Browse Items (25 total)

  • Collection: 000 Computer Science, Information & General Works

0015858_Authors_Book (2025-01-30 09_39_57).jpg
Data Privacy and Security - Principles and Applications offers a comprehensive look at the critical aspects of protecting data in today’s interconnected world. As digital innovations rapidly expand across sectors such as healthcare, finance,…

self-learning.jpg
Configuring an anomaly-based Network Intrusion Detection System for cybersecurity of an industrial system in the absence of information on networking infrastructure and programmed deterministic industrial process is challenging. Within the research…

Demystifying.jpg
This open access book. Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end…

10th_Anniversary_of_emAxiomsem_Mathematical_Analysis.jpg
The journal Axioms has achieved a remarkable increase in the number of papers published, as well as a significant growth in citations over the past decade. In order to mark this significant milestone, I am glad to lead this Special Issue entitled…

leveraging-digital-innovation.pdf[1].jpg
Digital technologies offer unprecedented opportunities for organizations to realize efficiency gains and explore new lines of business. However, their integration into existing corporate structures and routines hardly materializes without frictions…

1006971.pdf.jpg
This This book is open access under a CC BY 4.0 license. This book offers a comprehensive guide, covering every important aspect of computational thinking education. It provides an in-depth discussion of computational thinking, including the notion…

9781315208787.jpg
From the Foreword:

"This book lays out much of what we’ve learned at AT&T about SDN and NFV. Some of the smartest network experts in the industry have drawn a map to help you navigate this journey. Their goal isn’t to predict the future but to…

9781498741996.jpg
Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"?

Cyber security…

images.jpg
Nonlocality was discovered by John Bell in 1964, in the context of the debates about quantum theory, but is a phenomenon that can be studied in its own right. Its observation proves that measurements are not revealing pre-determined values,…

978-3-662-66769-9.jpg
In diesem Open-Access-Tagungsband sind die besten Beiträge des 8. Jahreskolloquiums "Bildverarbeitung in der Automation" (BVAu 2022) enthalten. Das Kolloquium fand am 02. November 2022 auf dem Innovation Campus Lemgo statt. Die vorgestellten neuesten…
Output Formats

atom, csv, dcmes-xml, json, omeka-xml, rss2