Vi bøger
Levering: 1 - 2 hverdage
Filter
Filter
Sorter efterSorter Populære
  • af K. Logesh
    649,95 kr.

    Mobile Ad-hoc networks (MANETs) are the collection of two or more nodes can communicate with each other without the help of network infrastructures. Mobile nodes are free from moving any direction. Hence, there may be frequently link break happened. The difficult task in MANET is periodically maintains its routing information. Cross-Layer Design is suitable approach for providing QoS in MANETS, but traditional layered approach is designed for wired networks. It is difficult to provide QoS guarantee in ad-hoc networks with limited bandwidth and dynamic topology. But in Cross-Layer monitor is a logical entity to collect network state information like end-to-end throughput, application layer QoS requirements, latency, node throughput of link layer and remaining bandwidth in real-time applications. The main moto of this book is to learn to increase packet delivery ratio, reduce end-to-end delay in multimedia packet sharing.

  • af Casimir Akoi Appassan
    848,95 kr.

    This work has 107 pages and 5 paragraphs Methods of configuration of cisco equipment,Administrative commands. Configuration of ACLS, methods of network security and Cisco switches. Network administration guides, this manual proposes some types of attacks and methods for security on VPN. The insertion of page breaks is 1.5 It is also a theoretical and practical document with recommendations for solutions.

  • af Said El Hajji
    941,95 kr.

  • af David Hausheer, Samuel Hitz, Markus Legner, mfl.
    1.061,95 - 1.465,95 kr.

  • af Al-Sakib Khan Pathan
    1.723,95 - 1.732,95 kr.

    This book gathers key advances in various areas related to using wireless Internet and wireless connectivity to achieve a more connected world.The world is now highly dependent on Internet connectivity. Even though some parts of the globe remain isolated, the smoothly running world all around us relies on Internet services for countless businesses and activities. During the COVID-19 pandemic, we have seen that exclusively relying on wired Internet would leave out a large part of our tech-savvy world. Hence, wireless connectivity is essential to anywhere, anytime connectivity. Further, in the event of a new pandemic or other disaster of global scale, wireless Internet offers a reliable way to keep us all connected.  The contributors to this book, hailing from academia, industrial and research laboratories, report on the latest solutions, trends and technologies with the potential to make wireless Internet more reliable and secure for the years to come.

  • af Eberhard Von Faber
    376,95 kr.

    Für die IT- oder Cybersecurity von IT-Dienstleistungen (IT-Services) zu sorgen, kann ein komplexes Unterfangen sein. Als Anwender das erreichte Maß an IT-Sicherheit adäquat einzuschätzen nicht minder.Dieses Buch bringt Ordnung in das Dickicht von Prozessen, Aktivitäten und Informationen, indem neue Begriffe eingeführt sowie existierende geschärft und in den Zusammenhang gesetzt werden. Es liefert konkrete Anleitungen und ein Gesamtkonzept für das Management der IT-Service-Sicherheit im Sinne von Organisieren, Orchestrieren und Optimieren. Es zeigt, wie man die vielen Themen gleichzeitig bearbeiten und erfolgreich am internen oder externen Markt bestehen kann. Die Methoden und Konzeptionen sind die Essenz aus mehr als fünfzehn Jahren Forschung und Lehre und aus mehr als zwölf Jahren in zentraler Verantwortlichkeit in einem der großen international tätigen IT-Dienstleister. Die Aufteilung der an sich komplexen Materie in einzelne Begriffe ermöglicht es dem Leser, sich jeweils auf eine Fragestellung zu konzentrieren. Das Buch richtet sich an Anwender (Anwenderorganisationen) und an IT-Dienstleister (IT-Abteilungen und Firmen in der IT-Industrie) und ist hilfreich für Hersteller, die beide Parteien zufriedenstellen müssen.

  • af Srikanta Patnaik
    2.030,95 - 2.040,95 kr.

