Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
The Internet of Energy (IoE), with the integration of advanced information and communication technologies (ICT), has led to a transformation of traditional networks to smart systems. Internet of Energy Handbook provides updated knowledge in the field of energy management with an Internet of Things (IoT) perspective. FeaturesExplains the technological developments for energy management leading to a reduction in energy consumption through topics like smart energy systems, smart sensors, communication, techniques, and utilizationIncludes dedicated sections covering varied aspects related to renewable sources of energy, power distribution, and generationIncorporates energy efficiency, optimization, and sensor technologies Covers multidisciplinary aspects in computational intelligence and IoTDiscusses building energy management aspects including temperature, humidity, the number of persons involved, and light intensityThis handbook is aimed at graduate students, researchers, and professionals interested in power systems, IoT, smart grids, electrical engineering, and transmission.
Despite DRL, there are still domain-specific challenges in complex wireless network virtualization requiring further study covered in this book; DNN architectures design with 5G network optimization, developing intelligent mechanism for automated management of virtual communications in SDNs, etc
Since A Guide to IT Contracting: Checklists, Tools, and Techniques first published, several alarming trends have developed in the technology contracting industry. These trends include:The Dawn of the "As-Is" Technology ProductThe Ever-Changing ProductWhere in the World Is My Data?To meet these challenges, the Second Edition helps business managers and lawyers explore alternate solutions from other vendors, conduct simultaneous negotiations with other vendors, and, generally, ensure prospective vendors understand they can "lose the deal" if they refuse to act reasonably.Distilling the most critical business and legal lessons learned through the author's decades of legal experience drafting and negotiating IT-related agreements, this single volume lets readers quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement, each chapter includes a checklist of essential terms, a brief summary of what the agreement is intended to do, and a complete review of the legal and business issues that are addressed in that particular agreement. Providing nonlegal professionals with the tools to address IT contracting issues, the book:Contains checklists to help readers organize key concepts for ready referenceSupplies references to helpful online resources and aids for contract draftingIncludes a complete glossary that defines key legal, business, and technical termsTechnology contracting is becoming ever more difficult. This book is filled with recommendations to mitigate potential risk and makes clear the importance of maintaining negotiating leverage with potential vendors.
A recent study found that most business leaders believe in the value of using data and analytics, but say they lack confidence in measures of their effectiveness. In the data analytics community, intuition has been rarely discussed in executive decision-making. The book examines how well do executives trust their intuition.
A recent study found that most business leaders believe in the value of using data and analytics, but say they lack confidence in measures of their effectiveness. In the data analytics community, intuition has been rarely discussed in executive decision-making. The book examines how well do executives trust their intuition.
Innovation based in data analytics is a contemporary approach to developing empirically supported advances that encourage entrepreneurial activity inspired by novel marketing inferences. Data Analytics in Marketing, Entrepreneurship, and Innovation covers techniques, processes, models, tools, and practices for creating business opportunities through data analytics. It features case studies that provide realistic examples of applications. This multifaceted examination of data analytics looks at: Business analyticsApplying predictive analytics Using discrete choice analysis for decision-making Marketing and customer analyticsDeveloping new productsTechnopreneurshipDisruptive versus incremental innovationThe book gives researchers and practitioners insight into how data analytics is used in the areas of innovation, entrepreneurship, and marketing. Innovation analytics helps identify opportunities to develop new products and services, and improve existing methods of product manufacturing and service delivery. Entrepreneurial analytics facilitates the transformation of innovative ideas into strategy and helps entrepreneurs make critical decisions based on data-driven techniques. Marketing analytics is used in collecting, managing, assessing, and analyzing marketing data to predict trends, investigate customer preferences, and launch campaigns.
Despite increasing scholarly attention to artificial intelligence (AI), studies at the intersection of AI and communication remain ripe for exploration, including investigations of the social, political, cultural, and ethical aspects of machine intelligence, interactions among agents, and social artifacts. This book tackles these unexplored research areas with special emphasis on conditions, components, and consequences of cognitive, attitudinal, affective, and behavioural dimensions toward communication and AI. In doing so, this book epitomizes communication, journalism and media scholarship on AI and its social, political, cultural, and ethical perspectives.Topics vary widely from interactions between humans and robots through news representation of AI and AI-based news credibility to privacy and value toward AI in the public sphere. Contributors from such countries as Brazil, Netherland, South Korea, Spain, and United States discuss important issues and challenges in AI and communication studies. The collection of chapters in the book considers implications for not only theoretical and methodological approaches, but policymakers and practitioners alike.The chapters in this book were originally published as a special issue of Communication Studies.
