"En la literatura se encuentran diversos medios que, según las investigaciones, facilitan o ayudan al proceso educativo, como los dispositivos móviles (tabletas y teléfonos) y los reproductores de música como medio de formación de los estudiantes; este proceso es conocido como Mobile Learning (M-Learning).
Smart grid is a new generation of power grids that is expected to enhance its reliability and reduce carbon footprint by integrating distributed resources.
The text covers the fundamentals of Python programming and the implementation of data structures using Python programming with the help of worked-out examples.
Get up and running with the fundamentals of Bitcoin and blockchainKey FeaturesLearn quick, effective, and easy ways to master blockchain and Bitcoin Understand the impact of decentralization and discover ways to tackle it Explore the future of Bitcoin and blockchain and implement them in a business networkBook DescriptionBlockchain is a distributed database that enables permanent, transparent, and secure storage of data.
This book constitutes thoroughly refereed and revised selected papers from the proceedings of 19th European Conference on Multi-Agent Systems, EUMAS 2022, held in Dusseldorf, Germany, during September 14-16, 2022.
This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.
Handelt es sich nur um einen Zufall, dass die Tatwaffe in einem geheimnisvollen Mordfall und der Name der Geliebten des Hauptverdächtigen identisch sind?
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021.
This book provides comprehensive coverage of various Cryptography topics, while highlighting the most recent trends such as quantum, blockchain, lightweight, Chaotic and DNA cryptography.
This book constitutes the proceedings of the Second International Conference on Spatial Data and Intelligence, SpatialDI 2021, which was held during April 22-24, 2021 in Hangzhou, China.
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.
This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016.
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021.
This book presents state-of-the-art methodologies and a comprehensive introduction to the recognition and representation of species and individual animals based on their physiological and phenotypic appearances, biometric characteristics, and morphological image patterns.
This volume constitutes the refereed and revised post-conference proceedings of the 4th IFIP TC 5 DCITDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2019, in Kyiv, Ukraine, in October 2019.
This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2020, held in Bratislava, Slovakia, in September 2020.
This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, held in Amalfi, Italy, in September 2020*.
This book constitutes the proceedings of the 6th International Conference on Electronic Voting, E-Vote-ID 2021, held online -due to COVID -19- in Bregenz, Austria, in October 2021.
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020.
This book constitutes the thoroughly refereed post-workshop proceedings of the 25th International Workshop on Security Protocols, held in Cambridge, UK, in March 2017.
Build a blue team for efficient cyber threat management in your organizationKey FeaturesExplore blue team operations and understand how to detect, prevent, and respond to threatsDive deep into the intricacies of risk assessment and threat managementLearn about governance, compliance, regulations, and other best practices for blue team implementationBook DescriptionWe've reached a point where all organizational data is connected through some network.
Hier könnt Ihr in den Schwerpunkt "Bauwerke" im Bereich "Bauen" hereinschnuppern und herausfinden, was an Gebäuden, Straßen, Brücken, Fountonplatten, Errinerungs-Steine sowie vieles weitere, Interessant sein kann, und wie die Erde mit allen Bauwerken darin, jederzeit zum "Besseren" Umgestaltet werden kann.
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing: A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications.
This proceedings volume convenes selected, revised papers presented at the 52nd Southeastern International Conference on Combinatorics, Graph Theory and Computing (SEICCGTC 2021), virtually held at Florida Atlantic University in Boca Raton, USA, on March 8-12, 2021.
This book constitutes the refereed proceedings of the 8th European Lean Educator Conference ELEC 2022, which took place in Galway, Ireland, in November 2022; the event was sponsored by IFIP WG 5.
This book constitutes the refereed proceedings of the 8th International Symposium, UNet 2022, held in Montreal, QC, Canada, during October 25-27, 2022.