This book simplifies the complex world of AI agents, making the topic accessible to readers with limited technical expertise. It guides readers on how to leverage AI agents to automate repetitive tasks, optimize workflows, and drive innovation....Loe edasi...
This book simplifies the complex world of AI agents, making the topic accessible to readers with limited technical expertise. It guides readers on how to leverage AI agents to automate repetitive tasks, optimize workflows, and drive innovation....Loe edasi...
In the age of continuous delivery and microservices, the difference between resilient software and production chaos lies in proactive fault detection. This book shows how to harness the power of predictive analytics and DevSecOps to find weaknesses...Loe edasi...
Design, Operate, and Scale Advanced EVPN VXLAN Fabrics Modern data centers are transforming rapidly--driven by AI workloads, cloud-native applications, and increasingly diverse multi-vendor environments. Mastering Advanced Jun...Loe edasi...
AI-Powered Cybersecurity Essentials: Protecting Enterprise Networks explores how modern AI and machine learning safeguard complex, hybrid enterprise environments. The book progresses from cybersecurity and ML foundations to applied defenses: AI-enha...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
Master cloud cost optimization to increase profitability and become a sought-after expert in the booming cloud computing industry Key Features Design and implement cost-effective cloud architectures that use cloud-native servic...Loe edasi...
Secure identities across clouds and streamline DevOps workflows with real-world IAM strategies Key Features Master IAM across Azure, AWS, and GCP with platform-specific tools and best practices Secure CI/CD pipelines by automat...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security. In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental improve...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security.In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental i...Loe edasi...
Designed for practitioners and leaders, this book offers a multidisciplinary roadmap for effectively integrating technology, culture, and leadership to foster strategic innovation in today’s fast-changing digital landscape. This boo...Loe edasi...
Designed for practitioners and leaders, this book offers a multidisciplinary roadmap for effectively integrating technology, culture, and leadership to foster strategic innovation in today’s fast-changing digital landscape. This boo...Loe edasi...
Software-Defined Networking for IoT Systems: Architecture, Integration, and Applications is a cutting-edge guide that bridges the gap between Software-Defined Networking (SDN) and the Internet of Things (IoT). As IoT networks continu...Loe edasi...
This book is a cutting-edge guide that bridges the gap between Software-Defined Networking (SDN) and the Internet of Things (IoT). It provides a deep dive into the integration of SDN and IoT. Designed as a supplementary book for researchers, advan...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
How secure are intelligent computing networks (ICNs) when data, algorithms, and computing power intertwine? As ICNs become the backbone of modern digital ecosystems, their growing complexity introduces unprecedented risks in security and safety. Int...Loe edasi...
This book provides a fundamental understanding of wireless communication, RF, and microwave devices for next-generation wireless communications. Various security issues and their solutions are included, and the book also covers machine learning te...Loe edasi...
This edited book provides a comprehensive exploration of the latest advancements and methodologies in signal processing for intelligent systems. The book serves as a multidisciplinary reference, integrating theoretical foundations, algorithmic devel...Loe edasi...
This book is a comprehensive and approachable guide designed to help learners master the skills required for the CompTIA Network+ (N10-009) exam and succeed in real-world networking roles. Authored with clarity and structured for progressive learnin...Loe edasi...
The book provides an overview of what it means to create personality-like, thinking, reasoning, deciding technologies. It reviews the development of cognitive modeling as theory based on the principles of psychology and neuroscience and as used in...Loe edasi...
This book presents a comprehensive, research-driven framework for implementing cost-effective cybersecurity solutions through the integration of open-source security tools within a structured, multi-tiered defense model. Addressing the growing chall...Loe edasi...
(Ilmumisaeg: 10-Jun-2026, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031990007)
This book delves into the concept of smart cities, namely how modern technologies and excellent governance may transform urban landscapes...Loe edasi...
In the world of software development, distributed systems have proven essential yet remain complex. In this insightful guide, author Sam Newman offers more than just technical solutions. By combining wisdom from human factors and system safety with...Loe edasi...
This book demonstrates innovative approaches in the application of computational intelligence. The initial chapters discuss the application of AI to analyze physical systems, in particular contemporary neural networks for rapid and accurate seismic...Loe edasi...
