0411~0412_秘密中的秘密
0411~0413_這本書金實在

英文書 > 全部商品

Software Engineering and Formal Methods. Sefm 2024 Collocated Workshops

Springer 出版
2025/08/13 出版

This volume constitutes the papers of two workshops which were held in conjunction with the 22nd International Workshop on Software Engineering and Formal Methods, SEFM 2024 Collocated Workshops, held in Aveiro, Portugal, during November 4-5, 2024. The 20 full papers presented in this book were carefully reviewed and selected from 36 submissions. SEFM 2024 Collocated Workshops presents the following two workshops: ReacTS 2024: International Workshop on Reconfigurable Transition Systems: Semantics, Logics and Applications. CIFMA 2024: 6th International Workshop on Cognition: Interdisciplinary Foundations, Models and Applications.

9 特價4175
立即代訂
下次再買

Computational Science and Computational Intelligence

Springer 出版
2025/08/13 出版

This CCIS book constitutes selected papers accepted in the Research Track on Signal and Image Processing, Computer Vision and Pattern Recognition, and the Research Track on Parallel and Distributed Computing held as part of the 11th International Conference on Computational Science and Computational Intelligence, CSCI 2024, which took place in Las Vegas, NV, USA, during December 11-13, 2024. The Research Track on ignal and Image Processing, Computer Vision and Pattern Recognition, CSCI-RTPD, received 108 submissions of which 21 papers were accepted. For the Research Track on Parallel and Distributed Computing, CSCI-RTPD, 7 papers were accepted from 30 submissions. They were organized in topical sections on signal and image processing, computer vision and pattern recognition; signal and image processing, and medical applications; parallel and distributed computing, HPC and applications; and ongoing research projects and posters.

9 特價4436
立即代訂
下次再買

Artifiai for Aging Rehabilitation and Intelligent Assisted Living

Springer 出版
2025/08/13 出版

This book constitutes the refereed proceedings of the 8th International Workshop on ArtifiAI for Aging Rehabilitation and Intelligent Assisted Living, ARIAL 2025, Held in Conjunction with IJCAI 2025, Montreal, QC, Canada, August 16-22, 2025, Proceedings. The 10 full papers presented in this volume were carefully reviewed and selected from 14 submissions. They are grouped into the following topics: Multimodal data collection; Telemedicine; Sensor-based remote monitoring; Privacy-preserving algorithms; and Generative AI in elderly care.

9 特價4175
立即代訂
下次再買

Modern REST API Development in Go

Packt 出版
2025/08/13 出版

Master REST API design in Go in a pragmatic way by building production-ready web services using the Go standard library and idiomatic patternsKey Features: - Build scalable APIs using Go's robust standard library and HTTP tooling- Explore security, observability, and testing from a backend engineering perspective- Learn foundational REST principles by building a complete Go-based projectBook Description: Modern REST API Development in Go is a hands-on guide to understanding and applying REST principles using Go's powerful standard library. In an era where interconnected systems demand robust and performant APIs, Go offers the perfect combination of simplicity, performance, and tooling to build modern backend services.This book is centered around a complete, real-world REST API project and guides you through every stage of the development process, from building HTTP handlers to applying authentication and generating OpenAPI documentation. You'll learn to structure your application, handle persistence with common libraries like GORM and Squirrel, apply observability patterns through logging and tracing, and ensure code quality through unit and integration tests. Each concept is grounded in REST theory and backed by idiomatic Go practices, enabling you to build APIs that are not only functional but production-ready. By the end of the book, you'll be ready to design, build, and maintain REST APIs in Go.What You Will Learn: - Understand and implement HTTP handlers in Go- Create and manage RESTful routes- Persist and model data using GORM and Squirrel- Secure APIs with JWTs and basic authentication- Validate incoming requests with custom logic- Log and trace API activity for observability- Write unit and integration tests for endpoints- Generate API documentation using OpenAPIWho this book is for: This book is for developers who want to begin building REST APIs using the Go language. Whether you're new to Go or experienced in backend development, you'll gain practical skills and foundational knowledge to build secure, performant, and maintainable APIs. Ideal for backend engineers, system integrators, and full-stack developers entering the Go ecosystem.Table of Contents- Introduction to APIs- Exploring REST APIs- Building a REST Client- Designing Your REST API- Authentication and Authorization- Data Persistency- API Security- API Performance- Deploying Your API- Testing- Documenting with OpenAPI- Metrics, Logs, and Traces- Using GORM- Using the Echo Framework

9 特價2064
立即代訂
下次再買

The AI Advantage

Thin Leaf Press 出版
2025/08/13 出版

Artificial Intelligence is no longer science fiction. It is here!Will you use AI to your advantage or will you fall behind?For decades, artificial intelligence has captured the human imagination-from sentient machines in science fiction to real-world breakthroughs that now shape our everyday lives. The AI Advantage offers readers a practical guide to understanding and using AI in a world that is rapidly transforming.This book, written by a team of AI experts from diverse fields including business, healthcare, education, cybersecurity, creative arts, and more, gives readers the clarity needed to thrive in the age of intelligent machines.The AI Advantage is a blueprint for personal and professional growth. Each chapter explores how AI tools are already reshaping industries, automating tasks, unlocking new creative possibilities, and enhancing decision-making. Whether you're a manager, entrepreneur, educator, student, or simply curious about what AI means for your life, this book helps you get started using AI tools that increase productivity, spark innovation, and create meaningful advantage in your work and daily routines.At a time when hype and fear often dominate the conversation around artificial intelligence, The AI Advantage offers a grounded, hopeful perspective. It doesn't promise utopia or predict doom-it gives you something far more valuable: a place to start.Discover what's possible, what's coming, and how to move forward with purpose in this new era. The AI Advantage is your invitation to stop watching the future happen-and start shaping it.The co-authors in this book include Heikki Almay, Nik Baker, Romit Bhatia, Sarah Choudhary, PhD, Pedro Clark Leite, Jingying Gao, PhD, Vivek Gnanavelu, Yuri Gubin, Julien Guille, Anil Hari, Ofer Hermoni, PhD, Maman Ibrahim, Anupriya Jain, Lydia James, Bridget Kovacs, Matt Kurleto, Arnaud Lucas, Samer Madfouni, Parul Malik, Nathaniel J. Melby, PhD, Kurt Mueller, Giorgio Natili, Lech Nowak, Rory O'Keeffe, Izak Oosthuizen, Elisa Phillips, Paul Powers, Gabriele Sangugino, Linda Sinisi, Greg Starling, Jodessiah Sumpter, Sakina Syed, and Ersin Uzun, PhD.

