Mit diesem Handbuch identifizieren Sie Risiken, bauen wegweisendes effizienzförderndes Handlungswissen auf und sichern so Ihr Unternehmen sowie seine Prozesse, Ressourcen und die Organisation ab.
This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic of Finite Field, WAIFI 2022, held in Chengdu, China, in August - September 2022.
This book offers an alternative for encrypting and decrypting messages using objects called integer and fractional-order estimators or observers, by means of security codes.
This book presents the security and privacy challenges of the smart home following the logic of "e;terminal device - voice interface - application platform"e;.
Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden.
The concept of a PKI (public key infrastructure) has been around for decades, but it is one strand of IT which has taken an extraordinarily long time to come to fruition within the mainstream.
Explore Automated Market Makers (AMMs), the underlying protocols used by decentralized exchanges (DEX) to allow users to perform trades of cryptocurrencies in a decentralized way with no middlemen.
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods.
This book covers the relationship of recent technologies (such as Blockchain, IoT, and 5G) with the cloud computing as well as fog computing, and mobile edge computing.
Healthcare has become an extremely important and relevant topic in day to day discussions ever since the COVID-19 pandemic has been encountered by the global population.
This book covers the relationship of recent technologies (such as Blockchain, IoT, and 5G) with the cloud computing as well as fog computing, and mobile edge computing.
This book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 - December 2, 2022.
Das vorliegende Lehrbuch richtet sich an alle, die die Prüfung zur Schutz- und Sicherheitskraft vor einer Industrie- und Handelskammer ablegen wollen, und eignet sich zugleich als Nachschlagewerk für die Praxis sowie zur regelmäßigen Weiterbildung.
The book constitutes proceedings of the 12th Industry Symposium held in conjunction with the 18th edition of the International Conference on Distributed Computing and Intelligent Technology (ICDCIT 2022).
This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data.
The Age of Decentralization talks about various decentralization technologies including Web3, decentralized identity, and decentralized storage, and how they can be incorporated in traditional tech architectures to improve technical and business performance.
This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction.
This textbook highlights the essential need for a strong ethical framework in our approach to teaching of and working in computer, information and engineering sciences.
The Global South is recognized as one of the fastest growing regions in terms of Internet population as well as the region that accounts for the majority of Internet users.
Exploring the pressing issues of juvenile delinquency, victimization, and justice in Chinese societies, this book showcases contemporary research on these critical topics.
This book provides an overview of the many approaches that can adopted for programming and deploying highly-adaptive and large-scale IoT systems, with a specific focus on the key results achieved within the Fluidware research project.
This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2022 and CBT 2022, which took place in Copenhagen, Denmark, during September 26-30, 2022.
The book is a collection of best selected research papers presented at the International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications (ICMISC 2022) held during 28 - 29 March 2022 at CMR Institute of Technology, Hyderabad, Telangana, India.