    "e;Smart City"e; programs and strategies have become one of the most dominant urban agendas for local governments worldwide in the past two decades. The rapid urbanization rate and unprecedented growth of megacities in the 21st century triggered drastic changes in traditional ways of urban policy and planning, leading to an influx of digital technology applications for fast and efficient urban management. With the rising popularity in making our cities "e;smart"e;, several domains of urban management, urban infrastructure, and urban quality-of-life have seen increasing dependence on advanced information and communication technologies (ICTs) that optimize and control the day-to-day functioning of urban systems. Smart Cities, essentially, act as digital networks that obtain large-scale real-time data on urban systems, process them, and make decisions on how to manage them efficiently. The book presents 26 chapters, which are organized around five topics: (1) Conceptual framework for smart cities and communities; (2) Technical concepts and models for smart city and communities; (3) Civic engagement and citizen participation; (4) Case studies from the Global North; and (5) Case studies from the Global South.

  • af Chinmay Chakraborty
    2.032,95 - 2.042,95 kr.

    The book Intelligent Healthcare: Infrastructure, Algorithms, and Management(R) cover a wide range of research topics on innovative intelligent healthcare solutions and advancements with the latest research developments.  Data analytics are relevant for healthcare to meet many technical challenges and issues that need to be addressed to realize this potential. The advanced healthcare systems have to be upgraded with new capabilities such as data analytics, machine learning, intelligent decision making, and more professional services. The Internet of Things helps to design and develop intelligent healthcare solutions assisted by security, data analytics, and machine learning.This book will provide federated learning, Data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart healthcare. This book aims to attract works on multidisciplinary research spanning across computer science and engineering, environmental studies, services, urban planning and development, Healthcare, social sciences, and industrial engineering on technologies, case studies, novel approaches, and visionary ideas related to data-driven innovative learning and computing solutions and big medical data-powered applications to cope with the real-world challenges for building smart healthcare sectors.Main Features:o  Immersive technologies in healthcareo  Internet of medical thingso  Federated learning algorithmso  Explainable AI in Pervasive Healthcareo  New management principles using biomedical datao  Secured healthcare management systemsThis book aims to set up a better understanding of data scientists, researchers, and technologists under innovative digital health. The reader can find out existing research challenges, current market trends, and low-cost technologies to smoothly address the digital health issue.

  • af Russ Mckendrick
    433,95 kr.

    Master Infrastructure as Code (IaC) and streamline your DevOps workflows using Terraform and AnsiblePurchase of the print or Kindle book includes a free eBook in the PDF formatKey Features:Employ effective strategies and approach IaC projects efficiently by diving deep into its fundamentalsUnderstand the working of Terraform and Ansible and integrate them into your CI/CD workflowsWork with real-world examples of IaC across multiple cloud providers (Azure & AWS)Book Description:The Infrastructure as Code (IaC) approach ensures consistent and repeatable deployment of cloud-based IaaS/PaaS services, saving you time while delivering impeccable results. Infrastructure as Code for Beginners is a practical implementation guide that helps you gain a clear understanding of the foundations of Infrastructure as Code and make informed decisions when implementing it.With this book, you'll uncover essential IaC concepts, including planning, selecting, and implementing the right tools for your project. With step-by-step explanations and real-world examples, you'll gain a solid understanding of the benefits of IaC and the scope of application in your projects. You'll learn about the pros, cons, and best practices of different IaC tools such as Terraform and Ansible, and their use at different stages of the deployment process along with GitHub Actions. Using these tools, you'll be able to design, deploy, and secure your infrastructure on two major cloud platforms, Microsoft Azure and Amazon Web Services. In addition, you'll explore other IaC tools such as Pulumi, AWS CloudFormation, and Azure Bicep.By the end of this book, you'll be well equipped to approach your IaC projects confidently.What You Will Learn:Determine the right time to implement Infrastructure as Code for your workloadSelect the appropriate approach for Infrastructure-as-Code deploymentGet hands-on experience with Ansible and Terraform and understand their use casesPlan and deploy a workload to Azure and AWS clouds using Infrastructure as CodeLeverage CI/CD in the cloud to deploy your infrastructure using your codeDiscover troubleshooting tips and tricks to avoid pitfalls during deploymentWho this book is for:This book is for cloud engineers, software developers, or system administrators responsible for deploying resources to host applications. Ideal for both beginners and experienced professionals seeking to deepen their knowledge. Experience in manually deploying resources for applications in public clouds such as AWS or Microsoft Azure is a must. A basic understanding of programming or scripting languages, such as Python, Bash, PowerShell, etc. as well as familiarity with version control systems like Git, is a prerequisite.

