This digital Short Cut, delivered in Adobe PDF format for quick and easy access, is an introduction to issues with cheating and anti-cheating countermeasures in the online gaming industry.
Gain insights into the different challenges that can be solved using Go, with a focus on containers, Linux, security, networking, user interfaces and other relevant cloud based topics.
Know how Serverless and cloud-native systems work, their benefits and roles in automating and optimizing organizations, and the challenges to be considered.
This interactive study guide will support candidates in developing fundamental knowledge and understanding of the basics of computer and network technology, processor architecture and networks, and with an introduction to operating systems and system software.
An essential guide for networking professionals responsible for implementing Wi-Fi 7 Join wireless networking experts Jerome Henry, Brian Hart, Binita Gupta, and Malcolm Smith on this deep dive into Wi-Fi 7 and 802.
This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity.
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods.
This book covers the relationship of recent technologies (such as Blockchain, IoT, and 5G) with the cloud computing as well as fog computing, and mobile edge computing.
Healthcare has become an extremely important and relevant topic in day to day discussions ever since the COVID-19 pandemic has been encountered by the global population.
This book covers the relationship of recent technologies (such as Blockchain, IoT, and 5G) with the cloud computing as well as fog computing, and mobile edge computing.
This book focuses on the techniques of artificial intelligence that are mainly used in the power electronics field for the optimization of lost vehicle power.
This book describes an extensive and consistent soft error assessment of convolutional neural network (CNN) models from different domains through more than 14.
This book presents the proceedings of 2nd EAI International Conference on Smart Technology (MTYMEX), which took place April 27th, 2021, online and in Monterrey, Mexico.
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022.
The book constitutes proceedings of the 12th Industry Symposium held in conjunction with the 18th edition of the International Conference on Distributed Computing and Intelligent Technology (ICDCIT 2022).
This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data.
The Age of Decentralization talks about various decentralization technologies including Web3, decentralized identity, and decentralized storage, and how they can be incorporated in traditional tech architectures to improve technical and business performance.
As artificial intelligence (AI) becomes more and more woven into our everyday lives-and underpins so much of the infrastructure we rely on-the ethical, security, and privacy implications require a critical approach that draws not simply on the programming and algorithmic foundations of the technology.
This book presents original, peer-reviewed select articles from the International Conference on Cognitive & Intelligent Computing (ICCIC - 2021), held on December 11-12, 2021, at Hyderabad, India.
This book presents different tools and techniques used for Decision Support Systems (DSS), including decision tree and table, and their modifications, multi-criteria decision analysis techniques, network tools of decision support, and various case-based reasoning methods supported by examples and case studies.
This book presents different tools and techniques used for Decision Support Systems (DSS), including decision tree and table, and their modifications, multi-criteria decision analysis techniques, network tools of decision support, and various case-based reasoning methods supported by examples and case studies.
Census data is widely used by practitioners to understand demographic change, allocate resources, address inequalities, and make sound business decisions.
Census data is widely used by practitioners to understand demographic change, allocate resources, address inequalities, and make sound business decisions.
This textbook highlights the essential need for a strong ethical framework in our approach to teaching of and working in computer, information and engineering sciences.
Get to grips with the latest container examples, Python 3 features, GitLab DevOps, network data analysis, and cloud networking to get the most out of Python for network engineering with the latest edition of this bestselling guidePurchase of the print or Kindle book includes a free eBook in PDF format.
This textbook provides a comprehensive review of the evolution of mobile communications and networking from the birth of cellular networks to the forthcoming sixth-generation mobile communications, which is envisioned to be commercially deployed first in 2030.
This book provides an overview of the many approaches that can adopted for programming and deploying highly-adaptive and large-scale IoT systems, with a specific focus on the key results achieved within the Fluidware research project.
This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2022 and CBT 2022, which took place in Copenhagen, Denmark, during September 26-30, 2022.