This book presents contemporary issues and challenges in finance and risk management in a time of rapid transformation due to technological advancements. It includes research articles based on financial and economic data and intends to cover the emerging role of analytics in financial management, asset management, and risk management.
This book covers several essential aspects of pervasive ambient backscatter communication, one of the most cutting-edge technologies for Internet-of-Things. It begins with introductory Part I, which presents visions, basic concepts, principles, and paradigms of ambient backscatter. Also, a taxonomy of state-of-the-art ambient backscatter systems is provided from the perspective of the OSI model. Part II and III study how ambient backscatter systems work on the communication and networking levels. Specifically, Part II discusses in detail how to make use of ambient WiFi signals to provide high-throughput backscatter communications with WiFi 1 (chapter 5), WiFi 2-3 (chapter 4), WiFi 4 (chapter 3), WiFi 5-6 (chapter 6) standards. Further, Part III includes several of the most advanced ambient backscatter network solutions, which are made possible by the first multi-hop backscatter (chapter 7), first backscatter mesh (chapter 8), and multiprotocol backscatter (chapter 9). On top of reliable communication and networks, we propose two novel applications that are thought impossible before, lightweight spatial sound recording over the air (chapter 10) and self-powered wireless wearables for healthcare (chapter 11). To conclude the monograph, we point out critical challenges for realizing the vision of pervasive backscatter IoTs and potential directions of ambient backscatter applications. The book provides an in-depth understanding of ambient backscatter technologies. In particular, we mainly take ubiquitous WiF signals as the communication sources and adopt a top-down approach to introduce three crucial subjects: WiFi backscatter communication, ambient backscatter network, and self-powered application systems. For each subject, we carefully divide it into several relatively independent topics, which come with the latest advances in pervasive backscatter and include extensive discussions of closely related state-of-the-art methodologies.
This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29¿31, 2023. This event was held in hybrid mode.The 14 full papers presented in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: System and Hardware Security; Symmetric Key Cryptography; Public Key Cryptography; Zero Knowledge Proofs; and Card Based Cryptography.
This book presents selected, peer-reviewed contributions from the 9th International Conference on Experimental Vibration Analysis for Civil Engineering Structures (EVACES 2021), organized by the University of Tokyo and Saitama University from September 17-20, 2021 on the Hongo campus of the University of Tokyo, and hosted in an online format. The event brought together engineers, scientists, researchers, and practitioners, providing a forum for discussing and disseminating the latest developments and achievements in all major aspects of dynamic testing for civil engineering structures, including instrumentation, sources of excitation, data analysis, system identification, monitoring and condition assessment, in-situ and laboratory experiments, codes and standards, and vibration mitigation. The topics of EVACES 2021 included but were not limited to: damage identification and structural health monitoring; testing, sensing and modeling; vibration isolation and control; system and model identification; coupled dynamical systems (including human-structure, vehicle-structure, and soil-structure interaction); and application of advanced techniques involving the Internet of Things, robot, UAV, big data and artificial intelligence.
A comprehensive guide to kickstart your journey into the world of coding using the powerful tools and features of Microsoft Visual Studio. Whether you're a beginner taking your first steps in programming or an enthusiast looking to enhance your skills, this book is your go-to resource. Explore the fundamentals of coding, delve into popular programming languages like C# and Python, and discover how to build basic applications and web projects effortlessly. With clear explanations and hands-on examples, you'll master essential coding concepts and unlock the potential of Visual Studio's intuitive interface. Navigate through debugging, version control, and collaborative coding, and gain insights into deploying your creations with ease. Whether you're aiming to create desktop applications, web solutions, or APIs, this book equips you with the knowledge and confidence to excel in the dynamic world of coding. Let "Coding Basics with Microsoft Visual Studio" empower you to turn your coding aspirations into reality.
