Udsalget slutter om
Udvidet returret til d. 31. januar 2025
Filter
Filter
Sorter efterSorter Populære
  • af Byron DeVries & Paul C. (Grand Valley State University Jorgensen
    561,95 - 1.056,95 kr.

  • af Lin Zhang
    1.134,95 kr.

    This book constitutes the refereed proceedings of the 5th China Conference on Intelligent Networked Things, CINT 2022, held in Urumqi, China, during August 7-8, 2022. The 45 full papers included in this book were carefully reviewed and selected from 130 submissions. They were organized in topical sections as follows: Access, Perception, and Prediction in Intelligent Networked Things, Control of Intelligent Networked Things and Modeling, Simulation and Optimization of Intelligent Networked Things.

  • af Rupa Mahanti
    670,95 kr.

  • af Hamid Jahankhani, Reza Montasari & Haider Al-Khateeb
    1.795,95 kr.

  • af Jyotir Moy Chatterjee, Sachi Nandan Mohanty & Suneeta Satpathy
    1.137,95 kr.

  • af Hamid Jahankhani & Reza Montasari
    1.989,95 kr.

  • af Julian Ashbourn
    490,95 - 1.304,95 kr.

  • af Tobias Endress
    1.405,95 kr.

    New Work and Industry 4.0 have come to maturity and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers practical aspects. It critically examines existing approaches and practices and shows their limitations. The book also covers human and social

  •  
    569,95 kr.

    New Work and Industry 4.0 have matured and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers the practical aspects. It critically examines existing approaches and practices and shows their limitations. The book covers appropriate methods as well as human and social aspects. It contributes to the ongoing discussion of business practices and methods. It also aims to stimulate dialogue in the professional community.Digital Project Practice for New Work and Industry 4.0 begins by introducing basic concepts in the context of Industry 4.0 and discussing how they might influence organizational communication and impact the work environment. After examining the possibilities and challenges of remote work and collaboration in distributed teams all over the world, the book looks at a company's fundamental changes related to New Work from a practical business perspective as well as legal and ethical perspectives. It reviews the case of the VW emission scandal and recommends ways to improve corporate culture. Legal issues include New Work and hybrid forms of collaboration as well as liability for automated decisions (i.e., the potential need for an 'electronic person'). Other implications for the workplace include how:Industry 4.0 might influence the potential demand for "Digital Unions"Industry 4.0, and lean production, and their applications can change industrial practicesOpen Banking presents new approaches and new business modelsWork structures and systems can empower employees' work self-managementThis book also looks at how New Work effects individual workers. It addresses digital stress, introduces strategies for coping with it, and discusses related topics. It also explores the benefits of meditation and the economics of mind, body, and spirit.In essence, this book covers appropriate methods along with human and social factors. It also covers practice, different perspectives, and various experiences from all around the globe. Contributing to the ongoing discussion on business practices and methods, this book will nourish and stimulate dialogue in the professional community.

  • af Susmita Bandyopadhyay
    1.817,95 kr.

    This book presents different tools and techniques used for Decision Support Systems (DSS), including decision tree and table, and their modifications, multi-criteria decision analysis techniques, network tools of decision support, and various case-based reasoning methods supported by examples and case studies. Latest developments for each of the techniques have been discussed separately, and possible future research areas are duly identified as intelligent and spatial DSS.Features:Discusses all the major tools and techniques for Decision Support System supported by examples.Explains techniques considering their deterministic and stochastic aspects.Covers network tools including GERT and Q-GERT.Explains the application of both probability and fuzzy orientation in the pertinent techniques.Includes a number of relevant case studies along with a dedicated chapter on software.This book is aimed at researchers and graduate students in information systems, data analytics, operation research, including management and computer science areas.

  • af Ayman El-Baz
    1.800,95 kr.

    Today's healthcare organizations must focus on a lot more than just the health of their clients. The infrastructure it takes to support clinical-care delivery continues to expand, with information technology being one of the most significant contributors to that growth. As companies have become more dependent on technology for their clinical, administrative, and financial functions, their IT departments and expenditures have had to scale quickly to keep up. However, as technology demands have increased, so have the options for reliable infrastructure for IT applications and data storage. The one that has taken center stage over the past few years is cloud computing. Healthcare researchers are moving their efforts to the cloud because they need adequate resources to process, store, exchange, and use large quantities of medical data.Cloud Computing in Medical Imaging covers the state-of-the-art techniques for cloud computing in medical imaging, healthcare technologies, and services. The book focuses onMachine-learning algorithms for health data securityFog computing in IoT-based health careMedical imaging and healthcare applications using fog IoT networksDiagnostic imaging and associated servicesImage steganography for medical informaticsThis book aims to help advance scientific research within the broad field of cloud computing in medical imaging, healthcare technologies, and services. It focuses on major trends and challenges in this area and presents work aimed to identify new techniques and their use in biomedical analysis.

