This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014.
COMPREHENSIVE COVERAGE OF SHADERS, THE PROGRAMMABLE PIPELINE AND WEBGLFrom geometric primitives to animation to 3D modeling to lighting, shading and texturing, Computer Graphics Through OpenGL(R): From Theory to Experiments is a comprehensive introduction to computer graphics which uses an active learning style to teach key concepts.
Advanced Mathematical Analysis and its Applications presents state-of-the-art developments in mathematical analysis through new and original contributions and surveys, with a particular emphasis on applications in engineering and mathematical sciences.
This book presents a complete overview of the main EEG-based Brain-Computer Interface (BCI) paradigms and the related practical solutions for their design, prototyping, and testing.
In Data Sketches, Nadieh Bremer and Shirley Wu document the deeply creative process behind 24 unique data visualization projects, and they combine this with powerful technical insights which reveal the mindset behind coding creatively.
This book presents the reader with comprehensive insight into various kinds of mathematical modeling and numerical computation for problems arising in several branches of engineering, such as mechanical engineering, computer science engineering, electrical engineering, electronics and communication engineering, and civil engineering.
This book constitutes the proceedings of the 12th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2023, which took place in Penang, Malaysia, during August 28-30, 2023.
Minimize Power Consumption and Enhance User ExperienceEssential for high-speed fifth-generation mobile networks, mobile cloud computing (MCC) integrates the power of cloud data centers with the portability of mobile computing devices.
Unlock the transformative potential of deep learning in your professional and academic endeavors with Deep Learning in Engineering, Energy and Finance: Principals and Applications.
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing.
The text covers the fundamentals of Python programming and the implementation of data structures using Python programming with the help of worked-out examples.
As featured on CNN, Forbes and Inc - BookAuthority identifies and rates the best books in the world, based on recommendations by the world's most successful business leaders and experts.
Optimize Designs in Less TimeAn essential element of equipment and system design, computer aided design (CAD) is commonly used to simulate potential engineering problems in order to help gauge the magnitude of their effects.
This book constitutes papers presented during the workshop session titled "e;CyberSec4Europe - Research to Innovation: Common Research Framework on Security and Privacy"e; during the Privacy Symposium hosted by Universita Ca' Foscari in Venice, Italy, in April 2022.
Learn How to Design Effective Visualization SystemsVisualization Analysis and Design provides a systematic, comprehensive framework for thinking about visualization in terms of principles and design choices.
This book constitutes the refereed proceedings of the First Conference on Cybersecurity of Industrial Control Systems, CyberICS 2015, and the First Workshop on the Security of Cyber Physical Systems, WOS-CPS 2015, held in Vienna, Austria, in September 2015 in conjunction with ESORICS 2015, the 20th annual European Symposium on Research in Computer Security.
This book constitutes the proceedings of the Second International Conference on Business Data Analytics , ICBDA 2023 held in Dehradun, India, in December 7-8, 2023.
The growth of a global digital economy has enabled rapid communication, instantaneous movement of funds, and availability of vast amounts of information.
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011.
This book involves the design, analysis, and application of various cognitive predictive maintenance tests with the help of tools like vibration analysis, ultrasonic analysis, infrared analysis, oil analysis, laser-shaft alignment, and motor circuit analysis in the prediction of various cognitive diseases such as epilepsy, Parkinson's disease, Alzheimer's disease, and depression.
Design and assemble an inexpensive yet fast and reliable PCConstruct the PC of your dreams using the practical information contained in this hands-on guide.
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime.
This volume contains the proceedings of the 13th International Conference on Financial Cryptography and Data Security, held at the Accra Beach Hotel and Resort, Barbados, February 23-26, 2009.
The ten-volume set LNCS 15016-15025 constitutes the refereed proceedings of the 33rd International Conference on Artificial Neural Networks and Machine Learning, ICANN 2024, held in Lugano, Switzerland, during September 17-20, 2024.
Cybercrime and Information Technology: Theory and Practice-The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text addressing current technology, trends, and security issues.
Since computer scientists make decisions every day that have societal context and influence, an understanding of society and computing together should be integrated into computer science education.
This book constitutes the refereed proceedings of the 4th International Conference on Future Network Systems and Security, FNSS 2018, held in Paris, France, in July 2018.
This book constitutes the post-conference proceedings of the First MICCAI Workshop on Medical Applications with Disentanglements, MAD 2022, held in conjunction with MICCAI 2022, in Singapore, on September22, 2022.
This book provides practical advice for everyone on how to effectively secure yourself, your devices, and your privacy in an era where all of those things seem doomed.
Establishing adaptive control as an alternative framework to design and analyze Internet congestion controllers, End-to-End Adaptive Congestion Control in TCP/IP Networks employs a rigorously mathematical approach coupled with a lucid writing style to provide extensive background and introductory material on dynamic systems stability and neural network approximation; alongside future internet requests for congestion control architectures.
Strengthen your ability to implement, assess, evaluate, and enhance the effectiveness of information security controls based on ISO/IEC 27001/27002:2022 standardsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesFamiliarize yourself with the clauses and control references of ISO/IEC 27001:2022Define and implement an information security management system aligned with ISO/IEC 27001/27002:2022Conduct management system audits to evaluate their effectiveness and adherence to ISO/IEC 27001/27002:2022Book DescriptionISO 27001 and ISO 27002 are globally recognized standards for information security management systems (ISMSs), providing a robust framework for information protection that can be adapted to all organization types and sizes.
The book titled "e;Applications of Computational Intelligence Techniques in Communications"e; is a one-stop platform for the researchers, academicians, and people from industry to get a thorough understanding of the latest research in the field of communication engineering.