for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
Benford’s Law offers a powerful, data-driven approach to anomaly detection. Discovered 150 years ago, it wasn’t... Læs mere
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
The book offers an in-depth exploration of federated learning and its transformative impact on the healthcare industry.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
Warehouse-scale computers (WSCs) power cloud computing and all the great web services we use daily, including recent advancements in Artificial Intelligence/Machine Learning (AI/ML).
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
The book delves into the fundamentals of steganography, the ancient art of hiding messages in plain sight. From the historical roots to modern... Læs mere
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
The text provides a comprehensive study and exploration of the various types, aspects and effects of network failures in xG networks. It delves into the different approaches to network restoration that are most applicable to xG networks.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
Cybersecurity in the Big Data Era is a fascinating look at the invisible fight going on under our networked lives. In a world where every heartbeat of society is mirrored in digital code, this book shows us how to protect ourselves.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
Handbook of Sociotechnical Systems: A Human Systems Integration Approach, Second Edition is an essential resource for engineers, designers, researchers, policymakers, practitioners, and educators who work with people, technology, and organizations.
Bemærk: Kan ikke leveres før jul.
With the popularity of hardware security research, several edited monograms have been published, which aim at summarizing the research in a particular field.
Bemærk: Kan ikke leveres før jul.
This book describes novel hardware security and microfluidic biochip design methodologies to protect against tampering attacks in cyberphysical microfluidic biochips (CPMBs).
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book provides readers with insight into an alternative approach for enhancing the reliability, security, and low power features of integrated circuit designs, related to transient faults, hardware Trojans, and power consumption.