Udvidet returret til d. 31. januar 2025
Filter
Filter
Sorter efterSorter Populære
  • af Jun Du
    2.206,95 - 2.268,95 kr.

    To provide ubiquitous and various services, 6G networks tend to be more comprehensive and multidimensional by integrating current terrestrial networks with space-/air-based information networks and marine information networks; then, heterogeneous network resources, as well as different types of users and data, will be also integrated. Driven by the exponentially growing demands of multimedia data traffic and computation-heavy applications, 6G heterogenous networks are expected to achieve a high QoS with ultra-reliability and low latency. In response, resource allocation has been considered an important factor that can improve 6G performance directly by configuring heterogeneous communication, computing and caching resources effectively and efficiently. The book addresses a range of technical issues in cooperative resource allocation and information sharing for the future 6G heterogenous networks, from the terrestrial ultra-dense networks and space-based networks to the integrated satellite-terrestrial networks, as well as introducing the effects of cooperative behavior among mobile users on increasing capacity, trustworthiness and privacy. For the cooperative transmission in heterogeneous networks, the authors commence with the traffic offloading problems in terrestrial ultra-dense networks, and the cognitive and cooperative mechanisms in heterogeneous space-based networks, the stability analysis of which is also provided. Moreover, for the cooperative transmission in integrated satellite-terrestrial networks, the authors present a pair of dynamic and adaptive resource allocation strategies for traffic offloading, cooperative beamforming and traffic prediction based cooperative transmission. Later, the authors discuss the cooperative computation and caching resource allocation in heterogeneous networks, with the highlight of providing our current studies on the game theory, auction theory and deep reinforcement learning based approaches. Meanwhile, the authors introduce the cooperative resource and information sharing among users, in which capacity oriented-, trustworthiness oriented-, and privacy oriented cooperative mechanisms are investigated. Finally, the conclusion is drawn.

  • af Wan Hasbullah Mohd Isa
    2.413,95 kr.

    This book presents parts of the iM3F 2023 proceedings from the mechatronics as well as the intelligent manufacturing tracks. It highlights recent trends and key challenges in mechatronics as well as the advent of intelligent manufacturing engineering and technology that are non-trivial in embracing Industry 4.0 as well as addressing the UN Sustainable Development Goals. The book deliberates on conventional as well as advanced solutions that are utilized in the variety of mechatronics and intelligent manufacturing-based applications. The readers are envisaged to gain an insightful view on the current trends, issues, mitigating factors as well as solutions from this book. It provides a platform that allows academics as well as other relevant stakeholders to share, discuss, and deliberate their latest research findings in the field of manufacturing, mechatronics, and materials, respectively.

  • af Alex Callejas
    643,95 kr.

    Configure your Fedora Linux environment as a professional system administration workstation with this comprehensive guideKey FeaturesLeverage best practices and post-installation techniques to optimize your Fedora Linux workstationLearn how to optimize operating system tuning to enhance system administrationExplore Fedora Linux's virtualization resources using QEMU, KVM, and libvirt technologiesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionFedora Linux is a free and open-source platform designed for hardware, clouds, and containers that enables software developers and community members to create custom solutions for their customers. This book is a comprehensive guide focusing on workstation configuration for the modern system administrator.The book begins by introducing you to the philosophy underlying the open-source movement, along with the unique attributes of the Fedora Project that set it apart from other Linux distributions. The chapters outline best practices and strategies for essential system administration tasks, including operating system installation, first-boot configuration, storage, and network setup. As you make progress, you'll get to grips with the selection and usage of top applications and tools in the tech environment. The concluding chapters help you get a clear understanding of the basics of version control systems, enhanced Linux security, automation, virtualization, and containers, which are integral to modern system administration.By the end of this book, you'll have gained the knowledge needed to optimize day-to-day tasks related to Linux-based system administration.What you will learnDiscover how to configure a Linux environment from scratchReview the basics of Linux resources and componentsFamiliarize yourself with enhancements and updates made to common Linux desktop toolsOptimize the resources of the Linux operating systemFind out how to bolster security with the SELinux moduleImprove system administration using the tools provided by FedoraGet up and running with open container creation using PodmanWho this book is forThis book is for individuals who want to use Fedora Linux as a workstation for daily system administration tasks and learn how to optimize the distribution's tools for these functions. Although you should have a basic understanding of Linux and system administration, extensive knowledge of it is not necessary.Table of ContentsLinux and Open Source ProjectsBest practices for installationTuning the desktop environmentOptimizing storage usageNetwork and connectivityText editorsLibreOffice SuiteMail clients and browsersSandboxed applicationsSystem AdministrationPerformance tuning best practicesSELinuxVirtualization and containers

  • af Rob Botwright
    433,95 kr.

