This book provides an overview of economic espionage as practiced by a range of nations from around the world focusing on the mass scale in which information is being taken for China's growth and development.
Big Data and Blockchain Technology for Secure IoT Applications presents a comprehensive exploration of the intersection between two transformative technologies: big data and blockchain, and their integration into securing Internet of Things (IoT) applications.
Smart manufacturing environments are revolutionizing the industrial sector by integrating advanced technologies, such as the Internet of Things (IoT), artificial intelligence (AI), and robotics, to achieve higher levels of efficiency, productivity, and safety.
A fully updated, integrated self-study system for the Oracle Database SQL ExamThis thoroughly revised Oracle Press guide offers 100% coverage of all objectives on the latest version of the Oracle Database SQL Exam.
The 3rd International Conference on Foundations and Frontiers in Computer, Communication and Electrical Engineering is a notable event which brings together academia, researchers, engineers and students in the fields of Electronics and Communication, Computer and Electrical Engineering making the conference a perfect platform to share experience, f
Two large international conferences on Advances in Engineering Sciences were held in Hong Kong, March 13-15, 2013, under the International MultiConference of Engineers and Computer Scientists (IMECS 2013), and in London, U.
Rapid developments in the field of genetic algorithms along with the popularity of the first edition precipitated this completely revised, thoroughly updated second edition of The Practical Handbook of Genetic Algorithms.
Software Project Management (SPM) differs from the Traditional Project Management (PM) approaches in that Software Engineering requires multiple rounds of Software Testing, and Updating in accordance with their Testing results and their customer's feedback.
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed wayThis practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to oil and gas pipelines, electrical grids, and nuclear refineries.
Whether you're already in the cloud, or determining whether or not it makes sense for your organization, Cloud Computing and Software Services: Theory and Techniques provides the technical understanding needed to develop and maintain state-of-the-art cloud computing and software services.
Develop and implement an effective end-to-end security programToday s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional.
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.
Investigating Child Exploitation and Pornography provides the historical, legal, technical, and social background for the laws prohibiting child exploitation, in particular, child pornography.
Bestselling CompTIA A+ author Mike Meyers provides hands-on, step-by-step labs-updated for the 2012 release of Exam 220-802-so you can practice the IT skills essential for your successMike Meyers CompTIA A+ Guide to Managing and Troubleshooting Operating Systems Lab Manual, Fourth Edition contains more than 80 labs that challenge you to solve real-world problems with key concepts.
In cyber-physical systems (CPS), sensors and embedded systems are networked together to monitor and manage a range of physical processes through a continuous feedback system.
By focusing on the experiences of users, gamers, and audiences inside one of the world's largest gaming communities (Xbox Live), this book provides an overview of the landscape, architecture, and socio-technical structure of console gaming.
What sets Numerical Methods and Analysis with Mathematical Modelling apart are the modelling aspects utilizing numerical analysis (methods) to obtain solutions.
La sécurité logicielle désigne l’ensemble des théories, des pratiques, des vérifications et des prudences que devraient utiliser les programmeurs afin que les systèmes qu’ils développent soient aussi sécuritaires que possible.
The aim of this book is to demonstrate the use of business driven risk assessments to address government regulations and guidelines specific to AI risks, as AI systems often require access to personal data.
The debate is no longer whether to use information and communication technologies (ICT) in education in Africa but how to do so, and how to ensure equitable access for teachers and learners, whether in urban or rural settings.