Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book describes how equipping buildings with smart meters is essential to improve the prediction of energy costs within smart grids and to help end-users optimize their energy consumption. The book reports on the results of the European Upper Rhine INTERREG project SMI (www.smi.uha.fr), which connects artificial intelligence and micro-societal analysis. It is multidisciplinary and addresses the following aspects: social, legal, environmental, and technical.One of the critical factors for the transition to clean energy is the flexibility of the power grid. A flexible grid requires a constant flow of data about the network and its demand, on the other hand, clients who produce electrical power can be an active part of the demand response if they are informed about the power needs of their appliances.¿If you cannot measure it, you cannot improve it.¿ This common management saying also holds true for the area energy efficiency. Without a clear understanding of their energy usage, consumers are unable to take steps to reduce their consumption. A new intelligent tool is presented that is more efficient, safe, and acceptable to consumers. Thus, users of this intelligent tool will be able to collect and predict the consumption of their electrical appliances. At the same time, the consumption information is anonymized before being relayed to the energy supplier. In parallel, new techniques will be evaluated to improve the security level of the smart meter in a highly heterogeneous network.
This book describes common applied problems that are solved with the use of digital technology. The digital technology has simplified most of our daily activities. Technology has been improving our quality of life where human capability alone is insufficient enough to be utilized. For any challenging tasks, digital technology helps to solve it in very efficient ways and thousands of them are solved on a daily basis without much notice in the public. Software and IT technology let us to complete tasks in just a moment that took days without this technical support. In that sense, this book presents several examples on how software- and IT-based solutions were successfully applied in solving actual engineering problems.
"Introduces readers to the most common components of EDR systems, including function hooking, callback notifications, Event Tracing for Windows, and filesystem minifilters, by explaining how they are implemented and how they collect various data points. Covers documented evasion strategies for bypassing detections and describes how defenders might protect themselves"--
"Explores the history of Android attacks and covers static and dynamic approaches to analyzing real malware specimens, machine-learning techniques to detect malicious apps, and how to identify banking trojans, ransomware, and SMS fraud"--
This book provides Kafka administrators, site reliability engineers, and DataOps and DevOps practitioners with a list of real production issues that can occur in Kafka clusters and how to solve them. The production issues covered are assembled into a comprehensive troubleshooting guide for those engineers who are responsible for the stability and performance of Kafka clusters in production, whether those clusters are deployed in the cloud or on-premises. This book teaches you how to detect and troubleshoot the issues, and eventually how to prevent them.Kafka stability is hard to achieve, especially in high throughput environments, and the purpose of this book is not only to make troubleshooting easier, but also to prevent production issues from occurring in the first place. The guidance in this book is drawn from the author's years of experience in helping clients and internal customers diagnose and resolve knotty production problems and stabilize their Kafka environments. The book is organized into recipe-style troubleshooting checklists that field engineers can easily follow when under pressure to fix an unstable cluster. This is the book you will want by your side when the stakes are high, and your job is on the line. What You Will LearnMonitor and resolve production issues in your Kafka clustersProvision Kafka clusters with the lowest costs and still handle the required loadsPerform root cause analyses of issues affecting your Kafka clustersKnow the ways in which your Kafka cluster can affect its consumers and producersPrevent or minimize data loss and delays in data streamingForestall production issues through an understanding of common failure pointsCreate checklists for troubleshooting your Kafka clusters when problems occurWho This Book Is ForSite reliability engineers tasked with maintaining stability of Kafka clusters, Kafka administrators who troubleshoot production issues around Kafka, DevOps and DataOps experts who are involved with provisioning Kafka (whether on-premises or in the cloud), developers of Kafka consumers and producers who wish to learn more about Kafka
Ensuring cybersecurity for smart cities is crucial for a sustainable cyber ecosystem. Given the undeniable complexity of smart cities, fundamental issues such as device configurations and software updates should be addressed when it is most needed to fight cyber-crime and ensure data privacy.This book addresses the cybersecurity challenges associated with smart cities, aiming to provide a bigger picture of the concepts, intelligent techniques, practices and research directions in this area. Furthermore, this book serves as a single source of reference for acquiring knowledge on the technology, processes and people involved in the next-generation of cyber-smart cities.