In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications technologies such as Bluetooth, NFC, wireless sensors, wireless LANs, ZigBee, GSM, and others have their own challenges and security threats.This book addresses some of these challenges focusing on the implication, impact, and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of wireless networks but also the adversarial application of wireless networks and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting, and addressing wireless challenges and threats. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicioususe of the wireless networks if sufficient defenses are not implemented. The research contained in the book fits well into the larger body of work on various aspects of wireless networks and cyber-security.The book provides a valuable reference for cyber-security experts, practitioners, and network security professionals, particularly those interested in the security of the various wireless networks. It is also aimed at researchers seeking to obtain a more profound knowledge in various types of wireless networks in the context of cyber-security, wireless networks, and cybercrime. Furthermore, the book is an exceptional advanced text for Ph.D. and master¿s degree programs in cyber-security, network security, cyber-terrorism, and computer science who are investigating or evaluating a security of a specific wireless network. Each chapter is written by an internationally-renowned expert who has extensive experience in law enforcement, industry, or academia. Furthermore, this bookblends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.
Dieses Buch wendet künstliche Intelligenz auf die schlanke Produktion an und zeigt, wie sich die Vorteile dieser beiden Disziplinen praktisch kombinieren lassen. Die schlanke Produktion hat ihren Ursprung in Japan und ist ein bekanntes Instrument zur Verbesserung der Wettbewerbsfähigkeit der Hersteller. Zu den gängigen Werkzeugen der schlanken Produktion gehören Kanban, Pacemaker, Wertstromkarte, 5s, Just-in-Time und Pull Manufacturing. Lean Manufacturing und das Toyota-Produktionssystem wurden in verschiedenen Fabriken und Lieferketten auf der ganzen Welt erfolgreich eingesetzt. Ein schlankes Fertigungssystem kann nicht nur Verschwendung und Lagerbestände reduzieren, sondern auch unmittelbarer auf Kundenbedürfnisse reagieren. Künstliche Intelligenz ist ein Thema, das in letzter Zeit viel Aufmerksamkeit auf sich gezogen hat. Viele Forscher und praktische Entwickler arbeiten hart daran, künstliche Intelligenz in unserem täglichen Leben anzuwenden, auch in Fabriken. So wurden beispielsweise Fuzzy-Regeln zur Optimierung von Maschineneinstellungen entwickelt. Es wurden bionische Algorithmen vorgeschlagen, um Probleme bei der Produktionsreihenfolge und -planung zu lösen. Technologien des maschinellen Lernens werden eingesetzt, um mögliche Probleme mit der Produktqualität zu erkennen und den Zustand einer Maschine zu diagnostizieren. Dieses Buch ist für Produktionsingenieure, Manager sowie für Studenten und Forscher im Bereich der Fertigungstechnik von Interesse.
This book gives readers an overview about technologies that are useful for developments related to Smart Cities.Some technologies are already available, such for example, as smart meters for electricity and gas in buildings. But there are possibilities to incorporate existing devices into wider networks with other smart devices that currently operate independently. This in turn will considerably improve the reduction of the energy consumption in buildings, reduction of emission pollutions in cities and improvement of the well-being of people. The other objective of this book is to introduce readers to new technologies which are not yet implemented in areas related to the efficient functioning of cities. For example, areas related to Intelligent Transport Systems are mostly developed for the optimization of the traffic flow, reduction of accidents on roads, improvement of the safety of drivers and related to road transportation problems. The rapid advances in Blockchain technologies are also covered.
Pass the AZ-700 exam effortlessly with this comprehensive guide to Azure networking, covering all aspects of architecting, implementing, and managing Azure virtual networksPurchase of the print or Kindle book includes a free PDF eBookKey Features:Create and deploy a secure Azure network and implement dynamic routing and hybrid connectivityMaster Azure network design for performance, resilience, scalability, and securityEnhance your practical skills with hands-on labs aligned to the AZ-700 Network Engineer certificationBook Description:Designing and Implementing Microsoft Azure Networking Solutions is a comprehensive guide that covers every aspect of the AZ-700 exam to help you fully prepare to take the certification exam.Packed with essential information, this book is a valuable resource for Azure cloud professionals, helping you build practical skills to design and implement name resolution, VNet routing, cross-VNet connectivity, and hybrid network connectivity using the VPN Gateway and the ExpressRoute Gateway. It provides step-by-step instructions to design and implement an Azure Virtual WAN architecture for enterprise use cases.Additionally, the book offers detailed guidance on network security design and implementation, application delivery services, private platform service connectivity, and monitoring networks in Azure. Throughout the book, you'll find hands-on labs carefully integrated to align with the exam objectives of the Azure Network Engineer certification (AZ-700), complemented by practice questions at the end of each chapter, allowing you to test your knowledge.By the end of this book, you'll have mastered the fundamentals of Azure networking and be ready to take the AZ-700 exam.What You Will Learn:Recap the fundamentals of Azure networkingDesign and implement name resolutionImplement cross-VNet and VNet internet connectivityBuild site-to-site VPN connections using the VPN gatewayCreate an ExpressRoute connectionSecure your network with Azure Firewall and network security groupsImplement private access to Azure servicesChoose the right load balancing option for your networkWho this book is for:Whether you're an Azure network engineer or a professional looking to enhance your expertise in designing and implementing scalable and secure network solutions, this book is an invaluable resource. A basic understanding of cloud solutions will help you to get the most out of this book.
