Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development.
In the last decade, the Internet has grown from a network that connected a few universities and research centers to a network that links many businesses and households all over the country.
Structured Analog CMOS Design describes a structured analog design approach that makes it possible to simplify complex analog design problems and develop a design strategy that can be used for the design of large number of analog cells.
Service orchestration techniques combine the benefits of Service Oriented Architecture (SOA) and Business Process Management (BPM) to compose and coordinate distributed software services.
Whether you are a CEO, CFO, board member, or an IT executive, From Business Strategy to Information Technology Roadmap: A Practical Guide for Executives and Board Members lays out a practical, how-to approach to identifying business strategies and creating value-driven technology roadmaps in your organization.
This book presents a novel method of multimodal biometric fusion using a random selection of biometrics, which covers a new method of feature extraction, a new framework of sensor-level and feature-level fusion.
Programming Massively Parallel Processors: A Hands-on Approach shows both students and professionals alike the basic concepts of parallel programming and GPU architecture.
Microservices can have a positive impact on your enterprisejust ask Amazon and Netflixbut you can fall into many traps if you dont approach them in the right way.
This text provides novel smart network systems, wireless telecommunications infrastructures, and computing capabilities to help healthcare systems using computing techniques like IoT, cloud computing, machine and deep learning Big Data along with smart wireless networks.
The digital subscriber line (DSL) industry is expanding rapidly and a technology once thought to be only transitional will soon clear $100 billion in total annual service revenue.
Gain Critical Insight into the Parallel I/O EcosystemParallel I/O is an integral component of modern high performance computing (HPC), especially in storing and processing very large datasets to facilitate scientific discovery.
Crowd computing, crowdsourcing, crowd-associated network (CrAN), crowd-assisted sensing are some examples of crowd-based concepts that harness the power of people on the web or connected via web-like infrastructure to do tasks that are often difficult for individual users or computers to do alone.
This reference text will benefit readers in enhancing their understanding of the recent technologies, protocols, and challenges in various stages of development of wireless communication and networking.
The six volumes LNCS 11619-11624 constitute the refereed proceedings of the 19th International Conference on Computational Science and Its Applications, ICCSA 2019, held in Saint Petersburg, Russia, in July 2019.
Provides modern enterprises with the tools to create a robust digital platform utilizing proven best practices, practical models, and time-tested techniques Contemporary business organizations can either embrace the digital revolution or be left behind.
This book is aimed at a diverse audience including students, researchers, academicians, cybersecurity professionals, IT managers, Metaverse developers, business leaders, policymakers, and tech enthusiasts.
Use your Raspberry Pi to get smart about computing fundamentals In the 1980s, the tech revolution was kickstarted by a flood of relatively inexpensive, highly programmable computers like the Commodore.
Database and Application Security XV provides a forum for original research results, practical experiences, and innovative ideas in database and application security.
This book brings together all the latest methodologies, tools and techniques related to the Internet of Things and Artificial Intelligence in a single volume to build insight into their use in sustainable living.
Advances in Computers, the latest volume in the series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design, and applications.
Internet of Things (IoT) products and cyber-physical systems (CPS) are being utilized in almost every discipline and there continues to be significant increases in spending on design, development, and deployment of IoT applications and analytics within every domain, from our homes, schools, government, and industry.
This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and IoT technologies can be used to address cybersecurity challenges.
The six volumes LNCS 11619-11624 constitute the refereed proceedings of the 19th International Conference on Computational Science and Its Applications, ICCSA 2019, held in Saint Petersburg, Russia, in July 2019.
Computer Network Simulations Using NS2 provides a solid foundation of computer networking knowledge and skills, covering everything from simple operating system commands to the analysis of complex network performance metrics.
This book focuses on the suitable methods to solve optimization problems in wireless network system utilizing digital sensors like Wireless Sensor Network.
Give customers, clients, and coworkers easier access to your organization's information and servicesThe e-business environment is a tangle of disconnected and often incompatible data sources and applications.
It is currently quite easy for students or designers/engineers to find very general books on the various aspects of safety, reliability and dependability of computer system architectures, and partial treatments of the elements that comprise an effective system architecture.
Cybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic.
If you're involved in planning IT infrastructure as a network or system architect, system administrator, or developer, this book will help you adapt your skills to work with these highly scalable, highly redundant infrastructure services.
The term 'systems theory' is used to characterize a set of disparate yet related approaches to fields as varied as information theory, cybernetics, biology, sociology, history, literature, and philosophy.