0403_卡芙涅
0401~0403_4月選書

英文書 > 全部商品

Network Traffic Management

Ghassan,Abed  著
Ingram 出版
2024/07/13 出版

This book presents the architecture, fundamentals and analysed the functional structure of Network Traffic Management uses network monitoring tools and management techniques such as Transmission Control Protocol (TCP), bandwidth monitoring, deep packet inspection and application based routing to ensure optimal network operation. In doing so it helps maximize the performance and security of existing networks. It also allows for the identification of network intensive operations that can be incorporated in to network planning and growth strategies. Network Traffic Management is used alongside other optimization techniques like Application Traffic Management as part of an overall Application Delivery Network solution.

9 特價3258
立即代訂
下次再買

FastAPI Cookbook

Packt 出版
2024/07/12 出版

Enhance your web development skills, from setting up your environment and advanced integrations to building robust, high-traffic web applications with practical, scalable solutionsKey Features: - Explore FastAPI in depth, from basic setup to advanced features such as custom middleware and WebSockets- Discover practical strategies to optimize app performance and handle high traffic- Implement SQL and NoSQL integration techniques for versatile data management in FastAPI applications- Purchase of the print or Kindle book includes a free PDF eBookBook Description: FastAPI is a cutting-edge Python framework that is revolutionizing the way web apps and APIs are built. Known for its speed, simplicity, and scalability, FastAPI empowers developers to create high-performing applications with ease. This book will help you leverage FastAPI's immense potential to handle high-traffic scenarios and integrate seamlessly with modern Python tools.The book begins by familiarizing you with the basics of setting up and configuring your FastAPI environment before moving to the intricacies of building RESTful APIs, managing data with SQL and NoSQL databases, and handling authentication and authorization. Next, you'll focus on advanced topics such as custom middleware, WebSocket communication, and integration with various Python libraries. Each chapter is meticulously crafted with practical recipes, progressing from foundational concepts to advanced features and best practices. The concluding chapters show you how to optimize performance, implement rate limiting, and execute background tasks, empowering you to become a proficient FastAPI developer.By the end of this book, you'll have gained the skills you need to migrate existing apps to FastAPI, and be equipped to tackle any challenge in the modern web development landscape, ensuring your apps are not only functional, but also efficient, secure, and scalable.What You Will Learn: - Explore advanced FastAPI functionalities such as dependency injection, custom middleware, and WebSockets- Discover various types of data storage for powerful app functionality with SQL and NoSQL- Implement testing and debugging practices for clean, robust code- Integrate authentication and authorization mechanisms to secure web apps- Acquire skills to seamlessly migrate existing applications to FastAPI- Write unit and integration tests, ensuring reliability and security for your apps- Deploy your FastAPI apps to production environments for real-world useWho this book is for: This book is for Python developers looking to enhance their skills to build scalable, high-performance web apps using FastAPI. Professionals seeking practical guidance to create APIs and web apps that can handle significant traffic and scale as needed will also find this book helpful by learning from both foundational insights and advanced techniques. The book is also designed for anyone familiar with RESTful APIs, HTTP protocols, and database systems, as well as developers looking to migrate existing applications to FastAPI or explore its advanced features.Table of Contents- First Steps with FastAPI- Working with Data- Building RESTful APIs with FastAPI- Authentication and Authorization- Testing and Debugging FastAPI Applications- Integrating FastAPI with SQL Databases- Integrating FastAPI with NoSQL Databases- Advanced Features and Best Practices- Working with WebSockets- Integrating FastAPI with other Python Libraries- Middleware and Webhooks- Deploying and Managing FastAPI Applications

9 特價2064
立即代訂
下次再買

Embedded Computing Systems

Ingram 出版
2024/07/12 出版
9 特價871
立即代訂
下次再買

Digital Communication A Practical Guide to Data Communication Networking

Ingram 出版
2024/07/12 出版
9 特價963
立即代訂
下次再買

Frontiers of Networking Technologies

Xingwei,Wang  著
Springer 出版
2024/07/11 出版

This book constitutes the proceedings of the First China Conference on Networking, CCF ChinaNet 2023, which took place in Wenzhou, China, during September 8-10, 2023. The 13 full papers included in the book were carefully reviewed and selected from 61 submissions. They deal with networking technologies such as cloud computing; mobile and network security; computer engineering and networks; etc. The theme of this year's conference was "Integrating Industry, Search, and Innovation, Serving the Networking Powerhouse".

9 特價3653
立即代訂
下次再買

Security in Vehicular Adhoc Networks

Reema,Sandhu  著
Ingram 出版
2024/07/11 出版

This book is written to explain the concept of VANETs, its different characteristics and the challenges it faces in the light of network security. The security and privacy concerns of VANETs are highlighted and also different attacks and the proposed solutions are given for implementation. The concept of cryptography and different encryption algorithms used for providing security to the data are brought into concern of the reader. The different authentication schemes based on cryptography and signature are explained in detail. The shortcomings of these schemes are also picked up and presented to the readers. The concept of certificateless schemes and their aggregate verification process (CLAS) is explained to the users and difference between other schemes and CLAS is also picked up. In the end different applications and future scope of VANETs is explained.

9 特價2203
立即代訂
下次再買

Signals and Systems

Ingram 出版
2024/07/10 出版

The idea of signals and systems arises in different disciplines such as science, engineering, economics, politics, and medicine. Typical examples of systems include radio and television, telephone networks, radar systems, computer networks, wireless communication, military surveillance systems, and satellite communication systems. Knowledge of a broad range of signals and systems is of practical value to engineering students because engineers must be familiar with signal and system concepts to analyze some specific signals and systems they will deal with in their professional lives. This book is intended to serve as a textbook for junior-level students in electrical and computer engineering. The main aim of this second edition is to improve the clarity of the first edition and fulfill the same objective as the first, which is to present continuous-time and discrete-time signals and systems to electrical and computer engineering students in a manner that is clearer, more interesting, and easier to understand than other texts.

