Account
Orders
Advanced search
Handbook of Human-Machine Systems Insightful and cutting-edge discussions of recent developments in human-machine systems InHandbook of Human-Machine Systems, a team of distinguished researchers delivers a comprehensive exploration of human-machine systems (HMS)...
Deep Reinforcement Learning for Wireless Communications and Networking Comprehensive guide toDeep Reinforcement Learning (DRL) as applied to wireless communication systemsDeep Reinforcement Learning for Wireless Communications and Networking presents an overview of the...
Parallel Population andParallel Human Proposes a new paradigm to investigate an individual’s cognitive deliberation in dynamic human-machine interactions Today, intelligent machines enable people to interact remotely with friends, family, romantic partners, colleagues,...
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques...
Deep Learning Approaches for Security Threats in IoT Environments An expert discussion of the application of deep learning methods in the IoT security environment InDeep Learning Approaches for Security Threats in IoT Environments, a team of distinguished cybersecurity...
Methods and Techniques in Deep Learning Introduces multiple state-of-the-art deep learning architectures for mmWave radar in a variety of advanced applicationsMethods and Techniques in Deep Learning: Advancements in mmWave Radar Solutions provides a timely and...
Zeroing Neural Networks Describes the theoretical and practical aspects of finite-time ZNN methods for solving an array of computational problems Zeroing Neural Networks (ZNN) have become essential tools for solving discretized sensor-driven time-varying matrix problems...
CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMS Help protect your network system with this important reference work on cybersecurity Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical...
AI AND MACHINE LEARNING FOR NETWORK AND SECURITY MANAGEMENT Extensive Resource for Understanding Key Tasks of Network and Security ManagementAI and Machine Learning for Network and Security Management covers a range of key topics of network automation for network and...
Explore the cloud-native paradigm for event-driven and service-oriented applications In Cloud-Native Computing: How to Design, Develop, and Secure Microservices and Event-Driven Applications, a team of distinguished professionals delivers a comprehensive and insightful...
SECURITY TECHNOLOGIES AND SOCIAL IMPLICATIONS Explains how the latest technologies can advance policing and security, identify threats, and defend citizens from crime and terrorism Security Technologies and Social Implications focuses on the development and application...
IoT-enabled Unobtrusive Surveillance Systems for Smart Campus Safety Enables readers to understand a broad area of state-of-the-art research in physicalIoT-enabled securityIoT-enabled Unobtrusive Surveillance Systems for Smart Campus Safety describes new techniques in...
PROGRAMMING AND GUI FUNDAMENTALS Discover the foundations of TCL programming and GUI development Programming and GUI Fundamentals: Tcl-Tk for Electronic Design Automation (EDA), delivers a comprehensive exploration of the major design challenges and potential present in...
COMPUTER MODELS OF PROCESS DYNAMICS Comprehensive overview of techniques for describing physical phenomena by means of computer models that are determined by mathematical analysis Computer Models of Process Dynamics covers everything required to do computer based...
Understanding Artificial Intelligence Provides students across majors with a clear and accessible overview of new artificial intelligence technologies and applications Artificial intelligence (AI) is broadly defined as computers programmed to simulate the cognitive...
CYBER-PHYSICAL SYSTEMS Provides a unique general theory of cyber-physical systems, focusing on how physical, data, and decision processes are articulated as a complex whole Cyber-physical systems (CPS) operate in complex environments systems with integrated physical...
Explore foundational concepts in blockchain theory with an emphasis on recent advances in theory and practice In Wireless Blockchain: Principles, Technologies and Applications, accomplished researchers and editors Bin Cao, Lei Zhang, Mugen Peng, and Muhammad Ali Imran...
CORPORATE CYBERSECURITY An insider’s guide showing companies how to spot and remedy vulnerabilities in their security programs A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those...
INTELLIGENT CONNECTIVITY AI, IOT, AND 5G Explore the economics and technology of AI, IOT, and 5G integration Intelligent Connectivity: AI, IoT, and 5G delivers a comprehensive technological and economic analysis of intelligent connectivity and the integration of...
INTELLIGENT SECURITY SYSTEMS Dramatically improve your cybersecurity using AI and machine learning In Intelligent Security Systems, distinguished professor and computer scientist Dr. Leon Reznik delivers an expert synthesis of artificial intelligence, machine learning...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers