Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
The benefits of digitalisation do not lie in the use of new technologies for existing processes, but in organisational changes and new business models. The book highlights the composable enterprise as the guiding principle for successful digital transformation and associated cost reductions and revenue increases. What does it mean? A composable enterprise is organised in a decentralised process-oriented way. This allows the enterprise to react quickly to new situations, develop or change processes and business models. The information systems are based on platform architectures. A paradigm shift to monolithic applications.Sector concepts for industry, consulting and universities show how organisation and application architectures interlock in the composable enterprise.The reader receives inspiration, a foundation and a compass for the digital transformation of a company to the composable enterprise.
This book overviews the drivers behind the smart city vision, describes its dimensions and introduces the reference architecture. It further enumerates and classifies threats targeting the smart city concept, links corresponding attacks, and traces the impact of these threats on operations, society and the environment. This book also introduces analytics-driven situational awareness, provides an overview of the respective solutions and highlights the prevalent limitations of these methods. The research agenda derived from the study emphasizes the demand and challenges for developing holistic approaches to transition these methods to practice equipping the user with extensive knowledge regarding the detected attack instead of a sole indicator of ongoing malicious events. It introduces a cyber-situational awareness framework that can be integrated into smart city operations to provide timely evidence-based insights regarding cyber incidents and respective system responses to assist decision-making. This book targets researchers working in cybersecurity as well as advanced-level computer science students focused on this field. Cybersecurity operators will also find this book useful as a reference guide.
This book constitutes the refereed proceedings of the 34th Australasian Database Conference on Databases Theory and Applications, ADC 2023, held in Melbourne, VIC, Australia, during November 1-3, 2023.The 26 full papers presented in this volume are carefully reviewed and selected from 41 submissions. They were organized in topical sections named: Mining Complex Types of Data, Natural Language Processing and Text Analysis, Machine Learning and Computer Vision, Database Systems and Data Storage, Data Quality and Fairness for Graphs and Graph Mining and Graph Algorithms.
This book constitutes the proceedings of the 28th Nordic Conference, NordSec 2023, held in Oslo, Norway, during November 16¿17, 2023.The 18 full papers included in this volume were carefully reviewed and selected from 55 submissions. This volume focuses on a broad range of topics within IT security and privacy.
Erfahren Sie mit diesem Buch alles über die angewandte NetzwerktechnikIm privaten Bereich spielt Netzwerktechnik eine eher untergeordnete Rolle. Dabei sorgt sie erst dafür, dass die Kommunikation via Internet funktioniert. Der industrielle Sektor hat die Vorteile des Datenaustauschs mit Hilfe von Netzwerken allmählich erkannt. Doch erst im Rahmen der ¿Industrie 4.0¿ wird laut Valentin Plenk die Datenübertragung in Echtzeit mehr Bedeutung gewinnen. Mit Blick auf diese Entwicklung stellt er in seinem Buch im Sinne der angewandten Netzwerktechnik speziell die höheren Schichten der Netzwerktechnik in den Fokus. Dieses kompakte Lehrbuch zeigt Ihnen anhand von konkreten, in Java ausprogrammierten Beispielen, wie Informationen zwischen Systemen über ein Netzwerk ausgetauscht werden können. Pro Kapitel behandelt dieses Netzwerktechnik-Buch ein bestimmtes Thema. Nach der Einführung in die Grundlagen der Kommunikation geht derAutor zunächst auf Java-Streams, Zeichencodierung sowie die Netzwerkanalyse mit Wireshark ein. Anschließend schenkt Plenk speziell folgenden Datenaustauschformaten sowie Protokollen besonderes Augenmerk:¿ JSON¿ HTML¿ HTTP¿ OPC UA¿ TCP/IP¿ UDP/IPKonkrete Beispiele und Übungen geben Ihnen PraxiseinblickeAuf diese Weise deckt dieses Buch über die angewandte Netzwerktechnik den gesamten Bereich technischer Kommunikation ab, von den Netzwerkprotokollen bis hin zum Versenden von Netzwerktelegrammen. Durch diese breite Themenauswahl bekommen Sie als Leser ein tieferes Verständnis für die typischen Problemstellungen in der Anwendung der Netzwerktechnik. Sie erfahren mehr über die Darstellung von Daten in einem bestimmten Dateiformat und wie Sie Daten mittels Standardprotokollen austauschen können. Zudem lernen Sie, wie Sie eigene, einfache Protokolle auf der Basis von TCP/IP erstellen können. Schwerpunkt des Buches bildet dabei immer die Anwendung von Netzwerken.Mit Hilfe zahlreicher Übungsaufgaben (inklusive Lösungsvorschlägen) sowie Anwendungsbeispielen können Sie Ihren persönlichen Kenntnisstand überprüfen und das Gelernte vertiefen. So sind Sie ideal auf die Praxis vorbereitet. Die zweite Auflage des Buchs ¿Angewandte Netzwerktechnik kompakt¿ wurde um den Themenbereich Webservices ergänzt. Im Abschnitt zu UDP/IP finden Sie jetzt außerdem hilfreiche Codebeispiele für Broadcast und Multicast.
