Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 1-10 results of 9383

This Open Access proceedings presents new approaches to Machine Learning for Cyber Physical Systems, experiences and visions. It contains some selected papers from the international Conference ML4CPS – Machine Learning for Cyber Physical Systems, which was held in Karlsruhe, October 23-24, 2018.  Cyber Physical Systems are characterized by their ability to adapt and to learn: They analyze their environment and, based on... more...

Develop blockchain application with step-by-step instructions, working example and helpful recommendations Key Features Understanding the blockchain technology from the cybersecurity perspective Developing cyber security solutions with Ethereum blockchain technology Understanding real-world deployment of blockchain based applications Book Description Blockchain technology is being welcomed as one of the most... more...

The implementation of IPv6 is essential to the continued growth of the Internet and the development of new applications. The Handbook of IPv4 to IPv6 Transition Methodologies provides a wealth of best practices and procedures that will help corporations plan and implement a smooth transition to IPv6. A blueprint for successful transition, the Handbook of IPv4 to IPv6 Transition— Provides a tutorial of IPv6 addressing... more...

Provides comprehensive treatment of the theory of both static and dynamic neural networks.* Theoretical concepts are illustrated by reference to practical examples Includes end-of-chapter exercises and end-of-chapter exercises.*An Instructor Support FTP site is available from the Wiley editorial department.

Smart Cities and intelligence are among the most significant topics in IoT. Intelligence in communication and infrastructure implementation is at the heart of this concept, and its development is a key issue in smart cities. This book addresses the challenges in realizing intelligence in smart cities and sensing platforms in the era of cloud computing and IoT, varying from cost and energy efficiency to availability and service quality.... more...


Smart Antennas—State of the Art brings together the broad expertise of 41 European experts in smart antennas. They provide a comprehensive review and an extensive analysis of the recent progress and new results generated during the last years in almost all fields of smart antennas and MIMO (multiple-input multiple-output) transmission. The following represents a summarized table of content. Receiver: space-time processing, antenna combining,... more...

LINUX OPERATIONS AND ADMINISTRATION introduces readers to Linux operations and system administration through a unified installation, using virtual machines. This text is more effective than those that take a professional approach because it eliminates confusion from working with differing hardware configurations, while allowing users to test interoperability between Linux and Windows. Detailed, yet reader-friendly, Linux Operations and Administration... more...

One of the hottest topics in the telecommuncations industry today is the migration of voice traffic from the circuit switched Telco networks to packet switched networks such as IP, ATM, Frame Relay and access technologies such as DSL (Digital Subscriber Line) and Packet Cable. The sheer volume of voice traffic, together with the efficiencies of packet transport and the opportunity to offer new features on voice calls, has made internetworking, between... more...

Investigate, analyze, and report iOS, Android, and Windows devices Key Features Get hands-on experience in performing simple to complex mobile forensics techniques Retrieve and analyze data stored not only on mobile devices but also through the cloud and other connected mediums A practical guide to leveraging the power of mobile forensics on popular mobile platforms with lots of tips, tricks, and caveats Book... more...

Implementing Cisco IOS Network Security (IINS) is a Cisco-authorized, self-paced learning tool for CCNA® Security foundation learning. This book provides you with the knowledge needed to secure Cisco® routers and switches and their associated networks. By reading this book, you will gain a thorough understanding of how to troubleshoot and monitor network devices to maintain integrity, confidentiality, and availability of data and... more...