This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity. In a digitally connected world, cybersecurity is one of the most important issues today. We have witnessed tremendous advancements over the last two decades in various fields of networking, connectivity, electronics, and the technologies that make use of those platforms and devices. Many emerging technologies are also showing promise for future use in the cybersecurity area. Hence, it is important to understand some basics of the technologies and concepts that are making their impacts today and those which may show stronger influence in the near future. The book begins with an introduction to ICT and its advancements, then talks about Artificial Intelligence (AI), Machine Learning (ML), and Blockchain Technologies. It then goes on to cover wireless technology, Internet of Things (IoT), Distributed Cloud Computing, Quantum Computing, Virtual Reality, and other futuristic technologies that would be directly related to Cyberspace and Cybersecurity.This textbook is written in a step-by-step manner, with easily accessible information for both general readers and experts in the field. It is suitable to be used as a textbook for undergraduate and graduate courses like Computer Networks and Security, Information Security, etc.
This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols. This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for further reading and research. This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists.
Unleash the power of automation by mastering network programming fundamentals using Python and Go best practicesPurchase of the print or Kindle book includes a free PDF eBookKey Features:Understand the fundamentals of network programming and automationLearn tips and tricks to transition from traditional networking to automated networksSolve everyday problems with automation frameworks in Python and GoBook Description:Network programming and automation, unlike traditional networking, is a modern-day skill that helps in configuring, managing, and operating networks and network devices. This book will guide you with important information, helping you set up and start working with network programming and automation.With Network Programming and Automation Essentials, you'll learn the basics of networking in brief. You'll explore the network programming and automation ecosystem, learn about the leading programmable interfaces, and go through the protocols, tools, techniques, and technologies associated with network programming. You'll also master network automation using Python and Go with hands-on labs and real network emulation in this comprehensive guide.By the end of this book, you'll be well equipped to program and automate networks efficiently.What You Will Learn:Understand the foundation of network programmingExplore software-defined networks and related familiesRecognize the differences between Go and Python through comparisonLeverage the best practices of Go and PythonCreate your own network automation testing framework using network emulationAcquire skills in using automation frameworks and strategies for automationWho this book is for:This book is for network architects, network engineers, and software professionals looking to integrate programming into networks. Network engineers following traditional techniques can use this book to transition into modern-day network automation and programming. Familiarity with networking concepts is a prerequisite.
This book constitutes the post proceedings of the 18th International Workshop on Security and Trust Management, STM 2022, co-located with the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in Copenhagen, Denmark, in September 2022.The 7 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 18 submissions. The workshop presents papers with topics such as security and trust access control, cryptographic protocols, identity management, security metrics, and privacy.
This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12¿14, 2022.The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.
This book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway.The 8 papers presented in this volume were carefully reviewed and selected from 23 submissions. These contributions span all aspects of code-based cryptography, from design to software and hardware implementations, works about recent NIST PQC standardization candidates, side channel analysis, and improved decoding techniques.
This book constitutes the refereed proceedings of the First International Workshop, FL 2022, Held in Conjunction with IJCAI 2022, held in Vienna, Austria, during July 23-25, 2022. The 11 full papers presented in this book were carefully reviewed and selected from 12 submissions. They are organized in three topical sections: answer set programming; adaptive expert models for personalization in federated learning and privacy-preserving federated cross-domain social recommendation.
C differs from most programming languages in its use of expressions, pointers, and arrays. For those learning C, pointers are the greatest source of confusion. The primary aim of this text is to provide working models of how pointers are used in C as well as an introduction to their use in C++. Most beginners falter on the use of pointers. Many try to avoid pointers completely, but quickly find that pointers are used extensively throughout C programs. Some attain a partial understanding of pointers which, at first, gets them by. However, when faced with complex programming tasks, they find that pointers become a necessity. In most programming languages one learns about pointers only after most other topics have been discussed. Pointers are just one more added feature of the language. In C and in C++, however, pointers are used with every feature. There are pointers to variables, pointers as parameters, pointers as arrays, pointers to structures, and even pointers to pointers. With each feature pointers are used differently. The way pointers work with variables is very different from the way pointers work with arrays. In this text, you learn pointers as you learn each feature of the language. With variables, you learn pointers to variables; with parameters, pointers to parameters; with functions: pointers to functions; with arrays, pointers in arrays; with structures, pointers to structures. In addition, for C++ you will learn pointers to objects, to class members, and derived objects. Such an approach provides an understanding of the many different ways pointers are used throughout the language. The text is arranged in five sections. The first section focuses on the basic structure of the language. Variables, functions, and expressions are carefully examined. The second section deals with arrays. Arrays form an exception in C. Unlike structures they are not data objects. They are completely managed by pointers. The third section describes data structures and file management. The chapter on data structures introduces basic concepts such as linked lists and trees. A special examination is made of recursion and how it operates with lists, trees, and b-trees. The chapters on file management discuss the different types of files with special emphasis on record files b-tree indexes. The fourth section provides an introduction to C++, covering classes and objects, their use with pointers, as well as operator overloading and inheritance. The fifth section covers additional topics greater detail such as the pre-processor and bitwise operations.
