With the increasing use of e-learning, technology has not only revolutionized the way businesses operate but has also impacted learning processes in the education sector.
This proceedings volume convenes selected, revised papers presented at the 52nd Southeastern International Conference on Combinatorics, Graph Theory and Computing (SEICCGTC 2021), virtually held at Florida Atlantic University in Boca Raton, USA, on March 8-12, 2021.
Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure.
CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition, offers a practical guide for those interested in pursuing CompTIA Network+ certification.
Offering a holistic view of the pioneering trends and innovations in smart healthcare management, this book focuses on the methodologies, frameworks, design issues, tools, architectures, and technologies necessary to develop and understand intelligent healthcare systems and emerging applications in the present era.
Resisting State Surveillance in the Digital Age provides an in-depth examination of the complexity and diversity of organised opposition to increasing state surveillance powers in the UK.
This book provides insights on blockchain technology and its applications in real-world business, supply chain, health care, education, HRM, retail, logistics and transport industries.
Focusing on the continued terrorist threat by jihadist groups, such as Al Qaeda and ISIS, and homegrown violent far-right and far-left extremists in the West, Terrorism and Counterterrorism investigates this form of political violence in a historical and contemporary context.
Focusing on the continued terrorist threat by jihadist groups, such as Al Qaeda and ISIS, and homegrown violent far-right and far-left extremists in the West, Terrorism and Counterterrorism investigates this form of political violence in a historical and contemporary context.
Cyberbullying and Online Harms identifies online harms and their impact on young people, from communities to campuses, exploring current and future interventions to reduce and prevent online harassment and aggression.
Cyberbullying and Online Harms identifies online harms and their impact on young people, from communities to campuses, exploring current and future interventions to reduce and prevent online harassment and aggression.
This book constitutes the post proceedings of the 18th International Workshop on Security and Trust Management, STM 2022, co-located with the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in Copenhagen, Denmark, in September 2022.
This book constitutes the refereed proceedings of the First International Workshop, FL 2022, Held in Conjunction with IJCAI 2022, held in Vienna, Austria, during July 23-25, 2022.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2022), held at tThe Karkonosze University of Applied Sciences, Poland, during June 2022.
The book is a compilation of high-quality scientific papers presented at the 4th International Conference on Computer & Communication Technologies (IC3T 2022).
This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022.
Artificial Intelligence (AI) in general and machine learning (ML) and deep learning (DL) in particular and related digital technologies are a couple of fledging paradigms that next-generation healthcare services are sprinting towards.
Artificial Intelligence (AI) in general and machine learning (ML) and deep learning (DL) in particular and related digital technologies are a couple of fledging paradigms that next-generation healthcare services are sprinting towards.
This book will teach you the core concepts of blockchain technology in a concise manner through straightforward, concrete examples using a range of programming languages, including Python and Solidity.
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.
We are at the threshold of a new area of the internet that promises to transform the way we engage financially and take the power of data and privacy back from big corporations and give it to the individual through decentralization.
Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak.
Mit dem Thema Datenschutz müssen sich alle Unternehmen auseinandersetzen, vom Solo-Selbstständigen über kleine und mittlere Betriebe bis zum Großunternehmen.
Organised crime and financial crime are pressing global problems, increasingly recognised as policy priorities both by national governments and international bodies and corporations.
Organised crime and financial crime are pressing global problems, increasingly recognised as policy priorities both by national governments and international bodies and corporations.
This book presents mathematical models of various renewable energy sources (RESs) such as wind energy systems, solar PV systems, battery energy storage systems, pumped-storage hydropower, biomass, and electric vehicles (EVs).
The Internet of Things (IoT) involves physical devices, cars, household appliances, and any other physical appliance equipped with sensors, software, and network connections to gather and communicate data.
This book constitutes the proceedings of the 21st International Conference on Smart Card Research and Advanced Applications, CARDIS 2022, which took place in November 2022.
This book constitutes the refereed proceedings of the 18th European Workshop on Computer Performance Engineering, EPEW 2022, held in Santa Pola, Spain, in September 2022.