Hinschauen oder verschleiern?
Die Welt der Organisationen ist voller Paradoxien: Wir wollen höchste Qualität, aber niedrige Preise; Kreativität ist uns wichtig, aber Regelbefolgung auch. Wer erst ei……続きを見る
Tech bosses are invading institutions, replacing workers with "artificial intelligence".
Musk plugs in propaganda bots; Schmidt plugs in killer robots. But aging bosses are replaceable too. Once wor……続きを見る
Interest in control of climbing and walking robots has remarkably increased over the years. Novel solutions of complex mechanical systems such as climbing, walking, flying and running robots with di……続きを見る
Edge computing has emerged as a powerful technology for efficiently executing tasks by pushing cloud computing capabilities to the edge of the network. This approach significantly improves the quali……続きを見る
This book covers cutting edge advancements on self-powered Internet of Things, where sensing devices can be energy-positive while capturing context from the physical world. It provides new mechanism……続きを見る
This book provides readers with a valuable guide to understanding security and the interplay of computer science, microfluidics, and biochemistry in a biochip cyberphysical system (CPS). The authors……続きを見る
This revised textbook presents updated material on its core content: an end-to-end IoT architecture that is comprised of devices, network, compute, storage, platform, applications along with managem……続きを見る
Protecting yourself and your data against online threats and hacking has never been more critical, and as the saying goes, knowledge is power.
The Principles of Cybersecurity and Hacking seeks to eq……続きを見る
Charles E. Robinson, Professor Emeritus of English at The University of Delaware, definitively transformed study of the novel Frankenstein with his foundational volume The Frankenstein Notebooks and……続きを見る
فرزندان ما از اولین روزهای تولد، با تلفن همراه والدین خود بازی می کنند.با صدای تلویزیون بیدار می شوند و با لالایی آن به خواب می روند. بازی های رایانه ای، آن ها را ساعت ها سرگرم می کند تا جای خالی خو……続きを見る
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in tran……続きを見る
This book describes power management integrated circuits (PMIC), for power converters and voltage regulators necessary for energy efficient and small form factor systems. The authors discuss state-o……続きを見る
This book provides a new perspective on modeling cyber-physical systems (CPS), using a data-driven approach. The authors cover the use of state-of-the-art machine learning and artificial intelligenc……続きを見る
Computing Reality is a rare and challenging research output in the area of cybernetic and system theory explaining the meaning behind the understanding, interpretation and application of scientific ……続きを見る
The new edition of this popular book has been transformed into a hands-on textbook, focusing on the principles of wireless sensor networks (WSNs), their applications, their protocols and standards, ……続きを見る
This book is focused on wireless infrastructure deployment in modern transportation markets, where the wireless infrastructure co-exists with the existing structure. It details the challenges this d……続きを見る
This book explores C-based design, implementation, and analysis of post-quantum cryptography (PQC) algorithms for signature generation and verification. The authors investigate NIST round 2 PQC algo……続きを見る