    Unlock the Power of Blue Team Defense!¿¿¿¿ Introducing "Blue Team Operations: Defense" - Your Comprehensive Cybersecurity SolutionAre you ready to take on the challenges of the ever-evolving digital threat landscape? Equip yourself with the knowledge and skills needed to excel in the realm of cybersecurity defense with our exclusive book bundle, "Blue Team Operations: Defense." This comprehensive collection of four essential volumes covers operational security, incident response, digital forensics, and advanced threat defense, offering you a holistic approach to safeguarding your organization's digital assets.¿¿¿¿ Book 1 - Blue Team Essentials: A Beginner's Guide to Operational SecurityStart your journey with "Blue Team Essentials," designed for both newcomers and those seeking a refresher on operational security. Explore fundamental concepts of threat assessment, risk management, and secure communication practices. Whether you're a novice or a seasoned professional, this beginner's guide sets the stage for a deep dive into the world of blue team defense.¿¿¿¿ Book 2 - Mastering Incident Response: Strategies for Blue Teams"Mastering Incident Response" takes you to the heart of incident handling, empowering you to develop robust response plans, detect threats rapidly, and orchestrate effective strategies. Real-world scenarios and expert guidance ensure you have the skills needed to handle security incidents swiftly and decisively.¿¿¿¿ Book 3 - Digital Forensics for Blue Teams: Advanced Techniques and InvestigationsUncover the art of digital forensics with "Digital Forensics for Blue Teams." Dive into advanced methods for collecting and analyzing digital evidence, equipping you to conduct thorough investigations that uncover the truth behind security incidents. Whether you're dealing with cybercrime or insider threats, these advanced techniques will set you apart.¿¿¿¿ Book 4 - Expert Blue Team Operations: Defending Against Advanced ThreatsIn our final volume, "Expert Blue Team Operations," we tackle advanced adversaries, covering threat hunting, threat intelligence, and tactics for defending against the most sophisticated attacks. Insights from seasoned professionals prepare you to defend your organization against the ever-evolving threat landscape.¿¿¿¿ Your Blueprint for Cybersecurity Excellence Awaits!Get ready to defend your organization against cyber threats with confidence. "Blue Team Operations: Defense" is your comprehensive toolkit for operational security, incident response, digital forensics, and advanced threat defense. Whether you're an aspiring cybersecurity professional or a seasoned defender, this bundle will empower you to protect and secure your digital assets effectively.¿¿¿¿¿ Don't Wait! Take Your Cybersecurity Defense to the Next Level Today!Click the link below to get your hands on "Blue Team Operations: Defense" and embark on a journey to becoming a cybersecurity guardian of tomorrow. Don't let cyber threats catch you off guard - fortify your defenses and secure your digital future now!

  • - Exploitation and Countermeasures for Modern Web Applications
    af Andrew Hoffman
    523,95 kr.

    While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lackinguntil now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply.Andrew Hoffman, a senior security engineer at Salesforce, introduces three pillars of web application security: recon, offense, and defense. Youll learn methods for effectively researching and analyzing modern web applicationsincluding those you dont have direct access to. Youll also learn how to break into web applications using the latest hacking techniques. Finally, youll learn how to develop mitigations for use in your own web applications to protect against hackers.Explore common vulnerabilities plaguing today's web applicationsLearn essential hacking techniques attackers use to exploit applicationsMap and document web applications for which you dont have direct accessDevelop and deploy customized exploits that can bypass common defensesDevelop and deploy mitigations to protect your applications against hackersIntegrate secure coding best practices into your development lifecycleGet practical tips to help you improve the overall security of your web applications

  • af Qingqing Wu
    1.210,95 kr.

