Udvidet returret til d. 31. januar 2025
Filter
Filter
Sorter efterSorter Populære
  • af Clint Reach
    532,95 kr.

    "RAND researchers examine the reasons behind Russia's evolution toward a unified strategic operation, as well as the capabilities that would be necessary to execute key conventional offensive tasks in such an operation"--

  • af Wesley Haakman
    433,95 kr.

    Apply scenario-based learning to effectively handle the technical and business impact of various services like AKS, ACI, Azure Functions, and Azure Container Apps on AzurePurchase of the print or Kindle book includes a free PDF eBookKey Features:Understand the what, why, and how of different container technologies available on Microsoft AzureExplore the practical implementation of various Azure container technologies with the help of use casesLearn common business strategies for selecting the right Azure container technology at optimized costBook Description:Whether you're working with a start-up or an enterprise, making decisions related to using different container technologies on Azure has a notable impact your app migration and modernization strategies. This is where companies face challenges, while choosing the right solutions and deciding when to move on to the next technology. Azure Containers Explained helps you make the right architectural choices for your solutions and get well-versed with the migration path to other platforms using practical examples.You'll begin with a recap of containers as technology and where you can store them within Azure. Next, you'll explore the different Microsoft Azure container technologies and understand how each platform, namely Azure Container Apps, Azure Kubernetes Service (AKS), Azure Container Instances (ACI), Azure Functions, and Azure App Services, work - you'll learn to implement them by grasping their respective characteristics and use cases. Finally, you'll build upon your own container solution on Azure using best practices from real-world examples and successfully transform your business from a start-up to a full-fledged enterprise.By the end of this book, you'll be able to effectively cater to your business and application needs by selecting and modernizing your apps using various Microsoft Azure container services.What You Will Learn:Make the best-suited architectural choices to meet your business and application needsUnderstand the migration paths between different Azure Container servicesDeploy containerized applications on Azure to multiple technologiesKnow when to use Azure Container Apps versus Azure Kubernetes ServiceFind out how to add features to an AKS clusterInvestigate the containers on Azure Web apps and Functions appsDiscover ways to improve your current architecture without starting againExplore the financial implications of using Azure container servicesWho this book is for:This book is for cloud and DevOps architects, application developers, technical leaders, decision makers, and IT professionals working with Microsoft Azure and cloud native technologies, especially containers. Reasonable knowledge of containers and a solid understanding of Microsoft Azure will help you grasp the concepts in this book.

  • af Ian Mitchell, Reza Montasari, Fiona Carroll, mfl.
    1.982,95 kr.

  • af Raghavendar Raju L.
    368,95 kr.

    In recent years the Internet has been transformed from a special purposenetwork to a ubiquitous platform for a wide range of everyday communication services. The demands on Internet reliability and availability have increased accordingly. Disruption of a link in central parts of a network has the potential to affect hundreds of thousands of phone conversations or TCP connections, with apparent adverse effects. The ability to recover from failures has always been a central design goal of the Internet. IP networks are intrinsically robust since IGP routing protocols like OSPF are designed to update the forwarding information based on the changed topology after a failure. This re-convergence assumes full distribution of the new link state to all routers in the network domain. When the further state information is distributed, each router individually calculates new valid routing tables.

  • af Richie Miller
    288,95 kr.

    If you want to become a Cybersecurity Professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover:¿¿Baseline Configuration, Diagrams & IP Management Data Sovereignty & Data Loss Prevention Data Masking, Tokenization & Digital Rights Management Geographical Considerations & Cloud Access Security Broker Secure Protocols, SSL Inspection & Hashing API Gateways & Recovery Sites Honeypots, Fake Telemetry & DNS Sinkhole Cloud Storage and Cloud Computing IaaS, PaaS & SaaS Managed Service Providers, Fog Computing & Edge Computing VDI, Virtualization & Containers Microservices and APIs Infrastructure as Code (IAC) & Software Defined Networking (SDN) Service Integrations and Resource Policies Environments, Provisioning & Deprovisioning Integrity Measurement & Code Analysis Security Automation, Monitoring & Validation Software Diversity, Elasticity & Scalability Directory Services, Federation & AttestationEmbedded Systems & SCADA SecuritySmart Devices / IoT & Special Purpose DevicesHVAC, Aircraft/UAV & MFDsReal Time Operating Systems & Surveillance SystemsBarricades, Mantraps & AlarmsCameras, Video Surveillance & GuardsCable Locks, USB Data Blockers, Safes & FencingMotion Detection / Infrared & Proximity ReadersDemilitarized Zone & Protected Distribution SystemShredding, Pulping & Pulverizing Deguassing, Purging & Wiping Cryptographic Terminology and History Digital Signatures, Key Stretching & HashingQuantum Communications & Elliptic Curve CryptographyQuantum Computing, Cipher Modes & XOR FunctionEncryptions & BlockchainsAsymmetric/Lightweight Encryption & SteganographyCipher Suites, Random & Quantum Random Number Generators BUY THIS BOOK NOW AND GET STARTED TODAY!