9 特價5742
立即代訂
下次再買

ISO 27001 Controls

Ingram 出版
2024/07/10 出版

Following the success of the first edition, this book has been re-released to reflect the ISO/IEC 27001:2022 and ISO/IEC 27002:2022 updates.Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001:2022 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001:2022. Similarly, for anyone involved in internal or external audits, the book includes the definitive requirements that auditors must address when certifying organisations to ISO 27001:2022.The auditing guidance covers what evidence an auditor should look for to satisfy themselves that the requirement has been met. This guidance is useful for internal auditors and consultants, as well as information security managers and lead implementers as a means of confirming that their implementation and evidence to support it will be sufficient to pass an audit.This guide is intended to be used by those involved in: - Designing, implementing and/or maintaining an ISMS;- Preparing for ISMS audits and assessments; or- Undertaking both internal and third-party ISMS audits and assessments.

9 特價2115
立即代訂
下次再買

CC Certified in Cybersecurity Cert Guide

Ingram 出版
2024/07/10 出版

Trust the best-selling Cert Guide series from Pearson IT Certification to help you learn, prepare, and practice for the CC Certified in Cybersecurity exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CC Certified in Cybersecurity Cert Guide helps you master the concepts and techniques that ensure your exam success. Expert authors Amena Jamali and Mari Galloway share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which let you decide how much time you need to spend on each section Exam Topic lists that make referencing easy Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time This study guide helps you master all the topics on the CC Certified in Cybersecurity exam, including Security Principles Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts Access Control Concepts Network Security Security Operations Companion Website: The companion website contains more than 200 unique practice exam questions, practice exercises, and a study planner Also available from Pearson IT Certification is the CC Certified in Cybersecurity Premium Edition ebook and Practice Tests. This digital-only certification preparation product combines an eBook with an enhanced Pearson Test Prep Practice Test. This integrated learning package Enables you to focus on individual topic areas or take complete, timed exams Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions Provides unique sets of exam-realistic practice questions Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most

9 特價1710
立即代訂
下次再買

Advances in Cryptology - Crypto 2024

Springer 出版
2024/07/09 出版

The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments.

9 特價4175
立即代訂
下次再買

Advances in Cryptology - Crypto 2024

Springer 出版
2024/07/09 出版

The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments.

9 特價4175
立即代訂
下次再買

Advances in Cryptology - Crypto 2024

Springer 出版
2024/07/09 出版

The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments.

9 特價4175
立即代訂
下次再買

Advances in Cryptology - Crypto 2024

Springer 出版
2024/07/09 出版

The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments.

9 特價4175
立即代訂
下次再買

Computer Safety, Reliability, and Security. Safecomp 2024 Workshops

Springer 出版
2024/07/09 出版

This book constitutes the proceedings of the Workshops held in conjunction with the 43rd International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2024, which took place in Florence, Italy, during September 2024. The 36 papers included in this book were carefully reviewed and selected from a total of 64 submissions to the following workshops: DECSoS 2024 - 19th Workshop on Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems SASSUR 2024 - 11th International Workshop on Next Generation of System Assurance Approaches for Critical Systems TOASTS 2024 - Towards A Safer Systems' Architecture Through Security WAISE 2024 - 7th International Workshop on Artificial Intelligence Safety Engineering

9 特價4175
立即代訂
下次再買

Advances in Cryptology - Crypto 2024

Springer 出版
2024/07/09 出版

The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments.

9 特價4175
立即代訂
下次再買

Computer Safety, Reliability, and Security

Springer 出版
2024/07/09 出版

This book constitutes the refereed proceedings of the 43rd International Conference on Computer Safety, Reliability and Security, SAFECOMP 2024, held in Florence, Italy, in September 2024. The 19 full papers included in this volume were carefully reviewed and selected from 80 submissions. They have been organized in topical sections as follows: Fault Injection and Tolerance; System and Software Safety Assurance; Automated Driving Systems; Security of safety-critical systems; Safety Verification; and Autonomous Systems.

9 特價3392
立即代訂
下次再買

Advances in Cryptology - Crypto 2024

Springer 出版
2024/07/09 出版

The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments.

9 特價4175
立即代訂
下次再買

Advances in Cryptology - Crypto 2024

Springer 出版
2024/07/09 出版

The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments.

9 特價4175
立即代訂
下次再買

Advances in Cryptology - Crypto 2024

Springer 出版
2024/07/09 出版

The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments.

9 特價4175
立即代訂
下次再買

Cissp for Dummies

For Dummies 出版
2024/07/09 出版

Showcase your security expertise with the highly regarded CISSP certification The CISSP certification, held by more than 150,000 security professionals worldwide, is the gold standard of cybersecurity certifications. The CISSP Exam certifies cybersecurity professionals and opens doors for career advancement. Fully updated and revised to reflect the 2024 ISC2 CISSP Exam Outline, CISSP For Dummies is packed with helpful content for all eight security domains. This book includes access to online study tools such as practice questions and digital flashcards, boosting your likelihood of success on the exam. Plus, you'll feel prepared and ready for test day thanks to a 60-day study plan. Boost your security career with this Dummies study guide. Review all the content covered in the latest CISSP Exam Test with confidence and achieve your certification as a cybersecurity professional Study smarter, thanks to online practice resources and a 60-day study plan Enhance your career with the in-demand CISSP certification Continue advancing your career and the profession through speaking and mentoring opportunities With up-to-date content and valuable test prep features, this book is a one-and-done resource for any cybersecurity professional studying for the CISSP exam.

9 特價1539
立即代訂
下次再買

Church Privacy Team

Ingram 出版
2024/07/08 出版

PRIVACY ISN'T IT-IT'S ABOUT PEOPLE AND THEIR NEED FOR DIGNITY, TRUST, COMMUNION, HEALING, HEALTHY BOUNDARIES, AND SAFETY.Do you believe your church, or ministry has no privacy issues or risks? Are you stretched so thin that you think you can't prevent liabilities right now? Are you a frustrated ministry worker who can't seem to get leadership to improve privacy practices? Do you need actionable steps to help you comply with privacy policies, laws, and regulations?If you answered yes to any of these questions, your roadmap to success is Church Privacy Team.Church Privacy Team will: Teach you what privacy means and why it's critical for building trust and transforming livesReveal potential grounds for lawsuits and penalties from privacy violations and breachesIntroduce you to domestic and global privacy practices, obligations, laws, and regulationsShow you how to plan and implement simple privacy practices that reduce risks and fit any budgetProvide management resources to help you understand business risks and privacy practicesIt will define what to consider when: Handling financial transactionsTaking prayer requestsProtecting personal information gathered at eventsSecuring children's personal informationHelping members who require counseling and careYou're a small church with limited resourcesGrab your copy and begin the education that is sure to make a difference to your church team.

9 特價2524
立即代訂
下次再買

Zabbix 7 IT Infrastructure Monitoring Cookbook - Third Edition

Packt 出版
2024/07/08 出版

Discover practical recipes to help you efficiently monitor enterprise IT infrastructure for Microsoft Windows, Linux, networking, and moreKey Features: - Find out how you can leverage some of the most exciting features of Zabbix 7- Discover easy-to-follow, practical solutions for common problems in network monitoring with Zabbix- Perform professional IT infrastructure and application monitoring across multiple platforms- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Realize the full potential of Zabbix 7 with this updated third edition of the Zabbix 7 IT Infrastructure Monitoring Cookbook. Packed with new recipes and updated with the latest Zabbix functionalities, this guide covers everything you need, whether you're setting up Zabbix with built-in (proxy) high availability, using LDAP JIT user provisioning, implementing low-level host discovery, or creating advanced triggers.This hands-on guide offers easy-to-follow recipes to use Zabbix 7 to monitor the performance of devices and applications across your network. You'll start by learning how to install Zabbix and examine its most prominent features, ensuring you make the right design choices to build a scalable and easily manageable environment. Each recipe is crafted to help you build items and triggers for different types of monitoring, create templates, and use Zabbix proxies. You'll also get to grips with using the Zabbix API for customization and managing your Zabbix server and database. Finally, you'll find quick solutions to the common and not-so-common problems that you may encounter in your Zabbix monitoring work.By the end of this book, you'll have expert insights into using Zabbix for all your monitoring needs and be able to build a solid Zabbix setup by leveraging its key functionalities.What You Will Learn: - Implement a high-availability Zabbix setup for both server and proxies- Build templates and explore various monitoring types available in Zabbix 7- Use Zabbix proxies to scale your environment effectively- Work with custom integrations and the Zabbix API- Set up advanced triggers and alerting- Maintain your Zabbix setup for scaling, backups, and upgrades- Perform advanced Zabbix database management- Monitor cloud-based products such as Amazon Web Services (AWS), Azure, and DockerWho this book is for: This book is for network and IT engineers who want to get started with Zabbix as well as those with an intermediate-level understanding of Zabbix looking to extend their knowledge. While prior experience with Zabbix is not a prerequisite, it will help you make the most of this book.Table of Contents- Installing Zabbix and getting started using the frontend- Getting things ready with Zabbix user management- Setting up Zabbix monitoring- Working with triggers and alerts- Building your own structured templates- Visualizing data, Inventory, Reporting and Business service monitoring- Using discovery for automatic creation- Setting up Zabbix proxies- Integrating Zabbix with External services- Extending Zabbix functionality with custom scripts and Zabbix API- Maintaining your Zabbix setup- Advanced Zabbix database management- Bringing Zabbix to the cloud with Zabbix cloud integration

9 特價2385
立即代訂
下次再買

Full-Stack Web Development with TypeScript 5

Packt 出版
2024/07/08 出版

Unleash the power of modern web development and master both frontend and backend development by building a real-world applicationKey Features: - Integrate AI capabilities in an application using the OpenAI API and learn AI-based features- Build robust web applications with advanced TypeScript features like typing, generics, classes, and interfaces- Implement user authentication and authorization mechanisms to protect your apps and user data- Purchase of the print or Kindle book includes a free PDF eBookBook Description: This book takes you on a journey with TypeScript 5, introducing its nuances and advantages over traditional JavaScript, explaining TypeScript basics, and highlighting the syntax, typing, generics, classes, and interfaces. Expert advice will help you build your understanding of TypeScript's role in modern web applications.You'll gain hands-on experience with the tools required to write full-stack web applications end to end, beginning with setting up the Bun environment for backend development. This book also explores server-side functionality such as authentication, routing, and database integration with PostgreSQL. The second part of the book focuses on the integration of the OpenAI API, demonstrating the use of the GPT API for different use cases. The final part covers frontend development using Svelte, guiding you through UI design, state management, and performance optimization. Each chapter has real-world examples and comparisons to other technologies, providing you with a comprehensive understanding of full-stack development.By the end of this book, you'll have learned how to build modern web applications using TypeScript 5 and confidently tackle full-stack development challenges.What You Will Learn: - Develop a chat application by implementing frontend and backend features effectively- Build powerful backends using PostgreSQL- Write unit tests efficiently for cleaner and more reliable apps- Understand full-stack application architecture for better scalability and maintainability- Create dynamic and responsive UIs with Svelte- Use debugging, testing, and logging tools in web applications to quickly detect and minimize errorsWho this book is for: This book is for junior to mid-level software engineers with foundational knowledge of JavaScript and web development, who are enthusiastic about the most cutting-edge technologies and want to expand their understanding of building full-stack applications end to end. Familiarity with the fundamentals of frontend and backend development will help you get the most out of this book.Table of Contents- TypeScript Fundamentals- TypeScript Deep Dive - Typing, Generics, Classes, and Interfaces- Configuring a Backend Environment with Bun and Hono- Building Backend Infrastructure with Bun, Hono, and TypeScript- Improving Reliability - Testing and Validation- Advanced Backend Development - Security, Throttling, Caching, and Logging- PostgreSQL Basics, Storage, and Setup- Interacting with PostgreSQL Using Libraries- Interacting with PostgreSQL Using Prisma ORM- Basics of Integrating External APIs with TypeScript and Hono- Setting Up and Configuring the OpenAI API for the Backend- Introduction to Svelte for Frontend Development- Setting up the Svelte Project- Svelte Chat Application Development- Advanced Svelte Techniques

9 特價1697
立即代訂
下次再買

Machine Learning for Metallic Corrosion Modeling

Kiran  著
Ingram 出版
2024/07/07 出版

Metal corrosion, from rusty cars to crumbling bridges, costs billions. Enter machine learning! This powerful tool analyzes vast amounts of data to predict and prevent corrosion. By simulating how metals interact with their environment, scientists can design better materials and protective coatings. It's a computational exploration to outsmart rust and save our infrastructure!

9 特價932
立即代訂
下次再買

Computational Science and Its Applications - Iccsa 2024

Springer 出版
2024/07/06 出版

The two-volume LNCS set 14813 and 14814 constitutes the refereed proceedings of the 24th International Conference on Computational Science and Its Applications, ICCSA 2024, held in Hanoi, Vietnam, during July 1-4, 2024. The 53 full papers, 6 short papers and 3 PHD showcase papers included in these volumes were carefully reviewed and selected from a total of 207 submissions. The papers focus on the following six sub-areas within Computer Science and its Applications: Computational Methods, Algorithms and Scientific Applications; High Performance Computing and Networks; Geometric Modeling, Graphics and Visualization; Advanced and Emerging Applications; Information Systems and Technologies & Urban and Regional Planning.

9 特價4697
立即代訂
下次再買

Cracking the Cybersecurity Interview

Karl,Gilbert  著
2024/07/04 出版

This book establishes a strong foundation by explaining core concepts like operating systems, networking, and databases. Understanding these systems forms the bedrock for comprehending security threats and vulnerabilities. The book gives aspiring information security professionals the knowledge and skills to confidently land their dream job in this dynamic field.This beginner-friendly cybersecurity guide helps you safely navigate the digital world. The reader will also learn about operating systems like Windows, Linux, and UNIX, as well as secure server management. We will also understand networking with TCP/IP and packet analysis, master SQL queries, and fortify databases against threats like SQL injection. Discover proactive security with threat modeling, penetration testing, and secure coding. Protect web apps from OWASP/SANS vulnerabilities and secure networks with pentesting and firewalls. Finally, explore cloud security best practices using AWS to identify misconfigurations and strengthen your cloud setup.The book will prepare you for cybersecurity job interviews, helping you start a successful career in information security. The book provides essential techniques and knowledge to confidently tackle interview challenges and secure a rewarding role in the cybersecurity field.KEY FEATURES ● Grasp the core security concepts like operating systems, networking, and databases.● Learn hands-on techniques in penetration testing and scripting languages.● Read about security in-practice and gain industry-coveted knowledge.WHAT YOU WILL LEARN● Understand the fundamentals of operating systems, networking, and databases.● Apply secure coding practices and implement effective security measures.● Navigate the complexities of cloud security and secure CI/CD pipelines. ● Utilize Python, Bash, and PowerShell to automate security tasks.● Grasp the importance of security awareness and adhere to compliance regulations.WHO THIS BOOK IS FORIf you are a fresher or an aspiring professional eager to kickstart your career in cybersecurity, this book is tailor-made for you.

9 特價1603
立即代訂
下次再買

IT Governance

Alan,Calder  著
Ingram 出版
2024/07/02 出版

Recommended textbook for the Open University's postgraduate information security course and the recommended text for all IBITGQ ISO 27001 coursesIn this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins: Discuss the ISO 27001/27002:2022 updates;Provide guidance on how to establish a strong IT governance system and an ISMS (information security management system) that complies with ISO 27001 and ISO 27002;Highlight why data protection and information security are vital in our ever-changing online and physical environments;Reflect on changes to international legislation, e.g. the GDPR (General Data Protection Regulation); andReview key topics such as risk assessment, asset management, controls, security, supplier relationships and compliance.Fully updated to align with ISO 27001/27002:2022IT Governance - An international guide to data security and ISO 27001/ISO 27002, Eighth edition provides: Expert information security management and governance guidance based on international best practice;Guidance on how to protect and enhance your organisation with an ISO 27001:2022-compliant ISMS; andDiscussion around the changes to international legislation, including ISO 27001:2022 and ISO 27002:2022.As cyber threats continue to increase in prevalence and ferocity, it is more important than ever to implement a secure ISMS to protect your organisation. Certifying your ISMS to ISO 27001 and ISO 27002 demonstrates to customers and stakeholders that your organisation is handling data securely.

9 特價3214
立即代訂
下次再買

Research That Scales

Kate,Towsey  著
Ingram 出版
2024/07/02 出版

Most organizations fail to tap into the game-changing power of research. Research That Scales is the ultimate playbook for transforming your research practice, whatever its size or shape, into an impactful and efficient insight-generating engine. Use it to plan, manage, and scale a research practice that can truly propel businesses forward. Who Should Read This BookIf you're a research leader, a researcher, or a ResearchOps specialist, this book is a must-read. But if you work in product management, design, content, marketing, academia, or for an agency, and do research as part of your work, this book is for you, too. Anyone involved in devising strategies and systems that support scaled-up human-centered research will find Research That Scales invaluable. Takeaways Learn what it means to scale research and how to build purpose into your research practice. Gain a pragmatic view of research strategy and why it's crucial to scaling research. Design a research operating system that can grow the impact of research. Uncover the eight elements of research operations and the ResearchOps Venn diagram. Use the ResearchOps Planning Matrix to deliver operations that make good ideas real. Build systems that make finding the right research participants a breeze. Learn how to make the most of research by developing a research knowledge management (RKM) strategy. Build a foundation of trust with your company and stakeholders by shifting perceptions about research. Make ethics and data privacy more than a checklist of dos and don'ts and lofty principles. Learn how to become a "money magnet" for research. Attract and retain the best research talent to fuel your growth.

