Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology.
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology.
Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks.
Network traffic has fractal properties such as impulsiveness, selfsimilarity, and long-range dependence over several time scales, from milliseconds to minutes.
Network traffic has fractal properties such as impulsiveness, selfsimilarity, and long-range dependence over several time scales, from milliseconds to minutes.
Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks.
The Internet of things (IoT) is a network of connected physical objects or things that are working along with sensors, wireless transceiver modules, processors, and software required for connecting, processing, and exchanging data among the other devices over the Internet.
The Internet of things (IoT) is a network of connected physical objects or things that are working along with sensors, wireless transceiver modules, processors, and software required for connecting, processing, and exchanging data among the other devices over the Internet.
Why efforts to moderate harmful content on social media fail to stop extremistsContent moderation on social media has become one of the most daunting challenges of our time.
This comprehensive and timely book, New Age Analytics: Transforming the Internet through Machine Learning, IoT, and Trust Modeling, explores the importance of tools and techniques used in machine learning, big data mining, and more.
This comprehensive and timely book, New Age Analytics: Transforming the Internet through Machine Learning, IoT, and Trust Modeling, explores the importance of tools and techniques used in machine learning, big data mining, and more.
This book brings together all the latest methodologies, tools and techniques related to the Internet of Things and Artificial Intelligence in a single volume to build insight into their use in sustainable living.
This book brings together all the latest methodologies, tools and techniques related to the Internet of Things and Artificial Intelligence in a single volume to build insight into their use in sustainable living.
This book offers a comprehensive overview of recent research on the internet, emphasizing its spatial dimensions, geospatial applications, and the numerous social and geographic implications such as the digital divide and the mobile internet.
This book offers a comprehensive overview of recent research on the internet, emphasizing its spatial dimensions, geospatial applications, and the numerous social and geographic implications such as the digital divide and the mobile internet.
Conservation of Time-based Media Art is the first book to take stock of the current practices and conceptual frameworks that define the emerging field of time-based media conservation, which focuses on contemporary artworks that contain video, audio, film, slides or software components.
Conservation of Time-based Media Art is the first book to take stock of the current practices and conceptual frameworks that define the emerging field of time-based media conservation, which focuses on contemporary artworks that contain video, audio, film, slides or software components.
Semantic web technologies (SWTs) offer the richest machine-interpretable (rather than just machine-processable) and explicit semantics that are being extensively used in various domains and industries.
Semantic web technologies (SWTs) offer the richest machine-interpretable (rather than just machine-processable) and explicit semantics that are being extensively used in various domains and industries.
This critical and forward-looking book features: An assessment of the impact of Internet of Things (IoT) on the telecom industry's revenue streams IoT-based business models in the telecom industry A PESTLE (political, economic, socio-cultural, technological, legal, and environmental) analysis of the industry in relation to IoT Key technological drivers.
This critical and forward-looking book features: An assessment of the impact of Internet of Things (IoT) on the telecom industry's revenue streams IoT-based business models in the telecom industry A PESTLE (political, economic, socio-cultural, technological, legal, and environmental) analysis of the industry in relation to IoT Key technological drivers.
Cultivating Professional Identity in Design is a nuanced, comprehensive companion for designers across disciplines honing their identities, self-perception, personal strengths, and essential attributes.
Cultivating Professional Identity in Design is a nuanced, comprehensive companion for designers across disciplines honing their identities, self-perception, personal strengths, and essential attributes.
Microservices architecture (MSA) is increasingly popular with software architects and engineers as it accelerates software solution design, development, and deployment in a risk-free manner.