  • af Linda Hepsiba C
    370,95 kr.

    Confidentiality is a major concern for cloud computing users who must ensure that their sensitive data is protected from unauthorized access or exposure, while still allowing for efficient sharing and collaboration among authorized parties. To address this challenge, a variety of encryption and access control techniques have been proposed and deployed, with varying levels of success.One promising approach to ensuring confidentiality in cloud computing is through the use of proxy re-encryption(PRE), which allows for the secure delegation of decryption rights from one party to another without compromising the privacy of the underlying data. PRE offers a number of advantages over traditional encryption techniques, including the ability to support fine-grained access control,efficient key management, and secure collaboration in multi-party environments.This book provides a comprehensive overview of PRE and its applications in cloud computing security. It covers the theoretical foundations of PRE, including its mathematical underpinnings and security properties, as well as practical aspects such as key management, performance optimization, and integration with other security mechanisms.

  • af Amit Kumar
    2.413,95 - 3.909,95 kr.

    This book is a collection of research articles presented at the 4th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2021), held on April 9 and 10, 2021, at CMR Engineering College, Hyderabad, India. ICCCE is one of the most prestigious conferences conceptualized in the field of networking and communication technology offering in-depth information on the latest developments in voice, data, image, and multimedia. Discussing the latest developments in voice and data communication engineering, cyber-physical systems, network science, communication software, image, and multimedia processing research and applications, as well as communication technologies and other related technologies, it includes contributions from both academia and industry.  This book is a valuable resource for scientists, research scholars, and PG students working to formulate their research ideas and find the future directions in these areas. Further, it may serve as a reference work to understand the latest engineering and technologies used by practicing engineers in the field of communication engineering.

  • af Elena G. Popkova
    1.859,95 kr.

    This book is devoted to strengthening the theoretical and methodological basis, systematization of international experience, and scientific elaboration of prospects for developing a climate-smart economy and business as a vector of the sustainable development of Industry 4.0 in the Decade of Action.The first part of the book focuses on climate-responsible entrepreneurship in support of the sustainable development of Industry 4.0. The part systematizes best practices for climate-smart green innovations across sectors of the digital economy. The third part reveals the experience of climate risk management based on smart green innovations in regions and countries. Particular attention is paid to the best practices of the European Union (EU) and the Eurasian Economic Union (EAEU). The book ends with part four, which explores ESG climate risk management and green finance in support of combating climate change.The book¿s novelty is that it rethinks the environmental footprints of Industry 4.0 from the perspective of climate risks and their management. The theoretical significance of the book lies in the formation of an innovative concept of climate change risk management, in which the economy, society, nature, and technology are presented and interact effectively. The book is intended for scientists. In this book, they will find an innovative and systemic vision of smart green innovations in Industry 4.0 for climate change risk management.

  • af Markus Stubbig
    358,95 - 365,95 kr.

  • af Noelle Amber-Joe Jensen
    305,95 kr.

