Computer networking and communications Books

704 products


  • Special Topics in Information Technology

    Springer International Publishing AG Special Topics in Information Technology

    5 in stock

    Book SynopsisThis open access book presents outstanding doctoral dissertations in Information Technology from the Department of Electronics, Information and Bioengineering, Politecnico di Milano, Italy. Information Technology has always been highly interdisciplinary, as many aspects have to be considered in IT systems. The doctoral studies program in IT at Politecnico di Milano emphasizes this interdisciplinary nature, which is becoming more and more important in recent technological advances, in collaborative projects, and in the education of young researchers.Accordingly, the focus of advanced research is on pursuing a rigorous approach to specific research topics starting from a broad background in various areas of Information Technology, especially Computer Science and Engineering, Electronics, Systems and Control, and Telecommunications.Each year, more than 50 PhDs graduate from the program. This book gathers the outcomes of the best theses defended in 2021-22 and selected for the IT PhD Award. Each of the authors provides a chapter summarizing his/her findings, including an introduction, description of methods, main achievements and future work on the topic. Hence, the book provides a cutting-edge overview of the latest research trends in Information Technology at Politecnico di Milano, presented in an easy-to-read format that will also appeal to non-specialists.

    5 in stock

    £23.74

  • Information, Communication and Computing Technology: 7th International Conference, ICICCT 2022, New Delhi, India, July 16, 2022, Revised Selected Papers

    Springer International Publishing AG Information, Communication and Computing Technology: 7th International Conference, ICICCT 2022, New Delhi, India, July 16, 2022, Revised Selected Papers

    Out of stock

    Book SynopsisThis book constitutes proceedings of the 7th International Conference on Information, Communication and Computing Technology, ICICCT 2022, held in New Delhi, India, in July 2022.The 11 papers presented in this volume were carefully reviewed and selected from 65 submissions. The papers cover a great variety of topics, such as wireless networks, deep learning, machine learning, neural networks, natural language processing, sentiment analysis, network security, image processing, image augmentation and others. The contributions are divided into the following thematic blocks: Networking and Communication; Evolutionary Computing through Machine Learning.Table of ContentsNetworking and Communication.- Energy Efficient Communication using Constrained Application Protocol for IoT Devices.- A Systematic Study on LoRa Communication in IoT: Implementation Challenges and Research Solutions.- A Low Complexity CFO Reduction Technique for LFDMA Systems.- DICCh-D: Detecting IPv6-based Covert Channels using DNN.- Evolutionary Computing through Machine Learning.- Image Caption Generation for Low Light Images.- A Study On Feature Selection For Gender Detection In Speech Processing For Assamese Language.- Bengali Fake News Detection: Transfer Learning Based Technique with Masked LM Process by BERT.- Crowd Counting Using Federated Learning And Domain Adaptation.- News Headline Generation using Abstractive Text Summarization.- Facial Based Age Estimation Among Dark Skinned Hominid Species.- Multi-class Classification of Leaves using Transfer Learning.

    Out of stock

    £49.49

  • Network and Parallel Computing: 19th IFIP WG 10.3 International Conference, NPC 2022, Jinan, China, September 24–25, 2022, Proceedings

    Springer International Publishing AG Network and Parallel Computing: 19th IFIP WG 10.3 International Conference, NPC 2022, Jinan, China, September 24–25, 2022, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 19th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2022, which was held in Jinan, China, during September 24-25, 2022. The 23 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 89 submissions. They were organized in topical sections as follows: computer architecture; cloud computing; deep learning; emerging applications; and storage and IO.Table of ContentsComputer architecture.- Cloud computing.- Deep learning.- Emerging applications.- Storage and IO.

    1 in stock

    £62.99

  • Smart Multimedia: Third International Conference,

    Springer International Publishing AG Smart Multimedia: Third International Conference,

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the Third International Conference on Smart Multimedia, ICSM 2022, which was held in Marseille, France, during August 25–27, 2022.The 30 full papers and 4 short paper presented in this volume were carefully reviewed and selected from 68 submissions. The contributions were organized in topical sections as follows: Machine Learning for Multimedia; Image Processing; Multimedia Applications; Multimedia for Medicine and Health-Care; Smart Homes; Multimedia Environments and Metaverse; Deep Learning on Video and Music; Haptic; Industrial.Table of Contents​Machine Learning for Multimedia.- Normalizing Flow Based Surface Defect Detection.- FUNet: Flow Based Conference Video Background Subtraction.- IARG: Improved Actor Relation Graph-based Group Activity Recognition.- SPGNet: Spatial Projection Guided 3D Human Pose Estimation in Low Dimensional Space.- Image Processing.- Unsupervised Face Frontalization GAN Driven by 3D Rotation and Symmetric Filling.- Infrared and Visible Image Fusion Based on Multi-Scale Gaussian Rolling Guidance Filter Decomposition.- Multi-Directional Edge Detection Algorithm Based on Fuzzy Logic Judgment.- Multimedia Applications.- Security Concerns and Citizens' Privacy Implications in Smart Multimedia Applications.- Metric Learning on Complex Projective Spaces.- Gamified Smart Grid Implementation through Pico, Nano, and Microgrids in a Sustainable Campus.- Product Re-Identification System in Fully Automated Defect Detection.- Multimedia for Medicine and Health-Care.- A Real-Time Fall Classification Model Based on Frame Series Motion Deformation.- GradXcepUNet: Explainable AI Based Medical Image Segmentation.- Non-Invasive Anemia Detection from Conjunctival Images.- 3D Segmentation and Visualization of Human Brain CT Images for Surgical Training - a VTK Approach.- Smart Homes.- The Energy 4.0 Concept and Its Relationship with the S3 Framework.- A Real-Time Adaptive Thermal Comfort Model for Sustainable Energy in Interactive Smart Homes: Part I.- A Real-Time Adaptive Thermal Comfort Model for Sustainable Energy in Interactive Smart Homes: Part II.- Multimedia Environments and Metaverse.- Including Grip Strength Activities into Tabletop Training Environments.- Matrix World – A Programmable 3D Multichain Metaverse.- Matrix Syncer - A Multi-Chain Data Aggregator for Supporting Blockchain-Based Metaverses.- Construction and Design of Food Traceability Based on Blockchain Technology Applying in the Metaverse.- Deep Learning on Video and Music.- Motion Segmentation Based on Pixel Distribution Learning on Unseen Videos.- Estimation of Music Recording Quality to Predict Automatic Music Transcription Performance.- Unleashing the Potential of Data Analytics through Music.- Haptic.- Impact of PGM Training on Reaction Time and Sense of Agency.- Epidural Motor Skills Measurements for Haptic Training.- Sensorless Force Approximation Control of 3-DOF Passive Haptic Devices.- Passive Haptic Learning as a Reinforcement Modality for Information.- Industrial.- Lighting Enhancement Using Self-Attention Guided HDR Reconstruction.- MoCap Trajectory-Based Animation Synthesis and Perplexity Driven Compression.- Hyperspectral Image Denoising Based on Dual Low-Rank Structure Preservation.- SimFormer: Real-To-Sim Transfer with Recurrent Restoration.- Spatio-Frequency Analysis for High-Frequency Surface Wave Radar Ship Target Detection.

    1 in stock

    £61.74

  • Applications and Usability of Interactive TV: 10th Iberoamerican Conference, jAUTI 2021, Sangolquí, Ecuador, December 2–3, 2021, Revised Selected Papers

    Springer International Publishing AG Applications and Usability of Interactive TV: 10th Iberoamerican Conference, jAUTI 2021, Sangolquí, Ecuador, December 2–3, 2021, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes thoroughly refereed and revised selected papers from the 10th Iberoamerican Conference on Applications and Usability of Interactive TV, jAUTI 2021, held in Sangolqui, Ecuador, during December 2–3, 2021.The 9 full papers included in this book were carefully reviewed and selected from 25 submissions. They were organized in topical sections as follows: ​Usability and UX; interaction techniques and accesibility; and technologies, services, and applications for interactive digital TV.Table of Contents​Usability and UX.- The importance of personalization and household dynamics for notifications in the TV ecosystem.- Connect elderly to other generations through iTV: evaluating notifications’ potential.- Interaction techniques and Accesibility.- Real-time emotion recognition through video conference and streaming.- Emotional Meta-Annotation of Educational Videos. A Review of Emotional Database Characterization.- Active and Healthy Aging: The Role of a Proactive Information Assistant Embedded on TV.- Design and development of an assisted ball positioning system for soccer matches with an HBBTV server integrated to a haptic TV glove accessible to visually impaired people.- Technologies, services, and applications for interactive digital TV.- MixMyVisit – Geração automática de vídeos para a melhoria da experiência dos visitantes.- Selection of configurable computer module applied to home automation and interactive digital television.- A Process for gathering data to train the NLU module of a NLI system for iTV.