9 特價786
立即代訂
下次再買

Science, Engineering Management and Information Technology

A,Mirzazadeh  著
Springer 出版
2025/08/13 出版

This book constitutes selected papers presented at the the 4th International Conference on Science, Engineering Management and Information Technology, SEMIT 2024, held in Ankara, Turkey, during September 12-13, 2024. The 27 full papers included in this book were carefully reviewed and selected from 123 submissions. These papers were organized in the following topical sections: Advances of AI/ML and Optimization in IT and Engineering; Novel AI Techniques in Healthcare and Medicine; Digital Technologies for Customer Service Orientation and Social Sustainability; Applications of AI/ML/DL in Traffic and Transportation Engineering.

9 特價7307
立即代訂
下次再買

Big Data and Social Computing

Springer 出版
2025/08/13 出版

This book constitutes the refereed proceedings of the 10th China National Conference on Big Data and Social Computing, BDSC 2025, held in Kunming, China, during August 15-17, 2025. The 40 full papers included in this book were carefully reviewed and selected from 140 submissions. They were organized in topical sections as follows: Digital Society Construction and Governance; Modelling and Simulation of Social Systems; Internet Intelligent Algorithm Governance; Social Network and Group Behavior; Innovation, Risks, and Security of Large Language Models; Artificial Intelligence and Cognitive Science; Applications of Large Language Models in Societal Contexts and Social Geography and Urban Computing.

9 特價5219
立即代訂
下次再買

Discrete and Computational Geometry, Graphs, and Games

Jin,Akiyama  著
Springer 出版
2025/08/12 出版

This book, LNCS 14364, constitutes the refereed proceedings of the 24th Japanese Conference on Discrete and Computational Geometry and Graphs, JCDCGGG 2022, held virtually during September 9-11, 2022. The 22 full papers included in this volume were carefully reviewed and selected from 35 submissions. The papers feature advances made in the field of computational geometry and focus on emerging technologies, new methodology and applications, graph theory and dynamics.

9 特價5219
立即代訂
下次再買

Ultimate AI-Assisted Development with GitHub Copilot

2025/08/12 出版

Code smarter, Test faster, and Build better with GitHub Copilot! Book DescriptionAI-assisted coding is transforming how software is built-faster, smarter, and with fewer errors. GitHub Copilot leads this revolution by turning natural language into functional code, enabling developers to focus on solving problems rather than writing boilerplate. The Ultimate AI-Assisted Development with GitHub Copilot takes you step-by-step through mastering Copilot, starting with initial setup and basic use across multiple languages like Java, Python, TypeScript, Go, and C++. You'll explore prompt engineering techniques to craft effective instructions, leverage multi-modal inputs to interact beyond text, and unlock advanced features like Vibe Coding and Agent Mode to create context-aware, intelligent workflows. The book also covers integrating Copilot into testing and debugging processes, automating repetitive tasks, and embedding AI-powered coding into CI/CD pipelines to streamline DevOps practices. Whether you're building APIs, automating tests, refactoring code, or optimizing release workflows, this book teaches you how to collaborate with AI-not just use it. Don't get left behind-unlock the full potential of GitHub Copilot and future-proof your skills today. Table of Contents1. The Rise of AI in Coding2. Getting Started with GitHub Copilot3. JavaScript/TypeScript with GitHub Copilot4. Python and AI-Assisted Coding5. Java with Copilot6. C/C++ with Copilot7. Go Programming with Copilot8. Pair Programming with Copilot9. Advanced Techniques with Copilot10. Testing and Debugging with Copilot11. Updating Workflows with GitHub Copilot12. Integrating Copilot with IDEs13. Best Practices and Limitations14. Copilot in Education15. Real-World Use Cases and Case Studies16. The Future of AI-Assisted Coding17. Recap of the Key Points Index

9 特價1901
立即代訂
下次再買

Mobile Web and Intelligent Information Systems

Springer 出版
2025/08/12 出版

This book constitutes the refereed proceedings of the 21st International Conference on Mobile Web and Intelligent Information Systems, MobiWIS 2025, held in Istanbul, T羹rkiye, during August 11-13, 2025. The 23 full papers and one short paper included in this book were carefully reviewed and selected from 75 submissions. They were organized in topical sections as follows: Mobile Web and Enterprises, Blockchain Technologies, Security and Privacy, Advanced AI Approaches, Mobile Systems and Applications, and Networking and SDN.