    Studienarbeit aus dem Jahr 2022 im Fachbereich Informatik - Künstliche Intelligenz, Note: 1,3, Universität Hamburg, Veranstaltung: Komplexe Methoden qualitativer empirischer Untersuchungen, Sprache: Deutsch, Abstract: In einer Gegenüberstellung des Iconic und Pictorial Turns, die beide einen Paradigmenwechsel in den Bildwissenschaften beschreiben, wird sich dem Verhältnis von Bild und Sprache genähert. Am Beispiel einer Bildanalyse eines Artificial Intelligence-Bildes wird der Widerspruch zwischen Text als Befehl für die Erstellung eines AI-Bildes und den gleichzeitigen Eigensinn von Bildern herausgearbeitet.In der Auseinandersetzung mit dem Iconic und Pictorial Turn wird herausgearbeitet, welche theoretischen Annahmen von Boehm und Mitchell mithilfe der AI bestätigt oder hinterfragt werden können. Für dieses Vorhaben wurde eine Gliederung in insgesamt sieben Teilbereiche gewählt. Das erste inhaltliche Kapitel (2.) führt in die wissenschaftstheoretischen Erläuterungen des Iconic und Pictorial Turns (2.1. & 2.2.) ein. Die Kürze der vorliegenden Arbeit erlaubt keine allumfassende Darlegung der Überlegungen von Boehm und Mitchell. Es wird jedoch in der Kürze umrissen, welche Hauptargumente angebracht werden und zu welchem Schluss die beiden Theoretiker gelangen. Anschließend verschafft das Kapitel drei einen Überblick über die Definition von Artificial Intelligence und über die technischen sowie interaktiven Möglichkeiten, die sich durch DALL-E mini eröffnen. Es wird darauf hingewiesen, dass die Quellen dieses Kapitels aufgrund der Aktualität des Themas nicht wissenschaftlichen Charakters sind. Wie ein AI-generiertes Bild in der Interaktion entsteht und aussieht, wird in Kapitel vier dargestellt. An dieser Stelle wird auch eine kurze Bildbeschreibung vorgenommen, um der Eigenart eines AI-Bildes näher zu kommen.

  • af Achim Orlikowski
    658,95 kr.

    "Mein MySQL Buch" mit Grundlagen, Fortgeschrittene Techniken und Best Practices ist das ultimative Handbuch für jeden, der seine Kenntnisse im Bereich Datenbankmanagement erweitern möchte. "Mein MySQL Buch" bietet eine umfassende Einführung in mySQL sowie zahlreiche fortgeschrittene Techniken und Best Practices, die von Einsteigern, Auszubildenden, Fortgeschrittenen und Experten gleichermaßen genutzt werden können."Mein MySQL Buch" ist in einer Schritt-für-Schritt-Struktur aufgebaut und bietet detaillierte Anleitungen, zahlreiche kommentierte Beispiele, Übungen, Multple Choise Aufgaben nach jedem Kapitel, Fallbeispiele, sowie ein umfangreiches Stichwortregister mit Erklärungen, um das Verständnis des Lesers zu verbessern. Jedes Kapitel baut auf den vorherigen Kapiteln auf, um eine nahtlose Lernumgebung zu schaffen.

  • af Cdts Llc
    748,95 kr.

    This is the fourth edition of a generalized hardware exercise and study manual for servers and data centers. It is designed to accompany a lecture based component that consists of twenty-eight modules covering material based on principles of a basic understanding of computer hardware and operating system interactions. This manual is designed to be used in a variety of teaching environments and has utilized generic server equipment for adaption to various academic programs.

  • af Pavan Kumar Singhal
    370,95 kr.

    The Enhanced Intrusion Detection System utilizing a Hybrid Machine Learning Approach is a security system that leverages a combination of machine learning algorithms to detect and prevent unauthorized access to computer networks. The system analyzes network traffic patterns and monitors user behavior to identify potential threats. By using a hybrid machine learning approach, the system is designed to improve its ability to detect and prevent cyber attacks, ultimately enhancing network security.

  • af Smaranika Roy
    328,95 kr.

