This book examines smart technologies and their invaluable role in augmenting the walking experience of mobile users.
From meticulously planned walking routes to precise footprint detection and anal……続きを見る
The Only Official Guide to All Components of Citrix XenApp Platinum Edition
Citrix XenApp, the new name for Citrix Presentation Server, is an end-to-end Windows application delivery system that offe……続きを見る
Dieses Buch wendet künstliche Intelligenz auf die schlanke Produktion an und zeigt, wie sich die Vorteile dieser beiden Disziplinen praktisch kombinieren lassen.
Die schlanke Produktion hat ihren Ur……続きを見る
**Avez-vous des inquiétudes concernant la sécurité de votre Active Directory?
Possédez-vous les compétences nécessaires pour évaluer la posture de sécurité de votre réseau ?**
Plongez dans l'univers……続きを見る
著者:Vincenzo Morabito
出版社: Springer International Publishing
発売日: 2016年05月22日
This book describes the trends in digital innovation that are of most importance for businesses and explores the key challenges. The book is in three parts, the first of which focuses on development……続きを見る
An essential anti-phishing desk reference for anyone with an email address
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive tec……続きを見る
This book shows how smart technology applications to mobile healthcare will be different in the post-pandemic era. Prior to the Covid-19 pandemic, smart technologies had been widely applied to mobil……続きを見る
This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The prima……続きを見る
This critical and forward-looking book features:
An assessment of the impact of Internet of Things (IoT) on the telecom industry’s revenue streams
IoT-based business models in the telecom industry
……続きを見る
"L’informatique dans les nuages, autrement dit « Cloud Computing », est certainement une des évolutions majeures de l’informatique. Dorénavant, les données ne sont plus stockées sur des serveurs loc……続きを見る
This book applies artificial intelligence to lean production and shows how to practically combine the advantages of these two disciplines.
Lean manufacturing originated in Japan and is a well-known ……続きを見る
Vous ne pouvez pas prétendre être un hacker sans savoir utiliser Linux.
Et vous ne pouvez pas non plus prétendre être un hacker si vous n'avez jamais entendu parler de Kali Linux !
Kali Linux est no……続きを見る
What does the phrase "ubiquitous media" actually mean? Individual definitions are just as varied and ubiquitous as the media to which they refer. As a result, there is to date no large-scale theoret……続きを見る
著者:Tin-Chih Toly Chen
出版社: Springer International Publishing
発売日: 2022年10月21日
This book systematically analyzes the applicability of big data analytics and Industry 4.0 from the perspective of semiconductor manufacturing management. It reports in real examples and presents ca……続きを見る
Ce livre abondamment illustré explique de manière simple et moderne les principes fondamentaux des réseaux (topologies, couches, protocoles…), avec à l’appui de nombreux schémas, exemples, exercices……続きを見る
Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to……続きを見る
Widely regarded as one of the most promising emerging technologies for driving the future development of wireless communications, cognitive radio has the potential to mitigate the problem of increas……続きを見る
Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss.BackTrack: Testing Wireless Network Security is for anyone who ……続きを見る
Discover all the security risks and exploits that can threaten iOS-based mobile devices
iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security i……続きを見る
The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker……続きを見る
The industry-standard guide to networked audiovisual systems
Published with InfoComm International, Networked AV Systems discusses the essential information AV and IT professionals need to know when……続きを見る
The field of information technology continues to advance at a brisk pace, including the use of Remote Laboratory (RL) systems in education and research. To address the needs of remote laboratory dev……続きを見る
Interconnecting Smart Objects with IP: The Next Internet explains why the Internet Protocol (IP) has become the protocol of choice for smart object networks. IP has successfully demonstrated the abi……続きを見る
Harness the powerful new SQL Server 2012
Microsoft SQL Server 2012 is the most significant update to this product since 2005, and it may change how database administrators and developers perform man……続きを見る
Filtering and system identification are powerful techniques for building models of complex systems. This 2007 book discusses the design of reliable numerical methods to retrieve missing information ……続きを見る
Que dit la toile de soi, de son patron, d’un candidat, d’un concurrent ? L'e-réputation joue un rôle important de nos jours...
L’e-réputation, l’identité numérique jouent un rôle sans cesse croissan……続きを見る
This Springer Brief provides a comprehensive overview of the background and recent developments of big data. The value chain of big data is divided into four phases: data generation, data acquisitio……続きを見る
COMMUNICATING IN R!SK, CRISIS, AND HIGH STRESS SITUATIONS
LEARN THE UNIFYING PRINCIPLES BEHIND RISK, CRISIS, AND HIGH STRESS COMMUNICATION WITH THIS STATE-OF-THE-ART REFERENCE WRITTEN BY A MAJOR LEA……続きを見る
In today’s technology-driven environment there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide ……続きを見る
Computer-based infectious disease surveillance systems are capable of real-time or near real-time detection of serious illnesses and potential bioterrorism agent exposures and represent a major step……続きを見る