    1 in stock

    £49.49

  • Electronic Governance with Emerging Technologies: First International Conference, EGETC 2022, Tampico, Mexico, September 12–14, 2022, Revised Selected Papers

    Springer International Publishing AG Electronic Governance with Emerging Technologies: First International Conference, EGETC 2022, Tampico, Mexico, September 12–14, 2022, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes selected and revised papers presented at the First International Conference on Electronic Governance with Emerging Technologies, EGETC 2022, held in Tampico, Mexico, in September 2022. The 15 full papers and 2 short papers presented were thoroughly reviewed and selected from the 54 submissions. This volume focuses on the recent developmentsin the domain of eGovernment and governance of digital organizations also aims to shed light on the emerging research trends and their applications. Table of ContentsDeep Learning based Obstructive Sleep Apnea Detection for e-health Applications.- Deep Learning and Sign language models based enhanced accessibility of e-governance services for speech and hearing-impaired.- A Blockchain Enabled Trusted Public Distribution Management System using Smart Contract.- Administration of Vaccine mechanism for COVID-19 using Blockchain.- Cyber Security Strategies While Safeguarding Information Systems in Public/Private Sectors.- The spatial relationships of meteorological data for Unmanned Aerial System Decision-Making Support.- HIAS: Hybrid Intelligence Approach for Soil Classification and Recommendation of Crops.- Education 5.0 Maturity Index: Concept and Prospects for Development.- Interpretability of AI systems in electronic governance to improve user trust and acceptance.- An automated stress recognition for digital healthcare: Towards e-governance.-Emergency supply chain management.- Public Budget Simulations with Machine Learning and Synthetic Data: Some Challenges and Lessons from The Mexican Case.- Open data hackathon as a tool for increased engagement of Generation Z: to hack or not to hack?.- Data Visualization Guide for Smart City Technologies.- A D eep Learning-based Mobile Chatbot Model for Crop Farmers.- Urban data: sources and targeted applications for urban planning indicators modelling.- Understanding KlimaDAO use and value: insights from an empirical analysis.

    1 in stock

    £56.99

  • Emerging Information Security and Applications: Third International Conference, EISA 2022, Wuhan, China, October 29–30, 2022, Proceedings

    Springer International Publishing AG Emerging Information Security and Applications: Third International Conference, EISA 2022, Wuhan, China, October 29–30, 2022, Proceedings

    1 in stock

    Book SynopsisThis volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online.The 13 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. Table of ContentsAsymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks.- Towards Low-Latency Big Data Infrastructure at Sangfor.- Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB.- Parallel Validity Analysis of the Boomerang Attack Model.- A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography.- Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption.- AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels.- HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation.- Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET.- An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy.- D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance.- Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks.

    1 in stock

    £56.99

  • Innovations and Interdisciplinary Solutions for Underserved Areas: 5th EAI International Conference, InterSol 2022, Abuja, Nigeria, March 23-24, 2022, Proceedings

    Springer International Publishing AG Innovations and Interdisciplinary Solutions for Underserved Areas: 5th EAI International Conference, InterSol 2022, Abuja, Nigeria, March 23-24, 2022, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed post-conference proceedings of the 5th EAI International Conference on Innovations and Interdisciplinary Solutions for Underserved Areas, InterSol 2022, held in Nile University of Nigeria Abuja, Nigeria, in March 2022. The 26 papers presented were selected from 66 submissions and issue different problems in underserved and unserved areas. They face problems in almost all sectors such as energy, water, communication, climate change, food, education, transportation, social development, and economic growth.Table of ContentsSustainable Development for Underserved Areas.- Effects of Noise Pollution on learning in Schools of Bamenda II Municipality, Northwest Region of Cameroon.- Hydro-meteorological Trends and Thermal comfort of Khartoum Sudan.- Community Water Projects Sustainability for Climate Change Resilience and Adaptation in Suam Catchment Area of West Pokot County, Kenya.- The Nigerian HealthCare Facilities: Need for Adopting Evidence-Based Design as an Innovative Approach for Improved Health and Wellbeing.- Artificial Intelligence (AI) and Machine Learning (ML) for Development.- An E-Nose Using Metal Oxide Semiconductor Sensors Array to Recognize the Odors of Fall Armyworm Pest For Its Early Detection in the Farm.- Prediction of process failure approach using process mining.- An AI-based Model for the Prediction of a newborn’s Sickle Cell Disease Status.- Study of an approach based on the analysis of computer program execution traces for the detection of vulnerabilities.- ICT for Development.- Comparative Evaluation on Sentiment Analysis Algorithms.- A new wavelet based steganography method for Securing medical Data.- A dual ring architecture using controllers for better load balancing in a Fog Computing environment.- Recommendation System for Carbon Reduction.- Engineering Impact on Sustainability Development.- Assessment of Heavy Metal Concentration of Municipal open-air Dumpsite: A case study of Gosa Dumpsite, Abuja.- Ten years after the Deepwater Horizon disaster - lessons learned for a better cementing job.- Generating Bioelectricity From Traditional Food Processing Wastewater Using An Inoculum Of Return Activated Sewage Sludge.- Application of molasses in improving water purification efficiency of diatomaceous earth-waste ceramic membranes.- Community Engagements and Collaboration.- The levels of crop raiding by rodents and primates in a subsistence farming community, in South Africa.- Survey on crop disease detection and identification based on deep learning.- Pest Birds Detection Approach in Rice Crops Using Pre-trained YOLOv4 Model.- Pest Birds Detection Approach in Rice Crops Using Pre-trained YOLOv4 Model.- Truncation effect of a three-dimensional compound parabolic concentrator on the solar flux at the input of the receiver of a 30 kWe solar tower power plant.- Renewable Energy Transition: A Panacea to the Ravaging Effects of Climate Change in Nigeria.- Investigation on Concrete with Partial Replacement of Aggregate from Demolition Waste.- Valorization of the recovered lime in cement-typha concretes: thermal and mechanical behavior.- Engineering and Science Education in Underserved Areas.- The Need for Nigerian Universities to Collaborate for Quality Research Output.- SenTekki: online platform and Restful Web service for translation between Wolof and French.- Towards an optimal placement of learning ressources in a fog computing based e-learning system : The case of UVS.

    1 in stock

    £58.49

  • High Performance Computing: 9th Latin American Conference, CARLA 2022, Porto Alegre, Brazil, September 26–30, 2022, Revised Selected Papers

    Springer International Publishing AG High Performance Computing: 9th Latin American Conference, CARLA 2022, Porto Alegre, Brazil, September 26–30, 2022, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 9th Latin American Conference on High Performance Computing, CARLA 2022, held in Porto Alegre, Brazil, in September 2022. The 16 full papers presented in this volume were carefully reviewed and selected from 56 submissions.CARLA, the Latin American High Performance Computing Conference, is an international academic meeting aimed at providing a forum to foster the growth and strength of the High Performance Computing (HPC) community in Latin America and the Caribbean through the exchange and dissemination of new ideas, techniques, and research in HPC and its application areas.Table of ContentsA Comparative Evaluation of Parallel Programming Python Tools for Particle-in-cell on Symmetric Multiprocessors.- Accelerating GNN Training on CPU+Multi-FPGA Heterogeneous Platform.- Implementing a GPU-Portable Field Line Tracing Application with OpenMP Offload.- Quantitative Characterization of Scientific Computing Clusters.- Towards parameter-based profiling for MARE2DEM performance modeling.- Time-Power-Energy Balance of BLAS kernels in modern FPGAs.- Improving Boundary Layer Predictions Using Parametric Physics-Aware Neural Networks.- Towards Fire Identification Model in Satellite Images Using HPC Embedded Systems and AI.- A Machine Learning-based Missing Data Imputation with FHIR Interoperability Approach in Sepsis Prediction.- Understanding the Energy Consumption of HPC Scale Artificial Intelligence.- Tracking the COVID-19 Emotional Response in Mexico.- Multi-GPU 3-D Reverse Time Migration with Minimum I/O.- ParslRNA-Seq: an efficient and scalable RNAseq analysis workflow for studies of differentiated gene expression.- Refactoring an electric-market simulation software for massively parallel computations.- Nearly Quantum Computing by Simulation.- Functionality testing in the automation of scientific application workflows in an HPC environment.

    1 in stock

    £49.49

  • Distributed Computing and Intelligent Technology: 19th International Conference, ICDCIT 2023, Bhubaneswar, India, January 18–22, 2023, Proceedings

    Springer International Publishing AG Distributed Computing and Intelligent Technology: 19th International Conference, ICDCIT 2023, Bhubaneswar, India, January 18–22, 2023, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 19th International Conference on Distributed Computing and Intelligent Technology, ICDCIT 2023, which was held in Bhubaneswar, India, in January 2023.The 20 full papers and 9 short papers presented in this volume were carefully reviewed and selected from 55 submissions. The papers are organized in the following topical sections: Invited Talks; Distributed Computing; Intelligent Technology.Table of Contents​Distributed Computing.- Filling MIS Vertices of a Graph by Myopic Luminous Robots.- WANMS: A Makespan, Energy, and Reliability Aware Scheduling Algorithm for Workflow Scheduling in Multi-Processor Systems.- Multiple Criteria Decision Making-based Task Offloading and Scheduling in Fog Environment.- Static Data Race Detection in Multi-Task Programs for Industrial Robots.- Ordered Scheduling in Control-flow Distributed Transactional Memory.- Fault-Tolerant Graph Realizations in the Congested Clique, Revisited.- A Perspective of IP Lookup Approach Using Graphical Processing Unit (GPU).- Intelligent Technology.- MCMARS: Hybrid Multi-Criteria Decision-Making Algorithm for Recommender Systems of Mobile Applications.- Opinion Maximization in Signed Social Networks using Centrality Measures and Clustering Techniques.- Detection of Object-based Forgery in Surveillance Videos utilizing Motion Residual and Deep Learning.- Mapped-RRT* a Sampling Based Mobile Path Planner Algorithm.- Intelligent Optimization Algorithms for Disruptive Anti-Covering Location Problem.- Enhancing Robustness of Malware Detection Model against White Box Adversarial Attacks.- Early Detection of Covid using Spectral Analysis of Cough and Deep Convolutional Neural Network.- Analysis of Tweets with Emoticons for Sentiment Detection using Classification Techniques.- Fine-tuning of Multilingual Models for Sentiment Classification in Code-mixed Indian Language Texts.- Landslide classification using deep convolutional neural network with synthetic minority oversampling technique.- ALPR - An Intelligent Approach Towards Detection and Recognition of License Plates in Uncontrolled Environments.- Towards Railway Cable Infrastructure Protection: Turning Cross-Sectional Explorative Analytics to Answers.- Designing an Intangible Tele-Interaction for Point-to-Point Robot Control Using Coercive Gesture Filtering.- Sentiment analytics for crypto pre and post covid: topic modeling.- A Rough Set Based Approach to Compute The Impact of Non-Academic Parameters on Academic Performance.- Varta Rasa - A Simple and Accurate System for Emotion Recognition in Conversations.- An Optimal Approach for Multi-class Object Detection.- Performance Analysis of RPL in IoT Environment.- A novel image steganography technique using AES encryption in DCT domain.- Text Classification using Correlation based Feature Selection on Multi-layer ELM Feature Space.- Multi-Objective Pelican Optimization Algorithm for Engineering Design Problems.- Prediction of Accident and Accident Severity based on Heterogeneous Data.

    1 in stock

    £56.99

  • Computational Data and Social Networks: 11th International Conference, CSoNet 2022, Virtual Event, December 5–7, 2022, Proceedings

    Springer International Publishing AG Computational Data and Social Networks: 11th International Conference, CSoNet 2022, Virtual Event, December 5–7, 2022, Proceedings

    Out of stock

    Book SynopsisThis book constitutes the refereed proceedings of the 11th International Conference on Computational Data and Social Networks, CSoNet 2022, held as a Virtual Event, during December 5–7, 2022. The 17 full papers and 7 short papers included in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: Machine Learning and Prediction, Security and Blockchain, Fact-checking, Fake News, and Hate Speech, Network Analysis, Optimization.Table of Contents​Machine Learning and Prediction.- Incorporating Neighborhood Information and Sentence Embedding Similarity into a Repost Prediction Model in Social Media Networks.- Driving factors of polarization on Twitter during protests against COVID19 mitigation measures in Vienna.- Categorizing Memes about the Ukraine Conflict.- Analyzing Scientometric Indicators of Journals and Chief Editors: A Case Study in Articial Intelligence (AI) Domain.- Link Prediction of Complex Networks based on Local Path and Closeness Centrality.- The influence of color on prices of abstract paintings.- ELA: A Time-Series Forecasting Model for LinerShipping Based on EMD-LSTM and Attention.- Knowledge transfer via word alignment and its application to Vietnamese POS tagging.- A group clustering recommendation approach based on energy distance.- Security and Blockchain.- An Implementation and Evaluation of Layer 2 for Ethereum with zkRollup.- Targeted Attack of the Air Transportation Network Global Component.- Measuring Cryptocurrency Mining in Public Cloud Services: A Security Perspective.- Do Content Management Systems Impact the Security of Free Content Websites?.- Fact-checking, Fake News, and Hate Speech.- BNnetXtreme: An enhanced methodology for Bangla fake news detection online.- Heuristic Gradient Optimization Approach to Controlling Susceptibility to Manipulation in Online Social Networks.- Identifying Targeted and Generalized Offensive Speech from Anti-Asian Social Media Conversations.- US News and Social Media Framing around Vaping.- Network Analysis.- Social Network Analysis of the Caste-Based Reservation System in India.- Structure, stability, persistence and entropy of stock networks during financial crises.- A Community Detection Algorithm using Random Walk.- Learning Heuristics for the Maximum Clique Enumeration Problem Using Low Dimensional Representations.- Optimization.- Competitive influence maximisation with nonlinear allocations.- Frank Wolfe Algorithm for Nonmonotone One-sided Smooth Function Maximization Problem.- Non-monotone $k$-submodular function maximization with individual size constraints.- A Heuristic Algorithm for Student-Project Allocation Problem.- Online File Caching on Multiple Caches in Latency-Sensitive Systems.

    Out of stock

    £47.49

  • Self-Powered Internet of Things: How Energy

    Springer International Publishing AG Self-Powered Internet of Things: How Energy

    1 in stock

    Book SynopsisThis book covers cutting edge advancements on self-powered Internet of Things, where sensing devices can be energy-positive while capturing context from the physical world. It provides new mechanisms for activity recognition without the need of conventional inertial sensors, which demand significant energy during their operation and thus quickly deplete the batteries of internet-of-things (IoT) devices. The book offers new solutions by employing energy harvesters as activity sensors as well as power sources to enable the autonomous and self-powered operation of IoT devices without the need of human intervention. It provides useful content for graduate students as well as researchers to understand the nascent technologies of human activity, fitness and health monitoring using autonomous sensors. In particular, this book is very useful for people working on pervasive computing, activity recognition, wearable IoT, fitness/healthcare and autonomous systems.This book covers a broad range of topics related to self-powered activity recognition. The main topics of this book include wearables, IoT, energy harvesting, energy harvesters as sensors, activity recognition and self-powered operation of IoT devices. This book starts with the introduction of wearable IoT devices and activity recognition and then highlights the conventional activity recognition mechanisms. After that, it describes the use of energy harvesters to power the IoT devices. Later, it explores the use of various energy harvesters as activity sensors. It also proposes the use of energy harvesters as simultaneous source of energy and context information and defines the emerging concept of energy-positive sensing compared to conventional energy-negative sensing. Finally, it explores sensor/signal fusion to enhance the performance using multiple energy harvesters and charts a way forward for future research in this area. This book covers all important and emerging topics that have significance in the design and implementation of autonomous wearable IoT devices. We believe that this book will lay the foundation for designing self-powered IoT devices which can ultimately replace the conventional wearable IoT devices which need regular recharging and replacement.Table of ContentsIntroduction.- Background.- Energy harvesting to power the IoT devices.- Energy harvesters as activity sensors.- Energy harvesters as a simultaneous source of energy and activity information.- Energy-Positive Activity Recognition.- Fusion of multiple energy harvesters.- Conclusion and Future Work.