    This book provides comprehensive insights into the theory, models, and unique characteristics of intelligent reflecting surface (IRS) and its appealing applications in wireless information and power transmission for B5G/6G. It is organized as follows:Chapter 1 gives an overview of the fundamentals of IRS, including the signal and channel models of IRS, its hardware architecture, advantages and practical constraints. Chapter 2, 3 and 4 focus on how to optimize the joint design of active and passive beamforming for three types of IRS-aided wireless information/energy transmission systems, namely IRS-aided power transfer (WPT), IRS-aided simultaneous wireless information and power transfer (SWIPT) and IRS-aided wireless powered communication networks (WPCN).Chapter 2 specifically presents a general framework design for IRS-aided WPT systems from the perspectives of energy beamforming design and channel estimation, while the dynamic IRS beamforming design is also discussed.Chapter 3 thoroughly studies the IRS-aided SWIPT for achieving better R-E trade-off, wherein two different designs based on weighted sum-power maximization at energy users (EUs) and under individual quality-of-service (QoS), requirements at both information users (IUs) and EUs are investigated. Chapter 4 presents three paradigms of IRS-aided WPCN, i.e., IRS-aided half-duplex (HD) WPCN, IRS-aided full-duplex (FD) WCPN and IRS-aided multiple-input-multiple-output (MIMO) FD WPCN. The authors present some related emerging topics, e.g., active IRS aided wireless communications and IRS-aided unmanned aerial vehicle (UAV) communications in chapter 5.This book targets postgraduate students studying electrical engineering and computer science, and can be used as a secondary textbook. Professionals, researchers and engineers working in wireless networks will also find this book useful as a reference.

  • af Ricardo Madeira
    665,95 - 666,95 kr.

    This book provides a step-by-step methodology and system design that can be used to design a fully integrated PMU using SC DC-DC converters, for any CMOS technology. The authors discuss trade-offs between power density and efficiency of the methodology for the 130 nm CMOS technology, and how to implement it on other CMOS technologies. The book describes the state-of-the-art of fully or near-fully integrated SC DC-DC converters with multiple conversion ratios and the techniques used to enhance the overall performance of these converters. Coverage includes the trade-off between the number of conversion ratios and overall extracted efficiency from a supercapacitor, as well as the sizing of the converter cells according to the desired output power and maximum clock frequency. The authors also describe in detail the design of the fundamental blocks for the converter operation, which includes a secondary control loop using capacitance modulation by sensing the clock frequency.

  • af Bin Duo
    515,95 kr.

    This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view.The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design, cooperative jamming and reconfigurable intelligent surfaces are covered. The corresponding algorithms for significantly improving the security of UAV networks, along with practical case studies on topics such as energy-efficient and secure UAV networks, elevation angle-distance trade-off for securing UAV networks and securing UAV networks with the aid of reconfigurable intelligent surfaces are presented as well. Last, this book outlines the future challenges and research directions to facilitate further studies on secure UAV networks. This book is suitable reading for graduate students and researchers who are interested in the research areas of UAV networking and communications, IoT security, and physical layer security in wireless networks. Professionals working within these related fields will also benefit from this book.

  • af Pascal Hirmer
    1.974,95 - 1.984,95 kr.

    This book gives an overview of existing models that cover the whole lifecycle of an IoT application, ranging from its design, implementation, deployment, operation, and monitoring to its final termination and retirement. Models provide abstraction and can help IoT application developers into creating more robust, secure, and reliable applications. Furthermore, adaptation of applications can be eased by using these models, leading to an increased dynamic of the developed IoT applications.In the book, research of the last years in the area of model based approaches to the Internet of Things is described and these approaches are incorporated into the lifecycle of IoT applications.Finally, use cases from different domains are introduced that show how these models could be applied in real-world applications.

  • af Chua-Chin Wang
    2.413,95 - 2.423,95 kr.

    This book presents the proceedings of the 5th International Conference on Signal Processing and Information Communications (ICSPIC)), which was held in Paris, France on March 14-16, 2022. The conference solicits papers on all aspects of signal processing and information communications, which includes mixed signal processing, multimedia signal processing, nonlinear signal processing, communication theory and techniques, optical communications, and wireless networks. The conference is made up of theorists and experts in advanced characterization techniques in the fields of signal processing and information communications, which brings researchers, practitioners, and scientists in discussion of the latest methods, research developments, and future opportunities.

  • af Zhihan Lv
    1.669,95 - 2.166,95 kr.

    This book comprehensively introduces readers to Digital Twins, from the basic concepts, core technologies and technical architecture, to application scenarios and other aspects. Readers will gain a profound understanding of the emerging discipline of Digital Twins. Covering the latest and cutting-edge application technologies of Digital Twins in various fields, the book offers practitioners concrete problem-solving strategies. At the same time, it helps those working in Digital Twins-related fields to deepen their understanding of the industry and enhance their professional knowledge and skills. Given its scope, the book can also be used as teaching material or a reference book for teachers and students of product design, industrial design, design management, design marketing and related disciplines at colleges and universities. Covering a variety of groundbreaking Digital Twins technologies, it can also provide new directions for researchers.