This book highlights the latest advancements and applications in wireless IoT-enabled structural health monitoring (SHM). It begins with an overview of the emergency and evolution of IoT-based SHM and its associated requirements and challenges. The...Loe edasi...
This book offers a comprehensive exploration of federated learning (FL), a novel approach to decentralized, privacy-preserving machine learning. This book delves into the resilience and security challenges inherent to FL, such as model poisoning and...Loe edasi...
Over the past decade, the security environment has undergone rapid transformation driven by climate change, geopolitical tensions, digitalization, energy transition, and AI integration. These shifts have created a new risk reality where traditional...Loe edasi...
This book provides a structured, practical exploration of modern computer networking concepts and the transformative role of artificial intelligence in cybersecurity. This book begins by introducing the foundational principles of computer networks,...Loe edasi...
This book provides a comprehensive treatment of the concepts and applications of digital twins and related virtual prototyping technologies for a variety of distributed Internet-of-Things (IoT) applications. It can serve as a reference for practitio...Loe edasi...
Whether youre a student stepping into the world of cybersecurity or a self-taught learner eager to build real-world skills, this book is your gateway to understanding and mastering Linux from both offensive and defensive perspectives. Designed for...Loe edasi...
Deliver developer-friendly infrastructure with automation, AI acceleration, and real-world platform patterns all built from scratch on your laptop Key Features Hands-on guide to designing, deploying, and evolving engineering pl...Loe edasi...
The autonomous supply chain is the attack surface of the next decade. This is the book that defends it. Download the ASCR Blueprint artifacts directly from the book. Deploy them. Customize them. Use them in client engagements. The blueprint is the b...Loe edasi...
Integrate cybersecurity into TPRM to reduce vendor breach impact, meet DORA and NIST C-SCRM expectations, and monitor fourth-party exposure using SBOM-driven diligence, threat intelligence, and automation. Key Features Design T...Loe edasi...
Secure your critical infrastructure by understanding architectures and risks, hardening legacy and modern systems, protecting data and communications, and building resilient policies through real-world case studies Key Features ...Loe edasi...
This book provides a comprehensive guide to integrating Artificial Intelligence (AI), Large Language Models (LLMs), and quantum-safe security mechanisms into modern cybersecurity practices. It begins by examining the evolving cyber threat landscape...Loe edasi...
Explore the full scope of blockchain technology and its relationship with cybersecurity Cybersecurity Implications in Blockchain Architecture delves into the transformative power of blockchain technology and its intricate relation...Loe edasi...
This book provides a systematic and in-depth introduction to machine unlearning (MU) for foundation models, framed through an optimizationmodeldata tri-design perspective and complemented by assessments and applications. As foundation models are con...Loe edasi...
Splunk is a software technology for monitoring, searching, analyzing, and visualizing machine-generated data in real time. This book, divided into three modules, is structured to help readers prepare for Splunk certification exams. ...Loe edasi...
Can you forecast the future value by considering historical data? Accurate forecasting requires more than just plugging in historical data into models. Readers will find the latest techniques used by managers in business today, discover the importan...Loe edasi...
The digital forensics research community develops new solutions daily to advance its subfields, including cloud and network forensics and security. However, a substantial amount of such research requires greater experimental rigor. A few works have...Loe edasi...
This book discusses how artificial intelligence, machine learning, and digital technology are being used to re-engineer the manufacturing industry. With a particular emphasis on small- and medium-sized enterprises (SMEs), this book debunks the myth...Loe edasi...
This book addresses the most common questions raised by parents regarding the impact of media on children. It offers insights on suitable media choices for children, fostering healthy media usage, determining appropriate age for media consumption, a...Loe edasi...
This book covers topics related to Artificial Intelligence, Internet of Things (IoT) , and Data Science for future communications systems. It is beneficial for undergraduate, graduate, postgraduate students, researchers, academicians, institutions,...Loe edasi...
In the age of Artificial Intelligence, organisations are increasingly using data, information and knowledge as a competitive weapon. Their data, information and knowledge are arguably their most valuable assets. Yet, this fourth asset is managed b...Loe edasi...
In short, this book is written by executives for executives and explains where to start to significantly improve your business’ operations and productivity through disciplined management of your Fourth Asset. In the age of Artificia...Loe edasi...
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic users account or if it genuinely originates from the declared...Loe edasi...
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic users account or if it genuinely originates from the declared...Loe edasi...