You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
By the time he was twenty, Alok Kejriwal had his life pre-planned for him. He would inherit the family's socks manufacturing business and be the hard-working, money-minting, quintessential Marwari businessman, forever. Except that it didn't turn out that way. A few years after surviving the family set-up, something turned up that sent Alok on a completely different career path: the Internet! A crazy business idea Alok had turned out to be a winner. Soon, Alok was fighting and thriving in a world completely different from the one he had grown up in. A world where technology breakthroughs, VCs and out-of-the-box thinking decided the real winners. Why I Stopped Wearing My Socks is Alok's real-l...
The book proposes new technologies and discusses future solutions for design infrastructure for ICT. The book contains high quality submissions presented at Second International Conference on Information and Communication Technology for Sustainable Development (ICT4SD - 2016) held at Goa, India during 1 - 2 July, 2016. The conference stimulates the cutting-edge research discussions among many academic pioneering researchers, scientists, industrial engineers, and students from all around the world. The topics covered in this book also focus on innovative issues at international level by bringing together the experts from different countries.
This book presents selected papers from the 5th International Conference on Inventive Systems and Control (ICISC 2021), held on 7–8 January 2021 at JCT College of Engineering and Technology, Coimbatore, India. The book includes an analysis of the class of intelligent systems and control techniques that utilises various artificial intelligence technologies, where there are no mathematical models and systems available to make them remain controlled. Inspired by various existing intelligent techniques, the primary goal is to present the emerging innovative models to tackle the challenges faced by the existing computing and communication technologies. The proceedings of ICISC 2021 aim at presenting the state-of-the-art research developments, trends, and solutions for the challenges faced by the intelligent systems and control community with the real-world applications. The included research articles feature the novel and unpublished research works on intelligent system representation and control.
This two-volume constitutes the refereed proceedings of the First International Conference on Advancements in Smart Computing and Information Security, ASCIS 2022, held in Rajkot, India, in November 2022. The 37 full papers and 19 short papers presented were thoroughly reviewed and selected from the 206 submissions. The papers are organized in topical sections on artificial intelligence; smart computing; cyber security; industry.
Through the rise of big data and the internet of things, terrorist organizations have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare, which grants great advantage to the attacker, has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. Examining cyber warfare and terrorism through a critical and academic perspective can lead to a better understanding of its foundations and implications. Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applicatio...
Global Business Leadership discusses the urgent issues facing global business leaders and presents seven strategies found necessary for successful intercultural business ventures. It provides business professionals and students with insight into the failure of businesses to prepare leaders for stepping into complex cultural contexts. The Geoleadership Model developed by Dr. Wibbeke is applied to global business situations using cases taken from leading companies such as Google and eBay. The book uses a case study format to present salient issues related to intercultural leadership and then principles of the model are applied to the case in discussion format. The concepts of care, communicati...
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud. The proceedings compiles the selected research papers presented at ICE-TEAS 2023 Conference held at Jaipur Engineering College and Research Centre, Jaipur, India, during February 17–19, 2023. The book focuses on expert applications and artificial intelligence; information and application security; advanced computing; multimedia applications in forensics, security, and intelligence; and advances in web technologies: implementation and security issues.
EVOLVING NETWORKING TECHNOLOGIES This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today. In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination...
The comic side of start-up investing is a satirical take on the world of start-up investing. The interactions between the various characters that are critical to the investing eco-system are depicted in a comic book style. The style is purposely chosen to make readers chuckle and appreciate the human behaviors that guide the world of start-up investing. The book also encourages readers to reflect on how they would make their decisions and what is important to them. The book is written by authors who are deeply embedded in the investing eco-system and have played multiple roles as founders , venture capitalists and even limited partners.
Three years have passed since the second edition of this book was published. The field of IT outsourcing continues to grow in practice as well as in academia and draws further attention in both domains. Aspects of traditional outsourcing (Part II) have remained pronounced but are becoming more mature. While o- sourcing determinants are still important, they are now of less interest to researchers. Relationship management (Chap. 1) and capability management (Chap. 2) continue to be of interest; so too are outsourcing outcomes (Chap. 3) and, as a new focus, innovation aspects (Chap. 4). These are motivating more and more research activities, complementing the lifecycle of traditional o- sourci...