This book features selected papers from the 10th International Conference on Mathematics and Computing (ICMC 2024), held at Kalasalingam Academy of Research and Education (KARE), Krishnankoil, India during 2 - 7 January 2024.
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.
This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016.
This book constitutes the refereed proceedings of the Second International Conference on Future Network Systems and Security, FNSS 2016, held in Paris, France, in November 2016.
The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023.
The book contains peer-reviewed papers from the International Conference on Recent Developments in Cyber Security organized by the Center for Cyber Security and Cryptology at Sharda University in June 2023.
This book presents the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2023), which took place Bratislava, Slovakia, October 24-26, 2023.
This book presents the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2023), which took place Bratislava, Slovakia, October 24-26, 2023.
This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing.
This book gathers recent research in security and privacy to discuss, evaluate, and improve the novel approaches of data protection in IoT and edge and fog computing.
This book-consisting of four parts-brings forth a comprehensive evaluation of information and communication technologies (ICTs) utilization in engineering and infrastructures.
This book-consisting of four parts-brings forth a comprehensive evaluation of information and communication technologies (ICTs) utilization in engineering and infrastructures.
This book analyzes the concept, theory, rules, and impact of the reform of the international monetary system and Crypto-SDRs and provides a feasibility analysis of the combination of blockchain technology and SDRs.
This book analyzes the concept, theory, rules, and impact of the reform of the international monetary system and Crypto-SDRs and provides a feasibility analysis of the combination of blockchain technology and SDRs.
This book is a collection of best-selected research papers presented at the International Conference on Advances in Data-driven Computing and Intelligent Systems (ADCIS 2023) held at BITS Pilani, K.
This book is a collection of best-selected research papers presented at the International Conference on Advances in Data-driven Computing and Intelligent Systems (ADCIS 2023) held at BITS Pilani, K.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
This book features high-quality research papers presented at the Third International Conference on Data Science and Big Data Analytics (IDBA 2023), organized by Sri Aurobindo Institute of Technology, Indore, India, in association with ACM and IEEE Computer Society in hybrid mode during June 16-17, 2023.
This book features high-quality research papers presented at the Third International Conference on Data Science and Big Data Analytics (IDBA 2023), organized by Sri Aurobindo Institute of Technology, Indore, India, in association with ACM and IEEE Computer Society in hybrid mode during June 16-17, 2023.
This book focuses on the subject area of Network Systems and Control Theory, providing a comprehensive examination of the dynamic behavior of networked systems operating under communication constraints.
This book focuses on the subject area of Network Systems and Control Theory, providing a comprehensive examination of the dynamic behavior of networked systems operating under communication constraints.
This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc.
This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc.
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities.
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities.
This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice.
This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice.
These days the term Real-Time Operating System (RTOS) is used when referring to an operating system designed for use in embedded microprocessors or controllers.
Learn, prepare, and practice for CompTIA Security+ SY0-701 exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.
Die IT-Welt befindet sich in einem ständigen Wandel, und Unternehmen stehen vor der Herausforderung, ihre IT-Services agil, effizient und zukunftssicher zu gestalten.
The Cybersecurity Guide to Governance, Risk, and Compliance Understand and respond to a new generation of cybersecurity threats Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks.
This handbook provides a detailed description and analysis of the concepts, processes, and technologies used in the development and implementation of an effective customer relationship (CRM) strategy.
Emphasizing that it's much easier and more cost effective to make changes in the planning phases of a project rather than later on, Project Management Tools and Techniques for Success provides an accessible introduction to project management fundamentals.
While global sourcing has expanded dramatically in terms of activities, consistent challenges remain for organizations that choose such a business decision.