This book constitutes the proceedings of the 12th International Congress on Telematics and Computing, WITCOM 2023, held in Puerto Vallarta, Mexico, in November 2023. The 35 full papers presented in this volume were carefully reviewed and selected from 88 submissions. The papers are focused on the topics of artificial intelligence techniques, data science, blockchain, environment monitoring, cybersecurity, education, and software for communications protocols.
This book provides a comprehensive review and in-depth discussion of the state-of-the-art research literature and propose energy-efficient computation offloading and resources management for mobile edge computing (MEC), covering task offloading, channel allocation, frequency scaling and resource scheduling. Since the task arrival process and channel conditions are stochastic and dynamic, the authors first propose an energy efficient dynamic computing offloading scheme to minimize energy consumption and guarantee end devices' delay performance. To further improve energy efficiency combined with tail energy, the authors present a computation offloading and frequency scaling scheme to jointly deal with the stochastic task allocation and CPU-cycle frequency scaling for minimal energy consumption while guaranteeing the system stability. They also investigate delay-aware and energy-efficient computation offloading in a dynamic MEC system with multiple edge servers, and introduce an end-to-end deep reinforcement learning (DRL) approach to select the best edge server for offloading and allocate the optimal computational resource such that the expected long-term utility is maximized. Finally, the authors study the multi-task computation offloading in multi-access MEC via non-orthogonal multiple access (NOMA) and accounting for the time-varying channel conditions. An online algorithm based on DRL is proposed to efficiently learn the near-optimal offloading solutions.Researchers working in mobile edge computing, task offloading and resource management, as well as advanced level students in electrical and computer engineering, telecommunications, computer science or other related disciplines will find this book useful as a reference. Professionals working within these related fields will also benefit from this book.
This book constitutes the proceedings of the 19th International Workshop on Security and Trust Management, STM 2023, co-located with the 28th European Symposium on Research in Computer Security, ESORICS 2023, held in The Hague, The Netherlands, during September 28th, 2023 The 5 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 15 submissions. The workshop presents papers with topics such as security and privacy, trust models, security services, authentication, identity management, systems security, distributed systems security, privacy-preserving protocols.
This book constitutes the refereed proceedings of the 11th International Conference on Code-Based Cryptography, CBCrypto 2023, held in Lyon, France, during April 22¿23, 2023. The 8 full papers included in this book were carefully reviewed and selected from 28 submissions. The conference offers a wide range of many important aspects of code-based cryptography such as cryptanalysis of existing schemes, the proposal of new cryptographic systems and protocols as well as improved decoding algorithms.
This book constitutes the refereed proceedings of the 5th International Conference on Advances in Quantitative Ethnography, ICQE 2023, held in Melbourne, VIC, Australia, during October 8¿12, 2023.The 33 full papers included in this book were carefully reviewed and selected from 39 submissions. They were organized in topical sections as follows: understanding learners and learning; society, culture, identity, and justice; and advances in QE methodologies.
This book constitutes the refereed post-conference proceedings of the 28th International Workshop on Security Protocols, held in Cambridge, UK, during March 27¿28, 2023.Thirteen papers out of 23 submissions were selected for publication in this book, presented together with the respective transcripts of discussions. The theme of this year's workshop was ¿Humans in security protocols ¿ are we learning from mistakes?¿The topics covered are securing the human endpoint and proving humans correct.