  • af Richie Miller
    353,95 kr.

    If you want to become a Cybersecurity Professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. Whether you want to become an Infrastructure Engineer, IT Security Analyst or any other Cybersecurity Professional, this book will certainly help you get there! BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover:Secure Networking ProtocolsHost or Application Security SolutionsCoding, Fuzzing & Quality TestingHow to Implement Secure Network DesignsNetwork Access Control, Port Security & Loop ProtectionSpanning Tree, DHCP Snooping & MAC FilteringAccess Control Lists & Route SecurityIntrusion Detection and PreventionFirewalls & Unified Threat ManagementHow to Install and Configure Wireless SecurityHow to Implement Secure Mobile SolutionsGeo-tagging & Context-Aware AuthenticationHow to Apply Cybersecurity Solutions to the CloudHow to Implement Identity and Account Management ControlsHow to Implement Authentication and Authorization SolutionsHow to Implement Public Key InfrastructureFile Manipulation & Packet CapturesForensics & Exploitation FrameworksData Sanitization ToolsHow to Apply Policies, Processes and Procedures for Incident ResponseDetection and AnalysisTest Scenarios & SimulationsThreat Intelligence LifecycleDisaster Recovery & Business ContinuityHow to Implement Data Sources to Support an InvestigationRetention Auditing, Compliance & MetadataHow to Implement Mitigation Techniques to Secure an EnvironmentMobile Device ManagementDLP, Content Filters & URL FiltersKey Aspects of Digital ForensicsChain of Custody & Legal HoldFirst Responder Best PracticesNetwork Traffic and LogsScreenshots & WitnessesPreservation of EvidenceData IntegrityJurisdictional Issues & Data Breach Notification LawsThreat Types & Access ControlApplicable Regulations, Standards, & FrameworksBenchmarks & Secure Configuration GuidesHow to Implement Policies for Organizational SecurityMonitoring & BalancingAwareness & Skills TrainingTechnology & Vendor DiversityChange Management & Asset ManagementRisk Management Process and ConceptsRisk Register, Risk Matrix, and Heat MapRegulatory ExamplesQualitative and Quantitative AnalysisBusiness Impact AnalysisIdentification of Critical SystemsOrder of RestorationContinuity of OperationsPrivacy and Sensitive Data ConceptsIncident Notification and EscalationData ClassificationPrivacy-enhancing TechnologiesData Owners & ResponsibilitiesInformation Lifecycle BUY THIS BOOK NOW AND GET STARTED TODAY!

  • af Richie Miller
    208,95 kr.

