This book features selected high-quality papers from the Third International Conference on Mobile Radio Communications and 5G Networks (MRCN 2022), held at University Institute of Engineering and Technology, Kurukshetra University, Kurukshetra, India, during June 10-12, 2022.
A concise introduction to database design concepts, methods, and techniques in and out of the cloud In the newly revised second edition of Beginning Database Design Solutions: Understanding and Implementing Database Design Concepts for the Cloud and Beyond, Second Edition, award-winning programming instructor and mathematician Rod Stephens delivers an easy-to-understand guide to designing and implementing databases both in and out of the cloud.
This book gathers outstanding papers presented at the International Conference on Data Science and Applications (ICDSA 2022), organized by Soft Computing Research Society (SCRS) and Jadavpur University, Kolkata, India, from 26 to 27 March 2022.
Widely considered one of the best practical guides to programming, Steve McConnell's original CODE COMPLETE has been helping developers write better software for more than a decade.
This book constitutes the proceedings of the Blockchain, Robotic Process Management (RPA), and Central and Eastern Europe (CEE) Forum which were held as part of the 20th International Conference on Business Process Management, BPM 2022, which took place in Munster, Germany, during September 11-15, 2022.
In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat.
A comprehensive and fully visual guide to Microsoft Power BI Teach Yourself VISUALLY Power BI collects all the resources you need to master the everyday use of Microsoft's powerful data visualization software and delivers them in a single, easy-to-use volume.
A comprehensive and accessible roadmap to performing data analytics in the AWS cloud In Data Analytics in the AWS Cloud: Building a Data Platform for BI and Predictive Analytics on AWS, accomplished software engineer and data architect Joe Minichino delivers an expert blueprint to storing, processing, analyzing data on the Amazon Web Services cloud platform.
With the rapid proliferation of information and communications technology, industrial automation has undergone a sweeping transformation toward intelligent manufacturing.
This book provides comprehensive coverage of different aspects of low-power circuit synthesis for IoT applications at various levels of the design hierarchy, starting from the layout level to the system level.
With the rapid proliferation of information and communications technology, industrial automation has undergone a sweeping transformation toward intelligent manufacturing.
This book explores the potential of 5G technologies and beyond in smart city setups, with the availability of high bandwidths and performance, and low latency.
This book explores the potential of 5G technologies and beyond in smart city setups, with the availability of high bandwidths and performance, and low latency.
Gain a firm, practical understanding of securing your network and utilize Python's packages to detect vulnerabilities in your applicationKey FeaturesDiscover security techniques to protect your network and systems using PythonCreate scripts in Python to automate security and pentesting tasksAnalyze traffic in a network and extract information using PythonBook DescriptionPython's latest updates add numerous libraries that can be used to perform critical security-related missions, including detecting vulnerabilities in web applications, taking care of attacks, and helping to build secure and robust networks that are resilient to them.
The advancements in intelligent decision-making techniques have elevated the efficiency of manufacturing industries and led to the start of the Industry 4.
The advancements in intelligent decision-making techniques have elevated the efficiency of manufacturing industries and led to the start of the Industry 4.
This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency- Based Education (CBE) method.
Set up your first channel and effectively expand your outreach and customer base with Mailchimp to deliver scalable business outcomesPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesLearn audience management strategies to make informed decisions for your marketing channelsEmploy practical use cases for your custom business needs to implement basic and pro Mailchimp featuresCustomize Mailchimp using powerful integrations to deliver top-notch user experienceBook DescriptionAre you looking for an all-in-one comprehensive guide to implementing Mailchimp channels and automation for your business?
Leverage the simplicity of Python and available libraries to build web security testing tools for your applicationKey FeaturesUnderstand the web application penetration testing methodology and toolkit using PythonWrite a web crawler/spider with the Scrapy libraryDetect and exploit SQL injection vulnerabilities by creating a script all by yourselfBook DescriptionWeb penetration testing is the use of tools and code to attack a website or web app in order to assess its vulnerability to external threats.
Network revolutions of the past have shaped the present and set the stage for the revolution we are experiencing todayIn an era of seemingly instant change, it's easy to think that today's revolutions in communications, business, and many areas of daily life are unprecedented.
This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud.
This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud.