This book provides a valuable restatement of the current law of armed conflict regarding hostilities in a diverse range of ...
Continue reading
The intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. ...
Continue reading
Describes the relationships of PLM with the Internet of Things, Industry 4.0, Digital Twins and Digital Threads. “Product ...
Continue reading
This book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, ...
Continue reading
Data science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
Continue reading
Examines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...
Continue reading
This book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
Continue reading
This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop ...
Continue reading
T this book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent ...
Continue reading
The book will present a variety of on-going efforts to provide new results and solutions to the problem of service productivity. ...
Continue reading
This book constitutes the refereed proceedings of the Software Engineering and Algorithms section of the 10th Computer Science ...
Continue reading
Presents scientific results of the 21st ACIS International Winter Conference on Software Engineering, Artificial Intelligence, ...
Continue reading
Spying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but ...
Continue readingProvides readers with an understanding of various concepts, benefits, and practices that the adoption of Fourth Industrial ...
Continue reading
The 12 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 23 submissions. The ...
Continue reading
In our profoundly complex and interconnected world, there is a pressing need for systems thinking, to consider environmental, ...
Continue reading
This book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT ...
Continue reading
Pulls together the most important takeaways from the growth of cryptocurrencies and blockchains, looking at their potential ...
Continue reading
This book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses ...
Continue readingIn 1965 Lotfi Zadeh, a professor of electrical engineering at the University of California in Berkeley, published the first ...
Continue reading