9 特價3914
立即代訂
下次再買

New Trends in Mathematical Modeling, Analysis and Optimization for Engineering and Mechanics

Pedro,Navas  著
Mdpi AG 出版
2025/08/11 出版

Computational modeling has become essential in the engineering field in recent years, providing necessary analyses for real-life problems. Alongside this, optimization techniques have evolved to enhance solutions across diverse problems. Recent advances, including mesh-free methodologies and innovative finite element approaches, have emerged to complete a powerful range of tools for accurately reproducing engineering mechanical problems. This reprint compiles the accepted articles from the Special Issue of Mathematics (MDPI) titled "New Trends in Mathematical Modeling, Analysis and Optimization for Engineering and Mechanics". It serves as a valuable resource for researchers working on advanced mathematical modeling, numerical methods and optimization techniques in engineering and mechanics.

9 特價4896
立即代訂
下次再買

Computational Science and Computational Intelligence

Springer 出版
2025/08/11 出版

This CCIS book constitutes selected papers accepted in the Research Track on Big Data and Data Science and the Research Track on Social Network Analysis, Social Media and Mining held as part of the International Conference on Computational Science and Computational Intelligence, CSCI 2024, which took place in Las Vegas, NV, USA, during December 11-13, 2024. The Research Track on Big Data and Data Science, CSCI-RTBD, received 72 submissions of which 18 papers were accepted. For the Research Track on Social Network Analysis, Social Media and Mining, CSCI-RTNA, 7 papers were accepted from 41 submissions. They were organized in topical sections on Big Data and Data Science - applications and algorithms; Social Network Analysis, Social Media, and Mining; and Ongoing Research Projects and Posters.

9 特價4436
立即代訂
下次再買

Mastering Digital Product Management

2025/08/11 出版

The digital landscape is rapidly evolving, demanding skilled product managers who can consistently deliver innovative solutions and build trusted products. This book provides the essential frameworks and practical strategies to navigate this dynamic environment, transforming concepts into market-leading digital products.This book systematically guides you from foundational digital product management principles and roles to crafting a powerful product vision based on deep customer understanding. You will learn to develop product market strategies, emphasizing innovation and competitive analysis, while mastering techniques for building product value and stickiness. From product journey to implementing customer-centric design and leveraging data-driven insights for informed decisions, this book gets into Agile development methodologies, including sprints, provides comprehensive product sales strategies and business model insights, and equips you with the versatile skills for project management, stakeholder management, and storytelling.Readers will be equipped with a foundational mindset, practical tools, and a real-world perspective on how to handle situations confidently, while reshaping the way they think with a strategic mindset. This book will act as a toolkit where they will not just walk away with theory, but with a multifaceted product thinking capability. WHAT YOU WILL LEARN● Efficiently apply frameworks for product innovation from ideas to launch.● Identify and validate real customer problems.● Navigate the product journey with roadmaps and pre-launch.● Learn to prioritize product features with data and gain stakeholder alignment.● Hone PM soft skills: influence, negotiation, storytelling. ● Craft a roadmap that reflects strategy and user value. WHO THIS BOOK IS FORThis book is for aspiring and early to mid-stage product managers, graduate students, and professionals like UX designers, engineers, business analysts, product owners, or product marketing managers transitioning into digital product management. It is also ideal for experienced professionals in the tech or business field who want a structured, practical understanding of digital product management from end-to-end.

9 特價1833
立即代訂
下次再買

Collaborative Computing: Networking, Applications and Worksharing

Honghao,Gao  著
Springer 出版
2025/08/11 出版

The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14-17, 2024. The 62 full papers were carefully reviewed and selected from 173 submissions. They are categorized under the topical sections as follows: Edge computing & Task scheduling Deep Learning and application Blockchain applications Security and Privacy Protection Representation learning & Collaborative working Graph neural networks & Recommendation systems Federated Learning and application

9 特價5219
立即代訂
下次再買

Intelligent Computing

Kohei,Arai  著
Springer 出版
2025/08/11 出版
9 特價13049
立即代訂
下次再買

The Computer Security Workbook

Springer 出版
2025/08/11 出版

Mastering computer security requires more than just technical knowledge of software, systems and networks--it demands analytical thinking, a problem-solving mindset, and creative reasoning. These skills are best cultivated through practical challenges and structured problem-solving. This book presents a collection of questions and problems on a wide range of topics typically taught in introductory computer security courses, including basic concepts and principles, authentication techniques, access control models and methods, network security, software vulnerabilities, and malware. Topics and features: The content is organized into sections and chapters that are mostly self-contained, so readers can explore them in any order. This unique textbook/reference offers broad appeal: The exercises are intended to complement other learning materials and are tailored to different skill levels, allowing beginners to build a strong foundation while offering advanced challenges to more experienced learners.

9 特價2870
立即代訂
下次再買

Collaborative Computing: Networking, Applications and Worksharing

Honghao,Gao  著
Springer 出版
2025/08/11 出版

The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14-17, 2024. The 62 full papers were carefully reviewed and selected from 173 submissions. They are categorized under the topical sections as follows: Edge computing & Task scheduling Deep Learning and application Blockchain applications Security and Privacy Protection Representation learning & Collaborative working Graph neural networks & Recommendation systems Federated Learning and application

9 特價5219
立即代訂
下次再買

Availability, Reliability and Security

Springer 出版
2025/08/11 出版

This two-volume set LNCS 15998-15999 constitutes the proceedings of the ARES 2025 EU Projects Symposium Workshops, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 42 full papers presented in this book were carefully reviewed and selected from 92 submissions. They contain papers of the following workshops: Part I: 5th International Workshop on Advances on Privacy Preserving Technologies and Solutions (IWAPS 2025); 6th Workshop on Security, Privacy, and Identity Management in the Cloud (SECPID 2025); First International Workshop on Secure, Trustworthy, and Robust AI (STRAI 2025); 5th International Workshop on Security and Privacy in Intelligent Infrastructures (SP2I 2025). Part II: 5th workshop on Education, Training and Awareness in Cybersecurity (ETACS 2025); 5th International Workshop on Security Testing and Monitoring (STAM 2025); 8th International Workshop on Emerging Network Security (ENS 2025).

