In 2007, Estonia faced a series of cyberattacks on its cyber infrastructure, which caused widespread damage to the country's economy, politics, and security.
This book addresses social and complex network analysis challenges, exploring social network structures, dynamic networks, and hierarchical communities.
Build robust, production-ready microservices in gRPC Go to enhance the scalability and efficiency of your APIs in real-world applicationsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesDiscover essential guidelines to steer clear of pitfalls when designing and evolving your gRPC servicesDevelop your understanding of advanced gRPC concepts such as authentication and securityPut your knowledge into action as you build, test, and deploy a TODO list microserviceBook DescriptionIn recent years, the popularity of microservice architecture has surged, bringing forth a new set of requirements.
Build robust, production-ready microservices in gRPC Go to enhance the scalability and efficiency of your APIs in real-world applicationsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesDiscover essential guidelines to steer clear of pitfalls when designing and evolving your gRPC servicesDevelop your understanding of advanced gRPC concepts such as authentication and securityPut your knowledge into action as you build, test, and deploy a TODO list microserviceBook DescriptionIn recent years, the popularity of microservice architecture has surged, bringing forth a new set of requirements.
Unlike high-level languages such as Java and C++, assembly language is much closer to the machine code that actually runs computers; it's used to create programs or modules that are very fast and efficient, as well as in hacking exploits and reverse engineering Covering assembly language in the Pentium microprocessor environment, this code-intensive guide shows programmers how to create stand-alone assembly language programs as well as how to incorporate assembly language libraries or routines into existing high-level applications Demonstrates how to manipulate data, incorporate advanced functions and libraries, and maximize application performance Examples use C as a high-level language, Linux as the development environment, and GNU tools for assembling, compiling, linking, and debugging
CyberMedics: Navigating AI and Security in the Medical Field is a comprehensive exploration of the transformative role of artificial intelligence (AI) in healthcare and the critical importance of securing medical data in an increasingly digital world.
Artificial Intelligence (AI) is revolutionizing industries, yet its rapid evolution presents unprecedented challenges in governance, ethics, and security.
This book investigates the transformative impact of AI, ML, data analytics, and IoT on modern business, emphasizing their roles in strategic growth, operational efficiency, and data-driven decision-making.
How a computational framework can account for the successes and failures of human cognitionAt the heart of human intelligence rests a fundamental puzzle: How are we incredibly smart and stupid at the same time?
If you're involved in planning IT infrastructure as a network or system architect, system administrator, or developer, this book will help you adapt your skills to work with these highly scalable, highly redundant infrastructure services.
If you're involved in planning IT infrastructure as a network or system architect, system administrator, or developer, this book will help you adapt your skills to work with these highly scalable, highly redundant infrastructure services.
In this truly unique technical book, today's leading software architects present valuable principles on key development issues that go way beyond technology.
Information Technology professionals can use this book to move beyond the excitement of web services and service oriented architecture (SOA) and begin the process of finding actionable ideas to innovate and create business value.
In this truly unique technical book, today's leading software architects present valuable principles on key development issues that go way beyond technology.
In a typical organization, there's always plenty that to do such as: pay vendors, invoice customers, answer customer inquiries, and fix bugs in hardware or software.
System Performance Tuning answers one of the most fundamental questions you can ask about your computer: How can I get it to do more work without buying more hardware?
System Performance Tuning answers one of the most fundamental questions you can ask about your computer: How can I get it to do more work without buying more hardware?
Large IT organizations increasingly face the challenge of integrating various web services, applications, and other technologies into a single network.
Information Technology professionals can use this book to move beyond the excitement of web services and service oriented architecture (SOA) and begin the process of finding actionable ideas to innovate and create business value.
In a typical organization, there's always plenty that to do such as: pay vendors, invoice customers, answer customer inquiries, and fix bugs in hardware or software.
Real-time computing plays a crucial role in our society since an increasing num- ber of complex systems rely, in part or completely, on processor control.
Automatic transformation of a sequential program into a parallel form is a subject that presents a great intellectual challenge and promises great practical rewards.
Foundations of Dependable Computing: System Implementation, explores the system infrastructure needed to support the various paradigms of Paradigms for Dependable Applications.
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems presents two comprehensive frameworks for reasoning about system dependability, thereby establishing a context for understanding the roles played by specific approaches presented in this book's two companion volumes.
This book contains selected papers from the ONR Workshop on Parallel Algorithm Design and Program Transformation that took place at New York University, Courant Institute, from Aug.
Foundations of Dependable Computing: Paradigms for Dependable Applications, presents a variety of specific approaches to achieving dependability at the application level.
Load Balancing in Parallel Computers: Theory and Practice is about the essential software technique of load balancing in distributed memory message-passing parallel computers, also called multicomputers.
In Symbolic Analysis for Parallelizing Compilers the author presents an excellent demonstration of the effectiveness of symbolic analysis in tackling important optimization problems, some of which inhibit loop parallelization.
The Engineering of Complex Real-Time Computer Control Systems brings together in one place important contributions and up-to-date research results in this important area.
This book explores the impact of technology on Human Resource (HR) practices and how organisations can effectively incorporate progress in technology to improve HR processes.
Systems Architecture Modeling with the Arcadia Method is an illustrative guide for the understanding and implementation of model-based systems and architecture engineering with the Arcadia method, using Capella, a new open-source solution.