  • af Rob Botwright
    433,95 kr.

    Introducing the "RECONNAISSANCE 101" Book Bundle: Unleash Your Ethical Hacking Potential!Are you ready to embark on a thrilling journey into the world of ethical hacking and information gathering? Look no further, because the "RECONNAISSANCE 101" Book Bundle is here to equip you with the essential knowledge and skills you need to excel in this exciting field.¿¿¿¿ BOOK 1: RECONNAISSANCE 101: A BEGINNER'S GUIDE TO FOOTPRINTING & INFORMATION GATHERINGIf you're new to ethical hacking, this beginner's guide is your perfect starting point. Dive into the fundamentals of reconnaissance and information gathering, learning the ropes of footprinting in a clear and approachable manner. Lay a solid foundation for your ethical hacking journey.¿¿¿¿ BOOK 2: MASTERING FOOTPRINTING: ADVANCED INFORMATION GATHERING STRATEGIES FOR ETHICAL HACKERSReady to take your skills to the next level? In this volume, you'll explore advanced information gathering techniques used by ethical hackers worldwide. Discover how to navigate the digital landscape with precision and uncover hidden insights to enhance your cybersecurity prowess.¿¿¿¿ BOOK 3: THE ETHICAL HACKER'S FIELD GUIDE TO TARGET DATA ACQUISITIONEthical hacking isn't just about collecting data-it's about doing so responsibly and ethically. Book 3 delves into the principles of responsible data acquisition, ensuring you gather valuable information while maintaining the highest ethical standards. Learn how to identify vulnerabilities and strengthen security.¿¿¿¿ BOOK 4: RECONNAISSANCE PRO: THE ULTIMATE HANDBOOK FOR ELITE INFORMATION GATHERERSAre you ready to become an elite information gatherer? This ultimate handbook will elevate your skills to the highest echelons of the field. Uncover the secrets and tactics employed by the best ethical hackers, propelling you into the realm of elite information gatherers.¿¿¿¿ Why Choose the "RECONNAISSANCE 101" Book Bundle?· Comprehensive Knowledge: Covering everything from the basics to elite strategies, this bundle provides a complete understanding of reconnaissance and ethical hacking.· Responsible Hacking: Embrace ethical principles, responsible disclosure, and legal compliance in your journey to become an ethical hacker.· Expert Guidance: Benefit from the expertise of seasoned professionals who have distilled their knowledge into these invaluable books.· Stay Ahead: In the ever-evolving world of cybersecurity, staying updated is crucial. This bundle equips you with the latest insights and strategies.Don't miss this opportunity to become a master of reconnaissance and ethical hacking. Whether you're a beginner or looking to sharpen your skills, the "RECONNAISSANCE 101" Book Bundle is your ticket to success in the exciting world of ethical hacking. Secure your copy today and unlock the doors to a promising cybersecurity career!

  • af Rob Botwright
    433,95 kr.

    Introducing the "Wireless Security Masterclass" Book Bundle - Your Path to Becoming a Wireless Security Expert!¿¿¿¿ Are you concerned about the security of your wireless networks? ¿¿¿¿ Want to learn the ins and outs of penetration testing and ethical hacking? ¿¿¿¿ Seeking a comprehensive resource to master wireless security from beginner to expert level?Look no further! Our "Wireless Security Masterclass" book bundle is your one-stop solution to mastering the art of wireless network security. With four carefully curated books, this bundle caters to beginners, intermediate learners, and seasoned experts alike.¿¿¿¿ Book 1 - Wireless Network Security Essentials: A Beginner's Guide If you're new to wireless security, this book is your starting point. Learn the fundamentals of encryption, authentication, and security protocols. Lay a solid foundation to build your expertise.¿¿¿¿ Book 2 - Hacking Wi-Fi Networks: Intermediate Techniques for Penetration Testers Ready to take your skills to the next level? Explore intermediate-level techniques used by ethical hackers. Crack Wi-Fi passwords, conduct wireless reconnaissance, and understand advanced attacks.¿¿¿¿ Book 3 - Advanced Wireless Exploitation: A Comprehensive Guide to Penetration Testing Ready to delve into the advanced realm? This book equips you with skills to identify hidden SSIDs, exploit Wi-Fi protocol weaknesses, and evade intrusion detection systems.¿¿¿¿ Book 4 - Wireless Network Mastery: Expert-Level Penetration Testing and Defense Reach the pinnacle of wireless security mastery. Explore expert-level penetration testing, advanced network mapping, and the art of exploiting misconfigurations. Learn how to maintain persistent access and employ anti-forensic techniques.¿¿¿¿ Why Choose the "Wireless Security Masterclass" Bundle?¿ Comprehensive Learning: Cover all aspects of wireless security from beginner to expert. ¿ Real-World Techniques: Learn practical skills used by ethical hackers and penetration testers. ¿ Expert Authors: Our books are authored by experts with extensive industry experience. ¿ Ongoing Updates: Stay current with the latest wireless security trends and techniques. ¿ Career Advancement: Boost your career prospects by becoming a certified wireless security professional.¿¿¿¿ Get Started Today! ¿¿¿¿Invest in your future, enhance your skills, and fortify your networks with the "Wireless Security Masterclass" bundle. Click the link below to order now and embark on your journey to wireless security mastery!

