You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Nowadays it is impossible to imagine a business without technology as most industries are becoming "smarter" and more tech-driven, ranging from small individual tech initiatives to complete business models with intertwined supply chains and "platform"-based business models. New ways of working, such as agile and DevOps, have been introduced, leading to new risks. These risks come in the form of new challenges for teams working together in a distributed manner, privacy concerns, human autonomy, and cybersecurity concerns. Technology is now integrated into the business discipline and is here to stay leading to the need for a thorough understanding of how to address these risks and all the pote...
Part of a four-volume set, this book constitutes the refereed proceedings of the 7th International Conference on Computational Science, ICCS 2007, held in Beijing, China in May 2007. The papers cover a large volume of topics in computational science and related areas, from multiscale physics to wireless networks, and from graph theory to tools for program development.
The three-volume set LNCS 3514-3516 constitutes the refereed proceedings of the 5th International Conference on Computational Science, ICCS 2005, held in Atlanta, GA, USA in May 2005. The 464 papers presented were carefully reviewed and selected from a total of 834 submissions for the main conference and its 21 topical workshops. The papers span the whole range of computational science, ranging from numerical methods, algorithms, and computational kernels to programming environments, grids, networking, and tools. These fundamental contributions dealing with computer science methodologies and techniques are complemented by papers discussing computational applications and needs in virtually all scientific disciplines applying advanced computational methods and tools to achieve new discoveries with greater accuracy and speed.
Cybersecurity has been gaining serious attention and recently has become an important topic of concern for organizations, government institutions, and largely for people interacting with digital online systems. As many individual and organizational activities continue to grow and are conducted in the digital environment, new vulnerabilities have arisen which have led to cybersecurity threats. The nature, source, reasons, and sophistication for cyberattacks are not clearly known or understood, and many times invisible cyber attackers are never traced or can never be found. Cyberattacks can only be known once the attack and the destruction have already taken place long after the attackers have...
In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more modern networks like the internet of things and the internet of energy crossing fog and edge computing, among others. As technology matures and its standard use cases are established, there is a need to gather recent research that can shed light on several aspects and facts on the use of blockchain technology in different fields of interest. Enabling Blockchain Technology for Secure Networking and Comm...
The key role in the security policy of the North Atlantic Treaty Organization (NATO) is to prevent new types of asymmetric challenges and deal with the new architecture of the Euro-Atlantic security environment, including the control of weapons of mass destruction. In modern international politics, the growing militaristic policies of the states have created many dangers and raised the need for NATO to address new issues that the Alliance did not face during the Cold War. NATO and the Future of European and Asian Security reflects on difficult geopolitical and geostrategic conditions and reviews how new types of warfare have a drastic impact on NATO’s military and defense doctrine. This bo...
As personal data continues to be shared and used in all aspects of society, the protection of this information has become paramount. While cybersecurity should protect individuals from cyber-threats, it also should be eliminating any and all vulnerabilities. The use of hacking to prevent cybercrime and contribute new countermeasures towards protecting computers, servers, networks, web applications, mobile devices, and stored data from black hat attackers who have malicious intent, as well as to stop against unauthorized access instead of using hacking in the traditional sense to launch attacks on these devices, can contribute emerging and advanced solutions against cybercrime. Ethical Hackin...
This proceedings volume brings together peer-reviewed papers presented at the International Conference on Information Technology and Computer Application Engineering, held 10-11 December 2014, in Hong Kong, China. Specific topics under consideration include Computational Intelligence, Computer Science and its Applications, Intelligent Information Processing and Knowledge Engineering, Intelligent Networks and Instruments, Multimedia Signal Processing and Analysis, Intelligent Computer-Aided Design Systems and other related topics. This book provides readers a state-of-the-art survey of recent innovations and research worldwide in Information Technology and Computer Application Engineering, in so-doing furthering the development and growth of these research fields, strengthening international academic cooperation and communication, and promoting the fruitful exchange of research ideas. This volume will be of interest to professionals and academics alike, serving as a broad overview of the latest advances in the dynamic field of Information Technology and Computer Application Engineering.
"With the field of digital transformation and the associated risk and security management rapidly changing due to emerging technologies and upcoming regulations this book offers extensive Design Science Research approaches to on one hand extensively examine the problem and on the other hand offer pragmatic solutions (artefacts) that can serve both academia and practitioners"--
This book provides digital leaders who are accountable for the rapid development of high-quality software applications a concise guide to designing, implementing, measuring, and improving DevOps programs that are tailored to their organizations.In DevOps for Digital Leaders, deep collective experience on both sides of the dev–ops divide informs the global thought leadership and penetrating insights of the authors, all three of whom are cross-portfolio DevOps leaders at CA Technologies. Aruna Ravichandran, Kieran Taylor, and Peter Waterhouse analyze the organizational benefits, costs, freedoms, and constraints of DevOps. They chart the coordinated strategy of organizational change, metrics,...