    1 in stock

    £104.49

  • Practical Internet of Things Networking

    Springer International Publishing AG Practical Internet of Things Networking

    Out of stock

    Book SynopsisThis textbook explores the different protocols and technologies that are key to supporting the most important Internet of Things (IoT) networking scenarios.

    Out of stock

    £52.24

  • Ubiquitous Networking: 8th International

    Springer International Publishing AG Ubiquitous Networking: 8th International

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 8th International Symposium, UNet 2022, held in Montreal, QC, Canada, during October 25–27, 2022. The 17 full papers included in this book were carefully reviewed and selected from 43 submissions. Moreover, 4 additional invited papers have been also considered. They were organized in topical sections as follows: ​Spectrum Management and Channel Prediction, Resource Allocation in 5G/6G, Internet of Things and Vehicular Communications, Artificial Intelligence-Driven Communications, Pervasive Services and Cyber Security.Table of ContentsSpectrum Management and Channel Prediction.- On the Influence of Microscopic Mobility in Modelling Pedestrian Communication.- Low Profile CPW Fed Tri-Band Millimeter Wave Antenna Design for Future 5G Application.- Trading off Controlled System Energy and Wireless Communication Energy.- Statistical Moments of the Temporal Spectrum of Electromagnetic Waves in the Equatorial Ionosphere.- Resource Allocation in 5G/6G.- Towards Facilitating URLLC in UAV-Enabled MEC Systems for 6G Networks.- Resource Allocation and Power Control for Heterogeneous Cellular Network and D2D Communications.- Optimized Network Coding With Real-Time Loss Prediction for Hybrid 5G Networks.- TCP-RTA: Real-Time Topology Adaptiveness for Congestion Control in TCP.- Rio_DSA: Redirecting I/O Scheme for Dynamic Storage Allocation on Docker Container.- Internet of Things and Vehicular Communications.- VANET-Based Traffic Light Management for an Emergency Vehicle.- Deep Reinforcement Learning to Improve Vehicle-to-Vulnerable Road User Communications in C-V2X.- Pervasive Computing for Efficient Intra-UAV Connectivity: Based on Context-Awareness.- Road Accident Analysis of Dhaka City Using Counter Propagation Network.- Artificial Intelligence-Driven Communications.- Reinforcement Learning for Protocol Synthesis in Resource-Constrained Wireless Sensor and IoT Networks.- Distributional Reinforcement Learning for VoLTE Closed Loop Power Control in Indoor Small Cells.- Reinforcement Learning Aided Routing in Tactical Wireless Sensor Networks.- A Green and Scalable Clustering for Massive IoT Sensors with Selective Deactivation.- Pervasive Services and Cyber Security.- Threat Mitigation Model With Low False Alarm Rate Based on Hybrid Deep Belief Network.- On Feature Selection Algorithms for Effective Botnet Detection.- A Novel Hybrid Deep Learning Model for Crop Disease Detection Using BEGAN.- Multivariate Skewness and Kurtosis for Detecting Wormhole Attack in VANETs.

    1 in stock

    £47.49

  • Learning for Decision and Control in Stochastic

    Springer International Publishing AG Learning for Decision and Control in Stochastic

    1 in stock

    Book SynopsisThis book introduces the Learning-Augmented Network Optimization (LANO) paradigm, which interconnects network optimization with the emerging AI theory and algorithms and has been receiving a growing attention in network research. The authors present the topic based on a general stochastic network optimization model, and review several important theoretical tools that are widely adopted in network research, including convex optimization, the drift method, and mean-field analysis. The book then covers several popular learning-based methods, i.e., learning-augmented drift, multi-armed bandit and reinforcement learning, along with applications in networks where the techniques have been successfully applied. The authors also provide a discussion on potential future directions and challenges.Table of ContentsIntroduction.- The Stochastic Network Model.- Network Optimization Techniques.- Learning Network Decisions.- Summary and Discussions.

    1 in stock

    £42.74

  • Networked Systems: 11th International Conference,

    Springer International Publishing AG Networked Systems: 11th International Conference,

    3 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 11th International Conference on Networked Systems, NETYS 2023, held in Benguerir, Morocco, during May 22–24, 2023. The 9 full papers and 3 short papers presented were carefully reviewed and selected from 31 submissions. The scope of the conference covers all aspects related to the design and the development of these systems, including, e.g., cloud systems, formal verification, concurrent and distributed algorithms, data management, data science, parallel/concurrent/distributed programming, machine learning, multi-core architectures, networks, and security.Table of Contents​Machine Learning.- Detection of Fake News Through Heterogeneous Graph Interactions.- Species Recognition via Active Learning.- Federated Graph Neural Network for Threat Intelligence.- Formal Methods.- A Formal Analysis of Karn’s Algorithm.- Comparing Causal Convergence Consistency Models.- Security & Privacy.- Encrypted search is not enough to ensure privacy.- Case Study on the Performance of ML-Based Network Intrusion Detection Systems in SDN.- Beyond Locks and Keys: Structural Equation Modeling based Framework to Explore Security Breaches through the Lens of Crime Theories.- Fault Tolerance.- Consensus on Unknown Torus with Dense Byzantine Faults.- Distributed Systems.- Approximation Algorithms for Drone Delivery Scheduling Problem.- Pebble guided Treasure Hunt in Plane.- Distance-2-Dispersion: Dispersion with Further Constraints.

    3 in stock

    £42.74

  • Advances in Production Management Systems.

    3 in stock

    £134.99

  • Advances in Production Management Systems.

    1 in stock

    £123.49

  • Applied Problems Solved by Information Technology

    Springer International Publishing AG Applied Problems Solved by Information Technology

    Out of stock

    Book SynopsisThis book explores a dynamic landscape where cutting-edge technologies are revolutionizing various domains. This captivating book delves into the advancements in security, communication, and environmental management, highlighting their profound impact on society. The developments bridge the gap between human needs and technological innovation. Readers will uncover the fascinating world of IoT-driven devices that seamlessly integrate into our lives, ensuring enhanced safety and communication efficiency. This book is a must-read for technology enthusiasts, researchers, and anyone curious about the transformative power of technology in shaping our present and future.Table of Contents1. Development of a Motion Activated Security Cam for Monitoring Applications.2. Development of a Sign Language Translator Based on Gestures-To-Words Using IoT. 3. Energy Management System for ICU Wards. 4. Two Factor Authentication: Voice Biometric and Token-Based Authentication. 5. Development of a Forest Fire Prevention System Using Fuzzy Logic Control. 6. Smart Glove: The Sign Language Translator for Mute-Deaf Citizens. 7. The Application of Technology Organization Environment Framework in the Approaches for Smart Warehouse Adoption. 8. Promoting and Preserving Malaysian Folktales Through Augmented Reality Technology. 9. The Development of a Self-Balancing Robot based on Complementary Filter and Arduino. 10. Development of Vertical Indoor Farming Using an Arduino and IoT. 11. Designing an Augmented Reality Application as a Tool for Entomophobia Treatment. 12. The Readiness of Logistics Service Providers (LSPs) to Meet the Rapidly Growing Digital Economy in Malaysia. 13. Review of the Use of Digital Media Products by Small and Medium Enterprises in Malaysia During the Covid-19 Pandemic Crisis. 14. The Influence of Information Communication Technology (ICT) towards the successful of Ro-Ro Ferry service at Penang Port. 15. Pass Matrix Based Graphical Password Authentication on the Android Platform. 16. Development of a Driver Detection System for Somnolence and Alertness Based on Image Processing Techniques