9 特價3914
立即代訂
下次再買

Mathematical Modelling and Numerical Analysis in Electrical Engineering, 2nd Edition

Mdpi AG 出版
2025/08/11 出版

The Second Edition of this Special Issue book, titled "Mathematical Modelling and Numerical Analysis in Electrical Engineering, 2nd Edition", builds upon the success of the first edition published in August 2024. It continues to showcase cutting-edge applications of mathematical modelling and numerical analysis in electrical engineering. This edition comprises ten papers, demonstrating significant advancements across key research themes aligned with the objectives of the Special Issue. A feature paper by Hoang et al. presents an innovative rotational speed sensor based on FSM technology for superior and accurate speed measurement applications. Hoang et al. then applied harmonic modelling on eddy-current speed sensors. Garmut et al. present research on optimisation of IPMSM BLDC drives with neural network modelling. Cha at al. contribute a high-efficiency external rotor IPMSM using GPM and optimisation techniques. Nguyen et al.'s two studies employed subdomain modelling for the rapid analysis of WRSC and optimisation of a coaxial magnetic gear. Onokwai et al. implemented a combined metaheuristic algorithm with RSM to optimise GTPP performance. Baier et al. applied mathematical modelling on CSIs for grid-connected systems. Brezovnik et al. and Rahmanovic et al. advanced mathematical approximation techniques for the fast analytical calculation of a spot-welding system and the comparative modelling of NO steel materials using B矇zier curves, respectively.

9 特價5544
立即代訂
下次再買

Computational Science and Computational Intelligence

Springer 出版
2025/08/11 出版

The CCIS book constitutes selected papers accepted in the Research Track on Education of the 11th International Conference on Computational Science and Computational Intelligence, CSCI 2024, which took place in Las Vegas, NV, USA, during December 11-13, 2024. The 26 full papers included in this book were carefully reviewed and selected from a total of 155 submissions. They were organized in topical sections on subject-specific education and curriculum design; education and artificial intelligence; teaching and learning strategies and related reserach studies.

9 特價4436
立即代訂
下次再買

Lotus Magazine

Anonymous  著
2025/08/11 出版

Lotus Magazine, Volume 10, offers a comprehensive look into the world of Lotus software and related technologies. This volume provides readers with in-depth articles, tips, and tutorials designed to enhance their understanding and utilization of Lotus applications. Explore a range of topics, from advanced techniques to practical solutions, catering to both novice and experienced users alike.This magazine serves as an invaluable resource for anyone seeking to maximize their productivity and efficiency with Lotus software. Dive into detailed discussions, expert insights, and real-world examples that showcase the power and versatility of Lotus applications. Whether you're a professional or a hobbyist, Lotus Magazine, Volume 10, provides the knowledge and skills needed to excel in the digital landscape.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1144
立即代訂
下次再買

Fractional Differential Equations

Mdpi AG 出版
2025/08/11 出版

In recent times, researchers across various fields have become interested in the topic of fractional calculus based on integrals and derivatives of fractional order. This area has numerous and widespread applications in fields of science and engineering, including wave and fluid dynamics, mathematical biology, financial systems, structural dynamics, robotics, and artificial intelligence, among others. Therefore, fractional models have become relevant in the context of phenomena with memory effects, in place of the conventional reliance on ordinary or partial differential equations. Fractional calculus offers superior tools for addressing time-dependent effects compared to integer-order calculus, which forms the foundation of most mathematical systems. As a result, fractional calculus is crucial to modeling real-life problems, and finding mathematical solutions is a great challenge in this regard.

9 特價7487
立即代訂
下次再買

Smart Objects and Technologies for Social Good

Springer 出版
2025/08/11 出版

The two-volume set LNICST 648 and 649 constitutes the refereed post-conference proceedings of the 10th EAI International Conference on Smart Objects and Technologies for Social Goods, GOODTECHS 2024, held in Can Tho, Vietnam, during December 19-20, 2024. The 17 full papers and 27 short papers included in these volumes were carefully reviewed and selected from 102 submissions. They focus on a wide range of advancements in smart technologies aimed at promoting social good. Key topics include cutting-edge research in Internet of Things (IoT) security, innovative applications of artificial intelligence in domains such as healthcare, education, and environmental monitoring, and energy-efficient systems. They were organized in topical sections as follows: Part I: Advances in Artificial Intelligence, Machine Learning, and Blockchain Applications Across Diverse Domains Part II: Innovations in Energy-Based Models, and Advanced Predictive Systems Across Diverse Domains

9 特價4175
立即代訂
下次再買

Collaborative Computing: Networking, Applications and Worksharing

Honghao,Gao  著
Springer 出版
2025/08/11 出版

The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14-17, 2024. The 62 full papers were carefully reviewed and selected from 173 submissions. They are categorized under the topical sections as follows: Edge computing & Task scheduling Deep Learning and application Blockchain applications Security and Privacy Protection Representation learning & Collaborative working Graph neural networks & Recommendation systems Federated Learning and application

9 特價5219
立即代訂
下次再買

Availability, Reliability and Security

Springer 出版
2025/08/11 出版

This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025.The 34 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 186 submissions.They cover topics such as: Privacy-Enhancing Technologies and Legal Compliance; Network and Communication Security; IoT and Embedded Systems Security; Machine Learning and Privacy; Usable Security and Awareness; System Security; Supply Chain Security, Malware and Forensics; and Machine Learning and Security.

