Intrusion Detection Networks: A Key to Collaborative Security supplies a complete introduction to intrusion detection systems (IDS) and intrusion detection networks (IDN).
Existing ERP systems are being used to support an increasing amount of critical e-business initiatives, even though this is far from their original purpose.
This proceedings volume contains papers presented at the 2015 International Conference on Management and Technology in Knowledge, Service, Tourism & Hospitality (SERVE 2015), covering a wide range of topics in the fields of knowledge and service management, web intelligence, tourism and hospitality.
This book provides an introduction to machine learning, security and cloud computing, from a conceptual level, along with their usage with underlying infrastructure.
This book provides an introduction to machine learning, security and cloud computing, from a conceptual level, along with their usage with underlying infrastructure.
The book is a collection of best selected research papers presented at the International Conference on Advances in Information Communication Technology and Computing (AICTC 2024), held in NJSC South Kazakhstan State Pedagogical University, Shymkent City, Kazakhstan, during April 29-30, 2024.
The book is a collection of best selected research papers presented at the International Conference on Advances in Information Communication Technology and Computing (AICTC 2024), held in NJSC South Kazakhstan State Pedagogical University, Shymkent City, Kazakhstan, during April 29-30, 2024.
Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity.
This book includes high-quality research papers presented at the Seventh International Conference on Innovative Computing and Communication (ICICC 2024), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on 16-17 February 2024.
This book includes high-quality research papers presented at the Seventh International Conference on Innovative Computing and Communication (ICICC 2024), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on 16-17 February 2024.
In einer Welt, die zunehmend von digitalen Technologien geprägt ist, gewinnt das IT-Audit eine Schlüsselrolle in der Sicherung von Daten, Prozessen und Compliance.
Organizations increasingly need to deal with unstructured processes that traditional business process management (BPM) suites are not designed to deal with.
Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity.
Finance Transformation: Leadership on Digital Transformation and Disruptive Innovation is a general and wide-ranging survey of finance transformation and emerging technologies.
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience.
This book includes high-quality research papers presented at the Seventh International Conference on Innovative Computing and Communication (ICICC 2024), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on 16-17 February 2024.
Research shows that companies that employ data-driven decision-making are more productive, have a higher market value, and deliver higher returns for their shareholders.
Although recent advances in technology have made life easier for individuals, societies, and states, they have also led to the emergence of new and different problems in the context of security.
The world of SAP is undergoing a major transformation, with many customers either planning or actively modernizing their SAP landscapes as part of the S/4HANA digital transformation.