(Ilmumisaeg: 10-Jun-2026, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031990007)
This book delves into the concept of smart cities, namely how modern technologies and excellent governance may transform urban landscapes...Loe edasi...
In recent decades, the evolution of digital technologies has led to the proliferation of highly distributed, dynamic, and heterogeneous information and communication systems (ICS). Among them, 5G-IoT infrastructures, with their inherently dense to...Loe edasi...
How secure are intelligent computing networks (ICNs) when data, algorithms, and computing power intertwine? As ICNs become the backbone of modern digital ecosystems, their growing complexity introduces unprecedented risks in security and safety. Int...Loe edasi...
In the age of continuous delivery and microservices, the difference between resilient software and production chaos lies in proactive fault detection. This book shows how to harness the power of predictive analytics and DevSecOps to find weaknesses...Loe edasi...
This book simplifies the complex world of AI agents, making the topic accessible to readers with limited technical expertise. It guides readers on how to leverage AI agents to automate repetitive tasks, optimize workflows, and drive innovation....Loe edasi...
This book simplifies the complex world of AI agents, making the topic accessible to readers with limited technical expertise. It guides readers on how to leverage AI agents to automate repetitive tasks, optimize workflows, and drive innovation....Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
This book demonstrates innovative approaches in the application of computational intelligence. The initial chapters discuss the application of AI to analyze physical systems, in particular contemporary neural networks for rapid and accurate seismic...Loe edasi...
AI-Powered Cybersecurity Essentials: Protecting Enterprise Networks explores how modern AI and machine learning safeguard complex, hybrid enterprise environments. The book progresses from cybersecurity and ML foundations to applied defenses: AI-enha...Loe edasi...
This book provides a comprehensive treatment of the concepts and applications of digital twins and related virtual prototyping technologies for a variety of distributed Internet-of-Things (IoT) applications. It can serve as a reference for practitio...Loe edasi...
This book on Edge-enabled 6G Networking: Foundations, Technologies and Applications presents the latest advancements in the field of Edge-enabled 6G Networking, which has emerged as a new paradigm to address the limitations of current network infr...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security. In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental improve...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security.In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental i...Loe edasi...
Software-Defined Networking for IoT Systems: Architecture, Integration, and Applications is a cutting-edge guide that bridges the gap between Software-Defined Networking (SDN) and the Internet of Things (IoT). As IoT networks continu...Loe edasi...
This book is a cutting-edge guide that bridges the gap between Software-Defined Networking (SDN) and the Internet of Things (IoT). It provides a deep dive into the integration of SDN and IoT. Designed as a supplementary book for researchers, advan...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
This edited book provides a comprehensive exploration of the latest advancements and methodologies in signal processing for intelligent systems. The book serves as a multidisciplinary reference, integrating theoretical foundations, algorithmic devel...Loe edasi...
The digital forensics research community develops new solutions daily to advance its subfields, including cloud and network forensics and security. However, a substantial amount of such research requires greater experimental rigor. A few works have...Loe edasi...
This book discusses how artificial intelligence, machine learning, and digital technology are being used to re-engineer the manufacturing industry. With a particular emphasis on small- and medium-sized enterprises (SMEs), this book debunks the myth...Loe edasi...
This book provides a fundamental understanding of wireless communication, RF, and microwave devices for next-generation wireless communications. Various security issues and their solutions are included, and the book also covers machine learning te...Loe edasi...
This book is a comprehensive and approachable guide designed to help learners master the skills required for the CompTIA Network+ (N10-009) exam and succeed in real-world networking roles. Authored with clarity and structured for progressive learnin...Loe edasi...
The book provides an overview of what it means to create personality-like, thinking, reasoning, deciding technologies. It reviews the development of cognitive modeling as theory based on the principles of psychology and neuroscience and as used in...Loe edasi...
This book presents a comprehensive, research-driven framework for implementing cost-effective cybersecurity solutions through the integration of open-source security tools within a structured, multi-tiered defense model. Addressing the growing chall...Loe edasi...
In the world of software development, distributed systems have proven essential yet remain complex. In this insightful guide, author Sam Newman offers more than just technical solutions. By combining wisdom from human factors and system safety with...Loe edasi...