  • af Davide Ceolin
    521,95 kr.

    This book constitutes the refereed proceedings of the 5th Multidisciplinary International Symposium on Disinformation in Open Online Media, MISDOOM 2023, which was held in Amsterdam, The Netherlands, during November 21¿22, 2023.The 13 full papers presented in this book were carefully reviewed and selected from 19 submissions. The papers focus on misinformation, disinformation, hate speech, disinformation campaigns, social network analysis, large language models, generative AI, and multi-modal embeddings.

  • af Duncan Buell
    482,95 kr.

    Die Kryptographie, wie sie in diesem Jahrhundert betrieben wird, ist stark mathematisch geprägt. Aber sie hat auch ihre Wurzeln in dem, was rechnerisch machbar ist.In diesem einzigartigen Lehrbuch werden die Theoreme der Mathematik gegen die Machbarkeit von Berechnungen abgewogen. Kryptografie ist etwas, das man tatsächlich "macht", kein mathematisches Spiel, über das man Theoreme beweist. Es gibt tiefgründige Mathematik; es gibt einige Theoreme, die bewiesen werden müssen; und es besteht die Notwendigkeit, die brillante Arbeit derjenigen anzuerkennen, die sich auf die Theorie konzentrieren. Auf der Ebene eines Grundstudiums sollte der Schwerpunkt jedoch zunächst darauf liegen, die Algorithmen zu kennen und zu verstehen und zu wissen, wie sie zu implementieren sind, und sich auch bewusst zu machen, dass die Algorithmen sorgfältig implementiert werden müssen, um die "einfachen" Wege zum Brechen der Kryptografie zu vermeiden. Dieser Text deckt die algorithmischen Grundlagen ab und wird durch Kernmathematik und Arithmetik ergänzt.

  • af Rob Botwright
    383,95 kr.

    Introducing the "AZ-104: Azure Administrator Mastery" Book Bundle!Unlock the full potential of Microsoft Azure with this comprehensive book bundle. Whether you're a beginner or an experienced administrator, this bundle has something for everyone. Dive into Azure fundamentals, master identity and resource management, explore advanced networking and storage techniques, and ascend to pro-level automation and optimization.Book 1 - Azure Essentials: A Beginner's Guide to Navigating AZ-104 Are you new to Azure or looking to refine your basics? This book is your trusted companion. Learn to navigate the Azure portal, create and manage resources, and grasp core concepts. Start your Azure journey with confidence!Book 2 - Mastering Identity & Resource Management in Azure: A Comprehensive Guide to AZ-104 Identity and resource governance are pivotal in Azure. Master access control, implement robust identity solutions, and enforce compliance through resource management. Become a steward of security and governance in the Azure cloud.Book 3 - Azure Networking and Storage Mastery: Advanced Techniques for AZ-104 Administrators Take your expertise to the next level. Design resilient network architectures, optimize connectivity, and harness the power of Azure Storage for diverse data needs. Architect and manage high-performance Azure solutions.Book 4 - Azure Administrator Expertise: Pro-Level Automation and Optimization for AZ-104 Automation and optimization are your allies. Streamline operations, optimize resources for cost, performance, and security, and master Azure PowerShell and Azure CLI. Conquer complex Azure challenges with confidence.This book bundle is your roadmap to Azure excellence. Whether you're an IT professional, administrator, or aspiring cloud architect, these books are your comprehensive guide to Azure Administrator Mastery.Get ready to embark on a transformative journey through the world of Azure. Unlock the full potential of Microsoft Azure and become a true Azure expert. Don't miss out on this opportunity to enhance your skills and advance your career. Get the "AZ-104: Azure Administrator Mastery" Book Bundle today!

  • af Patrick Mukosha
    148,95 - 207,95 kr.