A practical guide to mastering C# and .NET MAUI to build native cross-platform apps with a single codebasePurchase of the print or Kindle book includes a free PDF eBookKey Features:Extend your skills to build cross-platform native apps for iOS, Android, Windows, and MacLearn by working on a real-world projectGo beyond MAUI and integrate with the .NET ecosystemBook Description:While UI plays a pivotal role in retaining users in a highly competitive landscape, maintaining the same UI can be tricky if you use different languages for different platforms, leading to mismatches and un-synced pages. In this book, you'll see how .NET MAUI allows you to create a real-world application that will run natively on different platforms. By building on your C# experience, you'll further learn to create beautiful and engaging UI using XAML or fluent C#, architect a solid app, and discover best practices for this Microsoft platform.The book starts with the fundamentals and quickly moves to intermediate and advanced topics on laying out your pages, navigating between them, and adding controls to gather and display data. You'll explore the key architectural pattern of Model-View-ViewModel: and ways to leverage it. You'll also get to grips with using xUnit and NSubstitute to create robust and reliable code coverage.By the end of this book, you'll be well-equipped to leverage .NET MAUI and create an API for your app to interact with a web frontend to the backend data using Blazor and C#.What You Will Learn:Explore the fundamentals of creating .NET MAUI apps with Visual StudioUnderstand XAML and fluent C# as the key tools for building your user interfaceObtain and Display data using layout and controlsDiscover the MVVM pattern to create robust appsAcquire the skills for storing and retrieving persistent dataBuild custom controls when the supplied controls fall shortUse unit testing to ensure your app is solid and reliableIntegrate into the .NET ecosystem to build a web-based frontendWho this book is for:Learning .NET MAUI is targeted squarely at C# programmers, whether or not they have experience with cross-platform or mobile applications, who wish to learn Microsoft's premier platform for building iOS, Android, Windows and Mac apps using a single C#-based solution.
These are the proceedings of Eurocrypt 2010, the 29th in the series of Eu- pean conferences on the Theory and Application of Cryptographic Techniques. The conference was sponsored by the International Association for Cryptologic Research and held on the French Riviera, May 30¿June 3, 2010. A total of 191 papers were received of which 188 were retained as valid submissions. These were each assigned to at least three Program Committee members and a total of 606 review reports were produced. The printed record of the reviews and extensive online discussions that followed would be almost as voluminous as these proceedings. In the end 35 submissions were accepted with twosubmissionpairsbeingmergedtogive33paperspresentedattheconference. The ?nal papers in these proceedings were not subject to a second review before publication and the authors are responsible for their contents. The ProgramCommittee, listed on the next page, deservesparticular thanks for all their hard work, their outstanding expertise, and their constant c- mitment to all aspects of the evaluation process. These thanks are of course extended to the very many external reviewers who took the time to help out during the evaluation process.It was also a greatpleasure to honor and welcome Moti Yung who gave the 2010 IACR Distinguished Lecture.
This book constitutes the refereed proceedings of the 14th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2023, held in Munich, Germany, during April 3¿4, 2023. The 12 full papers included in this book were carefully reviewed and selected from 28 submissions. They were organized in topical sections as follows: fault-injection analyses and countermeasures; side-channel analyses and countermeasures; attacks on PQC and countermeasure; and analyses and tools.
This book explores the most recent Edge and Distributed Cloud computing research and industrial advances, settling the basis for Advanced Swarm Computing developments. It features the Swarm computing concepts and realizes it as an Ad-hoc Edge Cloud architecture.Unlike current techniques in Edge and Cloud computing that solely view IoT connected devices as sources of data, Swarm computing aims at using the compute capabilities of IoT connected devices in coordination with current Edge and Cloud computing innovations. In addition to being more widely available, IoT-connected devices are also quickly becoming more sophisticated in terms of their ability to carry considerable compute and storage resources. Swarm computing and Ad-hoc Edge Cloud take full advantage of this trend to create on-demand, autonomic and decentralized self-managed computing infrastructures.Focusing on cognitive resource and service management, the book examines the specific research challenges of the Swarm computing approach, related to the characteristics of IoT connected devices that form the infrastructure. It also offers academics and practitioners insights for future research in the fields of Edge and Swarm computing.
