From smart sensors to cloud integration and the world of TinyML, this book is your comprehensive guide to the IoT ecosystem, using the ESP32 and industry-standard tools and technologiesKey FeaturesBuild IoT projects from scratch using ESP32Customize solutions, take them to cloud, visualize real-time data, implement security featuresPractice using a variety of hands-on projects such as an audio player, smart home, and moreBook DescriptionESP32, a low-cost and energy-efficient system-on-a-chip microcontroller, has become the backbone of numerous WiFi devices, fueling IoT innovation.
Blockchain technology is a disruptive technology that affords businesspeople an opportunity to correct problems of dishonesty, corruption, and poor decision-making.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
This book will show you how to build Java-based microservices architecture using the popular Spring Boot framework by evolving a small monolith application to an event-driven architecture composed of several services.
Protect the Digital Frontier with AIIn an age where cyber threats lurk behind every corner of the internet, safeguarding our digital assets has never been more critical.
The book is a modern primer on propaganda-aspects like disinformation, trolls, bots, information influence, psychological operations, information operations, and information warfare.
The book is a modern primer on propaganda-aspects like disinformation, trolls, bots, information influence, psychological operations, information operations, and information warfare.
Blockchain technology is a disruptive technology that affords businesspeople an opportunity to correct problems of dishonesty, corruption, and poor decision-making.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023.
Whether you're preparing for your service management foundation exam, or simply want to understand service management better, this new edition of our popular book covers the latest thinking and provides a comprehensive, practical introduction to IT service management.
Whether you're preparing for your service management foundation exam, or simply want to understand service management better, this new edition of our popular book covers the latest thinking and provides a comprehensive, practical introduction to IT service management.
The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2023), held at Vidyasagar University, Midnapore, India, during March 24-26, 2023.
This book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks.
5G Advanced: The Next Generation Wireless Access Technology, Third Edition follows the authors' highly celebrated books on 3G and 4G by providing a new level of insight into 5G NR.
The book is a collection of best selected research papers presented at the Third World Conference on Internet of Things: Applications & Future (ITAF 2023) organized by Global Knowledge Research Foundation in Cairo during February 4-5, 2023.
The book is a collection of best selected research papers presented at the Third World Conference on Internet of Things: Applications & Future (ITAF 2023) organized by Global Knowledge Research Foundation in Cairo during February 4-5, 2023.
This book features selected high-quality papers from the Forth International Conference on Mobile Radio Communications and 5G Networks (MRCN 2023), held at University Institute of Engineering and Technology, Kurukshetra University, Kurukshetra, India, during August 25-26, 2023.
This book demystifies how Kubernetes networking actually works by walking through a simple but practical simulation that mirrors reality as closely as possible, while skipping the gory details.
5G Advanced: The Next Generation Wireless Access Technology, Third Edition follows the authors' highly celebrated books on 3G and 4G by providing a new level of insight into 5G NR.
This book features high-quality, peer-reviewed research papers presented at the International Conference on Data Electronics and Computing (ICDEC 2022) organized by departments of Electronics and Communication Engineering, Computer Applications, and Biomedical Engineering, North-Eastern Hill University, Shillong, Meghalaya, India during 7 - 9 September, 2022.
This book explores the intersection of cybersecurity and education technologies, providing practical solutions, detection techniques, and mitigation strategies to ensure a secure and protected learning environment in the face of evolving cyber threats.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
This book explores the intersection of cybersecurity and education technologies, providing practical solutions, detection techniques, and mitigation strategies to ensure a secure and protected learning environment in the face of evolving cyber threats.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
Take your penetration testing career to the next level by discovering how to set up and exploit cost-effective hacking lab environments on AWS, Azure, and GCPKey FeaturesExplore strategies for managing the complexity, cost, and security of running labs in the cloudUnlock the power of infrastructure as code and generative AI when building complex lab environmentsLearn how to build pentesting labs that mimic modern environments on AWS, Azure, and GCPPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe significant increase in the number of cloud-related threats and issues has led to a surge in the demand for cloud security professionals.
The connected world paradigm effectuated through the proliferation of mobile devices, Internet of Things (IoT), and the metaverse will offer novel services in the coming years that need anytime, anywhere, high-speed access.