Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Advanced Information Systems Engineering
  • Language: en
  • Pages: 690

Advanced Information Systems Engineering

  • Type: Book
  • -
  • Published: 2014-06-05
  • -
  • Publisher: Springer

This book constitutes the proceedings of 26th International Conference on Advanced Information Systems Engineering, CAiSE 2014, held in Thessaloniki, Greece in June 2014. The 41 papers and 3 keynotes presented were carefully reviewed and selected from 226 submissions. The accepted papers were presented in 13 sessions: clouds and services; requirements; product lines; requirements elicitation; processes; risk and security; process models; data mining and streaming; process mining; models; mining event logs; databases; software engineering.

Advanced Information Networking and Applications
  • Language: en
  • Pages: 1396

Advanced Information Networking and Applications

  • Type: Book
  • -
  • Published: 2019-03-14
  • -
  • Publisher: Springer

The aim of the book is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications. Networks of today are going through a rapid evolution and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations are emerging as a critically important disruptive computer class based on a new platform, n...

Information Security and Privacy
  • Language: en
  • Pages: 472

Information Security and Privacy

  • Type: Book
  • -
  • Published: 2012-07-04
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.

AI-Driven Cybersecurity andThreat Intelligence
  • Language: en
  • Pages: 207

AI-Driven Cybersecurity andThreat Intelligence

None

Service-Oriented Computing--ICSOC 2013 Workshops
  • Language: en
  • Pages: 600

Service-Oriented Computing--ICSOC 2013 Workshops

  • Type: Book
  • -
  • Published: 2014-05-02
  • -
  • Publisher: Springer

This book constitutes the revised selected papers of the workshops of the 11th International Conference on Service-Oriented Computing (ICSOC 2013), held in Berlin, Germany, in December 2013. The conference hosted the following five workshops: 3rd International Workshop on Cloud Computing and Scientific Applications (CCSA'13); 1st International Workshop on Cloud Service Brokerage (CSB'13); 1st International Workshop on Pervasive Analytical Service Clouds for the Enterprise and Beyond (PASCEB'13); 9th International Workshop on Semantic Web Enabled Software Engineering (SWESE'13); 9th International Workshop on Engineering Service-Oriented Applications (WESOA'13); and a PhD Symposium, with best papers also being included in this book. The 54 papers included in this volume were carefully reviewed and selected from numerous submissions. They address various topics in the service-oriented computing domain and its emerging applications.

Surveillance, Prevention, and Control of Infectious Diseases
  • Language: en
  • Pages: 247
Blockchain Applications in Cybersecurity Solutions
  • Language: en
  • Pages: 182

Blockchain Applications in Cybersecurity Solutions

Applications of Blockchain in Cybersecurity Solutions is a comprehensive guide to blockchain applications in computer security. it presents the concepts and practical techniques that are useful in creating and designing decentralized cybersecurity software through 9 carefully edited chapters. Topics covered in the book include - An introduction to the use of blockchain technology in cybersecurity - Attack surfaces in blockchains - Anti-counterfeit solutions in blockchains - blockchain based access control systems - Multi-chain security deployment over smart contracts - Cybersecurity as a decentralized service The book is an essential primer for computer science students and researchers, and a quick reference for IT professionals on blockchain based cybersecurity.

Security and Risk Analysis for Intelligent Cloud Computing
  • Language: en
  • Pages: 371

Security and Risk Analysis for Intelligent Cloud Computing

  • Type: Book
  • -
  • Published: 2023-12-19
  • -
  • Publisher: CRC Press

This edited book is a compilation of scholarly articles on the latest developments in the field of AI, Blockchain, and ML/DL in cloud security. This book is designed for security and risk assessment professionals, and to help undergraduate, postgraduate students, research scholars, academicians, and technology professionals who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of cloud infrastructure and applications and shows how to make cloud infrastructure secure to combat threats and attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security conc...

Advances in Network-Based Information Systems
  • Language: en
  • Pages: 569

Advances in Network-Based Information Systems

None

Smart Grids as Cyber Physical Systems, 2 Volume Set
  • Language: en
  • Pages: 791

Smart Grids as Cyber Physical Systems, 2 Volume Set

Smart Grids as Cyber Physical Systems, a new two-volume set from Wiley-Scrivener, provides a comprehensive overview of the fundamental security of supervisory control and data acquisition (SCADA) systems, offering clarity on specific operating and security issues that may arise that deteriorate the overall operation and efficiency of smart grid systems. It also provides techniques to monitor and protect systems, as well as aids for designing a threat-free system. This title discusses how artificial intelligence (AI) may be extensively deployed in the prediction of energy generation, electric grid-related line loss prediction, load forecasting, and for predicting equipment failure prevention....