The Only Official Guide to All Components of Citrix XenApp Platinum Edition
Citrix XenApp, the new name for Citrix Presentation Server, is an end-to-end Windows application delivery system that offe……続きを見る
The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker……続きを見る
This Springer Brief provides a comprehensive overview of the background and recent developments of big data. The value chain of big data is divided into four phases: data generation, data acquisitio……続きを見る
Harness the powerful new SQL Server 2012
Microsoft SQL Server 2012 is the most significant update to this product since 2005, and it may change how database administrators and developers perform man……続きを見る
Identify, capture and resolve common issues faced by Red Hat Enterprise Linux administrators using best practices and advanced troubleshooting techniques About This Book • Develop a strong understan……続きを見る
Install, configure, and support your XenApp systems with the power of Citrix XenApp About This Book • Familiarize yourself with Citrix applications and desktop virtualization • Maintain and troubles……続きを見る
Essential Skills for Hackers is about the skills you need to be in the elite hacker family.
The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more ……続きを見る
This work presents link prediction similarity measures for social networks that exploit the degree distribution of the networks. In the context of link prediction in dense networks, the text propose……続きを見る
著者:Yin Zhang, Min Chen
出版社: Springer International Publishing
発売日: 2016年12月08日
This SpringerBrief introduces key techniques for 5G wireless networks. The authors cover the development of wireless networks that led to 5G, and how 5G mobile communication technology (5G) can no l……続きを見る
Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other ……続きを見る
This is the first book to introduce UUDN for 5G, including the concept, challenges, architecture and key technologies.
The new network architecture based on “de-cellular” and “user-centric” is propo……続きを見る
Becoming Digital examines the transition from the online world we have known to the Next Internet, which is emerging from the convergence of Cloud Computing, Big Data Analytics, and the Internet of ……続きを見る
This book presents several compact and fast methods for online traffic measurement of big network data. It describes challenges of online traffic measurement, discusses the state of the field, and p……続きを見る
The subject of this book is Command Control Communication and Information 3 (C I) which is the management infrastructure for any large or complex dynamic resource systems. Here command means the det……続きを見る
Security Smarts for the Self-Guided IT Professional
“Get to know the hackersーor plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed w……続きを見る
This book provides a comprehensive overview of the latest research and standardization progress towards the 5th generation (5G) of mobile communications technology and beyond. It covers a wide range……続きを見る
Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss.BackTrack: Testing Wireless Network Security is for anyone who ……続きを見る
This critical and forward-looking book features:
An assessment of the impact of Internet of Things (IoT) on the telecom industry’s revenue streams
IoT-based business models in the telecom industry
……続きを見る
著者:Tin-Chih Toly Chen
出版社: Springer International Publishing
発売日: 2022年10月21日
This book systematically analyzes the applicability of big data analytics and Industry 4.0 from the perspective of semiconductor manufacturing management. It reports in real examples and presents ca……続きを見る
This book applies artificial intelligence to lean production and shows how to practically combine the advantages of these two disciplines.
Lean manufacturing originated in Japan and is a well-known ……続きを見る
This book shows how smart technology applications to mobile healthcare will be different in the post-pandemic era. Prior to the Covid-19 pandemic, smart technologies had been widely applied to mobil……続きを見る
Dieses Buch wendet künstliche Intelligenz auf die schlanke Produktion an und zeigt, wie sich die Vorteile dieser beiden Disziplinen praktisch kombinieren lassen.
Die schlanke Produktion hat ihren Ur……続きを見る
著者:Vincenzo Morabito
出版社: Springer International Publishing
発売日: 2016年05月22日
This book describes the trends in digital innovation that are of most importance for businesses and explores the key challenges. The book is in three parts, the first of which focuses on development……続きを見る
This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The prima……続きを見る
An essential anti-phishing desk reference for anyone with an email address
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive tec……続きを見る
Discover all the security risks and exploits that can threaten iOS-based mobile devices
iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security i……続きを見る
The industry-standard guide to networked audiovisual systems
Published with InfoComm International, Networked AV Systems discusses the essential information AV and IT professionals need to know when……続きを見る
Interconnecting Smart Objects with IP: The Next Internet explains why the Internet Protocol (IP) has become the protocol of choice for smart object networks. IP has successfully demonstrated the abi……続きを見る
Filtering and system identification are powerful techniques for building models of complex systems. This 2007 book discusses the design of reliable numerical methods to retrieve missing information ……続きを見る
Computer-based infectious disease surveillance systems are capable of real-time or near real-time detection of serious illnesses and potential bioterrorism agent exposures and represent a major step……続きを見る