    Out of stock

    £37.99

  • Distributed Computing and Intelligent Technology:

    Springer International Publishing AG Distributed Computing and Intelligent Technology:

    Out of stock

    Book SynopsisThis book constitutes the refereed proceedings of the 20th International Conference on Distributed Computing and Intelligent Technology, ICDCIT 2024, which was held in Bhubaneswar, India, during January 17–20, 2024. The 24 full papers presented in this volume were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: Distributed Computing (DC) and Intelligent Technology (IT). The DC track solicits original research papers contributing to the foundations and applications of distributed computing, whereas the IT track solicits original research papers contributing to the foundations and applications of Intelligent Technology.Table of Contents​Distributed Computing.- Utility driven joint time-and-power allocation in Energy-Harvesting Cognitive Radio Relay Networks.- An Improved and Efficient Distributed Computing Framework with Intelligent Task Scheduling.- Scheduling of Containerized Resources for Microservices in Cloud.- ELITE: Energy and Latency-Optimized Task Offloading forDVFS-Enabled Resource-Constrained Devices in MEC.- Parking Problem by Oblivious Mobile Robots in Infinite Grids.- The Computational Landscape of Autonomous Mobile Robots: The Visibility Perspective.- Coverage Criteria based Testing of IoT Applications.- An Online Algorithm for Cost Minimization of Amazon EC2 Burstable Resources.- A Practical and Efficient Key-Aggregate Cryptosystem for Dynamic Access Control in Cloud Storage.- Intelligent Technology.- Prediction of Failure in Scania Truck due to Air Pressure System Failure.- A Multi-Class Classification for Detection of IoT Network attacks using machine learning models.- Optimizing Sentiment Analysis on Twitter: Leveraging Hybrid Deep Learning Models for Enhanced Efficiency.- Identification of onset and progression of Alzheimer’s disease using Topological Data Analysis.- Enhancing Mario Gaming Using Optimized Reinforcement Learning.- Deep Learning in Industry 4.0: Transforming Manufacturing through Data-Driven Innovation.- SASE: Sentiment Analysis with aspect Specific Evaluation using deep learning with hybrid contextual embedding.- A Genetic Algorithm-Based Heuristic for Rumour Minimization in Social Networks.- A Machine Learning driven Approach For Parkinson’s Prediction using Temporal Data.- Prediction of High-resolution Soil Moisture using Multi-source Data and Machine Learning.- Evaluating Deep CNNs and Vision Transformers for Plant Leaf Disease Classification.- Intelligent Ensemble-Based Road Crack Detection: A Holistic View.- Online Payment Fraud Detection for Big Data.- Bursty Event Detection Model for Twitter.- A General Variable Neighborhood Search Approach for the Clustered Traveling Salesman Problem with d-Relaxed Priority Rule.

    Out of stock

    £56.99

  • Modern App Development with Dart and Flutter 2: A

    De Gruyter Modern App Development with Dart and Flutter 2: A

    1 in stock

    Book SynopsisThe book introduces the programming language Dart, the language used for Flutter programming. It then explains the basics of app programming with Flutter in version 2. Using practical examples such as a games app, a chat app and a drawing app, important aspects such as the handling of media files or the connection of cloud services are explained. The programming of mobile as well as desktop applications is discussed. New important features of Dart 2.12 and Flutter 2 are described: - Null safety - Desktop Applications Targeted readers are people with some background in programming, such as students or developers. The sample projects from the book are available for download on the following GitHub repository: https://github.com/meillermediaOver time, more branches may be added. However, the default branches are those that correspond to the state in the book.

    1 in stock

    £26.25

  • Groups and Interaction

    De Gruyter Groups and Interaction

    7 in stock

    Book Synopsis

    7 in stock

    £14.25

  • de Gruyter The de Gruyter Handbook of Automated Futures

    Out of stock

    Book Synopsis

    Out of stock

    £130.00

  • 5g

    Walter de Gruyter 5g

    Out of stock

    Book Synopsis

    Out of stock

    £49.05

  • de Gruyter Mediendidaktik

    7 in stock

    Book Synopsis

    7 in stock

    £44.96

  • De Gruyter Mobile Applications Development

    1 in stock

    Book SynopsisThe book covers the concepts of Python programming language along with mobile application development. Starting from fundamentals, the book continues with the explanation of mobile app development using Kivy framework. All the chapters offer questions and exercises for to better understanding of the subject. This second revised and updated edition covers the most recent developments in Kivy since the publishing of the first edition.

    1 in stock

    £40.88

  • de Gruyter Fahrzeugtechnik

    2 in stock

    Book Synopsis

    2 in stock

    £55.21

  • de Gruyter The De Gruyter Handbook on Law and Digital

    1 in stock

    Book Synopsis

    1 in stock

    £122.85

  • de Gruyter Vehicle Technology

    Out of stock

    Book Synopsis

    Out of stock

    £65.70

  • de Gruyter Zur Anwendung Moderner Rechentechnik in Den

    Out of stock

    Book Synopsis

    Out of stock

    £134.09

  • de Gruyter Informationsspeicherung

    Out of stock

    Book Synopsis

    Out of stock

    £134.09

  • Cyber Threat Intelligence

    Springer International Publishing AG Cyber Threat Intelligence

    1 in stock

    Book SynopsisThis book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes.The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions – this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.Trade Review“Cyber Threat Intelligence offers responsible security professionals a chance to come face to face with the cyberthreat detectors of the modern era. Many may be intimidated by the ‘computerese,’ equations, and algorithms … but they have the educational advantage of engaging with the genuine article, not a sugar-coated primer.” (James T. Dunne, Security Management, June 01, 2019)Table of Contents1 Introduction.- 2 Machine Learning Aided Static Malware Analysis.- 3 Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Datasets and Feature Selection.- 4 Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Classification Algorithms.- 5 Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection.- 6 Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware.- 7 BoTShark - A Deep Learning Approach for Botnet Traffic Detection.- 8 A Practical Analysis of The Rise in Mobile Phishing.- 9 PDF-Malware Detection: A Survey and Taxonomy of Current Techniques.- 10 Adaptive Traffic Fingerprinting for Darknet Threat Intelligence.- 11 A Model for Android and iOS Applications Risk Calculations: CVSS Analysis and Enhancement Using Case-Control Studies.- 12 A Honeypot Proxy Framework for Deceiving Attackers with Fabricated Content.- 13 Investigating the Possibility of Data Leakage in Time of Live VM Migration.- 14 Forensics Investigation of OpenFlow-Based SDN Platforms.- 15 Mobile Forensics: A Bibliometric Analysis.- 16 Emerging from The Cloud: A Bibliometric Analysis of Cloud Forensics Studies.

    1 in stock

    £113.99

  • Mobile Computing

    LAP Lambert Academic Publishing Mobile Computing

    Out of stock

    Book Synopsis

    Out of stock

    £47.74

  • Windows Server für Dummies

    Wiley-VCH Verlag GmbH Windows Server für Dummies

    2 in stock

    Book SynopsisGanz gleich, ob Sie Einsteiger oder Umsteiger sind: Dieses Buch verschafft Ihnen einen guten Einblick in Windows Server und die Möglichkeiten, die Ihnen das komfortable und flexible Serverbetriebssystem von Microsoft gibt. Das Buch zeigt Ihnen, wie Sie das Betriebssystem installieren, aktivieren und einrichten, wie Sie Rollen und Features anlegen und verwalten, wie Sie eine Domäne erstellen und betreiben, wie Sie DNS und DHCP einrichten, wie Sie mit Hyper-V virtualisieren und vor allem wie Sie Ihre Daten sichern und die Prozesse überwachen. Willkommen in der Windows-Server-Welt!Table of ContentsÜber die Autoren 7 Einführung 17 Über dieses Buch 17 Was Sie nicht lesen müssen 18 Törichte Annahmen über den Leser 18 Wie dieses Buch aufgebaut ist 18 Teil I – Die Grundlagen des Windows-Servers 19 Teil II – Einrichtung und wichtige Rollen 19 Teil III – Das richtige Leben: Windows Server im Einsatz 19 Teil IV – Der Top-Ten- Teil 20 Symbole, die in diesem Buch verwendet werden 20 Wie es weitergeht 20 Teil I: Windows-Server- rundlagen 23 Kapitel 1 Windows-Server- Grundlagen 25 Das kleine 1x1 der Server 25 Hardware-Anforderungen 27 Hardware Compatibility List – HCL 29 Darf es ein bisschen mehr sein? Sizing des Servers 30 Kapitel 2 Wer zählt die Versionen und Editionen? 33 Server-Geschichte: Windows NT Server bis 2019 33 Windows Server 2019: Neuerungen und Vorteile 35 Editionen, Versionen und Service-Kanäle 36 Andere Welten (1): Windows-Subsystem für Linux 37 Andere Welten (2): Container, Docker, Kubernetes 39 Windows Server 2022 – die kommende Generation 40 Kapitel 3 Cloud und lokal 43 Installation: Cloud oder lokal? 43 Windows Server in der Azure Cloud 44 Alternative Cloud-Anbieter und deren Anbindungen 46 KAMP DHP 47 VPN-Zugriff in die Cloud 52 Kapitel 4 Fenster oder Konsole? 55 Windows-Oberfläche versus Kommandozeile 55 Was die Eingabeaufforderung so kann 57 Kommandozeile: Arbeiten direkt »am Prompt« 59 Kapitel 5 PowerShell und der Server 61 Wichtige PowerShell-Grundlagen 62 Begriffe und Besonderheiten der PowerShell 63 Erste Schritte zum eigenen Skript 67 Einige Informationen zu Objekten 67 Wichtig für viele Zwecke: Vergleichsoperatoren 70 Verzweigungen und Schleifen 73 Wie Sie ein Skript »zum Laufen« bringen 78 PowerShell in der Server-Verwaltung einsetzen 80 Prozesse finden und überwachen 80 Drucker im Griff behalten 83 Das Netzwerk und dessen Geräte 86 Teil II: Einrichtung und wichtige Rollen 93 Kapitel 6 Installation von Windows Server 95 Die Frage nach dem Boot-Medium 95 Schritt für Schritt: die Installation 97 Alternative: Core-Server installieren 101 Kapitel 7 Active Directory 105 Was ist überhaupt ein Active Directory? 106 Grundbegriffe rund um das Active Directory 107 Installation einer Active-Directory- Domäne 108 Erste Benutzer und Computer 113 Administrative Konten 118 Weiteren Domänencontroller in einer Domäne installieren 121 Replikation 126 Betriebsmasterrollen 128 Entfernung eines Domänencontrollers 130 Active-Directory- Verwaltung über den Client 132 Active-Directory- Papierkorb 133 Active-Directory- Verwaltungscenter 134 Gruppen, Benutzer, Container und OUs 136 Erstellung von Gruppen 138 Benutzer Gruppen zuweisen 140 Benutzerkontentypen 143 Standardbenutzerkonten und Gruppen 143 Rechte und Privilegien 145 Kapitel 8 DNS und DHCP 147 Grundlagen der Namensauflösung 147 Basiseinrichtung des DNS-Server- Diensts 150 DNS-Konfiguration 155 DNS-Stammhinweise wiederherstellen 157 Verwalten von DNS-Einträgen 158 Anlage einer Reverse-Lookupzone 159 Anlage eines Hosteintrags 160 Primärer und sekundärer DNS-Server 161 Zoneneigenschaften 165 Batch-Export von DNS-Einträgen 168 Microsoft-DNS- Server- Historie 170 Allgemeine DNS-Sicherheit 172 DNS absichern mit DNSSEC und DANE 172 Konfiguration von DNSSEC 173 Grundlagen von DHCP 178 APIPA 179 Installieren eines DHCP-Servers 180 DHCP-Reservierungen 183 DHCP-Optionen 186 DHCP-Failover 187 IPAM 190 Kapitel 9 Speicherdienste – Datei-Server 195 Platten und Storage 196 RAID, iSCSI-Zielserver und iSCSI-Initiator 196 iSCSI-Zielspeicheranbieter 201 Server für NFS 203 Freigaben, Datei-Server, Ressourcenmanager 207 Datendeduplizierung 214 DFS-Namespaces 217 DFS-Replikation 219 Grundlagen zu BranchCache für Datei-Server 221 Grundlagen zu Arbeitsordnern 223 Kapitel 10 Erweiterte Ressourcenfreigaben 225 Versteckte und administrative Freigaben 225 Dateifreigaben organisieren 228 Laufwerkfreigabe per Gruppenrichtlinie zuordnen 228 Lassen Sie sich nicht ausschließen 230 Vor Blicken schützen – ABE 231 Dynamic Access Control 233 Prüfung des effektiven Zugriffs 241 Kapitel 11 Hyper-V 245 Virtualisierung: Begriffe und Bestandteile 245 Vorteile beim Einsatz von Hyper-V 246 Einrichtung der Hyper-V- Rolle 247 Hyper-V konfigurieren 250 Manager für virtuelle Switches 254 Einrichten eines virtuellen Switches 255 Virtueller Switch und die PowerShell 257 Kapitel 12 Virtuelle Computer einsetzen 261 Anlegen einer virtuellen Maschine 261 Konfiguration der virtuellen Maschine 266 Kapitel 13 Windows und Linux als Gastsystem 277 Virtuelle Computer mit der PowerShell im Griff 283 Ein genauerer Blick auf die Prüfpunkte 285 Erstellen eines Prüfpunkts 286 Anwenden eines Prüfpunkts 288 Löschen eines Prüfpunkts 290 Ubuntu-Linux als Gastsystem 291 Kapitel 14 Druckdienste 297 Begrifflichkeiten 299 Installation von Druck-und Dokumentendiensten 301 Druckerserver in der Druckerverwaltung hinzufügen 305 Arbeiten mit Druckfiltern 305 Drucker in der Druckerverwaltung hinzufügen 307 Drucker bereitstellen 311 Drucker im-und exportieren 313 Druckaufträge im Spooler ansehen 314 Line Printer Daemon und Line Printer Remote 315 Druckertreiberisolation 316 Internetdrucken 317 Teil III: Windows-Server im Einsatz 321 Kapitel 15 Domänen-Beitritt 323 Vorbedingungen für den Domänen-Beitritt 323 Einbinden in die Domäne 327 Offline einer Domäne beitreten 329 Gruppenrichtlinien 333 Gruppenrichtlinienobjekt verknüpfen 338 Gruppenrichtlinienobjekt löschen 339 Gruppenrichtlinien und Gruppen 340 WMI-Filter 342 WMI Query Language 344 Zielgruppenadressierung 346 Administrative Vorlagen 349 Central Store 351 Handlungsempfehlung für Gruppenrichtlinien 352 Praktische Empfehlungen 354 Anmeldung am Computer verweigern 354 Desktophintergrundbild festlegen 357 Sicherheitsrelevante Gruppenrichtlinien 359 Standardbrowser per Gruppenrichtlinie 362 Office-VBA per Gruppenrichtlinie ausschalten 363 Softwareinstallation per Gruppenrichtlinie 365 Entfernen eines Pakets und Updates 367 Loopback 368 Programme per GPO sperren 368 Troubleshooting für Gruppenrichtlinien 370 Kapitel 17 Überwachung des Server-Betriebs 373 Der Server-Manager 373 Verwalten des lokalen Servers 377 Lokalen Server konfigurieren 379 Überblick über das Tools-Menü 381 Kapitel 18 Das Windows Admin Center 385 Was ist das Windows Admin Center (WAC)? 385 Installation 387 Konfiguration und erster Einsatz 390 Grundsätzliche Einstellungen und Erweiterungen 394 Weitere Einstellungen und Features 399 Kapitel 19 Windows-Server- Updates 405 Einstellungen und Features für die Updates 406 Update-Richtlinien verändern 414 Update-Einstellungen mittels sconfig ändern 416 Kapitel 20 Backup 419 Grundlagen der Sicherung und Wiederherstellung 420 Windows-Server- Sicherung 422 Einrichten von Backup-Jobs 423 Recovery-Medium nutzen 425 Einzelne Dateien wiederherstellen 426 Worum handelt es sich beim Azure-Backup- Dienst? 427 Kapitel 21 Ausfälle und deren Vermeidung 431 Vermeidung von Ausfällen 432 Windows aktuell halten 433 Applikationen aktuell halten 434 RAM-Test 435 Festplattenspeicherplatz beachten 436 Monitoring 437 PRTG 438 Nagios und Nagios XI 438 Syspectr 439 Kapitel 22 Fernzugriffe 441 Konsolenzugriffe 442 Microsoft Management Console (MMC) 445 Remote Desktop (RDP) 446 Dritthersteller-Tools 447 Kapitel 23 Troubleshooting 451 Erst die Ereignisanzeige – dann der Rest! 453 Eigene Dokumentationen 454 Server-Manager als Hilfestellung 455 IPv6 unterdrücken 456 Wo finde ich Unterstützung? 458 Teil IV: Der Top-Ten- Teil 461 Kapitel 24 Die 10 besten Server-Tools 463 Veeam Backup & Replication Community Edition 463 AD Replication Status Tool 463 Specops Password Auditor für Active Directory 463 Winscp 463 Microsoft Security Compliance Toolkit 1 0 (SCT) 464 WiseDateman Password Control 464 WireShark 464 RSAT 464 SysMon 464 SysInternals Suite (komplett) 464 Stichwortverzeichnis 467

