![]() |
The Road towards 6G: Opportunities, Challenges, and Applications
ISBN: 9783031425691 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. The proposed book will provide a comprehensive picture of the journey from 5G networks towards 6G. Different aspects, ranging from theoretical foundations to existing platforms and technologies will be presented and analysed, by critically highlighting the real opportunities and the challenges. The first chapters are to describe the general “transitioning” aspects from 5G to 6G. After that, an overview on the different technologies is provided, to present at the end the security aspects, the new applications and an analysis of the electromagnetic exposure, above all in terms of... The proposed book will provide a comprehensive picture of the journey from 5G networks towards 6G. Different aspects, ranging from theoretical foun... |
cena:
645,58 |
![]() |
Déploiement de réseaux définis par logiciel via open vswitch
ISBN: 9786207835805 / Francuski / Miękka / 88 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Dans le paysage dynamique des réseaux modernes, l'évolution constante des technologies de virtualisation et d'informatique en nuage a remis en question les infrastructures de réseau traditionnelles basées sur des dispositifs statiques. Cette transformation a entraîné une demande croissante de solutions pratiques offrant davantage de flexibilité et d'efficacité. En réponse à ce besoin, le Software Defined Networking (SDN) a émergé, une révolution dans l'industrie des réseaux. Au coeur de cette transformation se trouve OpenvSwitch (OVS), un puissant commutateur virtuel open source...
Dans le paysage dynamique des réseaux modernes, l'évolution constante des technologies de virtualisation et d'informatique en nuage a remis en quest...
|
cena:
335,81 |
![]() |
Cybersecurity in IoT-Netzwerken
ISBN: 9786208900908 / Niemiecki / Miękka / 144 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cybersicherheit ist im IoT von entscheidender Bedeutung, denn eine einzige Bedrohung oder ein einziger Hack könnte das Netzwerk stören - oder schlimmer noch, einem Cyberkriminellen vollständigen Zugriff auf das gesamte System verschaffen. In Branchen wie der Verteidigung oder dem Militär beherbergt das IoT äußerst sensible Informationen. Wenn der Zugriff auf das IoT über einen schwachen Netzwerkpunkt oder ein anfälliges Gerät erfolgt, haben Hacker die Möglichkeit, Informationen abzurufen oder das gesamte Netzwerk zu beschädigen. Während Unternehmen, Behörden und das...
Cybersicherheit ist im IoT von entscheidender Bedeutung, denn eine einzige Bedrohung oder ein einziger Hack könnte das Netzwerk stören - oder schlim...
|
cena:
295,46 |
![]() |
Federated Edge Learning: Algorithms, Architectures and Trustworthiness
ISBN: 9783031966484 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
645,58 |
![]() |
Computational Science and Its Applications - Iccsa 2025: 25th International Conference, Istanbul, Turkey, June 30-July 3, 2025, Proceedings, Part III
ISBN: 9783031969614 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
322,77 |
![]() |
Computational Science and Its Applications - Iccsa 2025: 25th International Conference, Istanbul, Turkey, June 30-July 3, 2025, Proceedings, Part II
ISBN: 9783031969966 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
322,77 |
![]() |
Computational Science and Its Applications - Iccsa 2025: 25th International Conference, Istanbul, Turkey, June 30-July 3, 2025, Proceedings, Part I
ISBN: 9783031969997 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
363,12 |
![]() |
LEVERAGING ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
ISBN: 9786208444730 / Angielski / Miękka / 60 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As cybersecurity threats continue to evolve in sophistication, velocity, and impact, the conventional reactive security approaches cannot keep up with them. In these cases, cyber attackers have employed more sophisticated strategies such as polymorphic malware, fileless attacks, and living-off-the-land techniques that do not depend on traditional detection methods. Anticipating this, predictive risk looking (more notably using artificial intelligence (AI) and machine learning) has emerged as a key technology in today's cybersecurity strategies. Predictive risk finding allows security teams to...
As cybersecurity threats continue to evolve in sophistication, velocity, and impact, the conventional reactive security approaches cannot keep up with...
|
cena:
196,82 |
![]() |
Evaluation of Clustering Techniques for News Recommendation
ISBN: 9786208442439 / Angielski / Miękka / 60 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The information overloading is one of the most significant issues nowadays. It can be seen in different domains, consisting of business, particularly in news. This is more important in link to news websites and web, where the news websites reliability is typically determined by quantity of news added to the portal. Then the most popular news websites include numerous of news articles daily. The classical solution generally used to address the information overloading is a recommendation. In this book we evaluate the MapReduce k-means and fuzzy k-means clustering for a content-based...