  • af Vahid Hajipour, Sajjad Jalali, Mohammad Amini & mfl.
    576,95 - 1.411,95 kr.

  • af Sabhyata Soni
    1.308,95 kr.

    5G technology is the next step in the evolution of wireless communication. However, it also introduces new cyber risks. 5G networks are expected to be much more complex, making them harder to secure. Fortunately, artificial intelligence can play a key role in mitigating these risks.

  • af Vincenzo Piuri, Dimitris Gritzalis & Chunhua Su
    1.045,95 kr.

  • af Yassine Maleh
    513,95 kr.

    This SpringerBrief  contains eight chapters and presents an overview of the evolution of the Moroccan Cybersecurity Strategy. It also draws attention to the development of cybersecurity in Morocco and to ensure national security in the context of the current and developing information confrontation in the international community. However, it cannot promise to provide an in-depth examination. The issue of cybersecurity is simply too wide-ranging for our purposes. This acknowledgment is meant to encourage more detailed research into the broader topics covered in this brief to better inform current approaches to national cybersecurity performance evaluation.This SpringerBrief targets researchers interested in exploring and understanding Morocco and its efforts in implementing its national cybersecurity strategy. This brief is also a relevant reference for diplomats, executives, CISOs, cybersecurity professionals and engineers working in this related field.

  • af Natalia Kryvinska, Alexandr Alexandrovich Kuznetsov, Oleksandr Volodymyrovych Potii, mfl.
    2.014,95 kr.

  • af Jithin Jude Paul
    548,95 kr.

    Explore the serverless world using Amazon Web Services (AWS) and develop various architectures, including those for event-driven and disaster recovery designs. This book will give you an understanding of different distributed serverless architectures and how to build them using AWS components. You will begin with an introduction to serverless components and architectures, before progressing to data platforms and containers. Next, you'll dig deeper into these serverless architectures and how they leverage AWS components through practical use cases. You will also explore designing systems in a multi-cloud paradigm. Author Jithin Jude Paul then demonstrates how efficient serverless architectures are, and the benefits of designing distributed systems globally in a cost-effective way while incorporating a microservices architectural style. Distributed Serverless Architectures with AWS concludes with a discussion of current and future trends in serverless frameworks. After completing this book, you'll be able to design distributed serverless architectures using AWS.What You'll LearnGain an overview of different serverless architectures Design and build distributed systems using serverless componentsBuild serverless data and container platforms on AWSPlan a multi-cloud strategy using serverless componentsWho This Book Is ForCloud engineers, DevOps engineers, and architects focused on the AWS ecosystem, as well as software engineers/developers working with AWS.

  • af Alexander Pöppl
    563,95 kr.

    Invasive computing is a paradigm for designing and programmingfuture parallel computing systems. For systems with 1,000 or more cores on a chip, resource-aware programming is of utmost importance to obtain high utilisation as well as computational, energy and power efficiency. Invasive computing provides a programmer explicit handles to specify and argue about resource requirements desired or required in different phases of execution: In an invade phase, an application asks the operating system to allocate a set of processor, memory and communication resources to be claimed. In a subsequent infect phase, the parallel workload is spread and executed on the obtained claim of resources. Finally, if the degree of parallelism should be lower again, a retreat operation frees the claim again, and the application resumes a sequential execution. To support this idea of self-adaptive and resource-aware programming, not only new programming concepts, languages, compilers, and operating systems were needed to be developed, but also revolutionary architectural changes in the design of MPSoCs (multiprocessor systems-on-a-chip) to efficiently support invasion, infection, and retreat operations. This book gives a comprehensive overview of all aspects of invasive computing.

  • af Alan Calder
    868,95 kr.

    In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation.This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts:Part 1: Introduction. The world of cyber security and the approach taken in this book.Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences.Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each.Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them.Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available.Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book.Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success.Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!

  • af Christian Reuter
    1.011,95 kr.

  • af Alastair R. Beresford
    878,95 kr.

    This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates.The 18 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 54 submissions. They were organized in topical sections as follows: zero-knowledge and MPC; public-key infrastructure; attacks and countermeasures; cryptanalysis and provable security; cryptographic protocols; blockchain and payment systems; and codes and post-quantum cryptography.

  • af Mamoun Alazab
    1.493,95 kr.

