|
Showing 1 - 3 of
3 matches in All Departments
This book constitutes the refereed proceedings of the 10th
International Conference on Big Data, BigData 2021, held online as
part of SCF 2021, during December 10-14, 2021.The 6 full and 2
short papers presented were carefully reviewed and selected from 53
submissions. The topics covered are Big Data Architecture, Big Data
Modeling, Big Data As A Service, Big Data for Vertical Industries
(Government, Healthcare, etc.), Big Data Analytics, Big Data
Toolkits, Big Data Open Platforms, Economic Analysis, Big Data for
Enterprise Transformation, Big Data in Business Performance
Management, Big Data for Business Model Innovations and Analytics,
Big Data in Enterprise Management Models and Practices, Big Data in
Government Management Models and Practices, and Big Data in Smart
Planet Solutions.
|
Edge Computing - EDGE 2020 - 4th International Conference, Held as Part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, Proceedings (Paperback, 1st ed. 2020)
Ajay Katangur, Shih-Chun Lin, Jinpeng Wei, Shuhui Yang, Liang-Jie Zhang
|
R1,539
Discovery Miles 15 390
|
Ships in 10 - 15 working days
|
This book constitutes the proceedings of the International
Conference on Edge Computing, EDGE 2020, held virtually as part of
SCF 2020, in Honolulu, HI, USA, in September 2020. The 7 full and 2
short papers presented in this volume were carefully reviewed and
selected from 13 submissions. The conference proceeding EDGE 2020
presents the latest fundamental advances in the state of the art
and practice of edge computing, identify emerging research topics,
and define the future of edge computing.
This textbook surveys the knowledge base in automated and resilient
cyber deception. It features four major parts: cyber deception
reasoning frameworks, dynamic decision-making for cyber deception,
network-based deception, and malware deception. An important
distinguishing characteristic of this book is its inclusion of
student exercises at the end of each chapter. Exercises include
technical problems, short-answer discussion questions, or hands-on
lab exercises, organized at a range of difficulties from easy to
advanced,. This is a useful textbook for a wide range of classes
and degree levels within the security arena and other related
topics. It's also suitable for researchers and practitioners with a
variety of cyber security backgrounds from novice to experienced.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|