9 特價2870
立即代訂
下次再買

Performance Evaluation and Benchmarking

Springer 出版
2024/07/02 出版

This book constitutes the refereed post-conference proceedings from the 15th TPC Technology Conference on Performance Evaluation and Benchmarking, TPCTC 2023, held in Vancouver, British Columbia, Canada, during August 28 - September 1, 2023. The 9 full papers included in this book were carefully reviewed and selected from 17 submissions. These papers focus on various novel ideas and methodologies for Performance evaluation and Benchmarking in emerging technology areas.

9 特價2870
立即代訂
下次再買

Smart Business Technologies

Springer 出版
2024/07/02 出版

This book constitutes the refereed post proceedings of the 20th International Conference on Smart Business Technologies, ICSBT 2023, held in Rome, Italy, during July 11-13, 2023. The 9 full papers included in this book were carefully reviewed and selected from 30 submissions. The scope of the conference covers technology-related topics, such as technology platforms, internet of things and web services, but also business-relevant topics, such as business processes, business intelligence, value setting and business strategy. Furthermore, it covers different approaches to address these issues and different possible applications with their own specific business needs and requirements on technology.

9 特價3392
立即代訂
下次再買

Application of Network Function Virtualization in Modern Computer Environments

Ingram 出版
2024/07/02 出版

The ebook edition of this title is Open Access and freely available to read online. The Internet's exponential growth is driven by the development and emergence of advanced technologies, attended by a flood of new services. The maturity of these technologies is a decisive factor in the progress of the entire telecom industry, leading to a profound transformation of computer networks from traditional, hardware-centric functions to flexible, software-based solutions. Network function virtualization (NFV), together with software-defined networking (SDN) and cloud computing, are not just key enablers, but they are the basis of more programmable networks that are able to adapt to the evolving requirements of diverse customers, ensuring a promising future for the Internet. This future implies the efficient collaboration of different software components, with the aim of improving flexibility, scalability, and the overall agility of the network. Numerous researchers and professionals today focus their research on finding solutions for the resource, service, security, and other orchestration types and further automation of the processes. The monograph focuses on the following contents: Shortcomings in traditional networks and the primary motives and benefits of NFV implementation in network infrastructure Fundamentals and the key components of the ETSI NFV framework The virtualization techniques and their application in modern computing environments, with an accent on the characteristics and functionality of virtual entities (virtual machines and containers) Containerization technology - creation, characteristics of various containers, and their orchestration and usage of the Kubernetes platform for the management of containerized workloads and services The basic principles of NFV-based network design and the path for migration from traditional to NFV-based architecture SDN technology, including architecture, protocols, use cases, and integration with NFV in modern networks The role of virtualization in the clouds' architectures, types, and delivery models Key service chaining strategies and standardized architecture for SFC deployment and SDN/NFV-based architecture for SFC deployment The key principles of network slicing in networks with implemented NFV and SDN The monograph offers a practical blend of theoretical considerations and practical NFV implementation in modern computer environments. It is a valuable resource for students, engineers, and researchers looking for a comprehensive guide to further network softwarization and building a highly programmable, scalable, and software-based network infrastructure.

9 特價6862
立即代訂
下次再買

Prompt Engineering for Beginners

Kapila,Arora  著
Ingram 出版
2024/07/01 出版

Prompt Engineering has emerged as a transformative technique for enhancing creativity and productivity in various fields. This book provides a comprehensive and beginner-friendly introduction to Prompt Engineering, equipping readers with the knowledge and skills to harness its potential. From understanding the basics to applying advanced strategies, this guide is a steppingstone for anyone looking to excel in creative writing, problem-solving, and idea generation."Prompt Engineering for Beginners" is a one-stop resource that demystifies the world of prompt-driven creativity. Prompt Engineering involves crafting thought-provoking prompts that stimulate innovative thinking, making it an invaluable skill for writers, artists, educators, and professionals in diverse domains. This book delves into the core concepts of Prompt Engineering, unraveling its methodologies and techniques through practical examples and exercises. From generating ideas to overcoming creative blocks, readers will discover the power of prompts in fostering creativity and expanding their imaginative horizons.

9 特價1054
立即代訂
下次再買

Decentralized Identity Explained

Rohan,Pinto  著
Packt 出版
2024/07/01 出版

Delve into the cutting-edge trends of decentralized identities, blockchains, and other digital identity management technologies and leverage them to craft seamless digital experiences for both your customers and employeesKey Features: - Explore decentralized identities and blockchain technology in depth- Gain practical insights for leveraging advanced digital identity management tools, frameworks, and solutions- Discover best practices for integrating decentralized identity solutions into existing systems- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Looking forward to mastering digital identity? This book will help you get to grips with complete frameworks, tools, and strategies for safeguarding personal data, securing online transactions, and ensuring trust in digital interactions in today's cybersecurity landscape.Decentralized Identity Explained delves into the evolution of digital identities, from their historical roots to the present landscape and future trajectories, exploring crucial concepts such as IAM, the significance of trust anchors and sources of truth, and emerging trends such as SSI and DIDs. Additionally, you'll gain insights into the intricate relationships between trust and risk, the importance of informed consent, and the evolving role of biometrics in enhancing security within distributed identity management systems. Through detailed discussions on protocols, standards, and authentication mechanisms, this book equips you with the knowledge and tools needed to navigate the complexities of digital identity management in both current and future cybersecurity landscapes.By the end of this book, you'll have a detailed understanding of digital identity management and best practices to implement secure and efficient digital identity frameworks, enhancing both organizational security and user experiences in the digital realm.What You Will Learn: - Understand the need for security, privacy, and user-centric methods- Get up to speed with the IAM security framework- Explore the crucial role of sources of truth in identity data verification- Discover best practices for implementing access control lists- Gain insights into the fundamentals of informed consent- Delve into SSI and understand why it matters- Explore identity verification methods such as knowledge-based and biometricWho this book is for: This book is for cybersecurity professionals and IAM engineers/architects who want to learn how decentralized identity helps to improve security and privacy and how to leverage it as a trust framework for identity management.Table of Contents- The History of Digital Identity- Identity Management Versus Access Management- IAM Best Practices- Trust Anchors/Sources of Truth and Their Importance- Historical Source of Authority- Relationships between Trust and Risk- Informed Consent and Why It Matters- IAM - the Security Perspective- Self-Sovereign Identity- Privacy by Design in the SSI Space- Relationship between DIDs and SSI- Protocols and Standards - DID Standards- DID Authentication- Identity Verification- Biometrics Security in Distributed Identity Management

9 特價2064
立即代訂
下次再買

Emerging Technologies for Developing Countries

Springer 出版
2024/06/28 出版

This book constitutes the refereed conference proceedings of the 6th EAI International Conference on Emerging Technologies for Developing Countries, AFRICATEK 2023, held in Arusha, Tanzania, during December 11-13, 2023. The 11 full papers in this book were carefully reviewed and selected from 39 submissions. They were organized in topical sections as follows: smart infrastructure and urban management; data security and digital technologies; economic growth and social development; health and well-being; and sustainability and environmental management.

9 特價6785
立即代訂
下次再買

Applied Cryptography and Network Security Workshops

Springer 出版
2024/06/28 出版

This two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held in parallel with the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, held in Abhu Dabhi, United Arab Emirates, during March 5-8, 2024. The 33 full papers and 11 poster papers presented in this volume were carefully reviewed and selected from 62 submissions. They stem from the following workshops: 6th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2024). 5th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2024). 6th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2024). 5th ACNS Workshop on Secure Cryptographic Implementation (SCI 2024). 1st Workshop on Advances in Asymmetric Cryptanalysis (AAC 2024). 6th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2024). 1st Workshop on Low-Latency Encryption (LLE 2024). 4th ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2024).

9 特價3914
立即代訂
下次再買

Rust for Network Programming and Automation, Second Edition

Gilbert,Stew  著
Ingram 出版
2024/06/28 出版

Designed with the needs of those interested in network programming and automation in mind, this updated "Rust for Network Programming and Automation" explores the realism of network programming using Rust 1.68. The book covers important topics like IP addressing, subnetting, and gateway configuration, ensuring a thorough understanding of network fundamentals. The chapters cover the use of popular Rust libraries such as Tokio, Mio, and Rust-async for asynchronous network programming. These libraries are thoroughly examined, demonstrating how to create TCP listeners, bind sockets, and handle incoming connections efficiently.Packet manipulation and analysis are also important topics, with practical examples using libraries like pnet and libtins. You will learn how to capture, process, and analyze network packets to gain an understanding of network traffic and identify potential problems. The book also focuses on network and performance monitoring, showing you how to set up and use various tools to track network availability, utilization, latency, packet loss, and jitter. Understanding these metrics allows you to ensure optimal network performance and reliability. Cloud network configuration, VPN setup, and data center networking are thoroughly covered, providing the necessary knowledge to manage and automate complex network environments. Key LearningsBecome fluent in the fundamentals of Rust-based TCP/IP programming.Use the pnet and libtins libraries to capture and analyze packets in depth.Use the Rust-async, Tokio, and Mio libraries to program asynchronous networks efficiently.Be well-versed in IP addressing, subnetting, and configuring gateways to assure a secure network installation.Learn to use Rust and OpenVPN to set up VPN connections and monitoring network availability, latency, and packet loss.Use packet analysis and monitoring to improve network security by identifying threats.

9 特價2736
立即代訂
下次再買

Cyber Incident Response

Ingram 出版
2024/06/28 出版

���� **CYBER INCIDENT RESPONSE BUNDLE** ����Dive into the world of cybersecurity with our exclusive "Cyber Incident Response: Counterintelligence and Forensics for Security Investigators" bundle! ��������Whether you're starting your journey or enhancing your expertise, this comprehensive collection equips you with the skills and strategies needed to tackle cyber threats head-on: ���� **Book 1: Cyber Incident Response Fundamentals**Begin your exploration with essential concepts and methodologies. Learn incident detection, initial response protocols, and the fundamentals of forensic analysis.���� **Book 2: Intermediate Cyber Forensics**Advance your skills with in-depth techniques and tools. Master digital evidence acquisition, forensic analysis, and attribution methods essential for effective investigations.���� **Book 3: Advanced Counterintelligence Strategies**Level up with expert tactics and strategies. Discover proactive threat hunting, advanced incident response techniques, and counterintelligence methods to thwart sophisticated cyber threats.���� **Book 4: Mastering Cyber Incident Response**Become an elite investigator with comprehensive techniques. Learn crisis management, incident command systems, and the integration of advanced technologies for resilient cybersecurity operations.���� **Why Choose Our Bundle?**- **Progressive Learning: ** From beginner to elite, each book builds upon the last to deepen your understanding and skills.- **Practical Insights: ** Real-world case studies and hands-on exercises ensure you're ready to handle any cyber incident.- **Expert Guidance: ** Written by cybersecurity professionals with years of industry experience.���� **Secure Your Future in Cybersecurity**Equip yourself with the knowledge and tools to protect against cyber threats. Whether you're a security professional, IT manager, or aspiring investigator, this bundle is your gateway to mastering cyber incident response.���� **Get Your Bundle Now!**Don't miss out on this opportunity to elevate your cybersecurity skills and defend against evolving threats. Secure your bundle today and embark on a journey towards becoming a trusted cybersecurity expert!Join thousands of cybersecurity professionals who have transformed their careers with our "Cyber Incident Response" bundle. Take charge of cybersecurity today! ����️����

