Internet of Things Security: Attacks, Tools, Techniques and Challenges delves into the essential aspects of safeguarding devices within the IoT ecosystem. This book provides a comprehensive overview of the IoT architecture, its vast applicatio...More info...
George Dimitoglou, Leonidas Deligiannidis, Hamid R. Arabnia
Series: Intelligent Computing
(Pub. Date: 20-Oct-2025, Hardback, Publisher: De Gruyter, ISBN-13: 9783111436418)
The depth of our dependence on technology in our interconnected world underscores the critical role of cyber security. This book provides essential insights into the latest research and best practices and techniques for protecting against cyber thre...More info...
Structured around strategic foundations, operational developments, and emerging threats, the book examines how Tόrkiye has adapted to the evolving landscape of terrorism....More info...
Metaverse Platform Implementation: AI, Security, and Applications provides a comprehensive exploration of the engineering and scientific principles behind the metaverse, a 3D digital world designed to replicate and enhance physical reality...More info...
This book explores cutting-edge innovations in intelligent systems and their real-world impact. From smart grids and IoT applications to machine learning-driven network optimization and cybersecurity, it covers the key technologies shaping modern...More info...
The book is a practical guide to be used by people with no or little knowledge of sustainability and also sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted...More info...
The book is a practical guide to be used by people with no or little knowledge of sustainability and also sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted...More info...
Almost 50 years ago, the C language defined modern computer programming. This book shows you why C is still as powerful and popular as ever, with an inside look at the new C23 standard.For programs that need to be small, fast, and unfa...More info...
There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architecture...More info...
Russia, China, Iran, Saudi Arabia, Turkey, North Korea and India are engaged in foreign information manipulation and interference (FIMI) in the democratic practices of countries in Europe, America, Africa and Asia. The Ukraine, in particular, has...More info...
TCP, UDP, DNS, HTTP, and more: these are the network protocols that make up the fabric of the Internet. Erlang and Elixir are the perfect fit for building network-intensive applicationsthe BEAMs actor model perfectly mirrors the way nodes operate i...More info...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. As mobile applications become...More info...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. This book follows industry-standard methodolo...More info...
During the past decade, the research on solid acid catalysis has progressed in some fields. This new edition presents some important developments in these fields in a new chapter....More info...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...More info...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...More info...
The field of edge computing is advancing quickly, with new algorithms, architectures, and use cases emerging regularly. Intelligent mobile edge computing includes various domainssuch as IoT, AI, and telecommunicationsmaking it essential to provi...More info...
Directfrom Microsoft, this Exam Ref is the official study guide for the new MicrosoftDP-300 Administering Microsoft Azure SQL Solutions certification exam. ...More info...
The rapid advancement of Artificial Intelligence (AI) is revolutionizing key sectors critical to global progress. AI Frontiers: Transforming Health, Agriculture, and Education delves into how cutting-edge AI innovations are addressin...More info...
In todays rapidly evolving business landscape, effective leadership is increasingly synonymous with adept digital strategy. In todays rapidly evolving business landscape, effective leadership is increasingly synonymous with adept...More info...
In todays rapidly evolving business landscape, effective leadership is increasingly synonymous with adept digital strategy. In todays rapidly evolving business landscape, effective leadership is increasingly synonymous with adept...More info...
This book introduces a strategic, business-aligned model for integrating cybersecurity and IT operations that acknowledges the friction between legacy systems and modern demands, global operations and local control, innovation and compliance. It r...More info...
Building and sustaining cybersecurity in the enterprise isnt just a technical challenge; it is an organizational imperative. In a world where most guidance is geared toward mid-sized environments, Integrated Assurance fills a critical gap...More info...
This book explores the transformative role of artificial intelligence (AI) in the field of digital forensics, offering a comprehensive over...More info...
Presents cutting-edge theoretical frameworks and compelling research findings to illuminate the concealed affiliations and obscured motives between Big Tech, government organisations, and digital and social media....More info...
The rise of digital media has disrupted the traditional media landscape, leading to various challenges such as fake news, privacy and data security concerns and power consolidation in the hands of a few corporations. This book is an essential resour...More info...
This book aims to provide a comprehensive exploration of the evolving field of Cyber-Physical Systems (CPS) and its intersecting domain, Internet of Things (IoT) security. It delves into the fundamental concepts, emerging threats, and cutting-edge s...More info...
Operations Management Analytics, 4th Edition, provides a clear and accessible introduction to this important area of study. Taking an international approach, and written in a concise style, this revised new edition has been updat...More info...
Operations Management Analytics, 4th Edition, provides a clear and accessible introduction to this important area of study. Taking an international approach, and written in a concise style, this revised new edition has been updat...More info...
Master the tools and skills to modernize your IT infrastructure with Windows Server 2025, from hands-on configuration to enterprise-grade security, virtualization, and cloud integration Key Features Learn to configure, manage,...More info...
Master Infrastructure as Code (IaC) and orchestrate powerful cloud environments across AWS, Azure, Google Cloud, and Kubernetes with Pulumi Key Features Build, deploy, and automate infrastructure across AWS, Azure, Google Cloud...More info...
AI will fundamentally change the way business is conducted across most industries. Organizations that excel at leveraging secure, responsible AI to advance their strategic objectives will have a distinct advantage. Those that do not may see their...More info...
This book presents the evolution roadmap of Reconfigurable Manufacturing Systems (RMS) and their characteristics since its invention in the 1990s. It discusses the role of RMS in today s increasingly competitive manufacturing environment and unpredi...More info...
6G-Life: Unveiling the Future of Technological Sovereignty, Sustainability and Trustworthiness, gives a journey into the multifaceted landscape of 6G technologies. It transcends the conventional boundaries of wireless communication as it dives...More info...
Non-Terrestrial Networks: Paving the Way Towards Global Connectivity presents technologies that are important for NTNs - from LEO satellite communication, unmanned aerial vehicles (UAVs)/flying platforms assisted wireless networking, the use o...More info...
In an era where technological behemoths wield unprecedented power over the digital landscape, this book is a call for autonomy, security, and innovation through the open-source revolution. It not only challenges the status quo but also unfolds a b...More info...
Open for Business: Harnessing the Power of Open-Source in the Corporate World advocates for open-source as a transformative force in corporate IT. It critiques proprietary restrictions and vendor lock-ins, urging businesses to adopt...More info...
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools neede...More info...
The book provides a fundamental exploration of cloud security, addressing the growing risks associated with modern cloud environments. It combines foundational theory with hands-on applications, equipping readers with the knowledge and tools neede...More info...
This book explores the role of the Internet of Things (IoT) in achieving sustainable development goals (SDGs). It provides a comprehensive overview of how IoT technologies enhance energy efficiency, promote clean energy, support environmental moni...More info...
This book analyzes the role of joint coding and modulation schemes in revolutionizing the way communication networks function. The primary objectives of the book are:1. To discuss the impact of joint codin...More info...
(Pub. Date: 01-Oct-2025, Hardback, Publisher: Institution of Engineering and Technology, ISBN-13: 9781837240319)
This book explores how AI and Explainable AI-based cybersecurity algorithms and methods are used to tackle cybersecurity challenges such as threats, intrusions and attacks to preserve data privacy and ensure trust, accountability, transparency and c...More info...
This book explores how the metaverse may be applied to career development practices. This book will interest scholars of digital human resource management, human resource development, and career management. Its practical suggestions may also inter...More info...
A comprehensive bundle of authoritative prep resources for the A+ certification exams: Study, practice, and reviewthe Sybex way! Based on the popular Sybex Study Guide approach, the CompTIA A+ Complete Certification Kit, 6th Edition...More info...
This study guide is your essential resource for mastering foundational AI concepts and AWS tools while preparing for the AIF-C01 certification exam. Author Tom Taulli breaks down complex topics into practical, easy-to-understand lessons that will en...More info...
An accessible introduction to the technical and social construct of digital identity, this book helps students understand how the data they generate through online activities and apps is used and the implications it can have. An acc...More info...
An accessible introduction to the technical and social construct of digital identity, this book helps students understand how the data they generate through online activities and apps is used and the implications it can have. An acc...More info...
Edge Computing and Intelligence is a new technical discipline that researches anddevelops theories, methods, technologies, and application systems for providing the fastand efficient processing and intelligent decision using the big data generated fr...More info...