Kubernetes is an essential tool for anyone deploying and managing cloud-native applications. Kubernetes in Action, Second Edition is a fully-updated and comprehensive guide to developing and running applications in a Kubernetes environment....Daugiau...
Get the speed and reliability of Rust libraries, functions, and high-performance features through incremental adoption without rewriting your codebase from scratch.In Refactoring to Rust you will learn to: Create Rust...Daugiau...
With a new section on improving the reality view of project planning and analysis, the fourth edition of Project Management Theory and Practice combines academic theory and real-world project experience that gives the textbook its unique perspective...Daugiau...
With a new section on improving the reality view of project planning and analysis, the fourth edition of Project Management Theory and Practice combines academic theory and real-world project experience that gives the textbook its unique perspective...Daugiau...
Informative reference on the state of the art in cybersecurity and how to achieve a more secure cyberspace AI for Cybersecurity presents the state of the art and practice in AI for cybersecurity with a focus on four interrelated d...Daugiau...
This book examines the complex interplay between state-of-the-art telecommunications, smart city initiatives, and the Internet of Things (IoT), analyzing the security challenges and opportunities that emerge as the world ventures into this technol...Daugiau...
Africa is a booming continent with incredible growth potential and is the second-largest continent in the world. The continent is home to immense potential and abundant resources. It is also the home to some of the youngest populations in the worl...Daugiau...
Internet of Things Security: Attacks, Tools, Techniques and Challenges delves into the essential aspects of safeguarding devices within the IoT ecosystem. This book provides a comprehensive overview of the IoT architecture, its vast applicatio...Daugiau...
George Dimitoglou, Leonidas Deligiannidis, Hamid R. Arabnia
Serija: Intelligent Computing
(Išleidimo metai: 20-Oct-2025, Hardback, Leidėjas: De Gruyter, ISBN-13: 9783111436418)
The depth of our dependence on technology in our interconnected world underscores the critical role of cyber security. This book provides essential insights into the latest research and best practices and techniques for protecting against cyber thre...Daugiau...
Structured around strategic foundations, operational developments, and emerging threats, the book examines how Türkiye has adapted to the evolving landscape of terrorism....Daugiau...
Metaverse Platform Implementation: AI, Security, and Applications provides a comprehensive exploration of the engineering and scientific principles behind the metaverse, a 3D digital world designed to replicate and enhance physical reality...Daugiau...
This book explores cutting-edge innovations in intelligent systems and their real-world impact. From smart grids and IoT applications to machine learning-driven network optimization and cybersecurity, it covers the key technologies shaping modern...Daugiau...
The book is a practical guide to be used by people with no or little knowledge of sustainability and also sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted...Daugiau...
The book is a practical guide to be used by people with no or little knowledge of sustainability and also sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted...Daugiau...
Almost 50 years ago, the C language defined modern computer programming. This book shows you why C is still as powerful and popular as ever, with an inside look at the new C23 standard.For programs that need to be small, fast, and unfa...Daugiau...
There are lot of take-aways as the book discusses for the first-time various dimensions of national security, the risks involved due to cyber threats and ultimately the prevention & detection through cyber forensics and cyber security architecture...Daugiau...
Russia, China, Iran, Saudi Arabia, Turkey, North Korea and India are engaged in foreign information manipulation and interference (FIMI) in the democratic practices of countries in Europe, America, Africa and Asia. The Ukraine, in particular, has...Daugiau...
TCP, UDP, DNS, HTTP, and more: these are the network protocols that make up the fabric of the Internet. Erlang and Elixir are the perfect fit for building network-intensive applicationsthe BEAMs actor model perfectly mirrors the way nodes operate i...Daugiau...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. As mobile applications become...Daugiau...
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. This book follows industry-standard methodolo...Daugiau...
Solid acid catalysts have been used mainly in petroleum refining and petrochemical processes. From the viewpoint of chemicals and energy resources, the utilization of resources other than fossil ones is important for overcoming environmental issue...Daugiau...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Daugiau...
Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors by Dr. Dustin S. Sachs is a timely and essential resource for cybersecurity professionals, leaders, and organizational strategists seeking to understand the powerful rol...Daugiau...
The field of edge computing is advancing quickly, with new algorithms, architectures, and use cases emerging regularly. Intelligent mobile edge computing includes various domainssuch as IoT, AI, and telecommunicationsmaking it essential to provi...Daugiau...
Directfrom Microsoft, this Exam Ref is the official study guide for the new MicrosoftDP-300 Administering Microsoft Azure SQL Solutions certification exam. ...Daugiau...
The rapid advancement of Artificial Intelligence (AI) is revolutionizing key sectors critical to global progress. AI Frontiers: Transforming Health, Agriculture, and Education delves into how cutting-edge AI innovations are addressin...Daugiau...
In todays rapidly evolving business landscape, effective leadership is increasingly synonymous with adept digital strategy. In todays rapidly evolving business landscape, effective leadership is increasingly synonymous with adept...Daugiau...
In todays rapidly evolving business landscape, effective leadership is increasingly synonymous with adept digital strategy. In todays rapidly evolving business landscape, effective leadership is increasingly synonymous with adept...Daugiau...
This book introduces a strategic, business-aligned model for integrating cybersecurity and IT operations that acknowledges the friction between legacy systems and modern demands, global operations and local control, innovation and compliance. It r...Daugiau...