This book presents a comprehensive, practitioner-focused exploration of how artificial intelligence (AI) is transforming the way modern cloud systems are designed, deployed, and operated. It will offer the readers blueprint for leveraging AI-powered...Loe edasi...
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is attributable to purely electronic attacks. The remaining human and physical exploits account for seventy-one percent. Hence, it is...Loe edasi...
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is attributable to purely electronic attacks. The remaining human and physical exploits account for seventy-one percent. Hence, it is...Loe edasi...
This book studies the evolution of sustainable green smart cities and demonstrates solutions for green environmental issues using modern industrial IoT solutions. This book studies the evolution of sustainable green smart cities and...Loe edasi...
This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and IoT technologies can be used to address cybersecurity challenges. It discusses the potential of AI for threat detection, risk a...Loe edasi...
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats....Loe edasi...
This book shows how SRv6 can be used in real-world network deployments, providing real-world project cases from multiple carriers and enterprises. This book shows how SRv6 can be used in real-world network deployments, providing rea...Loe edasi...
This book comprehensively discusses nature-inspired algorithms, deep learning methods, applications of mathematical programming and artificial intelligence techniques. It will further cover important topic such as linking green supply chain manage...Loe edasi...
This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks...Loe edasi...
The text focuses primarily on design concepts of stacked microstrip antennas, performance characteristics, and complete static analysis based on different approaches. It further provides readers with an in-depth understanding of static analysis appr...Loe edasi...
This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of know...Loe edasi...
This book is an essential guide to the constantly changing environment of embedded systems in healthcare in a world where the convergence of technology and healthcare is becoming increasingly important....Loe edasi...
This book details how to assess electric mobility characteristics within electric vehicles, discussing energy management methods, automated systems, and the enormous potential of data resources mined from software, navigation systems and connectivit...Loe edasi...
In an industry that often lacks representation, Dark Faces in Cyber Places shines a bright spotlight on the remarkable journeys of prominent cybersecurity CEOs, CISOs, and senior executives who have risen to the top, defying stereotypes and shatteri...Loe edasi...
In an industry that often lacks representation, Dark Faces in Cyber Places shines a bright spotlight on the remarkable journeys of prominent cybersecurity CEOs, CISOs, and senior executives who have risen to the top, defying stereotypes and shatteri...Loe edasi...
This book offers a comprehensive study of medical image processing, with an emphasis on methods to enhance the accuracy and readability of medical images for diagnosis and therapy. Its main goals are to improve the visual clarity of images by sharpe...Loe edasi...
This work reviews recent advancements in research, new methods and techniques, and applications in computational techniques in intelligent manufacturing....Loe edasi...
This book heralds a new era in instrumentation and measurements. It combines artificial intelligence and wireless communications technologies with instrumentation and measurement systems to function as a single unit....Loe edasi...
This comprehensive guide to the emerging areas and synergistic relationships among the domains of 6G, machine learning, and embedded systems offers readers a detailed analysis of their converging paths and contributions to the development of intel...Loe edasi...
The book discusses the issues of building and maintaining a distinctive and credible employer brand and presents a set of practical tools supporting a strategic approach to employer branding in IT companies. The book includes analyses of the develop...Loe edasi...
The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map sec...Loe edasi...
The built environment is undergoing a profound transformation driven by the integration of cutting-edge geospatial technologies. Smart Buildings and Cities with Remote Sensing and GIS serves as a comprehensive guide to navigating this trans...Loe edasi...
Network Optimization in Intelligent Internet of Things Applications: Principles and Challenges sheds light on the optimization methods that form the basis of effective communication between networked devices. It is...Loe edasi...
This book is a comprehensive work that comprises latest development and technologies, challenges, and best practices in the industry. It covers the fundamentals of cloud computing, including deployment models, service models, and the benefits of c...Loe edasi...
Identifying and stopping the dissemination of fabricated news, hate speech, or deceptive information camouflaged as legitimate news poses a significant technological hurdle. This book presents emergent methodologies and technological approaches of...Loe edasi...
As organizations increasingly depend on electronic information, the lack of systematic training on effective operations and security principles is causing chaos. Stories of data loss, data corruption, fraud, interruptions of service, and poor syst...Loe edasi...
This book is essential read for engineers, maintenance professionals, asset managers, and business leaders seeking to stay ahead in the rapidly evolving landscape of digital asset management. Digital Maintenance and Asset Digitalization is a definit...Loe edasi...
This book aims to present in much detail how complex adaptive processes in cybersecurity can be analysed based on multiple levels of adaptation and control in a multilevel adaptive dynamical system architecture. Furthermore, it is shown how such com...Loe edasi...
Splunk is a software technology for monitoring, searching, analyzing, and visualizing machine-generated data in real time. This book, divided into three modules, is structured to help readers prepare for Splunk certification exams. ...Loe edasi...
This book on Edge-enabled 6G Networking: Foundations, Technologies and Applications presents the latest advancements in the field of Edge-enabled 6G Networking, which has emerged as a new paradigm to address the limitations of current network infr...Loe edasi...
This book presents a comprehensive, practitioner-focused exploration of how artificial intelligence (AI) is transforming the way modern cloud systems are designed, deployed, and operated. It will offer the readers blueprint for leveraging AI-powered...Loe edasi...
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is attributable to purely electronic attacks. The remaining human and physical exploits account for seventy-one percent. Hence, it is...Loe edasi...
The relevant statistic for this book is that only twenty-nine percent of the annual, overall loss to cyber exploits is attributable to purely electronic attacks. The remaining human and physical exploits account for seventy-one percent. Hence, it is...Loe edasi...
This book studies the evolution of sustainable green smart cities and demonstrates solutions for green environmental issues using modern industrial IoT solutions. This book studies the evolution of sustainable green smart cities and...Loe edasi...
This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and IoT technologies can be used to address cybersecurity challenges. It discusses the potential of AI for threat detection, risk a...Loe edasi...
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats....Loe edasi...
This book shows how SRv6 can be used in real-world network deployments, providing real-world project cases from multiple carriers and enterprises. This book shows how SRv6 can be used in real-world network deployments, providing rea...Loe edasi...
This book comprehensively discusses nature-inspired algorithms, deep learning methods, applications of mathematical programming and artificial intelligence techniques. It will further cover important topic such as linking green supply chain manage...Loe edasi...
This book offers approaches for cybersecurity and cyber defense via Blockchain technology to counter cyber-attacks and ransomwares. The book can be used for many ways by several cybersecurity professionals to secure online data, people, and networks...Loe edasi...
The text focuses primarily on design concepts of stacked microstrip antennas, performance characteristics, and complete static analysis based on different approaches. It further provides readers with an in-depth understanding of static analysis appr...Loe edasi...
This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of know...Loe edasi...
This book is an essential guide to the constantly changing environment of embedded systems in healthcare in a world where the convergence of technology and healthcare is becoming increasingly important....Loe edasi...
This book details how to assess electric mobility characteristics within electric vehicles, discussing energy management methods, automated systems, and the enormous potential of data resources mined from software, navigation systems and connectivit...Loe edasi...
In an industry that often lacks representation, Dark Faces in Cyber Places shines a bright spotlight on the remarkable journeys of prominent cybersecurity CEOs, CISOs, and senior executives who have risen to the top, defying stereotypes and shatteri...Loe edasi...
In an industry that often lacks representation, Dark Faces in Cyber Places shines a bright spotlight on the remarkable journeys of prominent cybersecurity CEOs, CISOs, and senior executives who have risen to the top, defying stereotypes and shatteri...Loe edasi...
This book offers a comprehensive study of medical image processing, with an emphasis on methods to enhance the accuracy and readability of medical images for diagnosis and therapy. Its main goals are to improve the visual clarity of images by sharpe...Loe edasi...
This work reviews recent advancements in research, new methods and techniques, and applications in computational techniques in intelligent manufacturing....Loe edasi...
This book heralds a new era in instrumentation and measurements. It combines artificial intelligence and wireless communications technologies with instrumentation and measurement systems to function as a single unit....Loe edasi...