This book constitutes the refereed proceedings of the 17th International Conference on Network and System Security, NSS 2023, held in Canterbury, UK, August 14¿16, 2023.The 12 full and 9 short papers presented together with 2 invited talks in this book were carefully reviewed and selected from 64 submissions. They focus on Attacks and Malware, Blockchain, Security through Hardware, Machine learning and much more.
Master widely used cloud native platforms like Kubernetes, Calico, Kibana, Grafana, Anchor, and more to ensure secure infrastructure and software developmentPurchase of the print or Kindle book includes a free PDF eBookKey Features:Learn how to select cloud-native platforms and integrate security solutions into the systemLeverage cutting-edge tools and platforms securely on a global scale in production environmentsUnderstand the laws and regulations necessary to prevent federal prosecutionBook Description:For cloud security engineers, it's crucial to look beyond the limited managed services provided by cloud vendors and make use of the wide array of cloud native tools available to developers and security professionals, which enable the implementation of security solutions at scale. This book covers technologies that secure infrastructure, containers, and runtime environments using vendor-agnostic cloud native tools under the Cloud Native Computing Foundation (CNCF).The book begins with an introduction to the whats and whys of the cloud native environment, providing a primer on the platforms that you'll explore throughout. You'll then progress through the book, following the phases of application development. Starting with system design choices, security trade-offs, and secure application coding techniques that every developer should be mindful of, you'll delve into more advanced topics such as system security architecture and threat modelling practices. The book concludes by explaining the legal and regulatory frameworks governing security practices in the cloud native space and highlights real-world repercussions that companies have faced as a result of immature security practices.By the end of this book, you'll be better equipped to create secure code and system designs.What You Will Learn:Understand security concerns and challenges related to cloud-based app developmentExplore the different tools for securing configurations, networks, and runtimeImplement threat modeling for risk mitigation strategiesDeploy various security solutions for the CI/CD pipelineDiscover best practices for logging, monitoring, and alertingUnderstand regulatory compliance product impact on cloud securityWho this book is for:This book is for developers, security professionals, and DevOps teams involved in designing, developing, and deploying cloud native applications. It benefits those with a technical background seeking a deeper understanding of cloud-native security and the latest tools and technologies for securing cloud native infrastructure and runtime environments. Prior experience with cloud vendors and their managed services is advantageous for leveraging the tools and platforms covered in this book.
Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated from different sourcesPurchase of the print or Kindle book includes a free PDF eBookKey Features- Understand and analyze various modern cyber threats and attackers' techniques- Gain in-depth knowledge of email security, Windows, firewall, proxy, WAF, and security solution logs- Explore popular cyber threat intelligence platforms to investigate suspicious artifactsBook DescriptionEffective threat investigation requires strong technical expertise, analytical skills, and a deep understanding of cyber threats and attacker techniques. It's a crucial skill for SOC analysts, enabling them to analyze different threats and identify security incident origins. This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills.The book begins by explaining phishing and email attack types and how to detect and investigate them, along with Microsoft log types such as Security, System, PowerShell, and their events. Next, you'll learn how to detect and investigate attackers' techniques and malicious activities within Windows environments. As you make progress, you'll find out how to analyze the firewalls, flows, and proxy logs, as well as detect and investigate cyber threats using various security solution alerts, including EDR, IPS, and IDS. You'll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis.By the end of this book, you'll have learned how to analyze popular systems and security appliance logs that exist in any environment and explore various attackers' techniques to detect and investigate them with ease.What you will learn- Get familiarized with and investigate various threat types and attacker techniques- Analyze email security solution logs and understand email flow and headers- Find out how to analyze Microsoft event logs- Practical investigation of the various Windows threats and attacks- Analyze web proxy logs to investigate C&C communication attributes- Understand web application firewall (WAF) logs and examine various external attacks- Analyze FW logs and security alerts to investigate cyber threats- Understand the role of CTI in investigation and identify potential threatsWho this book is forThis book is for Security Operation Center (SOC) analysts, security professionals, cybersecurity