Personnaliser

OK

Information Technology - New Generations -

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre
Aucun vendeur ne propose ce produit

Soyez informé(e) par e-mail dès l'arrivée de cet article

Créer une alerte prix
Publicité
 
Vous avez choisi le retrait chez le vendeur à
  • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
  • Récupérez le produit directement chez le vendeur
  • Rakuten vous rembourse en cas de problème

Gratuit et sans engagement

Félicitations !

Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

En savoir plus

Retour

Horaires

      Note :


      Avis sur Information Technology - New Generations Format Broché  - Livre Littérature Générale

      Note : 0 0 avis sur Information Technology - New Generations Format Broché  - Livre Littérature Générale

      Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


      Présentation Information Technology - New Generations Format Broché

       - Livre Littérature Générale

      Livre Littérature Générale - 01/01/2019 - Broché - Langue : Anglais

      . .

    • Editeur : Springer International Publishing Ag
    • Langue : Anglais
    • Parution : 01/01/2019
    • Format : Moyen, de 350g à 1kg
    • Nombre de pages : 840
    • Expédition : 2004
    • Dimensions : 27.9 x 21.0 x 4.5
    • ISBN : 9783030083526



    • Résumé :
      Part I Cybersecurity.- Safeguarding Personal Health Information: Case Study.- Cybersecurity as People Powered Perpetual Innovation.- Performance Study of the Impact of Security on 802.11ac Networks.- Training Neural Tensor Networks with the Never Ending Language Learner.- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework.- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan.- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network.- A Virtual Animated Commentator Architecture for Cybersecurity Competitions.- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features.- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach).- A Self Proxy Signature Scheme over NTRU Lattices.- Towards an Ontology of Security Assessment: a core model proposal.- Integration of Mobile Forensic Tool Capabilities.- Deep Packet Inspection: A Key Issue for Network Security.- What Petya/NotPetya Ransomware is and What its Remidiations are.- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform.- New Techniques for Public Key Encryption with Sender Recovery.- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa.- Protecting Personal Data with Blockchain Technology.- The Role of CAE-CDE in Cybersecurity Education for Workforce Development.- Software Optimizations for DES.- Part II Networking and Wireless Communications.- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment.- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks.- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges.- A Dual canister medicine IoT Dispenser.- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks.- Denial of service attacks inwireless sensor networks with proposed countermeasures.- Part III Education and Technology.- Internet-Based Education: A New Milestone for Formal Language and Automata Courses.- Teaching Communication Management in Software Projects through Serious Educational Games.- Gamification applied in the teaching of agile Scrum methodology.- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework .- Part IV Agile Software Testing and Development.- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects.- Alignment of Requirements and Testing in Agile: an Industrial Experience.- Health Care Information Systems: A Crisis Approach.- Using Correct-by-Construction Software Agile Development.- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services .- Improving Agile Software Development with Domain Ontologies.- A Stratified Sampling Algorithmfor Artificial Neural Networks.- Part V Data Mining/Machine Learning.- Mining ENADE Data from the Ulbra Network Institution.- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA).- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise.- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets.- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series.- DeRis: Information system supporting the prediction of default risk in companies.- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm.- Pattern Recognition for Time Ser...

      Biographie:

      Shahram Latifi, PhD, P.E., is Professor of Electrical and Computer Engineering and?Co-director of Center for Information Technology, College of Engineering at the University of Nevada, Las Vegas

      Sommaire:

      Shahram Latifi, PhD, P.E., is Professor of Electrical and Computer Engineering and?Co-director of Center for Information Technology, College of Engineering at the University of Nevada, Las Vegas

      ...

      Le choixNeuf et occasion
      Minimum5% remboursés
      La sécuritéSatisfait ou remboursé
      Le service clientsÀ votre écoute
      LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
      visavisa
      mastercardmastercard
      klarnaklarna
      paypalpaypal
      floafloa
      americanexpressamericanexpress
      Rakuten Logo
      • Rakuten Kobo
      • Rakuten TV
      • Rakuten Viber
      • Rakuten Viki
      • Plus de services
      • À propos de Rakuten
      Rakuten.com