The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023.
ESORICS, the European Symposium on Research in Computer Security, is the leading research-oriented conference on the theory and practice of computer security in Europe.
This book constitutes the proceedings of the 30th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2017, held in College Station, TX, USA, in October 2017.
This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018.
Building Intelligent Interactive Tutors discusses educational systems that assess a student's knowledge and are adaptive to a student's learning needs.
This volume constitutes the papers of several workshops which were held in conjunction with the 28th International Conference on Database Systems for Advanced Applications, DASFAA 2023, held in Tanjin, China, in April 2023.
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.
Create powerful, marketable applications with Tizen for the smartphone and beyond Tizen is the only platform designed for multiple device categories that is HTML5-centric and entirely open source.
This volume contains the proceedings of the ACM SIGPLAN Workshop on L- guages, Compilers, and Tools for Embedded Systems (LCTES 2000), held June 18, 2000, in Vancouver, Canada.
This book constitutes the proceedings of the 11th Ecuadorian Conference on Information and Communication Technologies, TICEC 2023, held in Cuenca, Ecuador, during October 18-20, 2023.
Welcome to the proceedings of the 4th International Conference on Wired/ Wireless Internet Communications held at the University of Bern from May 10-12,2006.
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023.
Der Standard-Leitfaden – komplett aktualisiert auf Windows 10 und Windows Server 2016Tauchen Sie in die Architektur und die inneren Mechanismen von Windows ein und lernen Sie die Kernkomponenten kennen, die hinter den Kulissen arbeiten.
The first and last word on the feature-packed new Windows 8 Windows 8 is an exciting new version of Microsoft's flagship operating system and it's packed with exciting new features.
As computers become more and more integral to business and other organizational operations around the world, software design must increasingly meet the social demands of the workplace.
Get the most out of the latest version of OS X Updated and revised for the latest OS X release from Apple, OS X Yosemite For Dummies gives you fun, easy-to-understand coverage of the key features and tools needed to get the most out OS X.
Adaptation, for purposes of self-healing, self-protection, self-management, or self-regulation, is currently considered to be one of the most challenging pr- erties of distributed systems that operate in dynamic, unpredictable, and - tentially hostile environments.
This book provides a comprehensive learning journey aimed at helping you master Ansible and efficiently automate a range of enterprise network devices, such as routers, switches, firewalls, Wireless LAN Controller (WLC), and Linux servers.
Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such as ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks, mobility and personalization, put new requirements on privacy and security with respect to data management.
Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models.
Discover end-to-end penetration testing solutions to enhance your ethical hacking skillsKey FeaturesPractical recipes to conduct effective penetration testing using the latest version of Kali LinuxLeverage tools like Metasploit, Wireshark, Nmap, and more to detect vulnerabilities with easeConfidently perform networking and application attacks using task-oriented recipesBook DescriptionMany organizations have been affected by recent cyber events.
Recent years have witnessed the appearance of new paradigms for designing distributed applications where the application components can be relocated - namically across the hosts of the network.
Learn to harness the power of AI for natural language processing, performing tasks such as spell check, text summarization, document classification, and natural language generation.
Gary Bennett, Brad Lees, and Stefan Kaczmarek, the team behind Swift 2 for Absolute Beginners, brings you a hands-on "e;Swift"e; introduction to the new tvOS SDK with a collection of app projects to try out.
This book constitutes the proceedings of the 10th International Conference on Internet and Distributed Computing Systems, IDCS 2017, held in Mana Island, Fiji, in December 2017.
This book will help you understand the capabilities of Microsoft Hyper-V, architect a Hyper-V solution for your datacenter, plan a deployment/migration, and then manage it all using native tools and System Center.
Understand, troubleshoot and repair issues with local Windows installations, automating the OS deployment and configuring updates via WSUS and Windows Intune.
Design and implement a secure end-to-end desktop management solution with Microsoft Endpoint ManagerKey FeaturesLearn everything you need to know about deploying and managing Windows on physical and cloud PCsSimplify remote working for cloud-managed cloud PCs via new service Windows 365Benefit from the authors' experience of managing physical endpoints and traditional virtual desktop infrastructures (VDI)Book DescriptionMicrosoft Modern Workplace solutions can simplify the management layer of your environment remarkably if you take the time to understand and implement them.