This book is a comprehensive and approachable guide designed to help learners master the skills required for the CompTIA Network+ (N10-009) exam and succeed in real-world networking roles. Authored with clarity and structured for progressive learnin...Loe edasi...
Digital Personality A Man Forever unravels the missing link between human cognition and technology. It gives an idea of the further evolution of digital evolution where in addition to the ability to process information, digital systems exhibit quali...Loe edasi...
This book presents a comprehensive, research-driven framework for implementing cost-effective cybersecurity solutions through the integration of open-source security tools within a structured, multi-tiered defense model. Addressing the growing chall...Loe edasi...
(Ilmumisaeg: 31-May-2026, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031990007)
This book delves into the concept of smart cities, namely how modern technologies and excellent governance may transform urban landscapes...Loe edasi...
In the world of software development, distributed systems have proven essential yet remain complex. In this insightful guide, author Sam Newman offers more than just technical solutions. By combining wisdom from human factors and system safety with...Loe edasi...
This book demonstrates innovative approaches in the application of computational intelligence. The initial chapters discuss the application of AI to analyze physical systems, in particular contemporary neural networks for rapid and accurate seismic...Loe edasi...
This book highlights the latest advancements and applications in wireless IoT-enabled structural health monitoring (SHM). It begins with an overview of the emergency and evolution of IoT-based SHM and its associated requirements and challenges. The...Loe edasi...
This book offers a comprehensive exploration of federated learning (FL), a novel approach to decentralized, privacy-preserving machine learning. This book delves into the resilience and security challenges inherent to FL, such as model poisoning and...Loe edasi...
Over the past decade, the security environment has undergone rapid transformation driven by climate change, geopolitical tensions, digitalization, energy transition, and AI integration. These shifts have created a new risk reality where traditional...Loe edasi...
This book provides a structured, practical exploration of modern computer networking concepts and the transformative role of artificial intelligence in cybersecurity. This book begins by introducing the foundational principles of computer networks,...Loe edasi...
This book provides a comprehensive treatment of the concepts and applications of digital twins and related virtual prototyping technologies for a variety of distributed Internet-of-Things (IoT) applications. It can serve as a reference for practitio...Loe edasi...
Whether youre a student stepping into the world of cybersecurity or a self-taught learner eager to build real-world skills, this book is your gateway to understanding and mastering Linux from both offensive and defensive perspectives. Designed for...Loe edasi...
Deliver developer-friendly infrastructure with automation, AI acceleration, and real-world platform patterns all built from scratch on your laptop Key Features Hands-on guide to designing, deploying, and evolving engineering pl...Loe edasi...
The autonomous supply chain is the attack surface of the next decade. This is the book that defends it. Download the ASCR Blueprint artifacts directly from the book. Deploy them. Customize them. Use them in client engagements. The blueprint is the b...Loe edasi...
Integrate cybersecurity into TPRM to reduce vendor breach impact, meet DORA and NIST C-SCRM expectations, and monitor fourth-party exposure using SBOM-driven diligence, threat intelligence, and automation. Key Features Design T...Loe edasi...
Secure your critical infrastructure by understanding architectures and risks, hardening legacy and modern systems, protecting data and communications, and building resilient policies through real-world case studies Key Features ...Loe edasi...
This book provides a comprehensive guide to integrating Artificial Intelligence (AI), Large Language Models (LLMs), and quantum-safe security mechanisms into modern cybersecurity practices. It begins by examining the evolving cyber threat landscape...Loe edasi...
Explore the full scope of blockchain technology and its relationship with cybersecurity Cybersecurity Implications in Blockchain Architecture delves into the transformative power of blockchain technology and its intricate relation...Loe edasi...
This book provides a systematic and in-depth introduction to machine unlearning (MU) for foundation models, framed through an optimizationmodeldata tri-design perspective and complemented by assessments and applications. As foundation models are con...Loe edasi...