    2 in stock

    £23.70

  • Penetration Tester werden für Dummies

    Wiley-VCH Verlag GmbH Penetration Tester werden für Dummies

    2 in stock

    Book SynopsisPentests sind für Unternehmen unverzichtbar geworden, denn nur wer die Schwachstellen kennt, kann auch dagegen vorgehen. Robert Shimonski erklärt Ihnen in diesem Buch alles, was Sie brauchen, um selbst Pentests durchzuführen. Von den nötigen Vorbereitungen über Risikoanalyse und rechtliche Belange bis hin zur eigentlichen Durchführung und späteren Auswertung ist alles dabei. Versetzen Sie sich in Hacker hinein und lernen Sie, wo Unternehmen angreifbar sind. Werden Sie selbst zum Penetration Tester.Table of ContentsÜber den Autor 9 Einleitung 19 Teil I: Die ersten Schritte 23 Kapitel 1: Die Rolle von Pentests in der IT-Sicherheit 25 Kapitel 2: Pentesting im Überblick 41 Kapitel 3: Das Werkzeug zusammensuchen 57 Teil II: Angriffe und was man damit macht 71 Kapitel 4: Penetration und Exploit 73 Kapitel 5: Identitätsdiebstahl: der Mann in der Mitte und seine finsteren Freunde 91 Kapitel 6: Überschwemmen und lahmlegen: DoS/DDoS 101 Kapitel 7: Malware für Destroy Attacks 115 Kapitel 8: Die Kontrollen umgehen: subversive Angriffe 125 Teil III: Es geht los: Vorbereiten und testen 137 Kapitel 9: Einen Pentest vorbereiten 139 Kapitel 10: Einen Penetrationstest durchführen 151 Teil IV: Der Pentest-Report 169 Kapitel 11: Reporting 171 Kapitel 12: Empfehlungen geben 183 Kapitel 13: Retesting 203 Teil V: Der Top-Ten-Teil 213 Kapitel 14: Zehn falsche Pentest-Mythen 215 Kapitel 15: Zehn Tipps, wie Sie ein noch besserer Pentester werden 223 Kapitel 16: Zehn Websites, auf denen Sie noch mehr über Pentesting erfahren 231 Abbildungsverzeichnis 239 Stichwortverzeichnis 245

    2 in stock

    £21.38

  • Meine digitale Sicherheit für Dummies

    Wiley-VCH Verlag GmbH Meine digitale Sicherheit für Dummies

    1 in stock

    Book SynopsisDigital einfach besser geschützt! Wie Sie Ihre Daten zuhause und im Internet vor Betrügern schützen, vermittelt Ihnen dieses Buch. Sichere Passwörter, Browser, Online-Banking, Schutz Ihres Heimnetzwerks und Ihrer Endgeräte, Backups wichtiger Daten oder deren Wiederherstellung: Leicht verständlich und systematisch lernen Sie, sich digital zu schützen. Sie erfahren, welche menschlichen Eigenschaften Angreifer ausnutzen, um beim Phishing oder anderen Angriffen erfolgreich zu sein. Mit konkreten Schutzmaßnahmen für alle gängigen Betrugsmaschen und technischen Schutzvorkehrungen sind Sie ab sofort gewappnet. Sie erfahren Alles über zentrale Grundlagen der digitalen Sicherheit Welche Betrugsmaschen es gibt und wie Sie sich schützen Wie Sie Ihre Daten, Ihr Netzwerk und Ihre Endgeräte absichern Wie Sie sich zum Beispiel bei Bankgeschäften online wirklich sicher bewegen

    1 in stock

    £16.14

  • Cyberscience 2.0: Research in the Age of Digital

    Campus Verlag Cyberscience 2.0: Research in the Age of Digital

    10 in stock

    Book SynopsisAt the start of the twenty-first century, the Internet was already perceived to have fundamentally changed the landscape for research. With its opportunities for digital networking, novel publication schemes, and new communication formats, the web was a game-changer for how research was done as well as what came after - the dissemination and discussion of results. Addressing the seismic shifts of the past ten years, "Cyberscience 2.0" examines the consequences of the arrival of social media and the increasing dominance of big Internet players, such as Google, for science and research, particularly in the realms of organization and communication.

    10 in stock

    £43.00

  • Communication Protocol Engineering of Wireless Networks

    15 in stock

    £53.62

  • Service Creation and Deployment in Converged Networks

    15 in stock

    £38.64

  • ITSecurity und Botnetze Aktuelle Angriffs und

    Grin Publishing ITSecurity und Botnetze Aktuelle Angriffs und

    Out of stock

    Book Synopsis

    Out of stock

    £39.71

  • Model-Driven-Configuration-Management: Ein

    Springer Fachmedien Wiesbaden Model-Driven-Configuration-Management: Ein

    1 in stock

    Book SynopsisSebastian Herden präsentiert das Konzept des Model-Driven-Configuration-Managements (MDCM) zur Schließung der identifizierten semantischen Lücke zwischen Unternehmensarchitektur und IT-Konfiguration. Die grundlegende Idee des vorgestellten MDCM-Konzepts zur nahtlosen Integration von Enterprise-Architecture-Management und IT-Konfigurationsmanagement im IT-Betrieb ist es, einen Model-Driven-Engineering-Ansatz zu entwickeln. Das Ziel des MDCM ist neben der Ausrichtung der resultierenden IT-Konfiguration an den Geschäftsprozessen eines Unternehmens und der nachvollziehbaren und transparenten Gestaltung die Unabhängigkeit der Qualität von individuellem Wissen.Table of ContentsModel Driven Engineering.- Konfigurationsmanagement.- Enterprise Architecture Management.- IT–Systemlandschaft.- Modelltransformationen.

    1 in stock

    £49.49

  • IT Management: The art of managing IT based on a

    Springer Fachmedien Wiesbaden IT Management: The art of managing IT based on a

    1 in stock

    Book SynopsisThis book focuses on the art of managing IT. A simple and robust framework is proposed to describe and to structure the essential elements of IT management. The authors pay particular attention to didactic aspects in order to facilitate the retention of models presented as well as to promote reflection on the subjects introduced. Thanks to a concentrate of good practices, each company will rapidly be in a position to build their proper IT ecosystem.Table of ContentsIT Processes - IT Strategy - IT Services - IT Portfolio and Project Management - IT Reporting - IT Governance

    1 in stock

    £18.99

  • Benutzerzentrierte Unternehmensarchitekturen: Ein

    Springer Fachmedien Wiesbaden Benutzerzentrierte Unternehmensarchitekturen: Ein

    1 in stock

    Book SynopsisUnternehmensarchitektur-Management unterstützt die Planung und Durchführung von Geschäftstransformation. Existierende Ansätze können in portfolio- und projekt-orientierte Ansätze eingeteilt werden. Die Synthese dieser Ansätze bietet das Beste aus beiden Welten. Das Buch stellt den kombinierten Ansatz vor. Der Inhalt gliedert sich in ausgewählte Best-Practice-Szenarien. Der Fokus liegt jeweils auf dem Thema Benutzererfahrung – ein Schwerpunkt, der in Transformationsprojekten oftmals vernachlässigt wird.Zur Evaluierung von Unternehmensarchitekturen aus Sicht der Benutzer steht unter ww.omilab.org/usercentricassessment ein Online-Service zur Verfügung. Table of ContentsGeschäftstransformation – Eine Notwendigkeit.- Das Zusammenspiel zwischen TOGAF®, ArchiMate® und EA-Szenarien.- Transformationsportfolio-Management.- Capability-Portfolio-Management.- Applikationsportfolio-Management.- Datenportfolio-Management.- Technologieportfolio-Management.- Compliance-Portfolio-Management.- Benutzererfahrung als Wegweiser in der Geschäftstransformation.

