Evolving from Digital Transformation to Digital Acceleration Using The Galapagos Framework challenges established thinking and offers a new way to deliver digital change.
This book contains original, peer-reviewed research articles from the 5th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities, and Applications, held in Hyderabad, India on 28-29 March 2024.
Addressing the rapid evolution of global communications, this book provides step-by-step guidance on how to configure, enact, and manage the process of integrating mobile technology within an organization.
Practical Hacking Techniques and Countermeasures examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured to repel an attack.
Ambient assisted living (AAL) utilizes information and communication technology to empower individuals to maintain an active and independent lifestyle for as long as possible.
Written by one of the nation's most highly regarded project management mentors, The Complete Project Management Methodology and Toolkit provides a combined project and business management solution that any can be readily applied in any industry by both novice and certified project managers.
Turn the avalanche of raw data from Azure Data Explorer, Azure Monitor, Microsoft Sentinel, and other Microsoft data platforms into actionable intelligence with KQL (Kusto Query Language).
Incomplete or missed requirements, omissions, ambiguous product features, lack of user involvement, unrealistic customer expectations, and the proverbial scope creep can result in cost overruns, missed deadlines, poor product quality, and can very well ruin a project.
Although wireless sensor networks (WSNs) have been employed across a range of applications, there are few books available that cover the required algorithms, performance analysis, and applications of network management techniques in WSNs.
How did we end up here, masters of scientific insight, purveyors of ever more powerful technologies, astride the burning planet that created us, and now responsible for cleaning up the mess and determining the future direction of all of life?
Complex Networks: An Algorithmic Perspective supplies the basic theoretical algorithmic and graph theoretic knowledge needed by every researcher and student of complex networks.
AI iQ for a Human-Focused Future: Strategy, Talent, and Culture offers a pioneering approach to integrating artificial intelligence (AI) and generative AI (GenAI) in business, emphasizing a business strategy first mindset over a technologycentric one.
As we get caught up in the quagmire of big data and analytics, it is important to be able to reflect and apply insights, experience, and intuition as part of the decision-making process.
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Dr.
Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.
Securing Enterprise Networks with Cisco Meraki Discover the Power of Cisco Meraki Unlock the full potential of Cisco Meraki with this in-depth guide, designed to help you build and secure modern, cloud-managed networks.
Learn to enhance your organization s cybersecurit y through the NIST Cybersecurit y Framework in this invaluable and accessible guide The National Institute of Standards and Technology (NIST) Cybersecurity Framework, produced in response to a 2014 US Presidential directive, has proven essential in standardizing approaches to cybersecurity risk and producing an efficient, adaptable toolkit for meeting cyber threats.
This guide explains how to gain a handle on the vital aspects of data protection, offering a solid understanding of how data protection fits into various organizations.
In diesem essential entfaltet Martin Pils eine klare Vision für effektive Security-Awareness-Programme, die darauf abzielen, das menschliche Element in der Cyberabwehr zu stärken.
Advances in the area of wireless and mobile telemedicine to diagnose and treat patients have drawn growing attention from healthcare providers and recipients, industry, researchers, and governments.
This book explores how medical device integration (MDI) supports quality patient care and better clinical outcomes by reducing clinical documentation transcription errors, improving data accuracy and density within clinical records and ensuring the complete capture of medical device information on patients.
Get the details, examples, and best practices you need to build generative AI applications, services, and solutions using the power of Azure OpenAI Service.
This book highlights the application of smart technologies that utilize the Internet of Things (IoT) and Artificial Intelligence (AI) to enhance efficiency and productivity across various industries.
This book highlights the application of smart technologies that utilize the Internet of Things (IoT) and Artificial Intelligence (AI) to enhance efficiency and productivity across various industries.
In diesem essential entfaltet Martin Pils eine klare Vision für effektive Security-Awareness-Programme, die darauf abzielen, das menschliche Element in der Cyberabwehr zu stärken.
Grounded in practicality, this book explains the procedures for running a successful project and highlights the finer points of managing and controlling the project.
17th WCEAM Proceedings provides a record of some of the intellectual discussions (including keynote addresses, research paper presentations, panel debates and practical workshops) that took place among the attendees and participants of the 17th World Congress on Engineering Asset Management (WCEAM), held from 18 - 20 October 2023 at the Sheraton Saigon Hotel and Towers, Ho Chi Minh City, Vietnam.
Embark on a Radio Adventure: Dive into the World of BaofengImagine stepping into a world where the airwaves open up a galaxy of communication possibilities, connecting you with voices from across the globe.
Embark on a Radio Adventure: Dive into the World of BaofengImagine stepping into a world where the airwaves open up a galaxy of communication possibilities, connecting you with voices from across the globe.
This book presents insights, interpretations, concepts, and interdependent views-in the landscape of mobile connectivity and service-that emphasize the significance of a harmonious interplay, cooperation, and coalescing of a variety of interdisciplinary domains of science and art.
Embark on a journey to business evolution grounded in the real-world experiences and challenges faced by those at the forefront of the Web2 revolution.
Trust the best-selling Cert Guide series from Pearson IT Certification to help you learn, prepare, and practice for the CC Certified in Cybersecurity exam.
Work on 10 practical projects, each with a blueprint for a different machine learning technique, and apply them in the real world to fight against cybercrimePurchase of the print or Kindle book includes a free PDF eBookKey FeaturesLearn how to frame a cyber security problem as a machine learning problemExamine your model for robustness against adversarial machine learningBuild your portfolio, enhance your resume, and ace interviews to become a cybersecurity data scientistBook DescriptionMachine learning in security is harder than other domains because of the changing nature and abilities of adversaries, high stakes, and a lack of ground-truth data.