The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures(R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things.
The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures(R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity.
Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection.
Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection.
Considering the overall situation of the current pandemic and pertinent recommendations, this book focuses on the use of augmented reality (AR) applications for preventing COVID-19 outbreaks along with techniques, tools, and platforms to achieve social distancing.
Considering the overall situation of the current pandemic and pertinent recommendations, this book focuses on the use of augmented reality (AR) applications for preventing COVID-19 outbreaks along with techniques, tools, and platforms to achieve social distancing.
The purpose of this edited book is to provide the relevant technologies and case studies in a concise format that will simplify and streamline the processing of blockchain.
The purpose of this edited book is to provide the relevant technologies and case studies in a concise format that will simplify and streamline the processing of blockchain.
A Sensible Guide to Program Management Professional (PgMP)(R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard).
A Sensible Guide to Program Management Professional (PgMP)(R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard).
Digital Learning and Collaborative Practices offers a comprehensive overview of design-based, technology-enhanced approaches to teaching and learning in virtual settings.
Digital Learning and Collaborative Practices offers a comprehensive overview of design-based, technology-enhanced approaches to teaching and learning in virtual settings.
Public Policy Analytics: Code & Context for Data Science in Government teaches readers how to address complex public policy problems with data and analytics using reproducible methods in R.
Public Policy Analytics: Code & Context for Data Science in Government teaches readers how to address complex public policy problems with data and analytics using reproducible methods in R.
The Home in the Digital Age is a set of multidisciplinary studies exploring the impact of digital technologies in the home, with a shift of emphasis from technology to the people living and using this in their homes.
The Home in the Digital Age is a set of multidisciplinary studies exploring the impact of digital technologies in the home, with a shift of emphasis from technology to the people living and using this in their homes.
This book highlights progress in terms of Virus Biology and Infection Detection, Prevention, and Control, along with Screening, Testing, and Detection Techniques, that will provide learners and researchers (from basic to advanced) with the most innovative computer-driven methodologies for the fight against COVID-19.
This book highlights progress in terms of Virus Biology and Infection Detection, Prevention, and Control, along with Screening, Testing, and Detection Techniques, that will provide learners and researchers (from basic to advanced) with the most innovative computer-driven methodologies for the fight against COVID-19.
Selected papers from the International Conference on New Computational Social Science, focusing on the following five aspects: Big data acquisition and analysis, Integration of qualitative research and quantitative research, Sociological Internet experiment research, Application of ABM simulation method in Sociology Research, Research and development of new social computing tools.
Selected papers from the International Conference on New Computational Social Science, focusing on the following five aspects: Big data acquisition and analysis, Integration of qualitative research and quantitative research, Sociological Internet experiment research, Application of ABM simulation method in Sociology Research, Research and development of new social computing tools.
Operational Auditing: Principles and Techniques for a Changing World, 2nd edition, explains the proven approaches and essential procedures to perform risk-based operational audits.
Operational Auditing: Principles and Techniques for a Changing World, 2nd edition, explains the proven approaches and essential procedures to perform risk-based operational audits.
This book explores the potential of artificial intelligence (AI) to transform public relations (PR) and offers guidance on maintaining authenticity in this new era of communication.
Most applications generate large datasets, like social networking and social influence programs, smart cities applications, smart house environments, Cloud applications, public web sites, scientific experiments and simulations, data warehouse, monitoring platforms, and e-government services.
Most applications generate large datasets, like social networking and social influence programs, smart cities applications, smart house environments, Cloud applications, public web sites, scientific experiments and simulations, data warehouse, monitoring platforms, and e-government services.