Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book describes how AI techniques, such as deep learning, cognitive computing, and machine learning, can be used to analyze massive volumes of data produced by IoT devices in manufacturing environments.
Bemærk: Kan ikke leveres før jul.
The book brings a blend of different areas of Machine Learning and the recent advances in the area. From the use of ML in healthcare to security, the book encompasses several areas related to ML while keeping a check on the traditional ML algorithms.
Bemærk: Kan ikke leveres før jul.
5G-Based Smart Hospitals and Healthcare Systems provides an overview of the role of advanced technologies in... Læs mere
Bemærk: Kan ikke leveres før jul.
This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
Bemærk: Kan ikke leveres før jul.
Ransomware attacks have become much more covert and stealthier, than when they first came out. In this book, the author provides an overview of what Ransomware is all about, and the timeline of its evolution.
Bemærk: Kan ikke leveres før jul.
This book takes a closer look at the Cloud, the Zero Trust Framework, and how to deploy from both technical and psychological perspectives.
Bemærk: Kan leveres før jul.
Privacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities offered by big data.... Læs mere
Bemærk: Kan ikke leveres før jul.
The Internet of Things (IoT) has emerged due to information and communication technology developments, expanding the ability to connect numerous objects.
Bemærk: Kan leveres før jul.
The book provides both practical and managerial implications of cyber security that also supports business intelligence and discusses the latest innovations in cyber security.
Bemærk: Kan ikke leveres før jul.
This book shares new methodologies, technologies, and practices for resolving issues associated with leveraging AI-centric modeling, data analytics, ML-aided models, IoT-driven applications, and cybersecurity techniques in the era of the Industrial Revolution 4.0.
Bemærk: Kan leveres før jul.
The book starts with an overview of common threats and the risk management of cybercrime, explaining the 3 key cybersecurity areas: people, process, and technology. Each... Læs mere
Bemærk: Kan ikke leveres før jul.
Part of any modern defensive IT strategy for a business is guaranteeing data recoverability. Will you, as a busy IT manager, sleep well at night knowing you... Læs mere