This book provides a valuable restatement of the current law of armed conflict regarding hostilities in a diverse range of ...
Continue readingThe intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. ...
Continue readingDescribes the relationships of PLM with the Internet of Things, Industry 4.0, Digital Twins and Digital Threads. “Product ...
Continue readingThis book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, ...
Continue readingData science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
Continue readingExamines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...
Continue readingThis book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
Continue readingThis open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop ...
Continue readingT this book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent ...
Continue readingThe book will present a variety of on-going efforts to provide new results and solutions to the problem of service productivity. ...
Continue readingThis book constitutes the refereed proceedings of the Software Engineering and Algorithms section of the 10th Computer Science ...
Continue readingPresents scientific results of the 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, ...
Continue readingSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but ...
Continue readingProvides readers with an understanding of various concepts, benefits, and practices that the adoption of Fourth Industrial ...
Continue readingThe 12 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 23 submissions. The ...
Continue readingIn our profoundly complex and interconnected world, there is a pressing need for systems thinking, to consider environmental, ...
Continue readingThis book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT ...
Continue readingPulls together the most important takeaways from the growth of cryptocurrencies and blockchains, looking at their potential ...
Continue readingThis book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses ...
Continue readingIn 1965 Lotfi Zadeh, a professor of electrical engineering at the University of California in Berkeley, published the first ...
Continue reading