Cilium is now considered the de facto cloud native networking platform for Kubernetes, connecting, securing, and monitoring millions of applications across thousands of clusters. With such versatili……続きを見る
In "Careers in Information Technology: Cybersecurity Analyst," readers are introduced to the vital and ever-changing topic of cybersecurity in a perceptive manner. This thorough guide delves into th……続きを見る
"The Future of Connectivity: Unleashing the Power of 5G and Beyond" provides an in-depth analysis of 5G technology and its far-reaching implications across various sectors. This book is designed to ……続きを見る
Massive MIMO in Practice: From 5G/5G-Advanced to 6G (2nd edition of the previously titled Advanced Antenna Systems for 5G Network Deployments: Bridging the Gap between Theory and Practice) provides ……続きを見る
A practical guide to assessing OT systems using IEC 62443 ー written for real industrial professionals, not cybersecurity theorists.
Industrial control systems are becoming increasingly connected, c……続きを見る
This Wi-Fi 7 technology book serves as an essential and comprehensive professional reference for the academics and industry professionals, covering the entire Wi-Fi series across various generations……続きを見る
Project management is truly an art‑seeking science with complex processes balancing project output objectives against restraints of time, budget, human resources, quality, and customer satisfaction.……続きを見る
著者:Cynthia Tysick
出版社: Taylor & Francis
発売日: 2025年09月29日
An accessible introduction to the technical and social construct of digital identity, this book helps students understand how the data they generate through online activities and apps is used and th……続きを見る
Building and sustaining cybersecurity in the enterprise isn’t just a technical challenge; it is an organizational imperative. In a world where most guidance is geared toward mid-sized environments, ……続きを見る
A fast, hands-on introduction to offensive hacking techniques
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world……続きを見る
Ever wondered how AI can help you in your everyday life, but felt too overwhelmed or “not tech-savvy enough” to give it a try?
This is the book for you.
ChatGPT for Everyone is your simple, friendly……続きを見る
As an alternative to traditional client-server systems, Peer-to-Peer (P2P) systems provide major advantages in terms of scalability, autonomy and dynamic behavior of peers, and decentralization of c……続きを見る
This book is a guide to building a digital institution. It explains how a growing band of reformers in businesses and governments around the world have helped their organisations pivot to a new way ……続きを見る
This book examines how cloud-based services challenge the current application of antitrust and privacy laws in the EU and the US. The author looks at the elements of data centers, the way informatio……続きを見る
In exploring artificial intelligence (AI) in urban life, this book brings together and extends thinking on how human-AI interactions are continuously evolving. Through such interactions, people are ……続きを見る
The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is ……続きを見る
Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart gr……続きを見る
Blockchain-Enabled Internet of Things Applications in Healthcare: Current Practices and Future Directions examines cutting-edge applications, from blockchain-powered IoT innovations in healthcare sy……続きを見る
Blockchain-Enabled Internet of Things Applications in Healthcare: Current Practices and Future Directions examines cutting-edge applications, from blockchain-powered IoT innovations in healthcare sy……続きを見る
According to the Brookings Institute, an organization's information and other intangible assets account for over 80 percent of its market value. As the primary sponsors and implementers of informati……続きを見る
The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Prepar……続きを見る
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT securi……続きを見る
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!
Adam Shostack is responsible for security development lifecyc……続きを見る
Get started with Twisted, the event-driven networking framework written in Python. With this introductory guide, you’ll learn the key concepts and design patterns to build event-driven client and se……続きを見る
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapi……続きを見る
While computers and other devices identify each other on networks or the Internet by using unique addresses made up of numbers, humans rely on the Domain Name System (DNS), the distributed database ……続きを見る
In the quest to remove supply channel costs, streamline channel communications, and link customers to the value-added resources found along the supply chain continuum, Supply Chain Management (SCM) ……続きを見る
With future competitive landscape shifting from competition between companies themselves to trading partner networks, understanding and mastering process design and change is becoming more critical ……続きを見る
In orderto maximizeIT resources andjustify IT expenditures, CIO’s and other IT managers must be able to identify meaningful metrics and explain them in a way that management can understand. The Busi……続きを見る
It is almost impossible to conceive of the concept and practical application of supply chain management (SCM) without linking it to the enabling power of today’s information technologies. Building u……続きを見る