Internet of Things Security: Attacks, Tools, Techniques and Challenges delves into the essential aspects of safeguarding devices within the IoT ecosystem. This book provides a comprehensive overview of the IoT architecture, its vast applicatio...Loe edasi...
George Dimitoglou, Leonidas Deligiannidis, Hamid R. Arabnia
Sari: Intelligent Computing
(Ilmumisaeg: 20-Oct-2025, Hardback, Kirjastus: De Gruyter, ISBN-13: 9783111436418)
The depth of our dependence on technology in our interconnected world underscores the critical role of cyber security. This book provides essential insights into the latest research and best practices and techniques for protecting against cyber thre...Loe edasi...
Structured around strategic foundations, operational developments, and emerging threats, the book examines how Türkiye has adapted to the evolving landscape of terrorism....Loe edasi...
Metaverse Platform Implementation: AI, Security, and Applications provides a comprehensive exploration of the engineering and scientific principles behind the metaverse, a 3D digital world designed to replicate and enhance physical reality...Loe edasi...
This book explores cutting-edge innovations in intelligent systems and their real-world impact. From smart grids and IoT applications to machine learning-driven network optimization and cybersecurity, it covers the key technologies shaping modern...Loe edasi...
The book is a practical guide to be used by people with no or little knowledge of sustainability and also sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted...Loe edasi...
The book is a practical guide to be used by people with no or little knowledge of sustainability and also sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted...Loe edasi...
Almost 50 years ago, the C language defined modern computer programming. This book shows you why C is still as powerful and popular as ever, with an inside look at the new C23 standard.For programs that need to be small, fast, and unfa...Loe edasi...
There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architecture...Loe edasi...
(Ilmumisaeg: 15-Oct-2025, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031912986)
Russia, China, Iran, Saudi Arabia, Turkey, North Korea and India are engaged in foreign information manipulation and interference (FIMI) in the democratic practices of countries in Europe, America, Africa and Asia. The Ukraine, in particular, has...Loe edasi...
TCP, UDP, DNS, HTTP, and more: these are the network protocols that make up the fabric of the Internet. Erlang and Elixir are the perfect fit for building network-intensive applications—the BEAMs actor model perfectly mirrors the way nodes operate i...Loe edasi...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing – A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. As mobile applications become...Loe edasi...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing – A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. This book follows industry-standard methodolo...Loe edasi...
During the past decade, the research on solid acid catalysis has progressed in some fields. This new edition presents some important developments in these fields in a new chapter....Loe edasi...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Loe edasi...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Loe edasi...
The field of edge computing is advancing quickly, with new algorithms, architectures, and use cases emerging regularly. Intelligent mobile edge computing includes various domains—such as IoT, AI, and telecommunications—making it essential to provi...Loe edasi...
Directfrom Microsoft, this Exam Ref is the official study guide for the new MicrosoftDP-300 Administering Microsoft Azure SQL Solutions certification exam. ...Loe edasi...
The rapid advancement of Artificial Intelligence (AI) is revolutionizing key sectors critical to global progress. AI Frontiers: Transforming Health, Agriculture, and Education delves into how cutting-edge AI innovations are addressin...Loe edasi...
In todays rapidly evolving business landscape, effective leadership is increasingly synonymous with adept digital strategy. In todays rapidly evolving business landscape, effective leadership is increasingly synonymous with adept...Loe edasi...
In todays rapidly evolving business landscape, effective leadership is increasingly synonymous with adept digital strategy. In todays rapidly evolving business landscape, effective leadership is increasingly synonymous with adept...Loe edasi...
This book introduces a strategic, business-aligned model for integrating cybersecurity and IT operations that acknowledges the friction between legacy systems and modern demands, global operations and local control, innovation and compliance. It r...Loe edasi...
Building and sustaining cybersecurity in the enterprise isn’t just a technical challenge; it is an organizational imperative. In a world where most guidance is geared toward mid-sized environments, Integrated Assurance fills a critical gap...Loe edasi...
S. S. Iyengar, Kenneth G. Furton, Pronab Mohanty, Naveen Kumar Chaudhary
Sari: Signals and Communication Technology
(Ilmumisaeg: 04-Oct-2025, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031980350)
This book explores the transformative role of artificial intelligence (AI) in the field of digital forensics, offering a comprehensive over...Loe edasi...
Presents cutting-edge theoretical frameworks and compelling research findings to illuminate the concealed affiliations and obscured motives between Big Tech, government organisations, and digital and social media....Loe edasi...
The rise of digital media has disrupted the traditional media landscape, leading to various challenges such as fake news, privacy and data security concerns and power consolidation in the hands of a few corporations. This book is an essential resour...Loe edasi...
This book aims to provide a comprehensive exploration of the evolving field of Cyber-Physical Systems (CPS) and its intersecting domain, Internet of Things (IoT) security. It delves into the fundamental concepts, emerging threats, and cutting-edge s...Loe edasi...
Operations Management Analytics, 4th Edition, provides a clear and accessible introduction to this important area of study. Taking an international approach, and written in a concise style, this revised new edition has been updat...Loe edasi...
Operations Management Analytics, 4th Edition, provides a clear and accessible introduction to this important area of study. Taking an international approach, and written in a concise style, this revised new edition has been updat...Loe edasi...