This book explores opportunities and challenges in the field of Internet of Everything (IoE) security and privacy under the umbrella of distributed ledger technologies and blockchain technology including distributed consensus mechanisms, crypto-sensors, encryption algorithms, and fault tolerance mechanisms for devices and systems.
"Mit ChatGPT einfach Geld verdienen" ist ein umfassender Leitfaden, der das spannende Gebiet der Einkommensgenerierung durch künstliche Intelligenz erkundet.
This book interrogates the legality of corporate surveillance, offering a corrective approach to protecting privacy through litigation-not through legislation.
The text provides sustainable energy solutions using smart technologies such as artificial intelligence, blockchain technology, and the Internet of Things.
The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful occurrences is its security risk management capabilities.
The text provides sustainable energy solutions using smart technologies such as artificial intelligence, blockchain technology, and the Internet of Things.
The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful occurrences is its security risk management capabilities.
'Witty, knowledgeable and mind-expanding' RICHARD FISHER | 'A joyful romp' TOM HARFORD | 'A fun and inspiring teaser for curious minds' J R MIE HARRISEvery so often, a new idea comes along that changes everything.
Occupational Health and Safety has been a growth industry for several decades and has moved beyond the realm of the human resource department and workers' compensation claims.
Occupational Health and Safety has been a growth industry for several decades and has moved beyond the realm of the human resource department and workers' compensation claims.
Unmatched: 50 Years of Supercomputing: A Personal Journey Accompanying the Evolution of a Powerful ToolThe rapid and extraordinary progress of supercomputing over the past half-century is a powerful demonstration of our relentless drive to understand and shape the world around us.
This collection of essays explores the present and future of digital communication through a range of interdisciplinary approaches, all of which focus on the so-called metaverse.
This collection of essays explores the present and future of digital communication through a range of interdisciplinary approaches, all of which focus on the so-called metaverse.
Using the investigation of criminal culture as an example application, this edited volume presents a novel approach to agent-based simulation: interpretive agent-based social simulation as a methodological and transdisciplinary approach to examining the potential of qualitative data and methods for agent-based modelling (ABM).
This book explores quantum computing as a transformative technology and its applications in cryptography, teleportation, IoT, AI, Blockchain, and the futurist concept of quantum internet.
Unmatched: 50 Years of Supercomputing: A Personal Journey Accompanying the Evolution of a Powerful ToolThe rapid and extraordinary progress of supercomputing over the past half-century is a powerful demonstration of our relentless drive to understand and shape the world around us.
Using the investigation of criminal culture as an example application, this edited volume presents a novel approach to agent-based simulation: interpretive agent-based social simulation as a methodological and transdisciplinary approach to examining the potential of qualitative data and methods for agent-based modelling (ABM).
This book explores quantum computing as a transformative technology and its applications in cryptography, teleportation, IoT, AI, Blockchain, and the futurist concept of quantum internet.
This book provides an in-depth examination of recent research advances in cloud-edge-end computing, covering theory, technologies, architectures, methods, applications, and future research directions.
Computational intelligence-based optimization methods, also known as metaheuristic optimization algorithms, are a popular topic in mathematical programming.
Digital transformation has become more than a buzzword from the media since companies figured out the importance of rethinking business processes during global challenges.
Computational intelligence-based optimization methods, also known as metaheuristic optimization algorithms, are a popular topic in mathematical programming.
This book introduces embedded software engineering and management methods, proposing the relevant testing theory and techniques that promise the final realization of automated testing of embedded systems.
This book introduces embedded software engineering and management methods, proposing the relevant testing theory and techniques that promise the final realization of automated testing of embedded systems.
The Disputed Freedoms of a Disrupted Press explores the origins, connections, and contradictions evident amongst divergent understandings of press freedom around the world.
The Disputed Freedoms of a Disrupted Press explores the origins, connections, and contradictions evident amongst divergent understandings of press freedom around the world.
Security implementation is crucial in the Internet of Medical Things (IoMT) as it ensures the protection of sensitive medical data and prevents unauthorized access to or manipulation of devices and systems.
Security implementation is crucial in the Internet of Medical Things (IoMT) as it ensures the protection of sensitive medical data and prevents unauthorized access to or manipulation of devices and systems.
Smart grid is a new generation of power grids that is expected to enhance its reliability and reduce carbon footprint by integrating distributed resources.
Afin de connaître les bonnes pratiques de l'informatique au travail, ce guide propose en un peu moins de 20 fiches, des apports théoriques, courts et accessibles à l'usager courant, des définitions, des conseils et des exemples tirés de situations concrètes.