    If you want to become a Cybersecurity Professional, this book is for you! IT Security jobs are on the rise! Small, medium or large size companies are always on the look out to get on board bright individuals to provide their services for Business as Usual (BAU) tasks or deploying new as well as on-going company projects. Most of these jobs requiring you to be on site but since 2020, companies are willing to negotiate with you if you want to work from home (WFH). Yet, to pass the Job interview, you must have experience. Still, if you think about it, all current IT security professionals at some point had no experience whatsoever. The question is; how did they get the job with no experience? Well, the answer is simpler then you think. All you have to do is convince the Hiring Manager that you are keen to learn and adopt new technologies and you have willingness to continuously research on the latest upcoming methods and techniques revolving around IT security. Here is where this book comes into the picture. Why? Well, if you want to become an IT Security professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. Passing security exams isn't easy. In fact, due to the raising security beaches around the World, both above mentioned exams are becoming more and more difficult to pass. Whether you want to become an Infrastructure Engineer, IT Security Analyst or any other Cybersecurity Professional, this book (as well as the other books in this series) will certainly help you get there! BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover:· Secure Networking Protocols· Host or Application Security Solutions· Coding, Fuzzing & Quality Testing· How to Implement Secure Network Designs· Network Access Control, Port Security & Loop Protection· Spanning Tree, DHCP Snooping & MAC Filtering· Access Control Lists & Route Security· Intrusion Detection and Prevention· Firewalls & Unified Threat Management· How to Install and Configure Wireless Security· How to Implement Secure Mobile Solutions· Geo-tagging & Context-Aware Authentication· How to Apply Cybersecurity Solutions to the Cloud· How to Implement Identity and Account Management Controls· How to Implement Authentication and Authorization Solutions· How to Implement Public Key Infrastructure BUY THIS BOOK NOW AND GET STARTED TODAY!

  • af Ko Nishino, Leonid Karlinsky & Tomer Michaeli
    937,95 - 2.030,95 kr.

  • af Sokratis Katsikas
    746,95 kr.

    This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022.The 39 papers included in these proceedings stem from the following workshops: 8th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2022, which accepted 8 papers from 15 submissions; 6th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2022, which accepted 2 papers from 5 submissions; Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2022, which accepted 4 full papers out of 13 submissions; Third Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2022, which accepted 9 full and 1 short paper out of 19 submissions; Second International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT & SECOMANE 2022, which accepted 5 papers out of 8 submissions; First International Workshop on Election Infrastructure Security, EIS 2022, which accepted 5 papers out of 10 submissions; and First International Workshop on System Security Assurance, SecAssure 2022, which accepted 5 papers out of 10 submissions. Chapter(s) 5, 10, 11, and 14 are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

  • af Fei Fang
    872,95 kr.

    This book constitutes the refereed proceedings of the 13th International Conference on Decision and Game Theory for Security, GameSec 2022, held in October 2022 in Pittsburgh, PA, USA. The 15 full papers presented were carefully reviewed and selected from 39 submissions. The papers are grouped thematically on: deception in security; planning and learning in dynamic environments; security games; adversarial learning and optimization; novel applications and new game models.

  • af Debashis De, Siddhartha Bhattacharyya & Joel J. P. C. Rodrigues
    1.989,95 kr.

    The book is aimed to foster knowledge based on Blockchain technology highlighting on the framework basics, operating principles and different incarnations. The fundamental problems encountered in existing blockchain architectures and means for removing those would be covered. It would also touch upon blockchain based IoT systems and applications. The book covers applications and use cases of blockchain technology for industrial IoT systems. In addition, methods for inducing computational intelligence into existing blockchain frameworks thereby thwarting most of the limitations are also discussed. The readers would benefit from the rich technical content in this rapidly emerging field thereby enabling a skilled workforce for the future.

  • af Elena G. Popkova & Bruno S. Sergi
    1.994,95 kr.

    This book is concerned with the systemic examination of the prospects for the development of smart agriculture for sustainable development. This book substantiates the top-priority significance of smart innovation in agriculture for modern economic and ecological systems. The book not only examines the theoretical concept of smart agriculture, but also gives consideration to the rule of thumb in terms of its implementation in different countries worldwide. The book contains both fundamental and applied recommendations on the innovative technological development of smart agriculture in modern economic and ecological systems for sustainable development. The book is not limited to a single vector of development of smart agriculture, but is representative of all of them, making it possible to describe the future prospects in the fullest, most reliable and accurate manner, and to comprehensively present the directions for its development. The book has developed and applied an advanced and sophisticated methodology, the advantage of which consists in the reliance on big data with the use of datasets, which allows improving accuracy, reliability, authenticity, and coverage of results.

  • af Chandrasekar Vuppalapati, D. Jude Hemanth & Danilo Pelusi
    2.834,95 kr.

