Master the art of designing, developing, and operating secure infrastructures on Google CloudKey FeaturesPrepare for the certification exam with clear explanations, real-world examples, and self-assessment questionsReview Google Cloud security best practices for building a secure and compliant cloud environmentExplore advanced concepts like Security Command Center, BeyondCorp Zero Trust, and container securityBook DescriptionGoogle Cloud security offers powerful controls to assist organizations in establishing secure and compliant cloud environments.
The book includes papers about various problems of dependable operation of computer systems and networks, which were presented during the 18th DepCoS-RELCOMEX conference.
This proceedings volume presents a selection of peer-reviewed contributions from the Second Non-Associative Algebras and Related Topics (NAART II) conference, which was held at the University of Coimbra, Portugal, from July 18-22, 2022.
This book provides an introduction to the key concepts of Fully Homomorphic Encryption (FHE)-based computing, and discusses the challenges associated with architecting FHE-based computing systems.
This book constitutes revised selected papers from the workshops that were affiliated with the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.
This edited book presents a significant and timely contribution to our understanding of a broad range of issues pertaining to COVID-19 and its relationship to occupational safety, health and well-being (OSHW) in the global construction industry.
This edited book presents a significant and timely contribution to our understanding of a broad range of issues pertaining to COVID-19 and its relationship to occupational safety, health and well-being (OSHW) in the global construction industry.
This book constitutes revised selected papers from the 53rd International Simulation and Gaming Association Conference, ISAGA 2022, which took place in Boston, USA, during July 11-14, 2022.
The Path of Flames: Understanding and Responding to Fatal Wildfires is an edited volume covering the complexities of response and recovery issues relative to catastrophic wildfires.
This book constitutes revised selected papers from the workshops that were affiliated with the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.
Dieses Buch bietet eine prägnante und dennoch umfassende Einführung in die Resilienz von Lieferketten, die Management-, Modellierungs- und Technologieperspektiven abdeckt.
The contemporary world currently faces multi-level challenges, including cross-border migration, economic crises and myriad health issues, including the recent COVID-19 pandemic.
The contemporary world currently faces multi-level challenges, including cross-border migration, economic crises and myriad health issues, including the recent COVID-19 pandemic.
This book constitutes revised selected papers from the 53rd International Simulation and Gaming Association Conference, ISAGA 2022, which took place in Boston, USA, during July 11-14, 2022.
This volume in the Encyclopedia of Complexity and Systems Science, Second Edition, covers recent developments in classical areas of ergodic theory, including the asymptotic properties of measurable dynamical systems, spectral theory, entropy, ergodic theorems, joinings, isomorphism theory, recurrence, nonsingular systems.
This book offers a thorough introduction to the basics and scientific and technological innovations involved in the modern study of reinforcement-learning-based feedback control.
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection.
This second edition textbook provides invaluable guidance on carrying out qualitative research in psychology using methods both individually and in combination.
After critiquing chaos, catastrophe, and complexity theories, showing their limitations in the contemporary era, Rich furthers the development of crisis theory and applies the crisis theory approach to biological and social evolution.
From Poe's Dupin and Doyle's Holmes to the television hits Quincy and CSI, the public's fascination with science employed to solve crimes continues and grows.
Most discussions of the digital divide focus on the gap between African Americans and others when it comes to using, and benefiting from, the technological and business opportunities of the information age.
In this remarkable volume, a multinational team of scientists catalogs the stressors and benefits for combat-trained soldiers deployed on missions where they are told to hold their fire and assume the role of peacekeeper.
Recently there has been much debate over the adoption, implementation, and maintenance of comprehensive health and sexuality education programs in Massachusetts public schools.
This handbook offers a comprehensive overview of key themes and agendas in contemporary Participatory Design across diverse disciplines, continents, communities, and practices.
This book is a complete guide to using functions in Power Query and is designed to help users of all skill levels learn and master its various functions.
The sixth generation (6G) of wireless cellular networks is expected to incorporate the latest developments in network infrastructure and emerging advances in technology.
This book explores how both elite and non-elite actors frame societal threats such as the refugee crisis and COVID-19 using both digital and traditional media.