Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations.
This book constitutes the refereed proceedings of the 8th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, ISSEP 2015, held in Ljubljana, Slovenia, in September/October 2015.
Building Science Graphics: An illustrated guide to communicating science through diagrams and visualizations is a practical guide for anyone-regardless of previous design experience and preferred drawing tools-interested in creating science-centric illustrated explanatory diagrams.
The aim of this book is to provide an internationally respected collection of scientific research methods, technologies and applications in the area of data science.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014.
COMPREHENSIVE COVERAGE OF SHADERS, THE PROGRAMMABLE PIPELINE AND WEBGLFrom geometric primitives to animation to 3D modeling to lighting, shading and texturing, Computer Graphics Through OpenGL(R): From Theory to Experiments is a comprehensive introduction to computer graphics which uses an active learning style to teach key concepts.
Advanced Mathematical Analysis and its Applications presents state-of-the-art developments in mathematical analysis through new and original contributions and surveys, with a particular emphasis on applications in engineering and mathematical sciences.
This book presents a complete overview of the main EEG-based Brain-Computer Interface (BCI) paradigms and the related practical solutions for their design, prototyping, and testing.
In Data Sketches, Nadieh Bremer and Shirley Wu document the deeply creative process behind 24 unique data visualization projects, and they combine this with powerful technical insights which reveal the mindset behind coding creatively.
This book presents the reader with comprehensive insight into various kinds of mathematical modeling and numerical computation for problems arising in several branches of engineering, such as mechanical engineering, computer science engineering, electrical engineering, electronics and communication engineering, and civil engineering.
This book constitutes the proceedings of the 12th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2023, which took place in Penang, Malaysia, during August 28-30, 2023.
Minimize Power Consumption and Enhance User ExperienceEssential for high-speed fifth-generation mobile networks, mobile cloud computing (MCC) integrates the power of cloud data centers with the portability of mobile computing devices.
Unlock the transformative potential of deep learning in your professional and academic endeavors with Deep Learning in Engineering, Energy and Finance: Principals and Applications.
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing.
The text covers the fundamentals of Python programming and the implementation of data structures using Python programming with the help of worked-out examples.
As featured on CNN, Forbes and Inc - BookAuthority identifies and rates the best books in the world, based on recommendations by the world's most successful business leaders and experts.
Optimize Designs in Less TimeAn essential element of equipment and system design, computer aided design (CAD) is commonly used to simulate potential engineering problems in order to help gauge the magnitude of their effects.
This book constitutes papers presented during the workshop session titled "e;CyberSec4Europe - Research to Innovation: Common Research Framework on Security and Privacy"e; during the Privacy Symposium hosted by Universita Ca' Foscari in Venice, Italy, in April 2022.
Learn How to Design Effective Visualization SystemsVisualization Analysis and Design provides a systematic, comprehensive framework for thinking about visualization in terms of principles and design choices.
This book constitutes the refereed proceedings of the First Conference on Cybersecurity of Industrial Control Systems, CyberICS 2015, and the First Workshop on the Security of Cyber Physical Systems, WOS-CPS 2015, held in Vienna, Austria, in September 2015 in conjunction with ESORICS 2015, the 20th annual European Symposium on Research in Computer Security.
This book constitutes the proceedings of the Second International Conference on Business Data Analytics , ICBDA 2023 held in Dehradun, India, in December 7-8, 2023.
The growth of a global digital economy has enabled rapid communication, instantaneous movement of funds, and availability of vast amounts of information.
Cyber Insecurity: Examining the Past, Defining the Future deals with the multifaceted world of cybersecurity, starting with the premise that while perfection in cybersecurity may be unattainable, significant improvements can be made through understanding history and fostering innovation.
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011.
This book involves the design, analysis, and application of various cognitive predictive maintenance tests with the help of tools like vibration analysis, ultrasonic analysis, infrared analysis, oil analysis, laser-shaft alignment, and motor circuit analysis in the prediction of various cognitive diseases such as epilepsy, Parkinson's disease, Alzheimer's disease, and depression.
Design and assemble an inexpensive yet fast and reliable PCConstruct the PC of your dreams using the practical information contained in this hands-on guide.
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime.
This volume contains the proceedings of the 13th International Conference on Financial Cryptography and Data Security, held at the Accra Beach Hotel and Resort, Barbados, February 23-26, 2009.
The ten-volume set LNCS 15016-15025 constitutes the refereed proceedings of the 33rd International Conference on Artificial Neural Networks and Machine Learning, ICANN 2024, held in Lugano, Switzerland, during September 17-20, 2024.
Cybercrime and Information Technology: Theory and Practice-The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text addressing current technology, trends, and security issues.
Robotics: From Theory to Practice introduces robotic theories and technologies to audiences, including university students, professionals with engineering backgrounds, and even high-school students interested in building their own robots.
Since computer scientists make decisions every day that have societal context and influence, an understanding of society and computing together should be integrated into computer science education.