    This book gathers selected papers presented at the 5th International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI 2021), organized by JCT College of Engineering and Technology, Coimbatore, Tamil Nadu, India during 27 - 28 August 2021. This book solicits the innovative research ideas and solutions for almost all the intelligent data intensive theories and application domains. The general scope of this book covers the design, architecture, modeling, software, infrastructure and applications of intelligent communication architectures and systems for big data or data-intensive applications. In particular, this book reports the novel and recent research works on big data, mobile and wireless networks, artificial intelligence, machine learning, social network mining, intelligent computing technologies, image analysis, robotics and autonomous systems, data security and privacy.

  • af Sahir Ahmed
    603,95 kr.

    This project-oriented book gives you a hands-on approach to designing, developing, and templating your Snowflake platform delivery. Written by seasoned Snowflake practitioners, the book is full of practical guidance and advice to accelerate and mature your Snowflake journey. Working through the examples helps you develop the skill, knowledge, and expertise to expand your organization's core Snowflake capability and prepare for later incorporation of additional Snowflake features as they become available. Your Snowflake platform will be resilient, fit for purpose, extensible, and guarantee rapid, consistent, and repeatable, pattern-based deployments ready for application delivery.When a Snowflake account is delivered there are no controls, guard rails, external monitoring, nor governance mechanisms baked in. From a large organization perspective, this book explains how to deliver your core Snowflake platform in the form of a Landing Zone, a consistent, templated approach that assumes familiarity with Snowflake core concepts and principles. The book also covers Snowflake from a governance perspective and addresses the "who can see what?" question, satisfying requirements to know for certain that your Snowflake accounts properly adhere to your organization's data usage policies.The book provides a proven pathway to success by equipping you with skill, knowledge, and expertise to accelerate Snowflake adoption within your organization. The patterns delivered within this book are used for production deployment, and are proven in real-world use. Examples in the book help you succeed in an environment in which governance policies, processes, and procedures oversee and control every aspect of your Snowflake platform development and delivery life cycle. Your environment may not be so exacting, but you'll still benefit from the rigorous and demanding perspective this book's authors bring to the table. The book showsyou how to leverage what you already know and adds what you don't know, all applied to deliver your Snowflake accounts. You will know how to position your organization to deliver consistent Snowflake accounts that are prepared and ready for immediate application development.What You Will LearnCreate a common, consistent deployment framework for Snowflake in your organizationEnable rapid up-skill and adoption of Snowflake, leveraging the benefits of cloud platformsDevelop a deep understanding of Snowflake administration and configurationImplement consistent, approved design patterns that reduce account provisioning timesManage data consumption by monitoring and controlling access to datasets

  • af Prathibhavani P. M.
    368,95 kr.

    It is incredible how the entire world is totally dependent on the data. Data generation as how human speak and it is also true that they consume data through every possible medium. With the frequent and regular updates and upgrades in technology, human beings have witnessed the growth of smart devices unlike any. We have also seen a significant increase in the usage of the Internet of Things (IoT) and for some of us, it has been an integral part of daily life. Hence, it wouldn't be surprised when we realize that the IoT devices we are using are vulnerable to various malicious attacks. These IoT devices are elemental in both design and security. Their intrinsic design frailty is exploited during firmware attacks and their low-level network security is easily penetrated during the cyber-attacks. One such common cyber-attack is Distributed Denial of Services (DDoS) and the proposed work aims to address this against a network of IoT devices.

  • af Michelle Dennis & James Halbert
    1.878,95 - 2.443,95 kr.

  • af Parikshit N. Mahalle, Sheetal S. Sonawane & Archana S. Ghotkar
    1.298,95 kr.

    This book gives a comprehensive view of graph theory in informational retrieval (IR) and natural language processing(NLP). This book provides number of graph techniques for IR and NLP applications with examples. It also provides understanding of graph theory basics, graph algorithms and networks using graph. The book is divided into three parts and contains nine chapters. The first part gives graph theory basics and graph networks, and the second part provides basics of IR with graph-based information retrieval. The third part covers IR and NLP recent and emerging applications with case studies using graph theory. This book is unique in its way as it provides a strong foundation to a beginner in applying mathematical structure graph for IR and NLP applications. All technical details that include tools and technologies used for graph algorithms and implementation in Information Retrieval and Natural Language Processing with its future scope are explained in a clear and organized format.

  • af Lakhmi C. Jain, Robert J. Howlett, John R. Littlewood & mfl.
    1.991,95 kr.

    This book is a collection of extended versions of papers presented at the KES Covid-19 Challenge international summit. The book focusses on technological, economic, and social developments to combat the effects of global and local disasters as well as the ways in which the recovery from Covid can be used to build more resilient and sustainable communities, industry, and improve the environment. It also discusses the global challenges of human-influenced climate change. There are chapters on making cities and communities more resilient through energy self-sufficiency, food production, resilient housing and buildings, human health and intelligent systems e.g. for forecasting and prediction.

  • af Shu-Chuan Chu, Roumen Kountchev, Jie-Fang Zhang & mfl.
    2.423,95 kr.

    The book is a collection of high-quality research papers presented at 7th Euro-China Conference on Intelligent Data Analysis and Applications, hosted by Communication University of Zhejiang, China and technically co-sponsored by Shandong University of Science and Technology, China; Zhejiang Lab, China; and Fujian University of Technology, China. The book covers areas like intelligent data analysis, computational intelligences, signal processing, and all associated applications of artificial intelligence.

  • af K. Srujan Raju, A. Brahmananda Reddy, B. V. Kiranmayee & mfl.
    2.423,95 kr.

    This book includes original, peer-reviewed research articles from International Conference on Advances in Computer Engineering and Communication Systems (ICACECS 2021), held in VNR Vignana Jyoythi Institute of Engineering and Technology (VNR VJIET), Hyderabad, Telangana, India, during 13-14 August 2021. The book focuses on "Smart Innovations in Mezzanine Technologies, Data Analytics, Networks and Communication Systems" enlargements and reviews on the advanced topics in artificial intelligence, machine learning, data mining and big data computing, knowledge engineering, semantic Web, cloud computing, Internet on Things, cybersecurity, communication systems, and distributed computing and smart systems.

  • af Xiao-Zhi Gao, Naresh Babu Muppalaneni, Ch. Satyanarayana & mfl.
    664,95 kr.

    This book highlights recent advance in the area of Machine Learning and IoT, and their applications to solve societal issues/problems or useful for various users in the society. It is known that many smart devices are interconnected and the data generated is being analyzed and processed with machine learning models for prediction, classification, etc., to solve human needs in various sectors like health, road safety, agriculture, and education. This contributed book puts together chapters concerning the use of intelligent techniques in various aspects related to the IoT domain from protocols to applications, to give the reader an up-to-date picture of the state-of-the-art on the connection between computational intelligence, machine learning, and IoT.

  • af Bradley Wilson
    278,95 kr.

    U.S. Marine Corps Systems Command asked the RAND Corporation to assess the Marine Corps offensive cyber operations acquisition life cycle and identify ways to improve the transparency of related decisionmaking. The authors brought together data on operational capability, scheduling, and risk to develop a life-cycle cost-estimating framework. This framework should help Joint Cyber Weapons (JCW) program leadership understand the potential costs and provide additional guidance on budgeting considerations. It incorporates five classes of inputs and has three types of outputs. In creating the framework, the authors considered the demand for exploits from the operational user, as well as the type of cyber weapon (e.g., exploit, implant, payload), the weapon's target environment (e.g., desktop or mobile systems), vulnerability decay rate, the adversary's defense capabilities, weapon cost, and how various acquisitions are phased in and out of service over time. The framework also addresses the production of cyber weapons, their costs, and how uncertainties are distributed over a specified period. The authors conducted exploratory modeling and simulation to better understand associated uncertainties and model inputs.

  • af Ryan Leirvik
    445,95 kr.

