Cyber Insecurity: Examining the Past, Defining the Future deals with the multifaceted world of cybersecurity, starting with the premise that while perfection in cybersecurity may be unattainable, significant improvements can be made through understanding history and fostering innovation.
Build, deploy, test, and run cloud-native serverless applications using AWS Lambda and other popular AWS servicesKey FeaturesLearn how to write, run, and deploy serverless applications in Amazon Web ServicesMake the most of AWS Lambda functions to build scalable and cost-efficient systemsBuild and deploy serverless applications with Amazon API Gateway and AWS Lambda functionsBook DescriptionServerless computing is a way to run your code without having to provision or manage servers.
Learn best practices for testing with Jira and model industry workflows that can be used during the software development lifecycleKey FeaturesIntegrate Jira with test management tools such as Zephyr, Test Management, and SynapseRTUnderstand test case management, traceability, and test execution with reportsImplement continuous integration using Jira, Jenkins, and automated testing toolsBook DescriptionHands-On Test Management with Jira begins by introducing you to the basic concepts of Jira and takes you through real-world software testing processes followed by various organizations.
Discover the power of Rematch and its plugins by building a real-world application from scratchKey FeaturesGet to grips with the capabilities of Rematch quickly as you build applicationsLearn to use Rematch and its plugins to simplify everyday tasksTake total control of the application state and manage its scalability using RematchBook DescriptionRematch is Redux best practices without the boilerplate.
This volume constitutes the refereed proceedings of the 14th International Conference on Hybrid Artificial Intelligent Systems, HAIS 2019, held in Leon, Spain, in September 2019.
The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019.
This book constitutes the refereed proceedings of the 14th International Baltic Conference on Databases and Information Systems, DB&IS 2020, held in Tallinn, Estonia, in June 2020.
This two-volume set of LNCS 12463 and LNCS 12464 constitutes - in conjunction with the volume LNAI 12465 - the refereed proceedings of the 16th International Conference on Intelligent Computing, ICIC 2020, held in Bari, Italy, in October 2020.
This two-volume set, LNCS 11317 and 12318, constitutes the thoroughly refereed proceedings of the 4th International Joint Conference, APWeb-WAIM 2020, held in Tianjin, China, in September 2020.
Wireless Public Safety Networks, Volume Two: A Systematic Approach presents the latest advances in the wireless Public Safety Networks (PSNs) field, the networks established by authorities to either prepare the population for an eminent catastrophe, or those used for support during crisis and normalization phases.
This book constitutes selected and revised papers of the First International Conference on Artificial Intelligence and Sustainable Computing for Smart City, AIS2C2 2021, held in Greater Noida, India, in March 2021.
Learn to set up a Pi-based game development environment, and then develop a game with Lua, a popular scripting language used in major game frameworks like Unreal Engine (BioShock Infinite), CryEngine (Far Cry series), Diesel (Payday: The Heist), Silent Storm Engine (Heroes of Might and Magic V) and many others.
This book constitutes selected and extended papers from the Second International Workshop on Deployable Machine Learning for Security Defense, MLHat 2021, held in August 2021.
This book constitutes the proceedings of the 19th International Conference on Service-Oriented Computing, ICSOC 2020, which is held virtually in November 2021.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017.
This bookconstitutes the refereed proceedings of the Second International Symposium onCyber Security, CSS 2015, held in Coeur d'Alene, ID, USA, in April 2015.
This bookconstitutes the refereed proceedings of the Third European Conference onInformation Literacy, ECIL 2015, held in Tallinn, Estonia, in October 2015.
This book introduces and demonstrates the state-of-the art research and development in tackling sustainable urban and rural integration, supported by digitalization and digital transformation in rural areas with Industry 4.
This book constitutes revised selected papers from the 10th International Symposium on Foundations and Practice of Security, FPS 2017, held in Nancy, France in October 2017.
This book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017.
Software engineering education has a problem: universities and bootcamps teach aspiring engineers to write code, but they leave graduates to teach themselves the countless supporting tools required to thrive in real software companies.
This book constitutes the refereed proceedings of the Third EAI International Conference on Smart Objects and Technologies for Social Good, GOODTECHS 2017, held in Pisa, Italy, November 29-30, 2017.
This book constitutes the proceedings of the 19th International Conference on Passive and Active Measurement, PAM 2018, held in Berlin, Germany, in March 2018.
This book constitutes the proceedings of the 12th International Conference on Verification and Evaluation of Computer and Communication Systems ( VECoS 2018) held at Grenoble, France, in September 2018.
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology and Network Security, CANS 2018, held in Naples, Italy, in September/October 2018.
The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.