This book presents high-quality, peer-reviewed papers from 3rd International Conference on "e;Universal Threats in Expert Applications and Solutions"e; (UNI-TEAS 2024), jointly being organized by IES University, Bhopal, and Shree KKarni Universe College, Jaipur, in association with CSI Jaipur Chapter and Jaipur ACM Professional Chapter during January 6-9, 2024.
This unique new volume analyses source documents both previously known and recently declassified, generating an extremely broad and original synthesis about Enigma.
This book consists of twelve chapters covering the design aspects, their feasibility, mathematical modeling by numerical, experimental, computational and simulation approaches.
This book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology, held in London, on February 19-22, 2024.
This book consists of twelve chapters covering the design aspects, their feasibility, mathematical modeling by numerical, experimental, computational and simulation approaches.
The world of SAP is undergoing a major transformation, with many customers either planning or actively modernizing their SAP landscapes as part of the S/4HANA digital transformation.
A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran cybersecurity practitioners delivers a practical and hands-on discussion of how to set up and operate a security operations center (SOC) in a way that integrates and optimizes existing security procedures.
Innovative Management Science Practices: Bridging Theory and Applied Research delves into the dynamic interplay between theoretical frameworks and practical applications in management.
This book introduces 6G enabled healthcare systems and helps readers understand state-of-the-art techniques and applications for future healthcare systems.
This book introduces 6G enabled healthcare systems and helps readers understand state-of-the-art techniques and applications for future healthcare systems.
This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3-4 January 2024.
This book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3-4 January 2024.
This book provides a timely introduction to the methodology of Intelligent Bridge Maintenance and Management (IBM&M) and a comprehensive synthesis of emerging digital technologies for realizing IBM&M.
By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs).
Changes in the global environment, the complexity of decision-making, and the new role of social media have challenged the operating models and practices of traditional crisis preparedness and security of supply.
Changes in the global environment, the complexity of decision-making, and the new role of social media have challenged the operating models and practices of traditional crisis preparedness and security of supply.
This book introduces two internationally recognized bodies of knowledge: COBIT 5 from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF).
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud.
Get the most out of ACDs (automatic call distributors) and other complex systems in order to boost customer satisfaction and increase sales Includes three ready to use RFPs (request for proposals) for buying an ACD, computer telephony system, or recording
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more.
Step into the next frontier of technology with The Quantum Internet Revolution, a groundbreaking exploration of the science, innovations, and transformative potential of quantum networking.