incident investigators, incident handlers, incident responders, or anyone looking to explore attacker techniques and delve deeper into detecting and investigating attacks. If you want to efficiently detect and investigate cyberattacks by analyzing logs generated from different log sources, then this is the book for you. Basic knowledge of cybersecurity and networking domains and entry-level security concepts are necessary to get the most out of this book.Table of Contents- Investigating Email Threats- Email Flow and Header Analysis- Introduction to Windows Event Logs- Tracking Accounts Login and Management- Investigating Suspicious Process Execution Using Windows Event Logs- Investigating PowerShell Event Logs- Investigating Persistence and Lateral Movement Using Windows Event Logs- Network Firewall Logs Analysis- Investigating Cyber Threats by Using the Firewall Logs- Web Proxy Logs Analysis(N.B. Please use the Look Inside option to see further chapters)
This book will show you how to build Java-based microservices architecture using the popular Spring Boot framework by evolving a small monolith application to an event-driven architecture composed of several services. This third edition has been updated to cover Spring Boot 3, including its compatibility with Java 17 and Jakarta EE 10, and employs an incremental approach to teach the structure of microservices, test-driven development, and common patterns in distributed systems such as service discovery, load balancing, routing, centralized logs, per-environment configuration, and containerization. Authors Moisés Macero and Tarun Telang get the ball rolling by introducing you to the fundamentals of microservices and Spring Boot before walking you through the development of a basic Spring Boot application. Yoüll then see how to build a front end using React, and learn how to use the data layer to read and write data from and to other systems via Spring Boot and its access to Spring Data and its available APIs. Putting together what you've learned thus far, yoüll begin to transform an application from a monolith to a microservice. This pragmatic approach will enable you to better grasp the benefits of using this type of software architecture, instead of keeping you distracted with theoretical concepts. The emphasis is on what matters most, starting with the minimum viable product, while maintaining the ability to adapt and improve your application as needed. After completing this book, you will have the foundational knowledge necessary to build your own microservice-based applications using Spring Boot.What You Will LearnGain a thorough understanding of microservices architecture and how it differs from monolithic architectures.Discover the step-by-step process of breaking down a monolithic application into smaller, focused servicesBuild microservices with Spring Boot 3, Spring Data, Spring Cloud, React.js, Docker, Cucumber, and moreDevelop Java-based microservices using the latest version of Spring Boot, compatible with Java 17 and Jakarta EE 10.Discover architecture patterns for distributed systems such as asynchronous processing, eventual consistency, resilience, scalability, and moreGain insight into event-driven communication patterns and understand how to design and build event-driven microservicesTrace every request from beginning to end with Sleuth and centralized loggingDeploy your microservices anywhere as Docker containersWho This Book Is ForThose with at least some prior experience with Java programming. Some prior exposure to Spring Boot recommended but not required.
This book is for those who wish to understand how Python debugging is and can be used to develop robust and reliable AI, machine learning, and cloud computing software. It will teach you a novel pattern-oriented approach to diagnose and debug abnormal software structure and behavior.The book begins with an introduction to the pattern-oriented software diagnostics and debugging process that, before performing Python debugging, diagnoses problems in various software artifacts such as memory dumps, traces, and logs. Next, yoüll learn to use various debugging patterns through Python case studies that model abnormal software behavior. Yoüll also be exposed to Python debugging techniques specific to cloud native and machine learning environments and explore how recent advances in AI/ML can help in Python debugging. Over the course of the book, case studies will show you how to resolve issues around environmental problems, crashes, hangs, resource spikes, leaks, and performancedegradation. This includes tracing, logging, and analyzing memory dumps using native WinDbg and GDB debuggers. Upon completing this book, you will have the knowledge and tools needed to employ Python debugging in the development of AI, machine learning, and cloud computing applications.What You Will LearnEmploy a pattern-oriented approach to Python debugging that starts with diagnostics of common software problemsUse tips and tricks to get the most out of popular IDEs, notebooks, and command-line Python debuggingUnderstand Python internals for interfacing with operating systems and external modulesPerform Python memory dump analysis, tracing, and loggingWho This Book Is ForSoftware developers, AI/ML engineers, researchers, data engineers, as well as MLOps and DevOps professionals.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.