This book presents the selected research works from the 16th International Conference on Industrial Engineering and Industrial Management in 2022. The conference was promoted by ADINGOR (Asociación para el Desarrollo de la Ingeniería de Organización), organized by Ingenium Research Group at Universidad de Castilla-La Mancha, Spain, and it took place on July 7th and 8th, 2022, in Toledo, Spain. The book highlights some of the latest research advances and cutting-edge analyses of real-world case studies on Industrial Engineering and Industrial Management from a wide range of international contexts. It also identifies business applications and the latest findings and innovations in Operations Management and in Decision Sciences.
This book brings together chapters from leading world experts that signpost the way forward for industry and commerce in the coming decade, as we emerge from the Covid emergency to a new era of challenges and opportunities. It has the following aims, to: - Keep at the forefront of innovative theories and strategies relate with industry 5.0, both on an international and transnational level.- Develop and improve our knowledge about industry 5.0 implications in sustainable and competitive organizations.- Communicate and share knowledge and experience in industry 5.0. The book will be of interest to all those concerned with the development of industry and its relationship to commerce and human development.
This book teaches readers how wireless networks work, why some of their properties impact wireless network performance at the application level, and what both network engineers and application developers can do to cope with these challenges. Internet users increasingly rely on wireless access links for diverse tasks such as web browsing, video conferencing, interactive games, and data sharing. Irrespective of how they access the Internet, they expect good performance and a high quality of experience. Unfortunately, wireless access networks are much more challenging to build than wired networks. In wired networks, signals used for communication are contained in a carefully engineered transmission medium. In contrast, wireless signals travel in our physical environment, where the presence of obstacles, interference, and mobility can affect communication. In addition, network performance can differ significantly across physical environments. As a result, the performance of wireless links is often lower and less predictable than that of wired links. The author structured the book according to the layers in the Internet protocol stack, similar to traditional network books. However, rather than presenting a general description of each layer, the focus is on wireless networks and how they differ from wired networks.
This book contains a wide range of multiple-choice questions covering topics such as LAN, WAN, MAN, VPN and Wireless Networks. Each question is designed to test your knowledge and understanding of a specific concept or technology related to computer networks.The questions are organized into chapters, with each chapter focusing on a specific aspect of computer networking. You can use this book as a self-study tool to test your knowledge and identify areas where you need to improve. Alternatively, you can use it as a supplement to your existing coursework or as a study aid for certification exams.
Volume 2 speaks about Smart cities that emanate from a smart renewable energy aided power grid. The smart grid technologies offer an array of benefits like reliability, availability, and resiliency. Smart grids phenomenally contribute to facilitate cities reach those sustainability goals over time.
Some of the hottest topics today involve cryptocurrency, and FinTech. With all these trends, businesses need to become better informed. This book provides an easy-to-read, yet comprehensive, view of cryptocurrency in the U.S. and international markets, as well as the key issues, technologies, applications, challenges, and trends.
Whether the source is more industry-based or academic research, there certainly appears to be a growing interest in the field of cryptocurrency. The New York Times had a cover story on March 24, 2022, titled "Time to Enter the Crypto Zone?," and they talked about institutional investors pouring billions into digital tokens, salaries being taken in Bitcoins, and even Bitcoin ATMs in grocery stores. Certainly, there have been ups and downs in crypto, but it has a kind of alluring presence that tempts one to include crypto as part of one's portfolio. Those who are "prime crypto-curious" investors are usually familiar with the tech/pop culture and feel they want to diversify a bit in this fast-moving market. Even universities are beginning to offer more courses and create "Centers on Cryptocurrency." Some universities are even requiring their students who take a crypto course to pay the course tuition via cryptocurrency.In response to the growing interest and fascination about the crypto industry and cryptocurrency in general, Cryptocurrency Concepts, Technology, and Applications brings together many leading worldwide contributors to discuss a broad range of issues associated with cryptocurrency. The book covers a wide array of crypto-related topics, including:BlockchainNFTsData analytics and AICrypto crimeCrypto industry and regulationCrypto and public choiceConsumer confidenceBitcoin and other cryptocurrencies.Presenting various viewpoints on where the crypto industry is heading, this timely book points out both the advantages and limitations of this emerging field. It is an easy-to-read, yet comprehensive, overview of cryptocurrency in the U.S. and international markets.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.