This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
اقرأ المزيدThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
اقرأ المزيدThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيدThis study is about developing a secure, autoscaling military postponement e-service in Syria, that allows Syrian citizens ...
اقرأ المزيدIn developing the tools necessary for the study of complex manifolds, this comprehensive, well-organized treatment presents ...
اقرأ المزيدThis book explores the global challenges and experiences related to digital entrepreneurial activities, using carefully selected ...
اقرأ المزيدIf you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers ...
اقرأ المزيدNew information technologies are being applied swiftly to all levels of government service: local, county, regional and even ...
اقرأ المزيدThis is book. Media industry research and EU policymaking are predominantly tailored to large (and, in the latter case, ...
اقرأ المزيدField-Programmable Gate Arrays (FPGAs) are revolutionizing digital signal processing as novel FPGA families are replacing ...
اقرأ المزيدThis book explores the digital transformation of small and rural towns, in particular, how to measure the evolution and development ...
اقرأ المزيدPresents a number of case studies on digital transformation in Norway, one of the fore-runners in the digital progress index ...
اقرأ المزيدThe book presents new material and theory as well as synthesis of recent work with complete Project Designs using industry ...
اقرأ المزيدThe aim of this book is to extend our understandings on how digitalization and the future of financial services can be helpful ...
اقرأ المزيدIn the past decades, model reduction has become an ubiquitous tool in analysis and simulation of dynamical systems, control ...
اقرأ المزيدThe essential flaw in prior efforts is an over-reliance on geometric assumptions from large-scale cell-based layout algorithms. ...
اقرأ المزيدThes book is a most welcome contribution to an interesting and lively subject." -- NatureOriginally published in 1974, this ...
اقرأ المزيدThis Pivot demonstrates how a variety of technologies act as innovation catalysts within the banking and financial services ...
اقرأ المزيدThis book focuses on the application of various drying technologies to the processing of pharmaceuticals and biologicals. ...
اقرأ المزيد