The Fundamentals of Software-Defined Networking: Towards Intelligent and Flexible Networks is a comprehensive, beginner-friendly guide to Software-Defined Networking (SDN), designed specifically for educators, trainers, and professionals transitioni...Loe edasi...
The book provides senior leaders with a guide for capturing, connecting, and communicating AIs values. It shows how to ensure that AI projects deliver not only short-term but sustainable, long-term benefits. This book addresses the key challenge of...Loe edasi...
Unleash your inner dynamo and step into the spotlight with confidence, clarity, and charisma! This isnt your average training manualits a turbo-charged transformation toolkit for anyone whos ever stood in front of a classroom, a boardroom, or even...Loe edasi...
The emergence of quantum computing introduces a significant shift in the digital and security landscapeprompting organizations to reassess the foundations of how we protect information. Systematic Security: Building Quantum Securityis a practical gu...Loe edasi...
Forensic Investigation of Smart Connected Devices: A Hands-on Guide provides a thorough and practical resource for addressing the forensic challenges associated with these technologies. This book explores the forensic investigation of a wide array...Loe edasi...
The book offers practical guidelines for managing IT suppliers.The initial chapters explores the fundamentals of vendor selection and the principles of effective negotiation.Subsequent sections explore advanced topics such as drafting comprehensive...Loe edasi...
Metaverse Platform Implementation: AI, Security, and Applications provides a comprehensive exploration of the engineering and scientific principles behind the metaverse, a 3D digital world designed to replicate and enhance physical reality through s...Loe edasi...
The proposed book serves as a comprehensive guide, covering the fundamentals of cloud computing, advanced concepts, and practical applications....Loe edasi...
Offers a comprehensive exploration of cutting-edge technologies and methodologies at the intersection of cybersecurity and digital innovation....Loe edasi...
This book unravels the technical intricacies and recent developments of Bluetooth® LE Audio technology. Covering everything from the radio frequency model and LC3 codec to application profiles and use cases, it provides a deep dive into the new arch...Loe edasi...
This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, offering a detailed analysis of how these technologies are reshaping the security landscape...Loe edasi...
This book offers a practical and in-depth exploration of Open-Source Intelligence (OSINT) tailored for cybersecurity professionals, digital investigators, and threat analysts....Loe edasi...
The book explores AI model types including Large Language Models and multimodal embeddings alongside reinforcement learning and decision-priming simulations while discussing their impact on finance and marketing alongside healthcare and customer ser...Loe edasi...
Project Management can play a key role in arriving at an effective decision in various functional areas of management. This book focuses on the integral role of project management in an organization. All aspects of a project, like identification, pl...Loe edasi...
In an era where technological behemoths wield unprecedented power over the digital landscape, this book is a call for autonomy, security, and innovation through the open-source revolution. It not only challenges the status quo but also unfolds a blu...Loe edasi...
Its Not In the Manual shatters the illusion that effective leadership in security, risk, and resilience is all about titles, certifications, or rigid frameworks. In a world where cyber threats, insider risk, reputational landmines, and geopolitical...Loe edasi...
This book provides a comprehensive overview of cybersecurity management in ports, cybersecurity vulnerabilities, and managerial strategies to improve cyber resilience. It will appeal to students and researchers in the field, and practitioners intere...Loe edasi...
In todays digital landscape, no company is immune to cyber-attacks, making preparedness essential for any organization, regardless of size. Enter the world of Tabletop Exercises (TTX), a cost-effective and results-driven approach to test cyber cris...Loe edasi...
Cryptography has long been an essential tool in safeguarding digital communication and securing sensitive information. As technology has progressed, so has the complexity of the methods used to protect our data....Loe edasi...
This book systematically addresses the security and resilience of networked agent systems, from sensor networks to general multi-agent systems, against evolving cyber threats....Loe edasi...
Digital transformation is inevitable. The eras of if and when are over and the urgent question of how to best lead, manage and navigate this process is upon us. Now in its second edition, Managing Digital Transformation brings together scientifica...Loe edasi...
Delivering an end-to-end strategy execution perspective, the book begins with strategy formulation and progresses through impact analysis, business and systems design, initiative scoping and funding, and solution deployment. It provides organization...Loe edasi...
Securing Health: The Convergence of AI and Cybersecurity in Healthcare explores how emerging technologies are revolutionizing modern medicine, ensuring not just innovation but safety and trust in the digital age....Loe edasi...
The book focuses on the fundamental principles of IBN technology operation and integration for managing 5G and beyond. Intent-based networking can not only largely automate processes, but also improve connectivity and increase the efficiency of netw...Loe edasi...
