Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Advances in Technology Transfer Through IoT and IT Solutions
  • Language: en
  • Pages: 127

Advances in Technology Transfer Through IoT and IT Solutions

This book describes common applied problems that are solved with the use of digital technology. The digital technology has simplified most of our daily activities. Technology has been improving our quality of life where human capability alone is insufficient enough to be utilized. For any challenging tasks, digital technology helps to solve it in very efficient ways and thousands of them are solved on a daily basis without much notice in the public. Software and IT technology let us to complete tasks in just a moment that took days without this technical support. In that sense, this book presents several examples on how software- and IT-based solutions were successfully applied in solving actual engineering problems.

Tech Horizons
  • Language: en
  • Pages: 128

Tech Horizons

None

Proceedings of Ninth International Congress on Information and Communication Technology
  • Language: en
  • Pages: 647
Board Diversity and Corporate Governance
  • Language: en
  • Pages: 700

Board Diversity and Corporate Governance

None

Advances in Cyber Security
  • Language: en
  • Pages: 746

Advances in Cyber Security

This book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September 2020. Due to the COVID-19 pandemic the conference was held online. The 46 full papers and 1 short paper were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on internet of things, industry 4.0 and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication; governance, social media, mobile and web, data privacy, data policy and fake news.

Data Mining: Concepts, Methodologies, Tools, and Applications
  • Language: en
  • Pages: 2335

Data Mining: Concepts, Methodologies, Tools, and Applications

  • Type: Book
  • -
  • Published: 2012-11-30
  • -
  • Publisher: IGI Global

Data mining continues to be an emerging interdisciplinary field that offers the ability to extract information from an existing data set and translate that knowledge for end-users into an understandable way. Data Mining: Concepts, Methodologies, Tools, and Applications is a comprehensive collection of research on the latest advancements and developments of data mining and how it fits into the current technological world.

Advanced Data Mining and Applications
  • Language: en
  • Pages: 589

Advanced Data Mining and Applications

This book constitutes the refereed proceedings of the 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, held in Chongqing, China, in November 2010. 63 carefully reviewed regular papers and 55 revised short papers were presented. The papers are organized in topical sections on data mining foundations; data mining in specific areas; data mining methodologies and processes; and data mining applications and systems.

Medical Applications of Intelligent Data Analysis
  • Language: en

Medical Applications of Intelligent Data Analysis

  • Type: Book
  • -
  • Published: 2012
  • -
  • Publisher: Unknown

"This book explores the potential of utilizing medical data through the implementation of developed models in practical applications"--

The CERT Guide to Insider Threats
  • Language: en
  • Pages: 431

The CERT Guide to Insider Threats

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider Threats describes CERT’s findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by executives, managers, security officers, and operational staff within any private, government, or military organization. The authors systematically address attacks by all types of malicious insiders, including current and former employees, contractors, busine...

Insider Threats in Cyber Security
  • Language: en
  • Pages: 248

Insider Threats in Cyber Security

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book will be a must read, so of course I’ll need a copy." Insider Threats in Cyber Security covers all aspects of insider threats, from motivation to mitigation. It includes how to monitor insider threats (and what to monitor for), how to mitigate insider threats, and related topics and case studies. Insider Threats in Cyber Security is intended for a professional audience composed of the military, government policy makers and banking; financing companies focusing on the Secure Cyberspace industry. This book is also suitable for advanced-level students and researchers in computer science as a secondary text or reference book.