    Cel' ätoj knigi - predostawit' chitatelqm wsestoronnee ponimanie informacionnoj bezopasnosti, ohwatywaq razlichnye aspekty, nachinaq s bazowyh koncepcij i zakanchiwaq peredowymi strategiqmi. Kniga rasschitana na shirokuü auditoriü, wklüchaq studentow, professionalow i wseh, kto zainteresowan w izuchenii informacionnoj bezopasnosti. Kniga sostoit iz neskol'kih razdelow, kazhdyj iz kotoryh poswqschen razlichnym aspektam informacionnoj bezopasnosti, takim kak wwedenie w informacionnuü bezopasnost', uprawlenie riskami, podhody k obespecheniü bezopasnosti, kiberzakonodatel'stwo, kiberprestupnost', prawa intellektual'noj sobstwennosti, setewaq bezopasnost', cifrowye i älektronnye podpisi, prawonarusheniq i nakazaniq. V kazhdom razdele rassmatriwaütsq klüchewye koncepcii, nowye tendencii, peredowoj opyt i real'nye primery, chto pomogaet chitatelqm gluboko uswoit' predmet.

  • af Gunavathi Ramasamy
    563,95 kr.

    Ad hoc network is a set up anywhere without any need for external infrastructure such as wires of base station. However, there is an increasing need for connectivity in situations where there is no base station available there emerges ad hoc networks. They are often mobile and termed as MANET and it is an autonomous system of mobile nodes connected by wireless links. Each node operates as an end system and a router for all other nodes in the network. A good number work of work has been devoted over the past few years in designing scalable routing protocols for MANETs.

  • af Giampaolo Bella
    885,95 kr.

    This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8¿9, 2022.The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.

  • af Nilanjan Dey, Xin-She Yang, Amit Joshi & mfl.
    2.798,95 kr.

    This book gathers selected high-quality research papers presented at the Eighth International Congress on Information and Communication Technology, held at Brunel University, London, on 20-23 February 2023. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of Things (IoT) and e-mining. Written by respected experts and researchers working on ICT, the book offers a valuable asset for young researchers involved in advanced studies. The work is presented in four volumes.

  • af Dieter Gollmann, S. Ponnusamy, Debasis Giri, mfl.
    2.520,95 kr.

    This book features selected papers from the 9th International Conference on Mathematics and Computing (ICMC 2023), organized at BITS Pilani K. K. Birla Goa Campus, India, during 6¿8 January 2023. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry in mathematics, statistics, cryptography, network security, cybersecurity, machine learning, data analytics, and blockchain technology in computer science and information technology.

  • af K. G. Srinivasa
    2.016,95 - 2.029,95 kr.

    The book discusses Society 5.0 which fills the gap between cyber and physical space by providing a balanced environment between economic and social needs. The book is divided into two parts; part A focuses on various concepts related to Society 5.0 such as cyber space, physical space, information management and digital transformation. Part B discusses various integrated fields in Society 5.0, such as super-smart healthcare system, super-smart hospitality system, smart building, and transport management system. It also illustrates the concepts of big data, real-time analytics for smart Society 5.0 with an insight of real-time case studies.

  • af Sandeep Saxena
    2.014,95 - 2.024,95 kr.

    This book covers major areas of device and data security and privacy related to the Internet of Things (IoT). It also provides an overview of light-weight protocols and cryptographic mechanisms to achieve security and privacy in IoT applications. Besides, the book also discusses intrusion detection and firewall mechanisms for IoT. The book also covers topics related to embedded security mechanisms and presents suitable malware detection techniques for IoT. The book also contains a unique presentation on heterogeneous device and data management in IoT applications and showcases the major communication-level attacks and defense mechanisms related to IoT.

  • af Satya Ranjan Dash
    2.018,95 - 2.028,95 kr.

    This book discusses automated computing systems which are mostly powered by intelligent technologies like artificial intelligence, machine learning, image recognition, speech processing, cloud computing, etc., to perform complex automated tasks which are not possible by traditional computing systems. The chapters are extended version of research works presented at first Ph.D. Research Symposium in various advanced technologies used in the field of computer science. This book provides an opportunity for the researchers to get ideas regarding the ongoing works that help them in formulating problems of their interest. The academicians can also be benefited to know about the current research trends that smooth the way to guide their students to carry out research work in the proper direction. The industry people will be also facilitated to know about the current advances in research work and materialize the research work into industrial applications.

  • af Suresh Chandra Satapathy
    3.093,95 - 3.113,95 kr.

    The proceeding presents best selected papers presented at 5th International Conference on Smart Computing and Informatics (SCI 2020), held at Department of Computer Science and Engineering, Vasavi College of Engineering, Hyderabad, Telangana, India, during 17 - 18 September 2021. It presents advanced and multi-disciplinary research towards the design of smart computing and informatics. The theme is on a broader front focuses on various innovation paradigms in system knowledge, intelligence and sustainability that may be applied to provide realistic solutions to varied problems in society, environment and industries. The scope is also extended towards the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in various disciplines of science, technology and healthcare. The work is published in two volumes.

  • af Prasant Kumar Pattnaik
    2.778,95 - 3.011,95 kr.

    This book presents high-quality research papers presented at the Second International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2021) held during June 16-17, 2021, in the Department of Smart Computing, Kyungdong University, Global Campus, South Korea. The book includes selected works from academics and industrial experts in the field of computer science, information technology, and electronics and telecommunication. The content addresses challenges of cyber security.

  • af Reji Kumar Pillai
    1.736,95 - 2.539,95 kr.

    This book presents selected articles from INDIA SMART UTILTY WEEK (ISUW 2021), which is the seventh edition of the Conference cum Exhibition on Smart Grids and Smart Cities, organized by India Smart Grid Forum from 02-05 March 2021, in New Delhi, India. ISGF is a public private partnership initiative of the Ministry of Power, Govt. of India with the mandate of accelerating smart grid deployments across the country. This book gives current scenario updates of Indian power sector business. It also highlights various disruptive technologies for power sector business.

  • af Rebecca Blair
    543,95 kr.

    Align your SOC with the ATT&CK framework and follow practical examples for successful implementationPurchase of the print or Kindle book includes a free PDF eBookKey Features:Understand Cloud, Windows, and Network ATT&CK Framework using different techniquesAssess the attack potential and implement frameworks aligned with Mitre ATT&CKAddress security gaps to detect and respond to all security threatsBook Description:The Mitre ATT&CK framework is an extraordinary resource for all SOC environments, however, determining the appropriate implementation techniques for different use cases can be a daunting task. This book will help you gain an understanding of the current state of your SOC, identify areas for improvement, and then fill the security gaps with appropriate parts of the ATT&CK framework. You'll learn new techniques to tackle modern security threats and gain tools and knowledge to advance in your career.In this book, you'll first learn to identify the strengths and weaknesses of your SOC environment, and how ATT&CK can help you improve it. Next, you'll explore how to implement the framework and use it to fill any security gaps you've identified, expediting the process without the need for any external or extra resources. Finally, you'll get a glimpse into the world of active SOC managers and practitioners using the ATT&CK framework, unlocking their expertise, cautionary tales, best practices, and ways to continuously improve.By the end of this book, you'll be ready to assess your SOC environment, implement the ATT&CK framework, and advance in your security career.What You Will Learn:Get a deeper understanding of the Mitre ATT&CK FrameworkAvoid common implementation mistakes and provide maximum valueCreate efficient detections to align with the frameworkImplement continuous improvements on detections and review ATT&CK mappingDiscover how to optimize SOC environments with automationReview different threat models and their use casesWho this book is for:This book is for SOC managers, security analysts, CISOs, security engineers, or security consultants looking to improve their organization's security posture. Basic knowledge of Mitre ATT&CK, as well as a deep understanding of triage and detections is a must.

  • af Lekha J.
    370,95 kr.

    This book presents Double Guard, an IDS system that models the network behavior of user sessions across both the front-end web server and the back-end database. By monitoring both web and subsequent database requests, it is possible to ferret out attacks that independent IDS would not be able to identify. Furthermore, it is possible to quantify the limitations of any multi-tier IDS in terms of training sessions and functionality coverage. This work implemented Double Guard using an Apache web server with MySQL and lightweight virtualization.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.