In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Dr.
Numerical Methods for Scientists and Engineers: With Pseudocodes is designed as a primary textbook for a one-semester course on Numerical Methods for sophomore or junior-level students.
Discover how to plan a Microsoft Teams deployment within a business environment and manage Teams administrative functions on a day-to-day basisKey FeaturesPlan and design your Microsoft Teams deploymentPrepare, deploy, and manage policies for Microsoft Teams and for apps within TeamsPass the MS-700 exam and achieve certification with the help of self-assessment questions and a mock examBook DescriptionDo you want to build and test your proficiency in the deployment, management, and monitoring of Microsoft Teams features within the Microsoft 365 platform?
Develop efficient and modern full-stack applications using Spring Boot and React 16Key Features Develop resourceful backends using Spring Boot and faultless frontends using React.
Design, develop, and test powerful and robust web applications with MVC framework the agile wayKey FeaturesRapid guide to building powerful web applications with ASP.
Explore new and more sophisticated tools that reduce your marketing analytics efforts and give you precise resultsKey FeaturesStudy new techniques for marketing analyticsExplore uses of machine learning to power your marketing analysesWork through each stage of data analytics with the help of multiple examples and exercisesBook DescriptionData Science for Marketing Analytics covers every stage of data analytics, from working with a raw dataset to segmenting a population and modeling different parts of the population based on the segments.
This comprehensive book delves into the key features introduced in Java 22, providing insights and practical examples to help readers understand and implement these enhancements within the context of medical applications with the goal of enhancing medical practices, streamlining processes, and improving patient care.
This readable and engaging book will help managers and executives understand the major trends affecting digital technology so they are prepared to make the right decisions for their organisation.
Explore fundamentals, strategies, and emerging techniques in the field of human-computer interaction to enhance how users and computers interactKey FeaturesExplore various HCI techniques and methodologies to enhance the user experienceDelve into user behavior analytics to solve common and not-so-common challenges faced while designing user interfacesLearn essential principles, techniques and explore the future of HCIBook DescriptionHuman-Computer Interaction (HCI) is a field of study that researches, designs, and develops software solutions that solve human problems.
Information security primarily serves these six distinct purposes-authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation.
Explore Golang's data structures and algorithms to design, implement, and analyze code in the professional settingKey FeaturesLearn the basics of data structures and algorithms and implement them efficientlyUse data structures such as arrays, stacks, trees, lists and graphs in real-world scenariosCompare the complexity of different algorithms and data structures for improved code performanceBook DescriptionGolang is one of the fastest growing programming languages in the software industry.
It is with immense pleasure that we extend a warm welcome to all of you to the recently concluded conference, international conference on Advances in Science, Technology and Management (ICOSTEM 2023) which took place from November 24 - 27, 2023, in the picturesque Maldives, Male.
Understand how to use service mesh architecture to efficiently manage and safeguard microservices-based applications with the help of examplesKey FeaturesManage your cloud-native applications easily using service mesh architectureLearn about Istio, Linkerd, and Consul - the three primary open source service mesh providersExplore tips, techniques, and best practices for building secure, high-performance microservicesBook DescriptionAlthough microservices-based applications support DevOps and continuous delivery, they can also add to the complexity of testing and observability.
Use your programming skills to create and optimize high-frequency trading systems in no time with Java, C++, and PythonKey FeaturesLearn how to build high-frequency trading systems with ultra-low latencyUnderstand the critical components of a trading systemOptimize your systems with high-level programming techniquesBook DescriptionThe world of trading markets is complex, but it can be made easier with technology.
This book is an introduction to computers covering relevant topics that include: computers and society, the Internet, social media, Microsoft Office 2019, and high-level programming.
The two most wanted terrorists in Southeast Asia - a Malaysian and a Singaporean - are on the run in the Philippines, but they manage to keep their friends and family updated on Facebook.
This book constitutes the refereed proceedings of the 13th European Conference on Software Architecture, ECSA 2019, held in Paris, France, in September 2019.
This book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA, USA, in September 2018.
This book constitutes the refereed proceedings of the 15th International Conference on Persuasive Technology, PERSUASIVE 2020, held in Aalborg, Denmark, in April 2020.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2020, CT-RSA 2020, held in San Francisco, CA, USA, in February 2020.
This book constitutes the thoroughly refereed proceedings of the First International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019.
This book constitutes the thoroughly refereed workshop proceedings of the 8th International Workshop on Structured Object-Oriented Formal Language and Method, SOFL+MSVL 2018, held in Gold Coast, QLD, Australia, in November 2018.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.
This book constitutes the proceedings of the 12th International Workshop on Numerical Software Verification, NSV 2019, held in New York City, NY, USA, in July 2019 - colocated with the International Conference on Computer Aided Verification, CAV 2019.
This book constitutes the refereed proceedings of the 14th International Conference on Persuasive Technology, PERSUASIVE 2019, held in Limassol, Cyprus, in April 2019.
This book constitutes the refereed proceedings of the 13th International Conference on Provable Security, ProvSec 2019, held in Cairns, QLD, Australia, in October 2019.
This book constitutes the proceedings of the 14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019, held in Honolulu, HI, USA, in June 2019.
This book constitutes the refereed proceedings of the 19th International Conference on Product-Focused Software Process Improvement, PROFES 2018, held in Wolfsburg, Germany, in November 2018.
The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Smart Cities and Green ICT Systems, SMARTGREENS 2017, and the Third International Conference on Vehicle Technology and Intelligent Transport Systems, VEHITS 2017, held in Porto, Portugal in April 2017.
This book constitutes the refereed proceedings of the 21st International Conference on Asia-Pacific Digital Libraries, ICADL 2019, held in Kuala Lumpur, Malaysia, in November 2019.
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Workshop on Multi-Agent-Based Simulation, MABS 2019, held in Stockholm Sweden, in July 2018 as part of the Federated AI Meeting, FAIM 2018.
The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019.
This book constitutes the refereed proceedings of the 9th International Conference on Design, User Experience, and Usability, DUXU 2020, held as part of the 22nd International Conference on Human-Computer Interaction, HCII 2020, in Copenhagen, Denmark, in July 2020.
This volume constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2019, held in New York City, NY, USA, in July 2019.
This book constitutes revised selected papers of the Second International Workshop on Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment, DEVOPS 2019, held at the Chateau de Villebrumier, France, in May 2019.
This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018.
The two-volume set LNCS 11992 and 11993 constitutes the thoroughly refereed proceedings of the 5th International MICCAI Brainlesion Workshop, BrainLes 2019, the International Multimodal Brain Tumor Segmentation (BraTS) challenge, the Computational Precision Medicine: Radiology-Pathology Challenge on Brain Tumor Classification (CPM-RadPath) challenge, as well as the tutorial session on Tools Allowing Clinical Translation of Image Computing Algorithms (TACTICAL).
This book constitutes the refereed proceedings of the 18th International Conference on Runtime Verification, RV 2018, held in Limassol, Cyprus, in November 2018.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th Annual Privacy Forum, APF 2018, held in Barcelona, Spain, in June 2018.