9 特價1623
立即代訂
下次再買

Cybersecurity Governance

Ingram 出版
2024/06/26 出版

Offering insights tailored for high-level decision-makers, this guide is an indispensable resource for any executive committed to enhancing their organization's cybersecurity posture, ensuring a robust, informed response to the omnipresent threat of cyber intrusion.In today's digital age, no business is immune to the relentless threat of cyberattacks that besiege organizations globally on a daily basis. The stark reality is that it's not a matter of if but when your systems will become a target, potentially leading to significant data breaches and operational disruptions. As a leader, possessing a deep understanding of cybersecurity's critical role within your organization is not optional-it's imperative. This knowledge empowers you to engage meaningfully with your technical teams, steering strategic discussions and decisions that fortify your organization's defenses against these inevitable cyber incursions. Aimed squarely at managers, executives, finance leaders, CEOs, and company directors, this book demystifies cybersecurity from a leadership perspective. It's crafted specifically for those at the helm who must comprehend their pivotal role and responsibilities in navigating the cybersecurity landscape.

9 特價1708
立即代訂
下次再買

Defensive Security Handbook

Ingram 出版
2024/06/26 出版

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs. This book will help you: Plan and design incident response, disaster recovery, compliance, and physical security Learn and apply basic penetration testing concepts through purple teaming Conduct vulnerability management using automated processes and tools Use IDS, IPS, SOC, logging, and monitoring Bolster Microsoft and Unix systems, network infrastructure, and password management Use segmentation practices and designs to compartmentalize your network Reduce exploitable errors by developing code securely

9 特價2257
立即代訂
下次再買

Microsoft Power Pages in Action

Packt 出版
2024/06/26 出版

Master low-code web app development with Power Pages, learn to customize web apps using Liquid and JavaScript guided by step-by-step instructions and real-world examples.Key Features: - Build custom web apps effortlessly with Power Pages' low-code platform- Learn to integrate external services and databases using codeless cloud flows- Extend your web apps with customizable code using ChatGPT and Copilot- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Microsoft Power Apps Pages in Action is a comprehensive beginner's guide for effortlessly building and customizing functional-rich web apps. Packed with real-world examples, it offers a practical understanding of the Power Pages environment.You'll understand web pages by creating data tables and forms, progress to adding web pages, and delve into advanced techniques for seamlessly integrating web apps. Now, you'll learn how to create responsive web pages, automate web apps, and use ChatGPT-assisted coding with code snippets for common requirements or needs. As you progress, you'll be guided on crafting portals and websites, encompassing the utilization of various functionalities and layouts. Progressively, you'll discover how to seamlessly integrate them into your web pages across multiple Microsoft technologies, including Dataverse and Power Automate. Towards the end, you'll also learn how to implement cloud flows to provide access to external services and use cloud flows to provide user experiences running processes off the page.By the end of the book, you'll have a solid understanding of Power Pages and be able to create web applications tailored to your unique needs.What You Will Learn: - Build interactive web pages and portals using Power Pages- Establish secure web sites with robust configurations for data integrity- Implement responsive design for adaptable apps on different devices- Integrate Power Pages with external services- Learn to code using Power Pages tools and ChatGPT assistance- Implement charts and custom styling in your web apps- Discover where and how to use Liquid and JavaScript effectively- Develop and utilize web templates for efficient app designWho this book is for: This book is the ultimate guide for citizen developers aiming to build functionally rich and responsive web apps with Power Pages. With clear and concise guidance, it caters to both beginners and experienced developers, offering practical insights into every aspect of web app development. Whether you're new to the field or seeking advanced techniques, this book equips you with the skills you need to create powerful and user-friendly web apps tailored to your unique needs.Table of Contents- Modernizing Rob the Builder's Business with Power Pages- Power Pages Design Studio- Power Pages Studio - Styling and Themes- Dataverse Tables and Forms- Table Permissions and Security- Basic Forms, Lists, and Web Pages- JavaScript and jQuery- Web Templates and Liquid- Workflow Automation- Power Pages and Cloud Flows- Charts, Dashboards, and Power BI- REST Integration- Creating a PDF File from Dataverse- Modal Windows- Enhancing Development with ChatGPT

9 特價1835
立即代訂
下次再買

Learning Django 5

Clara,Stein  著
Ingram 出版
2024/06/25 出版

Beginning with a thorough introduction to Django 5, you'll learn how to install and configure Django on a Linux server, set up virtual environments, and create your first Django project, BookTech. The book walks you through the fundamentals of Django models and ORM, teaching you how to define models, perform database migrations, and interact with the ORM to optimize data querying. You will learn about Django views, including function-based and class-based views, URL mapping, and form handling.Advanced topics are thoroughly covered, including user authentication, permission management, and extending the default user model. You'll also learn how to use essential features like site maps, RSS feeds, and SEO optimization to boost your app's visibility and user engagement. The book then goes over deployment and scaling, teaching you how to containerize your application with Docker, deploy to cloud platforms like AWS, and set up continuous integration and deployment pipelines in Jenkins. You will learn how to maintain and monitor your application with tools such as Amazon CloudWatch, New Relic, and Sentry, ensuring that it runs smoothly in production.Table of ContentUp and Running with Django 5Django Models and ORMViews and URL RoutingTemplates and Django's Template LanguageForms and ValidationUser Authentication and AuthorizationAdvanced Django CapabilitiesWorking with MongoDBSite Maps, RSS Feeds, and SEODeployment and Scaling

9 特價2394
立即代訂
下次再買

Industrial Networks and Intelligent Systems

Springer 出版
2024/06/25 出版

This book constitutes the refereed proceedings of the 10th EAI International Conference on INISCOM 2024, held in Da Nang, Vietnam, during February 20-21, 2024. The 18 full papers included in this book were carefully reviewed and selected from 41 submissions. They were organized in topical sections as follows: industrial networks and intelligent systems; telecommunications systems and networks; information processing and data analysis; security and privacy.

