|
Books > Computing & IT > General theory of computing
 |
Principles of Security and Trust
- 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
(Hardcover)
Lujo Bauer, Ralf Kusters
|
R1,673
Discovery Miles 16 730
|
Ships in 10 - 15 working days
|
|
Many approaches have sprouted from artificial intelligence (AI) and
produced major breakthroughs in the computer science and
engineering industries. Deep learning is a method that is
transforming the world of data and analytics. Optimization of this
new approach is still unclear, however, and there's a need for
research on the various applications and techniques of deep
learning in the field of computing. Deep Learning Techniques and
Optimization Strategies in Big Data Analytics is a collection of
innovative research on the methods and applications of deep
learning strategies in the fields of computer science and
information systems. While highlighting topics including data
integration, computational modeling, and scheduling systems, this
book is ideally designed for engineers, IT specialists, data
analysts, data scientists, engineers, researchers, academicians,
and students seeking current research on deep learning methods and
its application in the digital industry.
Social media has emerged as a powerful tool that reaches a wide
audience with minimum time and effort. It has a diverse role in
society and human life and can boost the visibility of information
that allows citizens the ability to play a vital role in creating
and fostering social change. This practice can have both positive
and negative consequences on society. Examining the Roles of IT and
Social Media in Democratic Development and Social Change is a
collection of innovative research on the methods and applications
of social media within community development and democracy. While
highlighting topics including information capitalism, ethical
issues, and e-governance, this book is ideally designed for social
workers, politicians, public administrators, sociologists,
journalists, policymakers, government administrators, academicians,
researchers, and students seeking current research on social
advancement and change through social media and technology.
Digital controllers are part of nearly all modern personal,
industrial, and transportation systems. Every senior or graduate
student of electrical, chemical, or mechanical engineering should
therefore be familiar with the basic theory of digital controllers.
This new text covers the fundamental principles and applications of
digital control engineering, with emphasis on engineering design.
Fadali and Visioli cover analysis and design of digitally
controlled systems and describe applications of digital control in
a wide range of fields. With worked examples and Matlab
applications in every chapter and many end-of-chapter assignments,
this text provides both theory and practice for those coming to
digital control engineering for the first time, whether as a
student or practicing engineer.
With recent advancements in electronics, specifically nanoscale
devices, new technologies are being implemented to improve the
properties of automated systems. However, conventional materials
are failing due to limited mobility, high leakage currents, and
power dissipation. To mitigate these challenges, alternative
resources are required to advance electronics further into the
nanoscale domain. Carbon nanotube field-effect transistors are a
potential solution yet lack the information and research to be
properly utilized. Major Applications of Carbon Nanotube
Field-Effect Transistors (CNTFET) is a collection of innovative
research on the methods and applications of converting
semiconductor devices from micron technology to nanotechnology. The
book provides readers with an updated status on existing CNTs,
CNTFETs, and their applications and examines practical applications
to minimize short channel effects and power dissipation in
nanoscale devices and circuits. While highlighting topics including
interconnects, digital circuits, and single-wall CNTs, this book is
ideally designed for electrical engineers, electronics engineers,
students, researchers, academicians, industry professionals, and
practitioners working in nanoscience, nanotechnology, applied
physics, and electrical and electronics engineering.
Although the transition between the first three industrial
revolutions took more than a century, Industry 4.0 is progressing
quickly. The emergence of digitalization has been rapid thanks to
the development of cutting-edge technologies. Though we are
witnessing this rapid technological decentralization and
interconnectivity at present, organizations and researchers are
already discussing Industry 5.0 where full integration of the human
side of business and intelligent systems is expected. In this
scenario, it is essential to look forward to such strategic
workplaces that allow a combination of humans and technology to
assure a high degree of automation merged with the cognitive skills
of business leaders. Managing Technology Integration for Human
Resources in Industry 5.0 provides insights into the impact of the
Industrial Revolution 4.0 on human resources. It provides insights
for both industry and academia to assist them in teaching and
training the next generation leaders through universities and
corporate training. Covering topics such as business performance,
human technology integration, and digitalization, this premier
reference source is an essential resource for human resource
managers, IT managers, organizational executives and leaders,
entrepreneurs, students and educators of higher education,
librarians, researchers, and academicians.
Learn application security from the very start, with this
comprehensive and approachable guide! Alice and Bob Learn
Application Security is an accessible and thorough resource for
anyone seeking to incorporate, from the beginning of the System
Development Life Cycle, best security practices in software
development. This book covers all the basic subjects such as threat
modeling and security testing, but also dives deep into more
complex and advanced topics for securing modern software systems
and architectures. Throughout, the book offers analogies, stories
of the characters Alice and Bob, real-life examples, technical
explanations and diagrams to ensure maximum clarity of the many
abstract and complicated subjects. Topics include: Secure
requirements, design, coding, and deployment Security Testing (all
forms) Common Pitfalls Application Security Programs Securing
Modern Applications Software Developer Security Hygiene Alice and
Bob Learn Application Security is perfect for aspiring application
security engineers and practicing software developers, as well as
software project managers, penetration testers, and chief
information security officers who seek to build or improve their
application security programs. Alice and Bob Learn Application
Security illustrates all the included concepts with
easy-to-understand examples and concrete practical applications,
furthering the reader's ability to grasp and retain the
foundational and advanced topics contained within.
As the progression of the internet continues, society is finding
easier, quicker ways of simplifying their needs with the use of
technology. With the growth of lightweight devices, such as smart
phones and wearable devices, highly configured hardware is in
heightened demand in order to process the large amounts of raw data
that are acquired. Connecting these devices to fog computing can
reduce bandwidth and latency for data transmission when associated
with centralized cloud solutions and uses machine learning
algorithms to handle large amounts of raw data. The risks that
accompany this advancing technology, however, have yet to be
explored. Architecture and Security Issues in Fog Computing
Applications is a pivotal reference source that provides vital
research on the architectural complications of fog processing and
focuses on security and privacy issues in intelligent fog
applications. While highlighting topics such as machine learning,
cyber-physical systems, and security applications, this publication
explores the architecture of intelligent fog applications enabled
with machine learning. This book is ideally designed for IT
specialists, software developers, security analysts, software
engineers, academicians, students, and researchers seeking current
research on network security and wireless systems.
Pultrusion: State-of-the-Art Process Models with Applications,
Second Edition is a detailed guide to pultrusion, providing
methodical coverage of process models and computation simulation,
governing principles and science, and key challenges to help
readers enable process optimization and scale-up. This new edition
has been revised and expanded to include the latest advances,
state-of-the-art process models, and governing principles. The main
challenges in pultrusion, such as the process induced residual
stresses, shape distortions, thermal history, species conversion,
phase changes, impregnation of the reinforcements and pulling force
are described, with related examples are provided. Moreover,
strategies for having a reliable and optimized process using
probabilistic approaches and optimization algorithms are
summarized. Another focus of this book is on the thermo-chemical
and mechanical analyses of the pultrusion process for industrial
profiles.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,406
R1,302
Discovery Miles 13 020
|