  • af Michael Kofler
    473,95 kr.

    Developers and admins, it's time to simplify your workday. With this practical guide, use scripting to solve tedious IT problems with less effort and less code! Learn about popular scripting languages: Bash, PowerShell, and Python. Master important techniques such as working with Linux, cmdlets, regular expressions, JSON, SSH, Git, and more. Use scripts to automate different scenarios, from backups and image processing to virtual machine management. Discover what's possible with only 10 lines of code! In this book, you'll learn about: a. Scripting Languages Beginners, get the crash course you need in Bash (and its alternative, Zsh), PowerShell, and Python syntax to perform scripting tasks. b. Scripting Techniques Learn to write successful scripts by following expert guidance and practical examples. Use commands for processing text files, functions for handling JSON and XML files, cron for automating script execution, SSH for running code, and more. c. Scripting Examples See scripting in action! Walk through concrete applications of scripting: data backup, image processing, web scraping, REST APIs, database maintenance, cloud scenarios, and virtual machine administration. Highlights include: 1) Bash and Zsh 2) Linux toolbox 3) PowerShell and CmdLets 4) Python and pip 5) JSON, XML, and INI 6) SSH, VS Code, and Git 7) Automation with cron 8) Backup automation 9) Image processing 10) Web scraping 11) Cloud scripting 12) Virtual machines

  • af Elizabeth A. Quaglia
    463,95 kr.

    This book constitutes the proceedings of the 19th IMA International Conference, IMACC 2023, held in London, UK, during December 12¿14, 2023The 14 full papers included in this volume were carefully reviewed and selected from 36 submissions. This volume presents cutting-edge results in a variety of areas, including coding theory, symmetric cryptography, zeroknowledge protocols, digital signature schemes and extensions, post-quantum cryptography and cryptography in practice.

  • af Prathyusha Garimella
    1.163,95 kr.

    Replicate and synchronize data between different systems with SAP LT Replication Server! Whether you need to load and replicate data to SAP HANA, SAP S/4HANA, SAP BW, SAP BW/4HANA, or a cloud system, you'll get detailed instructions for configuring the replication process, handling authorizations, and managing outages. From there, expand your skillset by learning how to handle scheduled downtime, configure roles and privileges, and optimize performance using filters and parallelization. With information on monitoring and troubleshooting, this comprehensive guide is your one-stop shop for all things SLT! Highlights include: 1) Architecture 2) SAP HANA 3) SAP BW and SAP BW/4HANA 4) SAP S/4HANA 5) Cloud systems 6) Downtime recovery 7) Security 8) Performance optimization 9) Transformations 10) Monitoring 11) Troubleshooting

  • af Nataliia Neshenko
    1.780,95 - 1.789,95 kr.

    This book overviews the drivers behind the smart city vision, describes its dimensions and introduces the reference architecture. It further enumerates and classifies threats targeting the smart city concept, links corresponding attacks, and traces the impact of these threats on operations, society and the environment. This book also introduces analytics-driven situational awareness, provides an overview of the respective solutions and highlights the prevalent limitations of these methods. The research agenda derived from the study emphasizes the demand and challenges for developing holistic approaches to transition these methods to practice equipping the user with extensive knowledge regarding the detected attack instead of a sole indicator of ongoing malicious events. It introduces a cyber-situational awareness framework that can be integrated into smart city operations to provide timely evidence-based insights regarding cyber incidents and respective system responses to assist decision-making. This book targets researchers working in cybersecurity as well as advanced-level computer science students focused on this field. Cybersecurity operators will also find this book useful as a reference guide.

  • af Iman Almomani
    847,95 kr.

    This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover protections against malware using machine learning algorithms, Blockchain and AI technologies, smart AI-based applications, automated detection-based AI tools, forensics tools, and much more. The authors discuss theoretical, technical, and practical issues related to cyber malware attacks and defense, making it ideal reading material for students, researchers, and developers.

  • af Lothar Fritsch
    1.215,95 kr.

    This book constitutes the proceedings of the 28th Nordic Conference, NordSec 2023, held in Oslo, Norway, during November 16¿17, 2023.The 18 full papers included in this volume were carefully reviewed and selected from 55 submissions. This volume focuses on a broad range of topics within IT security and privacy.

  • af Valentin Plenk
    239,95 kr.