    When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner's guide lays down those foundational components, with real client examples and pitfalls to avoid.A plethora of cybersecurity management resources are available-many with sound advice, management approaches, and technical solutions-but few with one common theme that pulls together management and technology, with a focus on executive oversight. Author Ryan Leirvik helps solve these common problems by providing a clear, easy-to-understand, and easy-to-deploy foundational cyber risk management approach applicable to your entire organization.The book provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and helps practitioners pull cyber from a "e;technical"e; problem to a "e;business risk management"e; problem, equipping you with a simple approach to understand, manage, and measure cyber risk for your enterprise. What You Will LearnEducate the executives/board on what you are doing to reduce riskCommunicate the value of cybersecurity programs and investments through insightful risk-informative metricsKnow your key performance indicators (KPIs), key risk indicators (KRIs), and/or objectives and key resultsPrioritize appropriate resources through identifying program-related gapsLay down the foundational components of a program based on real examples, including pitfalls to avoidWho This Book Is ForCISOs, CROs, CIOs, directors of risk management, and anyone struggling to pull together frameworks or basic metrics to quantify uncertainty and address risk

  • af Abhinav Juneja
    1.340,95 kr.

    Discover a collection of meta-heuristic algorithms for distributed systems in different application domains Meta-heuristic techniques are increasingly gaining favor as tools for optimizing distributed systems--generally, to enhance the utility and precision of database searches. Carefully applied, they can increase system effectiveness, streamline operations, and reduce cost. Since many of these techniques are derived from nature, they offer considerable scope for research and development, with the result that this field is growing rapidly. Meta-Heuristic Algorithms for Advanced Distributed Systems offers an overview of these techniques and their applications in various distributed systems. With strategies based on both global and local searching, it covers a wide range of key topics related to meta-heuristic algorithms. Those interested in the latest developments in distributed systems will find this book indispensable. Meta-Heuristic Algorithms for Advanced Distributed Systems readers will also find: Analysis of security issues, distributed system design, stochastic optimization techniques, and more Detailed discussion of meta-heuristic techniques such as the genetic algorithm, particle swam optimization, and many others Applications of optimized distribution systems in healthcare and other key industries Meta-Heuristic Algorithms for Advanced Distributed Systems is ideal for academics and researchers studying distributed systems, their design, and their applications.

  • af Maan Muataz Abdulwahid
    595,95 kr.

    In this book, several challenges face researchers and communication, engineering students. Especially, when handling project for fiber optic network and picking the suitable software to be used. As they are looking for software to meet their needs and requirement to perform analysis for fiber optic communication and design a powerful model that could support the utilization of advanced modulation methods and have a proper analysis of the results. So, this book clarify the software of Optisystem in easy way and gives a lot of information that can help reader to get full knowledge about the software.

  • af Maanak Gupta, Smriti Bhatt, Asma Hassan Alshehri & mfl.
    1.686,95 kr.

  • af Taek-Young Youn
    875,95 kr.

    This book constitutes the revised selected papers from the 23rd International Conference on Information Security Applications, WISA 2022, which took place on Jeju Island, South Korea, during August 2022.The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: network security; cryptography; vulnerability analysis; privacy enhancing technique; security management; security engineering.

  • af Fengjun Li
    1.354,95 kr.

    This book constitutes the refereed proceedings of the 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. The 43 full papers included in this book were carefully reviewed and selected from 130 submissions. They were organized in topical sections as follows: AI for Security, Applied Cryptography, Binary Analysis, Blockchain, Cryptography, Data Security, Intrusion Detection, Mobile Security, Network Security, Privacy, Software Security, Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT).

  • af Manuel Wimmer
    1.148,95 kr.

    Digital Transformation in Industry 4.0/5.0 requires the effective and efficient application of digitalization technologies in the area of production systems. This book elaborates on concepts, techniques, and technologies from computer science in the context of Industry 4.0/5.0 and demonstrates their possible applications. Thus, the book serves as an orientation but also as a reference work for experts in the field of Industry 4.0/5.0 to successfully advance digitization in their companies.

  • af Giuseppe Agapito
    716,95 kr.

    This volume constitutes the papers of several workshops which were held in conjunction with the ICWE 2022 International Workshops, BECS, SWEET and WALS, held in Bari, Italy, July 5¿8, 2022.The 14 revised full papers and 1 short paper presented in this book were carefully reviewed and selected from 25 submissions. ICWE 2022 presents the following three workshops:Second International Workshop on Big Data driven Edge Cloud Services (BECS 2022)First International Workshop on the Semantic WEb of Everything (SWEET 2022)First International Workshop on Web Applications for Life Sciences (WALS 2022)

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.