This book constitutes the refereed post-conference proceedings of the Fifth IFIP International Cross-Domain Conference on Internet of Things, IFIPIoT 2022, held in Amsterdam in October 2022.The 20 full papers presented were carefully reviewed and selected from 36 submissions. The papers are organized in the following topical sections: IoT for Smart Villages, Security and Safety, Smart Home, Development, Engineering, Machine Learning, and Applications.
This volume constitutes selected papers presented during the First International Conference on New Media Pedagogy: Research Trends, Methodological Challenges and Successful Implementations, NMP 2022, held in Kraków, Poland, in October 2022. The 20 papers presented were thoroughly reviewed and selected from the 55 qualified submissions. They present recent research in the areas of teacher education in the information society, digitally-enhanced didactics, pedagogical innovations using ICT, e-learning, blended learning, crisis e-learning, digital inclusion and exclusion, identity of media pedagogy, and more.
This volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023. The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.
This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA.The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections: Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II.
This volume, IFIP AICT 660, constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "e;Co-creating for Context in Prospective Transfer and Diffusion of IT"e; on Transfer and Diffusion of IT, TDIT 2022, held in Maynooth, Ireland, during June 15-16, 2022.The 19 full papers and 10 short papers presented were carefully reviewed and selected from 60 submissions. The papers focus on the re-imagination of diffusion and adoption of emerging technologies. They are organized in the following parts:
This book provides insights into IoT, its applications, and various implementation techniques. The authors first discuss the IoT design methodology to define the domain model. They then cover various connection methodologies used in IoT such as Ethernet, Wi-Fi, low powered wide area network (LPWAN), Bluetooth, RFID, cellular, and satellite, and more, along with their challenges. An example is made on the designing process using Arduino, which offers smart, connected, and secure elements; they also illustrate the integration of IoT with Blockchain, cloud, machine learning, big data, embedded software, sensors, etc. The book going on to cover the future of IoT in various sectors and how IoT will continue to be game-changing technology.
This book constitutes the refereed conference proceedings of the 14th International Conference on Bio-inspired Information and Communications Technologies, held in Okinawa, Japan, during April 11-12, 2023. The 17 full papers were carefully reviewed and selected from 33 submissions. The papers focus on the latest research that leverages the understanding of key principles, processes, and mechanisms in biological systems for development of novel information and communications technologies (bio-inspired ICT). BICT 2023 will also highlight innovative research and technologies being developed for biomedicine that are inspired by ICT (ICT-inspired biomedicine).
This open access book constitutes the refereed proceedings of the 20th International Conference on Digital Health Transformation and Smart Ageing, ICOST 2023, held in Wonju, South Korea, during July 7¿8, 2023.The 18 full papers and 16 short papers included in this book were carefully reviewed and selected from 41 submissions. They were organized in topical sections as follows: IoT and AI Solutions for E-health, Biomedical and Health Informatics, Wellbeing Technologies, Short Contributions: Medical Systems and E-health Solutions and Short Contributions: Wellbeing Technologies.
This book constitutes the refereed proceedings of the 8th International Conference on Progress in Cryptology, LATINCRYPT 2023, held in Quito, Ecuador, in October 2023. The 19 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Symmetric-Key Cryptography; Multi-Party Computation; Isogeny-Based Cryptography; Discrete Logarithm Problem; Cryptographic Protocols; Real-World Cryptography; and Zero-Knowledge Proofs.
This book provides an account of the latest developments in IoT and cloud computing, and their practical applications in various industrial, scientific, business, education, and government domains. The book covers the advanced research and state of the art review of the latest developments in IoT and cloud computing and how they might be employed post-COVID era. The book also identifies challenges and their solutions in this era, shaping the direction for future research and offering emerging topics to investigate further. The book serves as a reference for a broader audience such as researchers, application designers, solution architects, teachers, graduate students, enthusiasts, practitioners, IT managers, decision-makers and policymakers. The book editors are pioneers in the fields of IoT and Cloud computing.Provides an account of the latest developments in IoT and cloud computing and how it can aid in a COVID-19 Era in a variety of applications; Identifies IoT and cloud computing challenges and their solutions, shaping the direction for future research; Serves as a reference for researchers, application designers, solution architects, teachers, and graduate students.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.