely important for an organization to actively design security mechanisms for their network infrastructures.
Design and implement a secure end-to-end desktop management solution with Microsoft Endpoint ManagerKey FeaturesLearn everything you need to know about deploying and managing Windows on physical and cloud PCsSimplify remote working for cloud-managed cloud PCs via new service Windows 365Benefit from the authors' experience of managing physical endpoints and traditional virtual desktop infrastructures (VDI)Book DescriptionMicrosoft Modern Workplace solutions can simplify the management layer of your environment remarkably if you take the time to understand and implement them.
This three-book set constitutes the refereed proceedings of the Second International Conference on Recent Trends in Image Processing and Pattern Recognition (RTIP2R) 2018, held in Solapur, India, in December 2018.
Although the Internet of Things (IoT) is a vast and dynamic territory that is evolving rapidly, there has been a need for a book that offers a holistic view of the technologies and applications of the entire IoT spectrum.
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
This book constitutes late breaking papers from the 22nd International Conference on Human-Computer Interaction, HCII 2020, which was held in July 2020.
In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TLS, and S/MIME.
This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method.
This book constitutes revised selected papers from the thoroughly refereed conference proceedings of the 16th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2023, held in Bucharest, Romania, in November 2023.
This book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, Fiji, on December 9-12, 2022.