The Raspberry Pi is about as minimalist as a computer gets, but it has the power to run a full Linux operating system and many great desktop and command line tools as well.
Discover how Verilog-A is particularly designed to describe behavior and connectivity of circuits and system components for analog SPICE-class simulators, or for continuous time (SPICE-based) kernels in Verilog-AMS simulators.
The Art of Living for A Technological Age sketches the crisis of our late modern age, where persons are enamored by the promises of progress and disciplined to form by the power of technology--the ontology of our age.
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more.
Digital Marketing: Integrating Strategy, Sustainability, and Purpose, Second Edition, draws on the latest digital tactics and strategic insights to help students understand how to generate sustainable growth through digital integration.
It is with great pleasure and enthusiasm that we welcome you to the International Conference on Advances in Computational Intelligence and its Applications (ICACIA-2023).
Over the past decade, 24/7 connectivity has given us not only convenience and fun but worries about privacy, interruptions while working or trying to enjoy family or other downtime, and new compulsions - from shopping to tweeting and cute-cat watching.
This book offers a comprehensive overview of the theory and practical applications of swarm intelligence in fog computing, beyond 5G networks, and information security.
Absolute Essentials of Ethereum is a concise textbook which guides the reader through the fascinating world of the emerging Ethereum ecosystem, from the basics of how its blockchain works to cutting-edge applications.
Make a fortune online with this powerful, practical, and comprehensive guide to starting a profitable internet business that “couldn’t be more timely” (Jack Canfield, New York Times–bestselling author of Chicken Soup for the Soul).
Despite spending more than $600 billion on information technology over the past decade, the Federal Government has achieved little of the productivity improvements that private industry has realized from IT according to the 25 Point Implementation Plan to Reform Federal Information Technology Management published by the White House in late 2010.
Whilst enterprise technology departments have been steadily building their information and knowledge management portfolios, the Internet has generated new sets of tools and capabilities which provide opportunities and challenges for improving and enriching knowledge work.
A comprehensive, structured, and up-to-date introduction to the law governing the dissemination of information in a computer-mediated world in China, Internet Law in China stresses the practical applications of the law that are encountered by all individuals and organizations in Chinese cyberspace, but always in the light of theoretical underpinnings.
Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPSs) due to the interconnected and often critical nature of these systems.
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logging and log management.
Detailing a comprehensive set of requirements for secure and resilient software development and operation, this book supplies documented test cases for those requirements and best practices for testing nonfunctional requirements.
Explore and understand data with the powerful data visualization techniques of Tableau, and then communicate insights in powerful waysKey FeaturesApply best practices in data visualization and chart types explorationExplore the latest version of Tableau Desktop with hands-on examplesUnderstand the fundamentals of Tableau storytellingBook DescriptionGraphical presentation of data enables us to easily understand complex data sets.
Understand how to apply distributed tracing to microservices-based architecturesKey FeaturesA thorough conceptual introduction to distributed tracingAn exploration of the most important open standards in the spaceA how-to guide for code instrumentation and operating a tracing infrastructureBook DescriptionMastering Distributed Tracing will equip you to operate and enhance your own tracing infrastructure.
Simplify your DevOps roles with DevOps tools and techniquesKey FeaturesLearn to utilize business resources effectively to increase productivity and collaborationLeverage the ultimate open source DevOps tools to achieve continuous integration and continuous delivery (CI/CD)Ensure faster time-to-market by reducing overall lead time and deployment downtimeBook DescriptionThe implementation of DevOps processes requires the efficient use of various tools, and the choice of these tools is crucial for the sustainability of projects and collaboration between development (Dev) and operations (Ops).
Get up to speed with various penetration testing techniques and resolve security threats of varying complexityKey FeaturesEnhance your penetration testing skills to tackle security threatsLearn to gather information, find vulnerabilities, and exploit enterprise defensesNavigate secured systems with the most up-to-date version of Kali Linux (2019.