The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
Middleware is the bridge that connects distributed applications across different physical locations, with different hardware platforms, network technologies, operating systems, and programming languages.
The increasing prominence of generative AI across various industries presents an abundance of opportunities for integration within the healthcare sector.
Transparent Artificial Intelligence (AI) systems facilitate understanding of the decision-making process and provide opportunities in various aspects of explaining AI models.
As computation continues to move into the cloud, the computing platform of interest no longer resembles a pizza box or a refrigerator, but a warehouse full of computers.
This book explores the transformative potential of blockchain technology and shows how blockchain can promote equitable access to resources and bridge societal gaps.
A COMPREHENSIVE GUIDE TO THE DESIGN & ORGANIZATION OF MODERN COMPUTING SYSTEMSDigital Logic Design and Computer Organization with Computer Architecture for Security provides practicing engineers and students with a clear understanding of computer hardware technologies.
The two-volume set LNCS 12043 and 12044 constitutes revised selected papers from the 13th International Conference on Parallel Processing and Applied Mathematics, PPAM 2019, held in Bialystok, Poland, in September 2019.
This book discusses the application of digital twin (DT) in condition monitoring of offshore and onshore wind turbines, including a pertinent framework to explain critical component Condition Monitoring and Fault Diagnosis.
This book discusses the application of digital twin (DT) in condition monitoring of offshore and onshore wind turbines, including a pertinent framework to explain critical component Condition Monitoring and Fault Diagnosis.
The emergence of quantum computing introduces a significant shift in the digital and security landscape-prompting organizations to reassess the foundations of how we protect information.
As digital ecosystems advance toward pervasive connectivity, smart devices have become embedded in the operational, social, and economic fabric of modern life.
The Fundamentals of Software-Defined Networking: Towards Intelligent and Flexible Networks is a comprehensive, beginner-friendly guide to Software-Defined Networking (SDN), specifically designed for educators, trainers, and professionals transitioning into modern networking.
As digital ecosystems advance toward pervasive connectivity, smart devices have become embedded in the operational, social, and economic fabric of modern life.
The emergence of quantum computing introduces a significant shift in the digital and security landscape-prompting organizations to reassess the foundations of how we protect information.
The Fundamentals of Software-Defined Networking: Towards Intelligent and Flexible Networks is a comprehensive, beginner-friendly guide to Software-Defined Networking (SDN), specifically designed for educators, trainers, and professionals transitioning into modern networking.
This book explores the transformative potential of Explainable AI (XAI) in enhancing healthcare delivery and XAI's role in fostering transparency, trust, and accountability in AI-driven medical decision-making.
This book explores the transformative potential of Explainable AI (XAI) in enhancing healthcare delivery and XAI's role in fostering transparency, trust, and accountability in AI-driven medical decision-making.
This book will serve as a comprehensive resource for readers interested in utilizing different technologies like fog computing, federated learning, cloud computing, and blockchain in 6G enabled systems for addressing security concerns.
This book will serve as a comprehensive resource for readers interested in utilizing different technologies like fog computing, federated learning, cloud computing, and blockchain in 6G enabled systems for addressing security concerns.