9 特價4175
立即代訂
下次再買

Computational Science and Computational Intelligence

Springer 出版
2025/08/11 出版

This CCIS book constitutes selected papers accepted in the Research Track on Smart Cities and Smart Mobility and the Research Track on Software Engineering of the 11th International Conference on Computational Science and Computational Intelligence, CSCI 2024, which took place in Las Vegas, NV, USA, during December 11-13, 2024. The Research Track on Smart Cities and Smart Mobility, CSCI-RTSC, received 75 submissions of which 15 papers were accepted. For the Research Track on Software Engineering, CSCI-RTSE, 13 papers were accepted from 58 submissions, 12 of these are included in this volume. They were organized in topical sections on Infrastructures: Smart Cities, Tools, and Utilities; Smart Cities and Smart Mobility; Software Engineering; and ongoing research projects.

9 特價5219
立即代訂
下次再買

Availability, Reliability and Security

Springer 出版
2025/08/11 出版

This two-volume set LNCS 15992-15993 constitutes the proceedings of the 20th International Conference on Availability, Reliability and Security, ARES 2025, in Ghent, Belgium, during August 11-14, 2025.The 34 full papers presented in this book together with 8 short papers were carefully reviewed and selected from 186 submissions.They cover topics such as: Privacy-Enhancing Technologies and Legal Compliance; Network and Communication Security; IoT and Embedded Systems Security; Machine Learning and Privacy; Usable Security and Awareness; System Security; Supply Chain Security, Malware and Forensics; and Machine Learning and Security.

9 特價4175
立即代訂
下次再買

Application of Machine Learning and Optimization Methods in Engineering Mathematics

Mdpi AG 出版
2025/08/11 出版

The articles published in this Special Issue collectively demonstrate the significant impact of mathematical modeling, machine learning, and optimization techniques in solving complex engineering problems. They cover a broad spectrum of applications, from manufacturing process control and electric vehicle motor temperature prediction to the financial optimization and structural analysis of dams.The integration of advanced algorithms, such as fuzzy control, deep learning, and stochastic modeling, with classical analytical methods highlights the evolving landscape of engineering mathematics. These studies not only improve predictive accuracy and operational efficiency but also contribute to sustainable and intelligent engineering solutions.Overall, this Special Issue showcases the critical role of interdisciplinary mathematical approaches in advancing engineering research and practice.

9 特價4896
立即代訂
下次再買

Lotus Magazine

Anonymous  著
2025/08/11 出版

Lotus Magazine, Volume 10, offers a comprehensive look into the world of Lotus software and related technologies. This volume provides readers with in-depth articles, tips, and tutorials designed to enhance their understanding and utilization of Lotus applications. Explore a range of topics, from advanced techniques to practical solutions, catering to both novice and experienced users alike.This magazine serves as an invaluable resource for anyone seeking to maximize their productivity and efficiency with Lotus software. Dive into detailed discussions, expert insights, and real-world examples that showcase the power and versatility of Lotus applications. Whether you're a professional or a hobbyist, Lotus Magazine, Volume 10, provides the knowledge and skills needed to excel in the digital landscape.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價1695
立即代訂
下次再買

Availability, Reliability and Security

Bart,Coppens  著
Springer 出版
2025/08/11 出版

This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 79 full papers presented in this book were carefully reviewed and selected from 173 submissions. They contain papers of the following workshops: Part I: First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025); 8th International Symposium for Industrial Control System and SCADA Cyber Security Research (ICS-CSR 2025); First Workshop on Sustainable Security and Awareness For nExt Generation InfRastructures (SAFER 2025); 4th Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025). Part II: 6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025); First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025); 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025). Part III: 18th International Workshop on Digital Forensics (WSDF 2025); 14th International Workshop on Cyber Crime (IWCC 2025); 9th International Workshop on Cyber Use of Information Hiding (CUING 2025). Part IV: First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025); Second International Workshop on Emerging Digital Identities (EDId 2025); Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025); 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025); 5th International Workshop on Behavioral Authentication for System Security (BASS 2025).

9 特價3392
立即代訂
下次再買

Availability, Reliability and Security

Springer 出版
2025/08/11 出版

This two-volume set LNCS 15998-15999 constitutes the proceedings of the ARES 2025 EU Projects Symposium Workshops, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 42 full papers presented in this book were carefully reviewed and selected from 92 submissions. They contain papers of the following workshops: Part I: 5th International Workshop on Advances on Privacy Preserving Technologies and Solutions (IWAPS 2025); 6th Workshop on Security, Privacy, and Identity Management in the Cloud (SECPID 2025); First International Workshop on Secure, Trustworthy, and Robust AI (STRAI 2025); 5th International Workshop on Security and Privacy in Intelligent Infrastructures (SP2I 2025). Part II: 5th workshop on Education, Training and Awareness in Cybersecurity (ETACS 2025); 5th International Workshop on Security Testing and Monitoring (STAM 2025); 8th International Workshop on Emerging Network Security (ENS 2025).

