Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book examines various topics and approaches related to the security and privacy in big data and cloud computing, where authors share their expertise in their respective chapters on a broad range of security and privacy challenges and state of the art solutions.
Modelling Enterprise Architectures looks at the practical needs of creating and maintaining an effective EA within a twenty-first-century business through the use of pragmatic modelling.
This book provides systematic guidance on how to sense and avoid the causes of IT project failure at every step, from project conception to the disposal of the system after a long and beneficial operational life. The author takes the reader through every stage of the process, pointing out pitfalls and suggesting tactics as you go.
This book reviews some of the underlying technologies and also some recent applications in a number of fields. In a world increasingly overloaded with data of varying quality, not least via the Internet, computerised tools are becoming useful to 'mine' useful data from the mass available.
This book provides an introduction to silicon IC technology including descriptions of the various processing techniques employed in the manufacture of microelectronic components. A heavy emphasis is placed on the design of semi-custom IC's and consideration is also given to the ways in which custom VLSI circuits will be designed in future.
The UML (Unified Modelling Language) has become the industry standard for modelling software-intensive systems. The book looks at applications using the UML as part of a generic approach to aid problem-solving and information modelling and covers the significant changes that have occurred since the release of UML version 2.
This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected, security becomes imperative.
This authored book investigates network traffic classification solutions by proposing transport-layer methods to achieve better run and operated enterprise-scale networks.
This book describes the primary uses for Trusted Platform Modules (TPMs) and practical considerations such as when TPMs can and should be used, when they shouldn't be, what advantages they provide, and how to actually make use of them, with use cases and worked examples of how to implement these use cases on a real system.
This book describes how smart cities can be designed with data at their heart, moving from a broad vision to a consistent city-wide collaborative configuration of activities.
This comprehensive edited 2-volume handbook provides a unique platform for researchers, engineers, developers, educators and advanced students in the field of Big Data analytics. The first volume presents methodologies that support Big Data analytics, while the second volume offers a wide range of Big Data analytics applications.
This comprehensive edited 2-volume handbook provides a unique platform for researchers, engineers, developers, educators and advanced students in the field of Big Data analytics. The first volume presents methodologies that support Big Data analytics, while the second volume offers a wide range of Big Data analytics applications.
Serving as a bridge between researchers in the computing domain and computing hardware designers, this book presents ReRAM techniques for distributed computing using IMC accelerators, ReRAM-based IMC architectures for machine learning (ML) and data-intensive applications, and strategies to map ML designs onto hardware accelerators.
Inspired by MPEG-I and JPEG-PLENO standardization activities, this book is for readers who want to understand 3D representations and multi-camera video processing for novel immersive media applications. The authors address new challenges that arise beyond compression-only, such as depth acquisition and 3D rendering.
In this book, the authors articulate the challenges associated with streaming data and analytics, describe data analytics algorithms and approaches, present edge and fog computing concepts and technologies and show how streaming analytics can be accomplished in edge device clouds. They also delineate several industry use cases.
Graph analytics are being empowered through novel analytics techniques to explore and pinpoint beneficial relationships between different entities such as organizations, people and transactions. This edited book presents the various aspects and importance of graph data science, with contributions by authors from academia and industry.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.