(Izdošanas datums: 19-Jan-2020, Hardback, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662603581)
This book deals with computer performance by addressing basic preconditions. Besides general considerations about performance, several new approaches are presented. One of them targets memory structures by introducing the possibility of overlap...Lasīt vairāk
This book provides a comprehensive analysis of Brooks-Iyengar Distributed Sensing Algorithm, which brings together the power of Byzantine Agreement and sensor fusion in building a fault-tolerant distributed sensor network....Lasīt vairāk
This work aims at understanding behavior around location information, including why users share such information, why they protect the data, and what kind of other factors influence the decision to behave in a certain way. This book explores privacy...Lasīt vairāk
Andy Taylor, David Alexander, Amanda Finch, David Sutton, Andy Taylor
(Izdošanas datums: 15-Jan-2020, Paperback / softback, Izdevniecība: BCS, The Chartered Institute for IT, ISBN-13: 9781780175188)
This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Secu...Lasīt vairāk
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retin...Lasīt vairāk
This book provides the conceptual foundation of security risk assessment and thereby enables reasoning about risk from first principles. It presents the underlying theory that is the basis of a rigorous and universally applicable security r...Lasīt vairāk
(Izdošanas datums: 13-Jan-2020, Hardback, Izdevniecība: World Scientific Publishing Co Pte Ltd, ISBN-13: 9789811204456)
In an era of unprecedented volatile political and economic environments across the world, computer-based cyber security systems face ever growing challenges. While the internet has created a global platform for the exchange of ideas, goods and ser...Lasīt vairāk
This book has a two-fold mission: to explain and facilitate digital transition in business organizations using information and communications technology and to address the associated growing threat of cyber crime and the challenge of creating and...Lasīt vairāk
This book strives to take stock of current achievements and existing challenges in nuclear verification, identify the available information and gaps that can act as drivers for exploring new approaches to verification strategies and technologie...Lasīt vairāk
The MS-101 exam is part of the Microsoft 365 Certified: Enterprise Administrator Expert certification path in which users learn to evaluate, plan, migrate, deploy, and manage Microsoft 365 services. This book offers complete, up-to-date coverag...Lasīt vairāk
The subjects of this volume are more relevant than ever, especially in light of the raft of electoral scandals concerning voter profiling. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions,...Lasīt vairāk
This book articulates how crime prevention research and practice can be reimagined for an increasingly digital world. This ground-breaking work explores how criminology can apply longstanding, traditional crime prevention techniques to the...Lasīt vairāk
Big Data, gathered together and re-analysed, can be used to form endless variations of our persons - so-called data doubles. Whilst never a precise portrayal of who we are, they unarguably contain glimpses of details about us that, when deployed...Lasīt vairāk
CSS in easy steps, 4th edition begins by explaining how Cascading Style Sheets (CSS) can determine the presentation of elements within HTML documents. Examples show how style sheet rules can control content position and appearance...Lasīt vairāk
This book gathers selected high-quality research papers presented at the Fourth International Congress on Information and Communication Technology, held at Brunel University, London, on February 27-28, 2019....Lasīt vairāk
Learn to engineer privacy into software, systems, and applications. This book is a resource for developers, engineers, architects, and coders. It provides tools, methodologies, templates, worksheets and guidance on engineering privacy into softw...Lasīt vairāk
Learn how to design, develop, and deploy smart contracts on the Ethereum blockchain. With this practical book, software developers with a high-level understanding of the blockchain will use the Solidity programming language to write decentraliz...Lasīt vairāk
As a decentralized ledger platform, Corda shares several characteristics with blockchain. But Corda&;s design serves large enterprises, especially financials such as insurance, trading, and trade finance that require data privacy and perm...Lasīt vairāk