In todays hyperconnected world, digital threats lurk in every corner of cyberspace. This comprehensive guide equips you with essential knowledge to identify, mitigate and counter cyber threats, navigating the increasingly dangerous digital landscap...Loe edasi...
The text covers diverse areas of security frameworks and software-defined fixes for security problems in 6G and the Internet of Things networks. It presents applications and case studies in diverse sectors including transportation, healthcare, and s...Loe edasi...
Sari: River Publishers Series in Communications and Networking
(Ilmumisaeg: 08-Dec-2025, Kirjastus: River Publishers, ISBN-13: 9788770041478)
This book provides comprehensive insight into the end-to-end automation journey of telecommunications. It explores the vision of zero-touch, AI-native network and service autonomy, examining key trends, catalysts, and technological advancements....Loe edasi...
Built on Huaweis pioneering research, this book provides a comprehensive introduction to the architecture, techniques, and deployment of IPv6 on-path telemetry, highlighting the most recent developments in IP network technologies....Loe edasi...
This book explores the transformative potential of Explainable AI (XAI) in enhancing healthcare delivery and XAIs role in fostering transparency, trust, and accountability in AI-driven medical decision-making....Loe edasi...
The need for this book arises from the growing cybersecurity challenges faced by small to medium-sized healthcare facilities, which often lack the resources, expertise, and dedicated staff to interpret and implement complex security regulations....Loe edasi...
This book offers a hands-on guide to cloud security from both offensive and defensive perspectives. It explores real-world threats like phishing, data exfiltration, and zero-day exploits, while equipping professionals with tools for threat modeling,...Loe edasi...
Mastering Cybersecurity A Practical Guide to Cyber Tools & Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniq...Loe edasi...
This book examines the complex interplay between state-of-the-art telecommunications, smart city initiatives, and the Internet of Things (IoT), analyzing the security challenges and opportunities that emerge as the world ventures into this technolog...Loe edasi...
This book examines the potential benefits of cyber-physical systems (CPS) and applications for rural development. It provides an in-depth examination of theoretical concepts, in addition to presenting real-world case studies and methodological frame...Loe edasi...
Explores the foundational concepts of IIoT, emphasizing ethical development, sustainable design, and human-centric solutions. The book concludes with strategies to overcome ethical challenges, shaping a secure, inclusive, and sustainable technologic...Loe edasi...
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is no longer optional but imperative. Cyberattacks on mobile platforms surge yearly, with vulnerabilities in banking, healthcare, and...Loe edasi...
This book explores digital innovation in the service sector and its potential for driving business transformation. It examines the various ways in which digital technologies are revolutionizing service-oriented industries and offers practical insigh...Loe edasi...
This book provides a hands-on, research-driven guide to building, deploying, and understanding machine learning models tailored for securing IIoT and WSN environments....Loe edasi...
(Ilmumisaeg: 17-Nov-2025, Kirjastus: Apple Academic Press Inc., ISBN-13: 9781779643421)
Explores many facets of CPS in robotics and engineering. Presents a host of cutting-edge technologies and approaches, with examples of real-world implementation, for CPS systems in industrial applications as well as in other sectors, such as transpo...Loe edasi...
The book Anatomy of IoT Botnets and Detection Methods delves into the evolving landscape of cybersecurity threats associated with the Internet of Things (IoT), specifically focusing on the anatomy, behavior, and detection of IoT-based botnets....Loe edasi...
Business executives consider what is necessary to protect the company. It comes down to people, process and technology, organized within an information security program. Everything has its place within the program, including business processes, asse...Loe edasi...
Digital Forensics in Next Generation Internet for Medical Things: Balancing Security and Sustainability provides a comprehensive exploration of the security challenges and solutions with the digital sustainability in the rapidly evolving digital lan...Loe edasi...
Localization and mapping play a critical role in the autonomous task execution of mobile robots. This book covers the theoretical and technological aspects of robot localization and mapping, including visual localization and mapping, visual relocali...Loe edasi...
Scaling Pyramids: Leadership Lessons from a Mid-Level Bureaucrat is an honest, engaging, and research-informed exploration of what it means to lead from the bottom and middle of an organizationespecially within complex systems that arent always buil...Loe edasi...
This two-volume set provides a comprehensive study of fractional random vibration from the perspective of theory and practice. Volume II provides the analytical expressions for the responses of seven classes of fractional vibration systems excited b...Loe edasi...
This book explores the practical use of data science in AI, healthcare, sustainability, and security. It covers key topics like predictive modelling, deep learning, and natural language processing, offering a mix of theory and hands-on applications....Loe edasi...
The book is a practical guide to be used by people with no or little knowledge of sustainability and also sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted by...Loe edasi...