The information overloading is one of the most significant issues nowadays. It can be seen in different domains, consisting of business, particularly ...
|
cena:
196,82 |
![]() |
The Neural Network Revolution: Transforming Data into Knowledge
ISBN: 9786208441296 / Angielski / Miękka / 156 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides a comprehensive exploration of deep learning, starting with the basics of neural networks, including the perceptron algorithm and key techniques like feed-forward and backpropagation, optimization, and regularization. It delves into deep learning foundations, covering important concepts such as gradient descent, backpropagation, and solutions for challenges like the vanishing gradient problem. The book then introduces convolutional neural networks (CNNs), explaining their architectures, convolution and pooling layers, and applications like transfer learning for image...
This book provides a comprehensive exploration of deep learning, starting with the basics of neural networks, including the perceptron algorithm and k...
|
cena:
358,23 |
![]() |
Optimized Deep Learning for Network Intrusion Detection
ISBN: 9786208440213 / Angielski / Miękka / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book targets young researchers exploring advanced network security techniques to counter evolving cyber threats. It presents innovative methods, including RNN-based cyber-attack detection and IDS with feature reduction. Additionally, it introduces optimization-driven deep learning models like DASO-Deep RNN, ADASO-Deep RNN, and Opt RCNN-LSTM for precise intrusion detection, ensuring high accuracy, sensitivity, and specificity.
This book targets young researchers exploring advanced network security techniques to counter evolving cyber threats. It presents innovative methods, ...
|
cena:
358,23 |
![]() |
Cybersecurity in IoT Networks
ISBN: 9786208846916 / Angielski / Miękka / 112 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber security is essential in the IoT because one threat or hack could disrupt the network - or worse, give a cyber criminal complete access to the entire system. In industries such as defense or military operations, the IoT houses extremely sensitive information. If the IoT is accessed via a weak network point or vulnerable device, hackers then have the ability to retrieve intelligence or cause physical damage to the entire network. While businesses, government and health care sectors have increasingly reaped the benefits of the IoT, this shift to interconnectedness also has raised the...
Cyber security is essential in the IoT because one threat or hack could disrupt the network - or worse, give a cyber criminal complete access to the e...
|
cena:
295,46 |
![]() |
Computational Science and Its Applications - Iccsa 2025 Workshops: Istanbul, Turkey, June 30 - July 3, 2025, Proceedings, Part I
ISBN: 9783031975752 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
363,12 |
![]() |
Computational Science and Its Applications - Iccsa 2025 Workshops: Istanbul, Turkey, June 30 - July 3, 2025, Proceedings, Part II
ISBN: 9783031975882 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
363,12 |
![]() |
Computational Science and Its Applications - Iccsa 2025 Workshops: Istanbul, Turkey, June 30 - July 3, 2025, Proceedings, Part III
ISBN: 9783031975950 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
363,12 |
![]() |
Computational Science and Its Applications - Iccsa 2025 Workshops: Istanbul, Turkey, June 30 - July 3, 2025, Proceedings, Part IV
ISBN: 9783031976025 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
363,12 |
![]() |
Computational Science and Its Applications - Iccsa 2025 Workshops: Istanbul, Turkey, June 30-July 3, 2025, Proceedings, Part V
ISBN: 9783031976056 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
363,12 |
![]() |
Computational Science and Its Applications - Iccsa 2025 Workshops: Istanbul, Turkey, June 30 - July 3, 2025, Proceedings, Part VI
ISBN: 9783031976162 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
363,12 |
![]() |
Detection of Intrusions and Malware, and Vulnerability Assessment: 22nd International Conference, Dimva 2025, Graz, Austria, July 9-11, 2025, Proceedi
ISBN: 9783031976193 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
234,00 |
![]() |
Detection of Intrusions and Malware, and Vulnerability Assessment: 22nd International Conference, Dimva 2025, Graz, Austria, July 9-11, 2025, Proceedi
ISBN: 9783031976223 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
266,28 |