This book fills a gap between high-level overview texts that are often too general and low-level detail oriented technical handbooks that lose sight the "e;big picture"e;.
This book fills a gap between high-level overview texts that are often too general and low-level detail oriented technical handbooks that lose sight the "e;big picture"e;.
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security.
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security.
Future Communication Systems Using Artificial Intelligence, Internet of Things and Data Science mainly focuses on the techniques of artificial intelligence (AI), Internet of Things (IoT) and data science for future communications systems.
Artificial intelligence (AI), machine learning, and advanced electronic circuits involve learning from every data input and using those inputs to generate new rules for future business analytics.
In today's connected world, the demand for mobile communications and instant access to information, anytime and anywhere, has drastically changed the electronics landscape, both consumer and industrial.
This text demystifies the subject of operating systems by using a simple step-by-step approach, from fundamentals to modern concepts of traditional uniprocessor operating systems, in addition to advanced operating systems on various multiple-processor platforms and also real-time operating systems (RTOSs).
A practical guide to establishing a risk-based, business-focused information security program to ensure organizational successKey FeaturesFocus on business alignment, engagement, and support using risk-based methodologiesEstablish organizational communication and collaboration emphasizing a culture of securityImplement information security program, cybersecurity hygiene, and architectural and engineering best practicesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionInformation Security Handbook is a practical guide that'll empower you to take effective actions in securing your organization's assets.
A practical guide to establishing a risk-based, business-focused information security program to ensure organizational successKey FeaturesFocus on business alignment, engagement, and support using risk-based methodologiesEstablish organizational communication and collaboration emphasizing a culture of securityImplement information security program, cybersecurity hygiene, and architectural and engineering best practicesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionInformation Security Handbook is a practical guide that'll empower you to take effective actions in securing your organization's assets.
Terraform has become a key player in the DevOps world for defining, launching, and managing infrastructure as code (IaC) across a variety of cloud and virtualization platforms, including AWS, Google Cloud, Azure, and more.
Terraform has become a key player in the DevOps world for defining, launching, and managing infrastructure as code (IaC) across a variety of cloud and virtualization platforms, including AWS, Google Cloud, Azure, and more.
This book provides a thorough exploration of the intersection between gender-based healthcare disparities and the transformative potential of artificial intelligence (AI) and machine learning (ML).
This volume gives an overview of the state-of-the-art with respect to the development of all types of parallel computers and their application to a wide range of problem areas.
This book explores the transformative impact of drone technology and unmanned aerial systems (UAS) across diverse industries, from precision agriculture and logistics to disaster response and forensic investigations.
Internet of Healthcare Things (IoHT) is an Internet of Things (IoT)-based solution that includes a network architecture which allows the connection between a patient and healthcare facilities.
The sixth generation of wireless communication (6G), succeeding 5G cellular technology, opens up several possibilities in terms of technology and its offered services.