9 特價3914
立即代訂
下次再買

Data Preparation and Analysis

Pooja,Sharma  著
2025/08/11 出版

Data science is an evolving field, and the ability to effectively prepare and analyze data is a critical skill for any aspiring professional. This book serves as a comprehensive introduction to the foundational concepts and tools of data science, making it ideal for beginners and aspiring data professionals.This book provides a structured and comprehensive learning path, beginning with a broad introduction to data science, its applications, and fundamental analysis methods. You will then explore the core Python libraries for data manipulation, NumPy for efficient numerical operations, and Pandas for powerful data structuring and transformation. The book dedicates significant focus to real-world data challenges, walking you through the crucial steps of data gathering, preparation, and cleaning; addressing issues like scalability, missing data, and inconsistencies. The book concludes with three real-world projects that apply the concepts in practical settings, making you proficient in the entire end-to-end data preparation and analysis pipeline. You will have a solid command of essential tools and techniques, empowering you to confidently tackle and derive meaningful insights from diverse datasets in any professional setting.WHAT YOU WILL LEARN● Implement ML models using NumPy, Pandas, Matplotlib, or scikit-learn.● Gain a solid foundation in data science, principles, algorithms, and methodologies.● Learn to frame real-world problems as ML tasks. ● Implement data cleaning for consistency and missing data.● Conduct exploratory data analysis with descriptive statistics.● Uncover data patterns using clustering and association techniques.● Design and create effective time series visualizations.WHO THIS BOOK IS FORThis book is ideal for students, programmers, and software engineers who want to learn data science from scratch. It assumes basic programming proficiency, but no prior data science knowledge is required to follow the comprehensive, hands-on curriculum.

9 特價1833
立即代訂
下次再買

Availability, Reliability and Security

Bart,Coppens  著
Springer 出版
2025/08/11 出版

This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 79 full papers presented in this book were carefully reviewed and selected from 173 submissions. They contain papers of the following workshops: Part I: First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025); 8th International Symposium for Industrial Control System and SCADA Cyber Security Research (ICS-CSR 2025); First Workshop on Sustainable Security and Awareness For nExt Generation InfRastructures (SAFER 2025); 4th Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025). Part II: 6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025); First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025); 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025). Part III: 18th International Workshop on Digital Forensics (WSDF 2025); 14th International Workshop on Cyber Crime (IWCC 2025); 9th International Workshop on Cyber Use of Information Hiding (CUING 2025). Part IV: First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025); Second International Workshop on Emerging Digital Identities (EDId 2025); Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025); 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025); 5th International Workshop on Behavioral Authentication for System Security (BASS 2025).

9 特價3914
立即代訂
下次再買

Bisociative Literature-Based Discovery

Nada,Lavrač  著
Springer 出版
2025/08/11 出版

This monograph introduces the field of bisociative literature-based discovery (LBD) by first explaining the underlying LBD principles and techniques, followed by the presentation of bisociative LBD techniques and applications developed by the authors. LBD is a process of uncovering new knowledge by analyzing and connecting disparate pieces of information from different sources of literature. Selected techniques include conventional natural language processing (NLP) approaches, as well as outlier-based, concept-based, network-based, and embeddings-based LBD approaches. Reproducibility aspects of bisociative LBD research are also covered, addressing all steps of the bisociative LBD process: data acquisition, text preprocessing, hypothesis discovery, and evaluation. The monograph is targeted at researchers, students, and domain experts interested in knowledge exploration, information retrieval, text mining, data science or semantic technologies. By covering texts, relations, networks, and ontologies, this work empowers domain experts to transcend their knowledge silos when confronted with varied data formats in their research practice. The monograph's open science approach with tutorials in Python allows for code reuse and experiment replicability.

9 特價9395
立即代訂
下次再買

AI For Absolute Beginners

Orionnexus.IO 出版
2025/08/10 出版

Finally, an AI Book That Actually Makes SenseStop feeling left behind by the AI revolution. Start leading it.If you've ever felt intimidated by ChatGPT or confused by AI hype, this book is your lifeline. Written by cybersecurity expert and business leader Maurice Kinsey, AI for Absolute Beginners transforms AI from mysterious technology into your most powerful daily ally.What Makes This Different?No technical jargon. No coding required. No assumptions about your tech background. Just practical, real-world guidance that gets you from "AI-curious" to "AI-confident" in weeks, not months.You'll Discover How To: Master ChatGPT like a pro - Learn the "CLEAR Framework" that turns mediocre prompts into powerful results, with dozens of copy-and-paste templates for work and life.Reclaim 10+ hours per week - Automate emails, create compelling content, plan complex projects, and solve problems faster than you ever thought possible.Transform your career - Whether you're a teacher, consultant, parent, or executive, discover specific strategies that make you indispensable in an AI-powered world.Avoid costly mistakes - Learn what ChatGPT can't do, when not to use it, and how to spot AI "hallucinations" before they damage your reputation.Real People, Real Results: "As a high school teacher, I thought AI was for tech people, not educators. This book proved me wrong. I now create personalized lesson plans in minutes instead of hours, and my students are more engaged than ever. Maurice made the impossible feel inevitable." - Sarah M., High School English Teacher "This book didn't just teach me ChatGPT - it changed how I run my business. I've reclaimed 20 hours per week and landed my biggest client ever." - Robert T., Small Business Owner "I'm a single mom running a catering business while finishing my degree. This book gave me back my evenings. ChatGPT now helps me write client emails, plan menus, and even assist my daughter with her science projects. It's like having a brilliant assistant who never sleeps." - Jennifer L., Small Business Owner & Student"Finally, someone explains AI without making me feel stupid. I went from AI-phobic to AI-powered in one month." - David C., Operations ManagerPerfect For: Overwhelmed professionals drowning in routine tasksSmall business owners competing against larger companiesAnyone who wants to work smarter, not harderPeople who thought AI was "too technical" for themWhat You Get: ✅ 200+ pages of practical strategies and real-world examples✅ Proven frameworks like the 5-Layer Learning Method and CLEAR prompting system✅ Industry-specific guidance for business, education, healthcare, and more✅ Ethical guidelines to use AI responsibly and safely✅ Future-proofing strategies to stay ahead as AI evolvesThe Bottom Line: AI isn't replacing humans - it's amplifying the humans who learn to use it well. This book ensures you're one of them.Stop watching from the sidelines. Start leading with AI.Order now and join thousands who've transformed their work and life with the power of artificial intelligence.