9 特價4175
立即代訂
下次再買

Advanced Intelligent Computing Technology and Applications

Springer 出版
2024/06/25 出版

This 6-volume set LNAI 14875-14880 constitutes - in conjunction with the 13-volume set LNCS 14862-14874 and the 2-volume set LNBI 14881-14882 - the refereed proceedings of the 20th International Conference on Intelligent Computing, ICIC 2024, held in Tianjin, China, during August 5-8, 2024. The total of 863 regular papers were carefully reviewed and selected from 2189 submissions. The intelligent computing annual conference primarily aims to promote research, development and application of advanced intelligent computing techniques by providing a vibrant and effective forum across a variety of disciplines. This conference has a further aim of increasing the awareness of industry of advanced intelligent computing techniques and the economic benefits that can be gained by implementing them. The intelligent computing technology includes a range of techniques such as Artificial Intelligence, Pattern Recognition, Evolutionary Computing, Informatics Theories and Applications, Computational Neuroscience & Bioscience, Soft Computing, Human Computer Interface Issues, etc.

9 特價4697
立即代訂
下次再買

Applied Cryptography and Network Security Workshops

Springer 出版
2024/06/25 出版

This two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held in parallel with the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, held in Abhu Dabhi, United Arab Emirates, during March 5-8, 2024. The 33 full papers and 11 poster papers presented in this volume were carefully reviewed and selected from 62 submissions. They stem from the following workshops: 6th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2024). 5th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2024). 6th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2024). 5th ACNS Workshop on Secure Cryptographic Implementation (SCI 2024). 1st Workshop on Advances in Asymmetric Cryptanalysis (AAC 2024). 6th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2024). 1st Workshop on Low-Latency Encryption (LLE 2024). 4th ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2024).

9 特價4436
立即代訂
下次再買

Advanced Intelligent Computing Technology and Applications

Springer 出版
2024/06/25 出版

This 6-volume set LNAI 14875-14880 constitutes - in conjunction with the 13-volume set LNCS 14862-14874 and the 2-volume set LNBI 14881-14882 - the refereed proceedings of the 20th International Conference on Intelligent Computing, ICIC 2024, held in Tianjin, China, during August 5-8, 2024. The total of 863 regular papers were carefully reviewed and selected from 2189 submissions. The intelligent computing annual conference primarily aims to promote research, development and application of advanced intelligent computing techniques by providing a vibrant and effective forum across a variety of disciplines. This conference has a further aim of increasing the awareness of industry of advanced intelligent computing techniques and the economic benefits that can be gained by implementing them. The intelligent computing technology includes a range of techniques such as Artificial Intelligence, Pattern Recognition, Evolutionary Computing, Informatics Theories and Applications, Computational Neuroscience & Bioscience, Soft Computing, Human Computer Interface Issues, etc.

9 特價4175
立即代訂
下次再買

Advanced Intelligent Computing Technology and Applications

Springer 出版
2024/06/25 出版

This 6-volume set LNAI 14875-14880 constitutes - in conjunction with the 13-volume set LNCS 14862-14874 and the 2-volume set LNBI 14881-14882 - the refereed proceedings of the 20th International Conference on Intelligent Computing, ICIC 2024, held in Tianjin, China, during August 5-8, 2024. The total of 863 regular papers were carefully reviewed and selected from 2189 submissions. The intelligent computing annual conference primarily aims to promote research, development and application of advanced intelligent computing techniques by providing a vibrant and effective forum across a variety of disciplines. This conference has a further aim of increasing the awareness of industry of advanced intelligent computing techniques and the economic benefits that can be gained by implementing them. The intelligent computing technology includes a range of techniques such as Artificial Intelligence, Pattern Recognition, Evolutionary Computing, Informatics Theories and Applications, Computational Neuroscience & Bioscience, Soft Computing, Human Computer Interface Issues, etc.

9 特價4175
立即代訂
下次再買

Advanced Intelligent Computing Technology and Applications

Springer 出版
2024/06/25 出版

This 6-volume set LNAI 14875-14880 constitutes - in conjunction with the 13-volume set LNCS 14862-14874 and the 2-volume set LNBI 14881-14882 - the refereed proceedings of the 20th International Conference on Intelligent Computing, ICIC 2024, held in Tianjin, China, during August 5-8, 2024. The total of 863 regular papers were carefully reviewed and selected from 2189 submissions. The intelligent computing annual conference primarily aims to promote research, development and application of advanced intelligent computing techniques by providing a vibrant and effective forum across a variety of disciplines. This conference has a further aim of increasing the awareness of industry of advanced intelligent computing techniques and the economic benefits that can be gained by implementing them. The intelligent computing technology includes a range of techniques such as Artificial Intelligence, Pattern Recognition, Evolutionary Computing, Informatics Theories and Applications, Computational Neuroscience & Bioscience, Soft Computing, Human Computer Interface Issues, etc.

9 特價4175
立即代訂
下次再買

Networked Systems

Springer 出版
2024/06/25 出版

This book constitutes the refereed proceedings of the 12th International Conference on Networked Systems, NETYS 2024, held in Rabat, Morocco, during May 29-31, 2024. The 14 full papers and 3 short papers presented were carefully reviewed and selected from 42 submissions. NETYS aims to bring together researchers and engineers from the theory and practice of distributed and networked systems. The scope of the conference covers all aspects related to the design and the development of networked systems, e.g., cloud systems, formal verification, concurrent and distributed algorithms, data management, data science and parallel/concurrent/distributed programming. Additionally, this year NETYS also featured works on the emerging topic of distributed machine learning, also commonly referred to as federated learning.

9 特價3392
立即代訂
下次再買
頁數27/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing