Chronologie aller Bände (1 - 19)
Die Reihenfolge beginnt mit dem eBook "The First Line of Code". Wer alle eBookz der Reihe nach lesen möchte, sollte mit diesem Band von Sukanta Kumar Sabut beginnen. Der zweite Teil der Reihe "Ubiquitous Security" ist am 25.02.2022 erschienen. Mit insgesamt 19 Bänden wurde die Reihe über einen Zeitraum von ungefähr 5 Jahren fortgesetzt. Der neueste Band trägt den Titel "Python Programming".
- Anzahl der Bewertungen für die gesamte Reihe: 0
- Ø Bewertung der Reihe: 0
- Start der Reihe: 02.04.2021
- Neueste Folge: 17.08.2026
Diese Reihenfolge enthält 16 unterschiedliche Autoren.
- Autor: Guo, Lin
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 27.05.2022
- Genre: Sachbuch
The First Line of Code
· Android part covers all the important aspects of the Android platform, such as activity, service, content provider, broadcast receiver, fragment, basic UI, data storage, network, Jetpack and other application-level knowledge.
· Kotlin part covers various aspects of Kotlin, such as standard grammar, common skills, higher-order functions, generics, coroutines, DSL and other language-level knowledge.
In addition, The First Line of Code is a very practicing book, illustrating concepts with a complete weather forecast program. You can use and practice all the knowledge comprehensively after learning and see the actual result for what you have learned through the book.
All contents of the book are quite easy to understand. It might be a good choice for both beginners and experienced developers. Also suitable for college students, college teachers, etc.
- Autor: Dounas, Theodoros
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 20.09.2022
- Genre: Sonstiges
Blockchain for Construction
This book highlights the design, use and structure of blockchain systems and decentralized ledger technologies (B/DLT) for use in the construction industry. Construction remains a fragmented change-resistant industry with chronic problems of underproductivity and a very low digitization factor compared to other fields. In parallel, the convergence, embedding and coordination of digital technologies in the physical world provides a unique opportunity for the construction industry to leap ahead and adopt fourth industrial revolution technologies. Within this context, B/DLT are an excellent fit for the digitization of the construction industry. B/DLT are effective in this as they organize and align digital and physical supply chains, produce stigmergic coordination out of decentralization, enable the governance of complex projects for multiple stakeholders, while enabling the creation of a new class of business models and legal instruments for construction.
- Autor: Li, Zhenhua
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 11.02.2023
- Genre: Sachbuch
Content Distribution for Mobile Internet: A Cloud-based Approach
Content distribution, i.e., distributing digital content from one node to another node or multiple nodes, is the most fundamental function of the Internet. Since Amazon’s launch of EC2 in 2006 and Apple’s release of the iPhone in 2007, Internet content distribution has shown a strong trend toward polarization. On the one hand, considerable investments have been made in creating heavyweight, integrated data centers (“heavy-cloud”) all over the world, in order to achieve economies of scale and high flexibility/efficiency of content distribution. On the other hand, end-user devices (“light-end”) have become increasingly lightweight, mobile and heterogeneous, creating new demands concerning traffic usage, energy consumption, bandwidth, latency, reliability, and/or the security of content distribution. Based on comprehensive real-world measurements at scale, we observe that existing content distribution techniques often perform poorly under the abovementioned new circumstances.
Motivated by the trend of “heavy-cloud vs. light-end,” this book is dedicated to uncovering the root causes of today’s mobile networking problems and designing innovative cloud-based solutions to practically address such problems. Our work has produced not only academic papers published in prestigious conference proceedings like SIGCOMM, NSDI, MobiCom and MobiSys, but also concrete effects on industrial systems such as Xiaomi Mobile, MIUI OS, Tencent App Store, Baidu PhoneGuard, and WiFi.com. A series of practical takeaways and easy-to-follow testimonials are provided to researchers and practitioners working in mobile networking and cloud computing. In addition, we have released as much code and data used in our research as possible to benefit the community.
- Autor: Niu, Weina
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 23.05.2024
- Genre: Sonstiges
Android Malware Detection and Adversarial Methods
The rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on users by employing various tactics, including deception, personal information theft, and device control. To address this issue, both academia and industry are continually engaged in research and development efforts focused on detecting and countering Android malware.
This book is a comprehensive academic monograph crafted against this backdrop. The publication meticulously explores the background, methods, adversarial approaches, and future trends related to Android malware. It is organized into four parts: the overview of Android malware detection, the general Android malware detection method, the adversarial method for Android malware detection, and the future trends of Android malware detection. Within these sections, the book elucidates associated issues, principles, and highlights notable research.By engaging with this book, readers will gain not only a global perspective on Android malware detection and adversarial methods but also a detailed understanding of the taxonomy and general methods outlined in each part. The publication illustrates both the overarching model and representative academic work, facilitating a profound comprehension of Android malware detection.- Autor: Panichella, Sebastiano
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 13.12.2025
- Genre: Sonstiges
- Autor: Gohil, Bhavesh N.
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 18.12.2025
- Genre: Sonstiges
Information Security, Privacy and Digital Forensics
This volume contains the selected proceedings of the International Conference on Information Security, Privacy, and Digital Forensics (ICISPD 2023). The content highlights novel contributions and recent developments in areas such as cyber-attacks and defenses, computer forensics, cybersecurity database forensics, cyber threat intelligence, data analytics for security, anonymity, penetration testing, incident response, Internet of Things security, malware and botnets, social media security, humanitarian forensics, software and media piracy, crime analysis, and hardware security, among others. This volume will serve as a valuable resource for researchers in both industry and academia who are working in the fields of security, privacy, and digital forensics from both technological and social perspectives.
- Autor: Puthal, Deepak
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 20.12.2025
- Genre: Sonstiges
Synergies in Data Analytics and Cyber Security
This book presents the select proceedings of the 7th International Conference on Data Analytics and Cyber Security (DACS 2024). It covers distinct features of various data analytics, cyber security, and synergies in data analytics and cyber security to resolve physical world problems. The book will be useful for researchers and professionals interested in the broad field of cyber security.
- Autor: Okoye, Kingsley
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: Digital
- Veröffentlicht: 17.08.2026
- Genre: Sonstiges
Python Programming
This book is written for programmers, software developers, managers, data analysts, researchers, teachers, students, professionals, and general consumers on how to solve real-life process problems and challenges through cutting-edge technologies, done by development and mastery of programming and data manipulation skills in Python. These days, “Computer Intelligence,” which refers to the ability of a computer to learn a specific task from data or experimental observation, has become a field and technique that can be used to critically analyze data (quantitative and qualitative information) derived from the various processes of different organizations. This can be used to facilitate decision-making by applying ground-breaking and cutting-edge technological tools such as mathematical reasoning, programming techniques, and statistical methods. This book covers the design of programming logic for the understanding of information flows, while building databases to solve various process and organizational problems through the combination of Computer programming and Process modelling techniques. It describes the specific design processes, flowchart, and algorithms that model real-life situations and translate them into technological applications that improve and innovate everyday processes. The main topics covered include the analysis of information flows, designs processes, and algorithms that model real-world process and situations, import and export of data from one platform to another, and the analysis and manipulation of data to support decision-making and digital transformation, in general. For all intents and purposes, this book serves as both textbook and guideline for Python users particularly for solving everyday process or problems. Resourcefully, encompassing different examples of everyday process and case studies, the envisioned subcompetencies and mastery level skills aimed to be developed by the readers and audience of this book using Python include:
• Computational resolution of simulated real processes using different examples and case studies
• Flow chart modeling and IPO (input, process, output) diagrams
• Code optimization and proper program execution
• Information flow in simulated process management
• Search and analysis tools, e.g., descriptive statistics
• Programming-based real-life solutions and decision making
• Modelling of real situations and professional activities through algorithmic reasoning, data manipulations, and visualizations that can be applied to any typical real-life process management.
- Band: 728
- Autor: Sabut, Sukanta Kumar
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 02.04.2021
- Genre: Sonstiges
Proceedings of International Conference on Communication, Circuits, and Systems
- Band: 1544
- Autor: You, Ilsun
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 22.01.2022
- Genre: Krimi
Mobile Internet Security
The 28 revised full papers presented were carefully reviewed and selected from 66 submissions. The papers are organized in the topical sections: IoT and cyber security; blockchain security; digital forensic and malware analysis; 5G virtual Infrastructure, cryptography and network security.
- Band: 1557
- Autor: Wang, Guojun
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 25.02.2022
- Genre: Krimi
Ubiquitous Security
The presented 26 full papers and 2 short papers were thoroughly reviewed and selected from the 96 submissions. They focus on security, privacy and anonymity aspects in cyberspace, physical world, and social networks.
- Band: 1644
- Autor: You, Ilsun
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 19.07.2023
- Genre: Krimi
Mobile Internet Security
The 24 full papers included in this book were carefully reviewed and selected from 60 submissions. They were organized in topical sections as follows: 5G advanced and 6G security; AI for security; cryptography and data security; cyber security; and IoT application and blockchain security.
- Band: 1804
- Autor: Prabhu, Srikanth
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 19.06.2023
- Genre: Krimi
Applications and Techniques in Information Security
The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies.
- Band: 2004
- Autor: Shao, Jun
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 03.01.2024
- Genre: Krimi
Emerging Information Security and Applications
The 11 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. The topics of the book are related but not limited to cyber intelligence techniques, multimedia security, blockchain and distributed ledger technology, malware and unwanted software, vulnerability analysis and reverse engineering, usable security and privacy, intrusion detection and prevention, authentication and access control, anonymity and privacy, cryptographic protection, digital forensics, cyber physical systems security, adversarial learning, security measurement, security management and policies, hardware and physical security.
- Band: 14341
- Autor: Meng, Weizhi
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 22.11.2023
- Genre: Krimi
Information Security Practice and Experience
The 27 full papers and 8 short papers included in this volume were carefully reviewed and selected from 80 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
- Band: 14426
- Autor: Liu, Qingshan
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 23.12.2023
- Genre: Sonstiges
Pattern Recognition and Computer Vision
The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2023, held in Xiamen, China, during October 13–15, 2023.
The 532 full papers presented in these volumes were selected from 1420 submissions. The papers have been organized in the following topical sections: Action Recognition, Multi-Modal Information Processing, 3D Vision and Reconstruction, Character Recognition, Fundamental Theory of Computer Vision, Machine Learning, Vision Problems in Robotics, Autonomous Driving, Pattern Classification and Cluster Analysis, Performance Evaluation and Benchmarks, Remote Sensing Image Interpretation, Biometric Recognition, Face Recognition and Pose Recognition, Structural Pattern Recognition, Computational Photography, Sensing and Display Technology, Video Analysis and Understanding, Vision Applications and Systems, Document Analysis and Recognition, Feature Extraction and Feature Selection, Multimedia Analysis and Reasoning, Optimization and Learning methods, Neural Network and Deep Learning, Low-Level Vision and Image Processing, Object Detection, Tracking and Identification, Medical Image Processing and Analysis.
- Band: 14430
- Autor: Liu, Qingshan
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 25.12.2023
- Genre: Sonstiges
Pattern Recognition and Computer Vision
The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2023, held in Xiamen, China, during October 13–15, 2023.
The 532 full papers presented in these volumes were selected from 1420 submissions. The papers have been organized in the following topical sections: Action Recognition, Multi-Modal Information Processing, 3D Vision and Reconstruction, Character Recognition, Fundamental Theory of Computer Vision, Machine Learning, Vision Problems in Robotics, Autonomous Driving, Pattern Classification and Cluster Analysis, Performance Evaluation and Benchmarks, Remote Sensing Image Interpretation, Biometric Recognition, Face Recognition and Pose Recognition, Structural Pattern Recognition, Computational Photography, Sensing and Display Technology, Video Analysis and Understanding, Vision Applications and Systems, Document Analysis and Recognition, Feature Extraction and Feature Selection, Multimedia Analysis and Reasoning, Optimization and Learning methods, Neural Network and Deep Learning, Low-Level Vision and Image Processing, Object Detection, Tracking and Identification, Medical Image Processing and Analysis.
- Band: 14431
- Autor: Liu, Qingshan
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 24.12.2023
- Genre: Sonstiges
Pattern Recognition and Computer Vision
The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2023, held in Xiamen, China, during October 13–15, 2023.
The 532 full papers presented in these volumes were selected from 1420 submissions. The papers have been organized in the following topical sections: Action Recognition, Multi-Modal Information Processing, 3D Vision and Reconstruction, Character Recognition, Fundamental Theory of Computer Vision, Machine Learning, Vision Problems in Robotics, Autonomous Driving, Pattern Classification and Cluster Analysis, Performance Evaluation and Benchmarks, Remote Sensing Image Interpretation, Biometric Recognition, Face Recognition and Pose Recognition, Structural Pattern Recognition, Computational Photography, Sensing and Display Technology, Video Analysis and Understanding, Vision Applications and Systems, Document Analysis and Recognition, Feature Extraction and Feature Selection, Multimedia Analysis and Reasoning, Optimization and Learning methods, Neural Network and Deep Learning, Low-Level Vision and Image Processing, Object Detection, Tracking and Identification, Medical Image Processing and Analysis.
- Band: 14440
- Autor: Guo, Jian
- Anzahl Bewertungen: 0
- Ø Bewertung:
- Medium: E-Book
- Veröffentlicht: 17.12.2023
- Genre: Sonstiges
Advances in Cryptology – ASIACRYPT 2023
The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows:
Part I: Secure Multi-party computation; threshold cryptography; .
Part II: proof systems - succinctness and foundations; anonymity;
Part III: quantum cryptanalysis; symmetric-key cryptanalysis;
Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model;
Part V: functional encryption, commitments and proofs; secure messaging and broadcast;
Part VI: homomorphic encryption; encryption with special functionalities; security proofs andsecurity models;
Part VII: post-quantum cryptography;
Part VIII: quantum cryptography; key exchange; symmetric-key design.


