    In this edited book, the authors present the challenges, technologies, applications and future trends of the artificial intelligence-enabled internet of things (AIoT) in realizing smart and intelligent environments.

  • af Craig Zacker
    295,95 kr.

    Directfrom Microsoft, this Exam Ref is the official study guide for the new MicrosoftDP-300 Administering Microsoft Azure SQL Solutions certification exam.ExamRef DP-300 Administering Microsoft Azure SQL Solutions offers professional-levelpreparation to maximize your exam performance and sharpen your skills on thejob. It focuses on helping modern IT professionals demonstrate real-worldmastery of implementing and managing cloud-native and hybrid data platformsolutions with Microsoft SQL Server and Microsoft Azure Data Services. Learnhow to:Planand implement data platform resourcesImplementa secure environmentMonitor,configure, and optimize database resourcesConfigureand manage automation of tasksPlanand configure a high availability and disaster recovery (HA/DR) environment MicrosoftExam Ref publications stand apart from third-party study guides because they:Provideguidance from Microsoft, the creator of Microsoft certification examsTargetIT professional-level exam candidates with content focused on their needs, notone-size-fits-all contentStreamlinestudy by organizing material according to the exam's objective domain (OD),covering one functional group and its objectives in each chapterOfferconcise overviews of every skill covered by the examFeatureThought Experiments and Thought Experiment Answers to guide candidatesthrough a set of what if? scenarios, and prepare them more effectively forPro-level style exam questionsIncludeNeed more review? aids pointing you to more study materials if you need themExplorebig picture thinking around the planning and design aspects of the IT pro's jobroleDeliverexam tips, summaries, and inline questions and answers to help you identify keypointsIncludeNeed more review? reader aids pointing to more study materials when readersneed themFormore information on Exam DP-300 and the Microsoft Certified: Azure DatabaseAdministrator Associate credential, visit https://learn.microsoft.com/en-us/certifications/azure-database-administrator-associate/.

  • af Peter Kestner
    243,95 kr.

    Die Kunst des Cyberkrieges greift die strategischen und taktischen Vorgehensweisen für Angriff und Verteidigung im digitalen Zeitalter auf. Dazu bedient sich der Autor historischer Konflikte (von Sun Tsu bis Carl von Clausewitz) und deren Ausgängen, um aufzuzeigen, dass es ungeachtet der veränderten Bedingungen wie Zeit, Ort, Mittel und Ressourcen ¿ nicht aber der physikalischen Gesetze ¿ möglich ist, von früheren Aktionen und deren Reaktionen zu lernen.Der Autor möchte mit diesem Buch zeigen, dass wir in Wirklichkeit nur alte Methoden in unser jetziges Zeitalter transferiert, aber dabei vergessen haben, deren Gründe und Auswirkungen und natürlich die daraus resultierenden Lehren mit zu übersetzen. Denn wie schon vor tausenden von Jahren sind und bleiben die Gründe für menschengeschaffene Konflikte immer dieselben: Reichtum, Ruhm, Macht, Ehre oder Lust. Kann man aus der Geschichte etwas für heutige und zukünftige (Cyber-)Kriege lernen?

  • af Fuchun Guo
    723,95 kr.

  • af Vicenc Torra
    483,95 kr.

    Data privacy technologies are essential for implementing information systems with privacy by design.Privacy technologies clearly are needed for ensuring that data does not lead to disclosure, but also that statistics or even data-driven machine learning models do not lead to disclosure.  For example, can a deep-learning model be attacked to discover that sensitive data has been used for its training?  This accessible textbook presents privacy models, computational definitions of privacy, and methods to implement them. Additionally, the book explains and gives plentiful examples of how to implement-among other models-differential privacy, k-anonymity, and secure multiparty computation.Topics and features:Provides integrated presentation of data privacy (including tools from statistical disclosure control, privacy-preserving data mining, and privacy for communications)Discusses privacy requirements and tools for different types of scenarios, including privacy for data, for computations, and for usersOffers characterization of privacy models, comparing their differences, advantages, and disadvantagesDescribes some of the most relevant algorithms to implement privacy modelsIncludes examples of data protection mechanismsThis unique textbook/guide contains numerous examples and succinctly and comprehensively gathers the relevant information. As such, it will be eminently suitable for undergraduate and graduate students interested in data privacy, as well as professionals wanting a concise overview.Vicenc Torra is Professor with the Department of Computing Science at Umea University, Umea, Sweden.

  • af Christopher Paul
    218,95 kr.

    A detailed enumeration of activities, a synthesis of expert consensus on challenges to gray zone competition, and a dynamic menu of solutions can enhance the U.S. competitive position in the gray zone and beyond.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.