for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The emergence of the Internet of Things (IoT), combined with greater heterogeneity not only online in cloud computing architectures but across the cloud-to-edge continuum, is introducing new challenges for managing applications and infrastructure across this continuum.
Bemærk: Kan ikke leveres før jul.
This book focuses on recent topics related to the convergence of information and communication technologies (ICT) and computing with smart devices.
Bemærk: Kan ikke leveres før jul.
This book highlights research and survey articles dedicated to big data techniques for cyber-physical system (CPS), which addresses the close interactions and feedback controls between cyber components and physical components.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed post-conference proceedings of the... Læs mere
Bemærk: Kan ikke leveres før jul.
This handbook covers recent advances in the integration of three areas, namely, cloud computing, cyber-physical... Læs mere
Bemærk: Kan ikke leveres før jul.
Blockchain and other trustless systems have gone from being relatively obscure technologies, which were only known to a small community of computer scientists and cryptologists, to mainstream phenomena that are now considered powerful game changers for many industries.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The authors discuss IoT and how it’s disrupting industries such as enterprise manufacturing, enterprise transportation, enterprise smart market, enterprise utilities, and enterprise healthcare.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2020, held in Costa de Caparica, Portugal, in July 2020.
Bemærk: Kan ikke leveres før jul.
This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies.