This book includes original, peer-reviewed articles from the 2nd International Conference on Cognitive & Intelligent Computing (ICCIC-2022), held at Vasavi College of Engineering Hyderabad, India.
This book gathers selected papers presented at the 7th International Conference on Inventive Communication and Computational Technologies conference (ICICCT 2023), held on May 22-23, 2023, at Gnanamani College of Technology, Tamil Nadu, India.
This book focuses on the numerous energy harvesting techniques and their system implementation towards the fulfilment of energy requirements in compact electronic devices.
Conduct impact measurement and outcomes evaluation, with a specific focus on nonprofits, using Salesforce Nonprofit Cloud (aka Salesforce for Nonprofits).
Even though the field of enterprise architecture (EA) has matured, many organisations still struggle with its development and implementation, particularly those organisations involved in continuous transformational cycles and subjected to different environmental trends.
This book includes original, peer-reviewed articles from the 2nd International Conference on Cognitive & Intelligent Computing (ICCIC-2022), held at Vasavi College of Engineering Hyderabad, India.
This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 8th International Conference on ICT for Sustainable Development (ICT4SD 2023), held in Goa, India, on August 3-4, 2023.
This book includes original, peer-reviewed articles from the 2nd International Conference on Cognitive & Intelligent Computing (ICCIC-2022), held at Vasavi College of Engineering Hyderabad, India.
This book gathers selected papers presented at the 7th International Conference on Inventive Communication and Computational Technologies conference (ICICCT 2023), held on May 22-23, 2023, at Gnanamani College of Technology, Tamil Nadu, India.
Anhand von mehr als 50 bearbeiteten Angriffen auf deutsche Firmen erörtern die Autoren das technische Vorgehen von Ransomwaregruppen, die richtige Reaktion im Krisenfall und die Möglichkeiten zur Prävention.
6G is currently under definition, being often addressed from a plain telecommunications perspective as an evolutionary paradigm that represents an extension of 5G.
This book offers an overview of digital, IoT and intelligent technologies, applications and solutions that are contributing to shape the digital, inclusive, and sustainable transformation of contemporary cities.
This book is a collection of selected high-quality research papers presented at International Conference on Paradigms of Communication, Computing and Data Analytics (PCCDA 2023), held at South Asian University, New Delhi, India, during 22-23 April 2023.
This book is your practical and comprehensive guide to learning Google Cloud Platform (GCP) for data science, using only the free tier services offered by the platform.
This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 8th International Conference on ICT for Sustainable Development (ICT4SD 2023), held in Goa, India, on 3-4 August 2023.
This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 8th International Conference on ICT for Sustainable Development (ICT4SD 2023), held in Goa, India, on 3-4 August 2023.
This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Risk Assessment and Risk-driven Testing, RISK 2013, held in conjunction with 25th IFIP International Conference on Testing Software and Systems, ICTSS 2013, in Istanbul, Turkey, in November 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Security, Privacy and Trust in a Digital World, e-Democracy 2013, held in Athens, Greece, December 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Trustworthy Global Computing, TGC 2013, held in Buenos Aires, Argentina, in August 2013.
This book constitutes the thoroughly refereed proceedings of the 5th International Conference on Ad Hoc Networks, ADHOCNETS 2013, held in Barcelona, Spain, in October 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Smart Card Research and Advanced Applications, CARDIS 2013, held in Berlin, Germany, in November 2013.
If you had to evacuate from your building right now and were told you couldn't get back in for two weeks, would you know what to do to ensure your business continues to operate?
A smart ecosystem is envisioned to exchange and analyze data across systems, enabling a flexible, faster, and reliable smart ecosystem for high-quality results at reduced costs and little human intervention.
Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guideKey FeaturesGain insights into the open source intelligence (OSINT) methods used by attackers to harvest dataUnderstand the evolving implications of social engineering on social networksImplement effective defensive strategies to mitigate the probability and impact of social engineering attacksPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionSocial engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities.
Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guideKey FeaturesGain insights into the open source intelligence (OSINT) methods used by attackers to harvest dataUnderstand the evolving implications of social engineering on social networksImplement effective defensive strategies to mitigate the probability and impact of social engineering attacksPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionSocial engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities.
In this practical guide, four Kubernetes professionals with deep experience in distributed systems, enterprise application development, and open source will guide you through the process of building applications with this container orchestration system.
In this practical guide, four Kubernetes professionals with deep experience in distributed systems, enterprise application development, and open source will guide you through the process of building applications with this container orchestration system.
The book is a collection of peer-reviewed best-selected research papers presented at the International Conference on Advances in IoT and Security with AI (ICAISA 2023), organized by Deen Dayal Upadhyaya College, University of Delhi, New Delhi, India, in collaboration with University of Canberra, Canberra, Australia, and NIT, Arunachal Pradesh, Itanagar, AP, India, during March 24-25, 2023.
The book is a collection of peer-reviewed best-selected research papers presented at the International Conference on Advances in IoT and Security with AI (ICAISA 2023), organized by Deen Dayal Upadhyaya College, University of Delhi, New Delhi, India, in collaboration with University of Canberra, Canberra, Australia, and NIT, Arunachal Pradesh, Itanagar, AP, India, during March 24-25, 2023.
The book is a collection of peer-reviewed best-selected research papers presented at the International Conference on Advances in IoT and Security with AI (ICAISA 2023), organized by Deen Dayal Upadhyaya College, University of Delhi, New Delhi, India, in collaboration with University of Canberra, Canberra, Australia, and NIT, Arunachal Pradesh, Itanagar, AP, India, during March 24-25, 2023.