9 特價634
立即代訂
下次再買

Software Engineering

Potta,Devika  著
2025/08/09 出版
9 特價3672
立即代訂
下次再買

High Tech Decision Making in the Airpower Age

Biblioscholar 出版
2025/08/08 出版

The purpose of this research was to explore whether electronic brainstorming and problem solving software are feasible for and add value to Air Force organizations, specifically Air Command and Staff College (ACSC). The authors literature review verified traditional nominal group brainstorming (group members working separately to generate ideas) is superior to traditional face-toface group brainstorming. Further, previous research also showed electronic brainstorming was as effective as, and in some cases superior to, traditional nominal group brainstorming. The author reviewed the capabilities of several electronic problem solving/brainstorming software tools. He tested the capabilities of one such tool, CM/1 (Corporate Memory/1), because ACSC currently owns 15 CM/1 site licenses. CM/1 allows group members the capability to use an issue-based decision making process in cyberspace. The author demonstrated the feasibility and value-added use of CM/1 at ACSC through successful software installation on the ACSC computer network, use by a student group brainstorming research ideas, and use by a faculty group attempting to solve an ACSC organizational problem over their local area network. Aerospace applicability was demonstrated throughout the project. The author concluded with recommendations for using CM/1 at ACSC and other organizations, and suggested areas for related future research.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價823
立即代訂
下次再買

Introduction to .NET Aspire

2025/08/08 出版

.NET Aspire is a revolutionary stack created for building cloud-native microservices. It emerges as a game-changer, offering a streamlined, opinionated approach to simplify orchestrating the .NET microservices and connecting them to cloud services with ease.The book explores the development of .NET Aspire, its core concepts, and a powerful manifest for defining the application's structure and integrations. With this foundation, you will explore practical patterns for seamlessly incorporating polyglot microservices, covering languages like Go, Python, and Node.js. You will gain hands-on experience in OpenTelemetry monitoring, Azure Developer CLI, and Dapr. You will also gain a deep understanding of unit testing practices and AI capabilities, including frameworks like TensorFlow and ML.NET, directly into your .NET Aspire solutions.By the end of this book, you will possess the practical skills and in-depth knowledge to design, build, deploy, and effectively manage sophisticated, production-ready cloud-native applications, empowering you to excel in the world of distributed systems.WHAT YOU WILL LEARN● Understand .NET Aspire fundamental and core architecture principles.● Build polyglot microservices using C#, Go, Python, and Node.js.● Deploy application using Azure Developer CLI.● Integrate Dapr for enhanced distributed application capabilities.● Build intelligent applications with LLM orchestration and Semantic Kernel.● Apply best practices for unit testing Aspire components.● Build resilient, observable, cloud-native .NET solutions.WHO THIS BOOK IS FORThis book is for .NET developers, cloud engineers, and software architects aiming to build modern cloud-native applications. Readers should have basic knowledge of .NET development and an understanding of web APIs and containerization concepts.

9 特價1741
立即代訂
下次再買

Timed Safety Automata and Logic Conformance

Biblioscholar 出版
2025/08/08 出版

Timed Logic Conformance (TLC) is used to verify the behavioral and timing properties of detailed digital circuits against abstract circuit speci cations when both are modeled as Timed Safety Automata (TSA) with real-valued clocks. TLC is a bisimulation-style partial order relation- ship de ned over TSA state space. In contrast to timed simulation, Calculus of Timed Re nement, and time-abstracted bisimulation, TLC de nes when one system is an acceptable implementation of another by asymmetric action-matching requirements for speci cation inputs and implemen- tation outputs. TLC intuitively and pragmatically supports writing abstract speci cations and verifying them against implementations. TLC scales up by substituting veri ed speci cations for implementations and hierarchically verifying larger systems. The TLC veri cation process is more e?cient than the circularly dependent assumes-guarantees veri cation methodology. Instead of building models of the system's environment and using them in the veri cation process, the TLC veri cation methodology explicitly captures environmental timing properties in the system speci - cation and automatically ensures they are satis ed in the TLC relation. The region-automata-based Timed Logic Conformance System (TLCS) implements TSA parallel composition and a TLC decision procedure. TLCS is used to hierarchically verify the STARI (Self-Timed at Receiver's Input) asynchronous circuit for communicating safely between clock-skewed systems.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價869
立即代訂
下次再買

DoD Role for Securing United States Cyberspace

Biblioscholar 出版
2025/08/08 出版

The cyber attacks on Estonia in late April and the early weeks of May 2007 significantly crippled the country, preventing it from performing banking, communications, news reporting, government transactions and command and control activities. Estonia is considered a "Wired Society", much like the United States. Both countries rely on the cyberspace infrastructure economically and politically. Estonia sought assistance outside the country to recover from and to address the attacks. The cyber attacks on Estonia focused world-wide attention on the effects that cyberspace attacks could have on countries. If a cyber attack of national significance occurred against the United States, what would the United States do? The Department of Defense is responsible for protecting the nation and its geographical boundaries from attack, but what is DoD's role for securing the United States' cyberspace? Research was conducted by studying national orders, strategies, policies plans, and doctrine to determine DoD's role for securing the United States' cyberspace.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

Data Rookies Labs

2025/08/08 出版

Learn Data Analytics Through Visual, Hands-On Labs with OrangeData Rookies Labs: Intro to Analytics with Orange offers a practical, no-code introduction to data science using the intuitive Orange platform. Designed for beginners, this workbook guides students through real-world tasks like classification, clustering, association rules, data cleaning, visualization, and text mining-all using drag-and-drop workflows.Each lab provides step-by-step instructions, screenshots, and sample datasets to help students understand how data is used to generate insights and drive decisions. With no programming required, it's ideal for high school, college, or adult learners looking to build foundational data literacy through an interactive, visual approach.Perfect for classrooms or self-paced study, this book helps learners think like data analysts-no coding required.

