Android ist das meistgenutzte mobile Betriebssystem, und entsprechend umfangreich und unübersichtlich ist der Markt für die kleinen Anwendungen, die das Smartphone oder Tablet erst richtig interessant machen.
Jürgen Appelo, a successful entrepreneur and well-known leadership expert, is paving new paths in management to help creative organizations survive and succeed in the 21st century.
Das Samsung Galaxy S6 sowie das Schwestermodell Samsung Galaxy S6 edge sind absolute High-End-Geräte, die mit vielen Neuheiten gegenüber dem Vorgänger aufwarten.
Examining how victimisation can occur across the online-offline continuum while emphasising the need for a holistic approach to understanding and addressing contemporary harms, this book covers various themes of victimisation in the digital age linked to the interconnectedness and blurred boundaries between online and offline experiences.
La robòtica, la intel·ligència artificial, el machine learning, el big data, la blockchain o la realitat virtual i augmentada seran fonamentals molt aviat per entendre les noves configuracions de l'educació, la salut, la seguretat, els transports, la logística, l'entreteniment o l'atenció a les persones a la llar.
Los robots habitan entre nosotros, crecen, se transforman y se hacen imprescindibles en nuestra vida cotidiana de la mano de los avances científicos y tecnológicos.
¿La Inteligencia Artificial responde correctamente al reto social que implica su irrupción en la sociedad contemporánea, a las dudas de su real aplicación y a los beneficios y perjuicios que genera?
A ready reference for the next-generation discovery techniques, this book presents advanced research findings on resource discovery, network navigability, and trust management on the Internet of Things (IoT) and Social Internet of Things (SIoT) ecosystems.
Este libro dotará al lector de los conocimientos necesarios para:- Identificar, recolectar, preservar y analizar evidencias digitales, redactando informes que recojan las conclusiones de la investigación.
Numerous studies indicate that team competencies, based on effective virtual and face-to-face communication, are a key factor for successful IT project work.
When the pressure is on to resolve an elusive software or hardware glitch, what's needed is a cool head courtesy of a set of rules guaranteed to work on any system, in any circumstance.
This book deals with how to measure innovation in crisis management, drawing on data, case studies, and lessons learnt from different European countries.
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues.
This book deals with how to measure innovation in crisis management, drawing on data, case studies, and lessons learnt from different European countries.
This book focuses on futuristic approaches and designs for real-time systems and applications, as well as the fundamental concepts of including advanced techniques and tools in models of data-driven blockchain ecosystems.
This textbook offers a guided tutorial that reviews the theoretical fundamentals while going through the practical examples used for constructing the computational frame, applied to various real-life models.
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues.
This book focuses on futuristic approaches and designs for real-time systems and applications, as well as the fundamental concepts of including advanced techniques and tools in models of data-driven blockchain ecosystems.
Condiciones minimas de transferencia de tecnologia y conocimiento para el beneficio global se deriva de un proyecto de investigacion que abordo el tema de la trasferencia de tecnologia y conocimiento dentro de las Instituciones de Educacion Superior (IES), reto actual de dichas instituciones, como es el caso de la Universidad de Guadalajara, y que se estudia especificamente en esta obra.
This book examines under which conditions information technology can stimulate high-quality learning, in particular at the undergraduate level and in social science courses.
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the technology that can best protect organizational security.
This book covers the proceedings of ICISSI 2022 (International Conference on Intelligent Systems and Smart Infrastructure) held at Prayagraj, Uttar Pradesh during April 21-22, 2022.
This book provides a straightforward manual and review handbook for accessing and using the resources of the Internet in the day to day labours of the working scientist.
This book presents a brief description of what constitutes computer modeling and simulation with techniques given to get a feel for how some of the simulation software packages involving hundreds of thousands of lines of code were developed.
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy.