You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Nowadays it is impossible to imagine a business without technology as most industries are becoming "smarter" and more tech-driven, ranging from small individual tech initiatives to complete business models with intertwined supply chains and "platform"-based business models. New ways of working, such as agile and DevOps, have been introduced, leading to new risks. These risks come in the form of new challenges for teams working together in a distributed manner, privacy concerns, human autonomy, and cybersecurity concerns. Technology is now integrated into the business discipline and is here to stay leading to the need for a thorough understanding of how to address these risks and all the pote...
This book is a collection of thoroughly well-researched studies presented at the Eighth Future Technologies Conference. This annual conference aims to seek submissions from the wide arena of studies like Computing, Communication, Machine Vision, Artificial Intelligence, Ambient Intelligence, Security, and e-Learning. With an impressive 490 paper submissions, FTC emerged as a hybrid event of unparalleled success, where visionary minds explored groundbreaking solutions to the most pressing challenges across diverse fields. These groundbreaking findings open a window for vital conversation on information technologies in our community especially to foster future collaboration with one another. We hope that the readers find this book interesting and inspiring and render their enthusiastic support toward it.
This book focuses on the core areas of computing and their applications in the real world. Presenting papers from the Computing Conference 2020 covers a diverse range of research areas, describing various detailed techniques that have been developed and implemented. The Computing Conference 2020, which provided a venue for academic and industry practitioners to share new ideas and development experiences, attracted a total of 514 submissions from pioneering academic researchers, scientists, industrial engineers and students from around the globe. Following a double-blind, peer-review process, 160 papers (including 15 poster papers) were selected to be included in these proceedings. Featuring state-of-the-art intelligent methods and techniques for solving real-world problems, the book is a valuable resource and will inspire further research and technological improvements in this important area.
description not available right now.
This book constitutes the proceedings of the 8th Enterprise Engineering Working Conference, EEWC 2018, held in Luxembourg, Luxembourg, in May/June 2018. EEWC aims at addressing the challenges that modern and complex enterprises are facing in a rapidly changing world. The participants of the working conference share a belief that dealing with these challenges requires rigorous and scientific solutions, focusing on the design and engineering of enterprises. The goal of EEWC is to stimulate interaction between the different stakeholders, scientists as well as practitioners, interested in making Enterprise Engineering a reality. The 9 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 24 submissions. They were organized in topical sections named: on architecture; on security and blockchain; on DEMO; and on teaching.
description not available right now.
The seventh Future Technologies Conference 2022 was organized in a hybrid mode. It received a total of 511 submissions from learned scholars, academicians, engineers, scientists and students across many countries. The papers included the wide arena of studies like Computing, Artificial Intelligence, Machine Vision, Ambient Intelligence and Security and their jaw- breaking application to the real world. After a double-blind peer review process 177 submissions have been selected to be included in these proceedings. One of the prominent contributions of this conference is the confluence of distinguished researchers who not only enthralled us by their priceless studies but also paved way for future area of research. The papers provide amicable solutions to many vexing problems across diverse fields. They also are a window to the future world which is completely governed by technology and its multiple applications. We hope that the readers find this volume interesting and inspiring and render their enthusiastic support towards it.
This book aims to provide an international forum for scholarly researchers, practitioners and academic communities to explore the role of information and communication technologies and its applications in technical and scholarly development. The conference attracted a total of 464 submissions, of which 152 submissions (including 4 poster papers) have been selected after a double-blind review process. Academic pioneering researchers, scientists, industrial engineers and students will find this series useful to gain insight into the current research and next-generation information science and communication technologies. This book discusses the aspects of communication, data science, ambient intelligence, networking, computing, security and Internet of things, from classical to intelligent scope. The authors hope that readers find the volume interesting and valuable; it gathers chapters addressing state-of-the-art intelligent methods and techniques for solving real-world problems along with a vision of the future research.
Over the years we’ve seen the digital security profession transformed into an overhyped and fuzzy domain that is often referred to as cybersecurity. Over the years we've seen the digital security profession transformed into an overhyped and fuzzy domain that is often referred to as cybersecurity. Since many authors have written a great deal on this subject in books, journals, and social media blogs, our aim here is to enrich this field with our opinions, -viewpoints, and expertise. Thanks to a combined total of forty-five years of experience - experience from our academic back grounds as well as from our work as security and tech leaders we are able to focus on things that should work in theory but fail in practice due to all kinds of intangible, "silent" factors. Our intention is not to be exhaustive, nor to criticize others, but to shed fresh light on crucial cyber-related allies, enemies, and issue that are rarely taken into account and talked about, but we believe you should know to help you combat the silent enemy of digital security.