This book highlights the latest advancements and applications in wireless IoT-enabled structural health monitoring (SHM). It begins with an overview of the emergency and evolution of IoT-based SHM and its associated requirements and challenges. The...Loe edasi...
This book offers a comprehensive exploration of federated learning (FL), a novel approach to decentralized, privacy-preserving machine learning. This book delves into the resilience and security challenges inherent to FL, such as model poisoning and...Loe edasi...
This book is a comprehensive roadmap for transitioning legacy systems into agile, cloud-native, and intelligent architectures. Whether youre a software architect, DevOps engineer, or technology decision-maker, this book is your essential guide to na...Loe edasi...
This book provides a structured, practical exploration of modern computer networking concepts and the transformative role of artificial intelligence in cybersecurity. This book begins by introducing the foundational principles of computer networks,...Loe edasi...
(Ilmumisaeg: 10-Jun-2026, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031990007)
This book delves into the concept of smart cities, namely how modern technologies and excellent governance may transform urban landscapes...Loe edasi...
In recent decades, the evolution of digital technologies has led to the proliferation of highly distributed, dynamic, and heterogeneous information and communication systems (ICS). Among them, 5G-IoT infrastructures, with their inherently dense to...Loe edasi...
How secure are intelligent computing networks (ICNs) when data, algorithms, and computing power intertwine? As ICNs become the backbone of modern digital ecosystems, their growing complexity introduces unprecedented risks in security and safety. Int...Loe edasi...
(Ilmumisaeg: 10-Jun-2026, Hardback, Kirjastus: ISTE Ltd, ISBN-13: 9781836690634)
Memory, the second function of a computer, has gradually become more complex in order to meet growing needs in terms of capacity, speed, security and energy efficiency. It takes the form of a component or system, such as a memory subassembly or a ma...Loe edasi...
In the age of continuous delivery and microservices, the difference between resilient software and production chaos lies in proactive fault detection. This book shows how to harness the power of predictive analytics and DevSecOps to find weaknesses...Loe edasi...
(Ilmumisaeg: 09-Jun-2026, Hardback, Kirjastus: No Starch Press,US, ISBN-13: 9781718504424)
Aspiring hackers will learn foundational programming in C and assembly languages from a veteran hacker and develop the skills to create their own hacking tools.In hacker lore, heavy wizardry means code so close to the metal it feels li...Loe edasi...
This book simplifies the complex world of AI agents, making the topic accessible to readers with limited technical expertise. It guides readers on how to leverage AI agents to automate repetitive tasks, optimize workflows, and drive innovation....Loe edasi...
This book simplifies the complex world of AI agents, making the topic accessible to readers with limited technical expertise. It guides readers on how to leverage AI agents to automate repetitive tasks, optimize workflows, and drive innovation....Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
This book demonstrates innovative approaches in the application of computational intelligence. The initial chapters discuss the application of AI to analyze physical systems, in particular contemporary neural networks for rapid and accurate seismic...Loe edasi...
AI-Powered Cybersecurity Essentials: Protecting Enterprise Networks explores how modern AI and machine learning safeguard complex, hybrid enterprise environments. The book progresses from cybersecurity and ML foundations to applied defenses: AI-enha...Loe edasi...
This book provides a comprehensive treatment of the concepts and applications of digital twins and related virtual prototyping technologies for a variety of distributed Internet-of-Things (IoT) applications. It can serve as a reference for practitio...Loe edasi...
This book on Edge-enabled 6G Networking: Foundations, Technologies and Applications presents the latest advancements in the field of Edge-enabled 6G Networking, which has emerged as a new paradigm to address the limitations of current network infr...Loe edasi...
Master cloud cost optimization to increase profitability and become a sought-after expert in the booming cloud computing industry Key Features Design and implement cost-effective cloud architectures that use cloud-native servic...Loe edasi...
Secure identities across clouds and streamline DevOps workflows with real-world IAM strategies Key Features Master IAM across Azure, AWS, and GCP with platform-specific tools and best practices Secure CI/CD pipelines by automat...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security. In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental improve...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security.In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental i...Loe edasi...