    Erfahren Sie mit diesem Buch alles über die angewandte NetzwerktechnikIm privaten Bereich spielt Netzwerktechnik eine eher untergeordnete Rolle. Dabei sorgt sie erst dafür, dass die Kommunikation via Internet funktioniert. Der industrielle Sektor hat die Vorteile des Datenaustauschs mit Hilfe von Netzwerken allmählich erkannt. Doch erst im Rahmen der ¿Industrie 4.0¿ wird laut Valentin Plenk die Datenübertragung in Echtzeit mehr Bedeutung gewinnen. Mit Blick auf diese Entwicklung stellt er in seinem Buch im Sinne der angewandten Netzwerktechnik speziell die höheren Schichten der Netzwerktechnik in den Fokus. Dieses kompakte Lehrbuch zeigt Ihnen anhand von konkreten, in Java ausprogrammierten Beispielen, wie Informationen zwischen Systemen über ein Netzwerk ausgetauscht werden können. Pro Kapitel behandelt dieses Netzwerktechnik-Buch ein bestimmtes Thema. Nach der Einführung in die Grundlagen der Kommunikation geht derAutor zunächst auf Java-Streams, Zeichencodierung sowie die Netzwerkanalyse mit Wireshark ein. Anschließend schenkt Plenk speziell folgenden Datenaustauschformaten sowie Protokollen besonderes Augenmerk:¿ JSON¿ HTML¿ HTTP¿ OPC UA¿ TCP/IP¿ UDP/IPKonkrete Beispiele und Übungen geben Ihnen PraxiseinblickeAuf diese Weise deckt dieses Buch über die angewandte Netzwerktechnik den gesamten Bereich technischer Kommunikation ab, von den Netzwerkprotokollen bis hin zum Versenden von Netzwerktelegrammen. Durch diese breite Themenauswahl bekommen Sie als Leser ein tieferes Verständnis für die typischen Problemstellungen in der Anwendung der Netzwerktechnik. Sie erfahren mehr über die Darstellung von Daten in einem bestimmten Dateiformat und wie Sie Daten mittels Standardprotokollen austauschen können. Zudem lernen Sie, wie Sie eigene, einfache Protokolle auf der Basis von TCP/IP erstellen können. Schwerpunkt des Buches bildet dabei immer die Anwendung von Netzwerken.Mit Hilfe zahlreicher Übungsaufgaben (inklusive Lösungsvorschlägen) sowie Anwendungsbeispielen können Sie Ihren persönlichen Kenntnisstand überprüfen und das Gelernte vertiefen. So sind Sie ideal auf die Praxis vorbereitet. Die zweite Auflage des Buchs ¿Angewandte Netzwerktechnik kompakt¿ wurde um den Themenbereich Webservices ergänzt. Im Abschnitt zu UDP/IP finden Sie jetzt außerdem hilfreiche Codebeispiele für Broadcast und Multicast.

  • af Carsten Bonnen
    1.163,95 kr.

    Calling all SAP developers and admins! If your SAP and non-SAP apps rely on OData, you need this definitive guide to SAP Gateway. Perform your SAP Gateway deployment, including installation and configuration. Follow step-by-step instructions to create OData services in the backend, either with traditional coding or new SAP S/4HANA programming models. Use those services to develop various types of applications: SAPUI5, mobile, social media, and more. This book is your gateway to the world of OData! In this book, you'll learn about: a. Installation and Setup Get started with SAP Gateway! Begin with the basics: What are OData services? What are your integration options? Then deploy the solution and fine-tune key configuration settings. b. Service Creation Create OData services, step by step! Whether you're developing services in the backend or using CDS-based technologies such as the ABAP RESTful application programming model, you'll find the instructions you need. c. Application Development Build apps that consume OData! Develop SAPUI5-based apps using SAP Business Application Studio, mobile apps using SAP Mobile Development Kit, and more. Highlights include: 1) Installation and deployment 2) Configuration and integration 3) Service development and generation 4) Application development 5) Extensibility 6) Lifecycle management 7) Security 8) ABAP programming model for SAP Fiori 9) ABAP RESTful application programming model 10) SAP Business Application Studio 11) SAP Business Technology Platform

  • af Wolfgang Babel
    1.324,95 - 2.015,95 kr.