9 特價1835
立即代訂
下次再買

Engaging Cyber Communities

Biblioscholar 出版
2025/08/08 出版

There are 1.7 billion Internet users worldwide as of October, 2009 and growing. The dramatic growth in online users in conjunction with the influence of social communities in cyberspace is having an effect in current and future international affairs. Despite the growing amount of activity performed by social groups in cyberspace, the US military remains focused on technology centric operations such as computer network attack and computer network defense. This leads to the question of whether the US military is missing an opportunity by not focusing on online social communities. This research performed a problem and solutions methodology to investigate this question. The research came up with the criteria of value and risk to analyze whether the US military should engage cyber communities. The results of this study suggest engaging online communities can augment the technology-centric solutions. Engaging online communities can help to degrade, deceive, and exploit adversaries operations in cyberspace. Engaging online communities can also influence and help respond to social groups' issues and concerns. Without responding or influencing these groups they are left to their own vagaries as well as negative and adversarial influence. There are risks associated with engaging online communities due to the ubiquitous reach of cyberspace. An ill-conceived comment, text, or video can be sent globally and have a negative impact to objectives and reputation. However, this study finds applying controls and rules of engagement in undertaking these operations can mitigate the risks. Thus, the US military needs to develop these capabilities and engage social communities in cyberspace.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價639
立即代訂
下次再買

Mitigating TCP Degradation Over Intermittent Link Failures Using Intermediate Buffers

M,Reynolds  著
Biblioscholar 出版
2025/08/08 出版

This thesis addresses the improvement of data transmission performance in a challenged network. It is well known that the popular Transmission Control Protocol degrades in environments where one or more of the links along the route is intermittently available. To avoid this degradation, this thesis proposes placing at least one node along the path of transmission to buffer and retransmit as needed to overcome the intermittent link. In the four-node, three-link testbed under particular conditions, file transmission time was reduced 20 fold in the case of an intermittent second link when the second node strategically buffers for retransmission opportunity.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價823
立即代訂
下次再買

Availability, Reliability and Security

Bart,Coppens  著
Springer 出版
2025/08/08 出版

This four-volume set LNCS 15994-15997 constitutes the proceedings of the ARES 2025 International Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025, which took place in Ghent, Belgium, during August 11-14, 2025. The 79 full papers presented in this book were carefully reviewed and selected from 173 submissions. They contain papers of the following workshops: Part I: First International Workshop on Artificial Intelligence, Cyber and Cyber-Physical Security (AI&CCPS 2025); 8th International Symposium for Industrial Control System and SCADA Cyber Security Research (ICS-CSR 2025); First Workshop on Sustainable Security and Awareness For nExt Generation InfRastructures (SAFER 2025); 4th Workshop on Cybersecurity in Industry 4.0 (SecIndustry 2025). Part II: 6th Workshop on Recent Advances in Cyber Situational Awareness and Data-Centric Approaches (CSA 2025); First International Workshop on Responsible Data Governance, Privacy, and Digital Transformation (RDGPT 2025); 22nd International Workshop on Trust, Privacy and Security in the Digital Society (TrustBus 2025). Part III: 18th International Workshop on Digital Forensics (WSDF 2025); 14th International Workshop on Cyber Crime (IWCC 2025); 9th International Workshop on Cyber Use of Information Hiding (CUING 2025). Part IV: First International Workshop on Cybersecurity and Privacy Risk Assessments (CPRA 2025); Second International Workshop on Emerging Digital Identities (EDId 2025); Second International Workshop on Security and Privacy Enhancing Technologies for Multimodal Data (SPETViD 2025); 6th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2025); 5th International Workshop on Behavioral Authentication for System Security (BASS 2025).

9 特價3914
立即代訂
下次再買

Performance Evaluation and Analysis of Effective Range and Data Throughput for Unmodified Bluetooth Communication Devices

Biblioscholar 出版
2025/08/08 出版

The DoD and the Air Force continually seek to incorporate new technology in an effort to improve communication, work effectiveness, and efficiency. Office devices utilizing Bluetooth technology simplify device configuration and communication. They provide a means to communicate wirelessly over short distances thereby eliminating the need for different vendor specific cables and interfaces. One of the key concerns involved in incorporating new communication technology is security; the fundamental security concern of wireless communication is interception. Studies focusing on IEEE 802.11b have shown vulnerability zones around many DoD installations that reflect the ranges at which wireless communications using the 802.11b standard can be intercepted. This research identifies the vulnerability zones in which Bluetooth transmissions can potentially be intercepted. Specifically, the orientation of Bluetooth device antenna and the distance between devices are varied to determine ranges at which set levels of throughput can be achieved for a specific device configuration. Throughput ranges are then mapped to graphically reflect vulnerability zones. This research shows that the range at which Bluetooth communication can occur with unmodified devices is more than twice that of the minimum standard of 10 m outlined in the core specification without degradation of the best-case throughput level measured. It is expected that the throughput ranges could be greatly extended with some device modification. This research shows that the security risk associated with interception of Bluetooth communications is legitimate and warrants further study.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價823
立即代訂
下次再買
頁數10/487
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing