Book 2 continues as the tiny fingers in Book 1 Grades K-2 grow and become more familiar with online activities. This isn......more
Book 2 continues as the tiny fingers in Book 1 Grades K-2 grow and become more familiar with online activities. The crit......more
This book presents a fresh perspective on combating cybercrime, showcasing innovative solutions from experts across vari......more
...more
The information security arena is often vague and confusing for internet users and fallling into cyber traps can take et......more
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively......more
Key elements in the formation of smart cities are development based on cooperation between local governments and busines......more
Digital evolution, whether through Internet advances or the development of connected objects, has triggered a veritable ......more
The aim of this book is to delineate the challenges faced by new generation mobile networks, such as 5G and forthcoming ......more
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively......more
Ransomware is a type of malicious software that prevents victims from accessing their computers and the information they......more
Become an MDI expert and transform your IT security with advanced identity protection strategies to safeguard against ev......more
Learn, prepare, and practice for CompTIA Network+ N10-009 exam success with this Cert Guide from Pearson IT Certificatio......more
Big Data and Blockchain Technology for Secure IoT Applications presents a comprehensive exploration of the intersection ......more
This book summarizes the work developed over more than two decades in the field of advanced calibration techniques for v......more
Today AI and Machine/Deep Learning have become the hottest areas in the information technology. This book aims to provid......more
This book will throw light on recent developments in latest field and will be of great interest to know various applicat......more
This book highlights the importance of data-driven techniques to solve wireless communication problems. It presents a nu......more
This book explores the potential of 5G and beyond technologies in smart city setup, including introduction to 5G along w......more
This book is intended to help the incoming administration and members of critical infrastructure communities to prioriti......more
This book is based on the work from world-famous experts on the application of DL for vehicle networks. It consists of t......more
The main objective of this book is to introduce cyber security using modern technologies like AI, Quantum Cryptography a......more
This book discusses the advancements in IoT and Cyber-Physical Systems Forensics. This book not only presents numerous c......more
This book covers different aspects of security implementations and challenges in IoMT and aims to bring researchers toge......more
The book offers comprehensive coverage of the essential topics, including machine Learning and Deep Learning for cyberse......more
This book is dedicated to addressing the major challenges in fighting diseases and psychological issues using AI. Challe......more
This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides method......more
"Calling all SAP enterprise architects-the strategy guide you need is here! See how the SAP EA Framework and SAP LeanIX ......more
This book provides a review of current research in fake news and presents six new empirical research studies examining i......more
Anticipate the security and privacy threats of the future with this groundbreaking text The development of the next gene......more
This book constitutes the refereed proceedings of the 14th International Conference on Security, Privacy, and Applied Cr......more
...more
...more
...more
...more
...more
...more
"Recently, numerous researchers have turned their attention to the dynamical behaviors of complex dynamical networks (CD......more
...more
In The Closing of the Auditor’s Mind?, author David J. O’Regan describes internal auditing as an important "binding agen......more
In The Closing of the Auditor’s Mind? David J. O’Regan describes internal auditing as an important "binding agent" of so......more
This book examines the uses and potential risks of location-based services (LBS) in the context of big data, with a focu......more
Integrated Sensing and Communications for Future Wireless Networks: Principles, Advances and Key Enabling Technologies p......more
...more
...more
The multi-volume set of LNCS books with volume numbers 15059 upto 15147 constitutes the refereed proceedings of the 18th......more
Unlock the Future of Networking with Segment Routing: Your Comprehensive Guide to SR-MPLS and SRv6 for Service Provider ......more
...more
...more
...more
The multi-volume set of LNCS books with volume numbers 15059 up to 15147 constitutes the refereed proceedings of the 18t......more
Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How Wor......more
The two-volume set LNCS 15342 and 15343 constitutes the refereed proceedings of the 26th International Conference on Inf......more
The two-volume set LNCS 15342 and 15343 constitutes the refereed proceedings of the 26th International Conference on Inf......more
The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory......more
The multi-volume set of LNCS books with volume numbers 15059 upto 15147 constitutes the refereed proceedings of the 18th......more
The multi-volume set of LNCS books with volume numbers 15059 up to 15147 constitutes the refereed proceedings of the 18t......more
This book constitutes the refereed proceedings of the 25th International Conference on Product-Focused Software Process ......more
The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory......more
...more
The multi-volume set of LNCS books with volume numbers 15059 upto 15147 constitutes the refereed proceedings of the 18th......more
Cybersecurity: Safeguarding Our Digital World is a comprehensive guide to modern cybersecurity. It covers fundamentals t......more
This book constitutes the proceedings of the workshops that have been held in conjunction with the 28th International Co......more
This book presents research developments and novel methodologies on data-rate-constrained control and state estimation f......more
This book gives a complete introduction to cybersecurity and its many subdomains. It’s unique by covering both technical......more
The multi-volume set of LNCS books with volume numbers 15059 upto 15147 constitutes the refereed proceedings of the 18th......more
The multi-volume set of LNCS books with volume numbers 15059 upto 15147 constitutes the refereed proceedings of the 18th......more
The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory......more
This book intends to present emerging Federated Learning (FL)-based architectures, frameworks, and models in Internet of......more
The underlying premise for Industry 4.0 is a systems approach. This book introduces the concept of Systems 4.0 as a foun......more
Since the invention of computers and other similar machines, scientists and researchers have been trying very hard to en......more
This book examines the implementation of emerging technology projects in the service-based Indian IT sector. The title s......more
The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very com......more
Green Internet of Things (IoT) envisions the concept of reducing the energy consumption of IoT devices and making the en......more
IT governance seems to be one of the best strategies to optimize IT assets in an economic context dominated by informati......more
Artificial intelligence (AI), machine learning, and advanced electronic circuits involve learning from every data input ......more
The digital twin of a physical system is an adaptive computer analog which exists in the cloud and adapts to changes in ......more
The main aim of the book is to familiarize readers with the concepts of convergence of different connected and smart dom......more
Information security primarily serves these six distinct purposes--authentication, authorization, prevention of data the......more
Information security primarily serves these six distinct purposes--authentication, authorization, prevention of data the......more
Whether you’re a seasoned professional or a newcomer to the world of AI product management, this is your definitive guid......more
...more
...more
...more
The multi-volume set of LNCS books with volume numbers 15059 up to 15147 constitutes the refereed proceedings of the 18t......more
Embark on a mind-bending exploration of existence with The Beginner’s Guide to Reality, an accessible trilogy that unrav......more
...more
The multi-volume set of LNCS books with volume numbers 15059 up to 15147 constitutes the refereed proceedings of the 18t......more
The multi-volume set of LNCS books with volume numbers 15059 up to 15147 constitutes the refereed proceedings of the 18t......more
The multi-volume set of LNCS books with volume numbers 15059 up to 15147 constitutes the refereed proceedings of the 18t......more
The multi-volume set of LNCS books with volume numbers 15059 up to 15147 constitutes the refereed proceedings of the 18t......more
This book constitutes the refereed proceedings of the 25th International Conference on Product-Focused Software Process ......more
"With the exponential growth in indoor wireless communication, the necessity for novel technologies to manage the escala......more
The best practice and preparation for the UPDATED CCNA certification exam CCNA Certification Practice Tests, Second Edit......more
Your comprehensive guide to succeeding on the UPDATED CCNA Certification exam In the newly revised second edition of the......more
The rise of audio deepfakes presents a significant security threat that undermines trust in digital communications and m......more
Are you ready to master the art of networking? Have you ever wondered what sets expert hackers apart in understanding pr......more