(Ilmumisaeg: 12-May-2026, EPUB+DRM, Kirjastus: Columbia University Press, ISBN-13: 9780231561853)
Will we one day inhabit virtual worlds? From the buzz around Second Life in the early 2000s to Mark Zuckerbergs much-hyped quest for the Metaverse, there seems to be a clear pattern. After being touted as revolutionary, virtual worlds fail to meet e...Loe edasi...
(Ilmumisaeg: 12-May-2026, PDF+DRM, Kirjastus: Columbia University Press, ISBN-13: 9780231565752)
Will we one day inhabit virtual worlds? From the buzz around Second Life in the early 2000s to Mark Zuckerbergs much-hyped quest for the Metaverse, there seems to be a clear pattern. After being touted as revolutionary, virtual worlds fail to meet e...Loe edasi...
(Ilmumisaeg: 26-Apr-2026, PDF+DRM, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783662724170)
This book introduces a unified framework for control and detection that brings together concepts from the unified design of control and detection systems and extends them into a comprehensive methodology for analysing and synthesising control, fault...Loe edasi...
(Ilmumisaeg: 26-Apr-2026, EPUB+DRM, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783662724170)
This book introduces a unified framework for control and detection that brings together concepts from the unified design of control and detection systems and extends them into a comprehensive methodology for analysing and synthesising control, fault...Loe edasi...
This four-volume set LNISCT 687-690 constitutes the proceedings of the 21st EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2025, held in Xiangtan, China, during July 4 - 6, 2025.The 119 full papers inc...Loe edasi...
This four-volume set LNISCT 687-690 constitutes the proceedings of the 21st EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2025, held in Xiangtan, China, during July 4 - 6, 2025.The 119 full papers inc...Loe edasi...
(Ilmumisaeg: 23-Apr-2026, EPUB+DRM, Kirjastus: Distributed via Draft2Digital, ISBN-13: 9798235642652)
**Your smart home isnt connected; its compromised.**Youve bought the latest router and installed antivirus, yet your smart cameras still leak data and your kids keep downloading malware. Generic advice tells you to "e;change your password,&quo...Loe edasi...
Secure computation allows any number of mutually distrustful parties to jointly run an arbitrary computation on their combined inputs without compromising their privacy. Secure computation offers a theoretical solution to a vast array of problems whe...Loe edasi...
Secure computation allows any number of mutually distrustful parties to jointly run an arbitrary computation on their combined inputs without compromising their privacy. Secure computation offers a theoretical solution to a vast array of problems whe...Loe edasi...
This book constitutes the refereed proceedings of the 20th International Conference on Critical Information Infrastructures Security, CRITIS 2025, held in Jönköping, Sweden, during October 21–23, 2025.The 22 full papers presented in t...Loe edasi...
This book constitutes the refereed proceedings of the 20th International Conference on Critical Information Infrastructures Security, CRITIS 2025, held in Jönköping, Sweden, during October 21–23, 2025.The 22 full papers presented in t...Loe edasi...
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information and Communication Technology for Competitive Strategies. The conference is organized in Jaipur, India during 15–17 December...Loe edasi...
This book contains best-selected research papers presented at ICTCS 2025: Tenth International Conference on Information and Communication Technology for Competitive Strategies. The conference is organized in Jaipur, India during 15–17 December...Loe edasi...
This book constitutes the refereed proceedings of the first International Conference on Cybersecurity, IoT, Data Science and Digital Forensics, CIDDF 2025, held in The Woodlands, Texas, USA, during October 2–4, 2025.The 13 full papers and one s...Loe edasi...
This book constitutes the refereed proceedings of the first International Conference on Cybersecurity, IoT, Data Science and Digital Forensics, CIDDF 2025, held in The Woodlands, Texas, USA, during October 2–4, 2025.The 13 full papers and one s...Loe edasi...
(Ilmumisaeg: 21-Apr-2026, EPUB+DRM, Kirjastus: Distributed via Draft2Digital, ISBN-13: 9798235430815)
Master the ISC2 Certified in Cybersecurity (CC) exam with this extensive practice test collection. Whether you are starting your journey in cybersecurity or validating your foundational knowledge, this course provides the rigorous testing environment...Loe edasi...
The Third Annual AI Workshop at Embry Riddle Aeronautical University, ERAI 2025, took place in Prescott, AZ, USA, during August 15-16, 2025.The 15 papers presented were carefully reviewed and selected for inclusion in the proceedings book. They deal...Loe edasi...
The Third Annual AI Workshop at Embry Riddle Aeronautical University, ERAI 2025, took place in Prescott, AZ, USA, during August 15-16, 2025.The 15 papers presented were carefully reviewed and selected for inclusion in the proceedings book. They deal...Loe edasi...
The three-volume set LNCS 16231, LNCS 16232, and LNCS 16233 constitutes the refereed proceedings of twelve International Workshops which were held in conjunction with the 30th European Symposium on Research in Computer Security, ESORICS 2025, in Toul...Loe edasi...
The three-volume set LNCS 16231, LNCS 16232, and LNCS 16233 constitutes the refereed proceedings of twelve International Workshops which were held in conjunction with the 30th European Symposium on Research in Computer Security, ESORICS 2025, in Toul...Loe edasi...