    1 in stock

    £52.24

  • Eingebettete Systeme: Grundlagen Eingebetteter

    Springer Fachmedien Wiesbaden Eingebettete Systeme: Grundlagen Eingebetteter

    Out of stock

    Book SynopsisEin Alleinstellungsmerkmal dieses Open-Access-Lehrbuchs ist die umfassende Einführung in das Grundlagenwissen über eingebettete Systeme mit Anwendungen in cyber-physischen Systemen und dem Internet der Dinge. Es beginnt mit einer Einführung in das Gebiet und eine Übersicht über Spezifikationsmodelle und -sprachen für eingebettete und cyber-physikalische Systeme. Es gibt einen kurzen Überblick über die für solche Systeme verwendeten Hardware-Geräte und stellt die Grundlagen der Systemsoftware für eingebettete Systeme vor, einschließlich Echtzeit-Betriebssystemen. Der Autor erörtert auch Evaluierungs- und Validierungstechniken für eingebettete Systeme und gibt einen Überblick über Techniken zur Abbildung von Anwendungen auf Ausführungsplattformen, inklusive Multi-Core-Plattformen. Eingebettete Systeme müssen unter engen Randbedingungen arbeiten, daher enthält das Buch auch einen ausgewählten Satz von Optimierungstechniken, mit einem Schwerpunkt bei Software-Optimierungstechniken. Das Buch schließt mit einer kurzen Übersicht über das Testen. Die vierte Auflage wurde aktualisiert und überarbeitet, um neue Trends und Technologien zu berücksichtigen, wie z. B. die Bedeutung von cyber-physischen Systemen (CPS) und dem Internet der Dinge (IoT), die Entwicklung von Single-Core-Prozessoren hin zu Multi-Core-Prozessoren und die zunehmende Bedeutung von Energieeffizienz und thermischen Fragen.Table of ContentsEinleitung - Spezifikation und Modellierung - Hardware eingebetteter Systeme - Systemsoftware - Bewertung und Validierung - Abbildung von Anwendungen (Scheduling) - Optimierung - Test

    Out of stock

    £31.49

  • Moderne Rechnernetze: Protokolle, Standards und

    Springer Fachmedien Wiesbaden Moderne Rechnernetze: Protokolle, Standards und

    Out of stock

    Book SynopsisDas Buch mit einem stark ausgeprägten modularen Aufbau, wird als ein vorlesungsbegleitendes Lehrbuch zum Modul Computernetzwerke im ET- und IT-Fachstudium an technischen Hochschulen empfohlen und enthält drei Teile sowie Zwischenfragen mit dazugehörigen Lösungen und weitere Übungsaufgaben. Teil I beinhaltet eine Einführung in das Gebiet der Rechnernetze. Die weiterführenden Teile II und III behandeln aktuelle Rechnernetztechnologien, Kopplungselemente und Verkabelungskonzepte. Die Leser werden dabei mit verteilten Softwaresystemen und Rechnernetzanwendungen vertraut gemacht.Table of ContentsGrundlagen (Dienste, Protokolle, Architekturen OSI, Internet).- Drahtgebundene und drahtlose Kernnetzwerktechnologien (Ethernet, MPLS, WLAN) sowie Mobile Kommunikation (4G, 5G, Satellitenfunk, Piko- und Sensornetze).- Netzkopplungsgeräte und Verkabelung.- Verarbeitungsorientierte Schichten (Applikationen, Sicherheit in Netzen).- Verteilte Systeme (Mobile Apps, Cloud Computing, Grids, Virtualisierung).- Neue Techniken (intelligente Vernetzung in der Industrie 4.0, Fog Computing für IoT).

    Out of stock

    £34.19

  • Betriebssysteme: Grundlagen und Konzepte

    Springer Fachmedien Wiesbaden Betriebssysteme: Grundlagen und Konzepte

    1 in stock

    Book SynopsisDer Autor präsentiert die Grundlagen und Konzepte der heutigen Betriebssysteme und behandelt die Gebiete Prozesse (Prozesszustände, Prozessscheduling, Prozesssynchronisation und Prozesskommunikation), Speicherverwaltung (virtueller Speicher, paging, swapping), Dateiverwaltung (Files, Ordner, Sicherheitsmechanismen), Ein-und Ausgabeverwaltung (Treiber, I/O-memory mapping, Systemfunktionen) sowie Netzwerke (Netzwerkschichten, Arbeitsverteilung, Schattenserver) und Sicherheitsmechanismen (Angriffsarten, root kits, Kerberos). Dabei werden sowohl Einprozessor- als auch Mehrprozessorsysteme betrachtet und die Konzepte an wichtigen existierenden Betriebssystemen wie Unix und Windows NT verdeutlicht.In der vorliegenden vierten Auflage wurden viele Erfahrungen aus der Lehrpraxis berücksichtigt. So wurden nicht nur die Entwicklungen in Windows NT und Unix, speziell Linux, aktualisiert, sondern auch einige Kapitel neu gegliedert und um das Thema „Sicherheit“ ergänzt. Weitere Aufgaben und Beispiele mit Musterlösungen runden das Werk ab. Alle Vorlesungsfolien, die Vorlesungsvideos sowie eine umfangreiche Klausursammlung mit Musterlösungen stehen auf den Webseiten des Autors zum Herunterladen bereit.Table of ContentsVorwort.- Übersicht.- Einleitung.- Prozesse.- Speicherverwaltung.- Dateiverwaltung.- Ein- und Ausgabeverwaltung.- Netzwerkdienste.- Sicherheit.- Benutzeroberflächen.- Musterlösungen.- Modellierung von Trashing.- Literatur.- Index.

    1 in stock

    £42.74

  • Internet: Technik – Nutzung – Social Media

    Springer Fachmedien Wiesbaden Internet: Technik – Nutzung – Social Media

    15 in stock

    Book SynopsisNeben einem kurzen Abriss über die Entstehungsgeschichte des Internets lernen Sie in diesem Buch u. a. was Protokolle, Domains sowie Server sind und welche Rolle Sie beim Aufbau einer Internetverbindung spielen. Im darauffolgenden Kapitel wird das Leben mit dem Internet genauer beleuchtet. Hier erfahren Sie beispielsweise, wie Sie das Internet für Ihre persönlichen Zwecke optimal nutzen. Der letzte große Schwerpunkt dieses Werks führt Sie an Twitter, Facebook und Co. heran. Mit verständlichen Abbildungen und Grafiken zeigen Ihnen die Verfasser, wie sich Social-Media-Plattformen als Marketinginstrumente einsetzen lassen. Aufgrund der ausgewogenen Mischung aus Theorie und Praxis ist dieses Internet-Buch ein solides Nachschlagewerk für:Studenten und AuszubildendeLaien und Neulinge Praktiker aus der Mediengestaltung Table of ContentsTechnik - Nutzung - Social Media

    15 in stock

    £11.54

  • Understanding Network Hacks: Attack and Defense

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Understanding Network Hacks: Attack and Defense

    Out of stock

    Book SynopsisThis book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting, Bluetooth and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.Table of ContentsInstallation.- Networks 4 newbies.- Python Basics.- Layer 2 attacks.- TCP / IP Tricks.- WHO IS DNS?.- HTTP Hacks.- Wifi fun.- Feeling Bluetooth on the Tooth.- Bargain Box Kung Fu.- Scapy Reference.- Secondary Links.- Index.

    Out of stock

    £67.49

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account