    The book gives an overview about automation technology over the last 50 years, based on my own experiences. It is a good summery for automation since 1970 for all who want to know about the context of automation developments and their standards. It is a fundamental summery and enables the reader to get experience in the complex field of automation.In detail the question is arised, whether Industry 4.0, China 2025, IoT, AI are a revolution or more an evolution of timewise established availbale technologies in HW, SW and algorithms.  Is the hype about Industry 4.0 justified or not?In that context a timelline since 1970 ist shown for AI, ANN, essential milestones in automation, e.g OSI-model, automation pyramid, standards for bus systems,  main SW-languages, robots, AI, ANN, pattern recognittion, Ethernet, the 12 most important international field busses, their main features and characterisitcs, foundation of committees, harmonization and standardization efforts, OPC UA and cloud computing, field devices, PLCs, SCADA, MES, ERP  and automation history. All that history is seen in the context of u-controller, DSP (Digital signal processor), FPGAs (Field Programmable Gate Arrays), ASICs (Application-Specific Integrated Circuit) , Chip on Board. It is include the HW-history, from Intel 8080 to octuple multicore processors. In the same way it is shown the history of field device out from laboratory into the field with all difficulties and benefits of that transition. The issues are summerized in a pyramid of complexity. Requirements for robustness and safety are shown for field devices.  In the same way it is shown the development of mainframes, workstations and PC's. SAP a leading ERP System  is explained in mor detail. Specially it is figured out how SAP works and what has to be considered in working with such kind of system. The differences between MES- and ERP-systems are discussed, specially also for future combined SAP/MES systems. Explained are the problems of middlesized companies (SMEs) in dealing with Industry 4.0 and automation. Further examples are given and discussed for automized quality control in automotvie, PCB-handling, CIGS (Solar cell)-production. Also shown is the upgrade for older products and make them ready for automation standards. In detail the history oft he modern robotics is shown for the automotive industry. In summery also is figured out the Industry 5.0 which is just coming up more and more.       

  • af Richard T. B. Ma
    1.099,95 - 1.121,95 kr.

    This book presents Internet transport economics as a new approach to understanding the packet-switching paradigm of Internet infrastructure as a global transport system for data packets. It is a prescient view of the Internet's evolution into a content-centric service platform where the quality of services (QoS) cannot be guaranteed due to the tens of thousands of autonomous systems that enact business decisions on peering, routing, and pricing in a way that determines aspects of the Internet ecosystem like network topology, latency and throughput of traffic flows, and performance of network applications. The trafficking issues created in this environment are a critical concern and barrier for user applications that require real-time responses, such as telesurgery and teleoperation of autonomous vehicles, and the book presents the Internet transport economics model as the solution.                While engineering and business are the prevailing lenses through which the Internet is viewed, the book builds its methodological framework around transport. Further delving into economics, it establishes how the Internet can be understood as providing transport services for data packets, whose demand and supply are driven by the QoS metrics of delay and loss, which can be regarded as congestion costs that result in equilibrium rates of traffic flows sent by content providers (CPs). The book goes on to present a stylized model of content provider-to-access provider (CP-AP) service as well as congestion equilibrium and rate equilibrium solution concepts under the Internet transport economics framework. These are used to analyze the problem domains of service differentiation, market structure, and data pricing. Finally, it discusses various potential future applications. This book will be of interest to graduate students and researchers in areas of computer networking and performance evaluation.

  • af Nirvana Popescu
    378,95 kr.

    One of the main benefits of this book is that it presents a comprehensive and innovative eHealth framework that leverages deep learning and IoT wearable devices for the evaluation of Parkinson's disease patients. This framework offers a new way to assess and monitor patients' motor deficits in a personalized and automated way, improving the efficiency and accuracy of diagnosis and treatment.Compared to other books on eHealth and Parkinson's disease, this book offers a unique perspective and solution to the challenges facing patients and healthcare providers. It combines state-of-the-art technology, such as wearable devices and deep learning algorithms, with clinical expertise to develop a personalized and efficient evaluation framework for Parkinson's disease patients.This book provides a roadmap for the integration of cutting-edge technology into clinical practice, paving the way for more effective and patient-centered healthcare. To understand this book, readers should have a basic knowledge of eHealth, IoT, deep learning, and Parkinson's disease. However, the book provides clear explanations and examples to make the content accessible to a wider audience, including researchers, practitioners, and students interested in the intersection of technology and healthcare.

  • af Tran Khanh Dang
    667,95 - 1.140,95 kr.

    This book constitutes the proceedings of the 8th International Conference on Future Data and Security Engineering, FDSE 2021, held in Ho Chi Minh City, Vietnam, in November 2021.*The 28 full papers and 8 short were carefully reviewed and selected from 168 submissions. The selected papers are organized into the following topical headings: big data analytics and distributed systems; security and privacy engineering; industry 4.0 and smart city: data analytics and security; blockchain and access control; data analytics and healthcare systems; and short papers: security and data engineering.* The conference was held virtually due to the COVID-19 pandemic.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.