Browse
Author profile
Load More
TRAINING MAJORS
- Khoa Điện - Tự động hóa (791)
- Khoa Công nghệ thông tin (480)
- Khoa Cơ khí (370)
- Khoa Dệt may và Thời Trang (158)
- Khoa Công nghệ thực phẩm (112)
Load More
Học liệu điện tử EBSCO
Browsing Học liệu điện tử EBSCO by Topic "Ngành Công nghệ kỹ thuật máy tính"
Now showing 1 - 24 of 54
Results Per Page
Sort Options
- PublicationAI and Blockchain Technology in 6G Wireless Network(Springer, 2022) Borah, Malaya Dutta; Singh, Pushpa; Deka, Ganesh ChandraThis book highlights future research directions and latent solutions by integrating AI and Blockchain 6G networks, comprising computation efficiency, algorithms robustness, hardware development and energy management. This book brings together leading researchers in Academia and industry from diverse backgrounds to deliver to the technical community an outline of emerging technologies, advanced architectures, challenges, open issues and future directions of 6G networks. This book is written for researchers, professionals and students to learn about the integration of technologies such as AI and Blockchain into 6G network and communications. This book addresses the topics such as consensus protocol, architecture, intelligent dynamic resource management, security and privacy in 6G to integrate AI and Blockchain and new real-time application with further research opportunities.
- PublicationAlgorithms For Big Data(World Scientific, 2020) Feldman, MoranThis unique volume is an introduction for computer scientists, including a formal study of theoretical algorithms for Big Data applications, which allows them to work on such algorithms in the future. It also serves as a useful reference guide for the general computer science population, providing a comprehensive overview of the fascinating world of such algorithms.To achieve these goals, the algorithmic results presented have been carefully chosen so that they demonstrate the important techniques and tools used in Big Data algorithms, and yet do not require tedious calculations or a very deep mathematical background.
- PublicationBig Data : Principles and Best Practices of Scalable Realtime Data Systems(Manning, 2015) Warren, James; Marz, NathanSummaryBig Data teaches you to build big data systems using an architecture that takes advantage of clustered hardware along with new tools designed specifically to capture and analyze web-scale data. It describes a scalable, easy-to-understand approach to big data systems that can be built and run by a small team. Following a realistic example, this book guides readers through the theory of big data systems, how to implement them in practice, and how to deploy and operate them once they're built.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the BookWeb-scale applications like social networks, real-time analytics, or e-commerce sites deal with a lot of data, whose volume and velocity exceed the limits of traditional database systems. These applications require architectures built around clusters of machines to store and process data of any size, or speed.
- PublicationBig Data For Dummies(For Dummies, 2013) Hurwitz, Judith S.; Nugent, Alan; Halper, Fern; Kaufman, MarciaFind the right big data solution for your business or organization Big data management is one of the major challenges facing business, industry, and not-for-profit organizations. Data sets such as customer transactions for a mega-retailer, weather patterns monitored by meteorologists, or social network activity can quickly outpace the capacity of traditional data management tools. If you need to develop or manage big data solutions, you'll appreciate how these four experts define, explain, and guide you through this new and often confusing concept. You'll learn what it is, why it matters, and how to choose and implement solutions that work. Effectively managing big data is an issue of growing importance to businesses, not-for-profit organizations, government, and IT professionals Authors are experts in information management, big data, and a variety of solutions Explains big data in detail and discusses how to select and implement a solution, security concerns to consider, data storage and presentation issues, analytics, and much more
- PublicationBlockchain Basics : A Non-Technical Introduction in 25 Steps(Apress, 2017) Drescher, DanielIn 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications.What You'll LearnWhat the blockchain isWhy it is needed and what problem it solves
- PublicationBlockchain Security From the Bottom Up : Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts(Wiley, 2022) Poston III, Howard E.The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant and educator Howard E. Poston delivers an authoritative exploration of blockchain and crypto cybersecurity. In the book, the author shows you exactly how cybersecurity should be baked into the blockchain at every layer of the technology's ecosystem. You'll discover how each layer can be attacked and learn how to prevent and respond to those attacks in an environment of constant technological change and evolution.
- PublicationCCFP Certified Cyber Forensics Professional All-in-One Exam Guide(McGraw Hill, 2015) Easttom, ChuckGet complete coverage of all six CCFP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. Written by a leading computer security expert, this authoritative guide fully addresses cyber forensics techniques, standards, technologies, and legal and ethical principles. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. COVERS ALL SIX EXAM DOMAINS: Legal and ethical principles Investigations Forensic science Digital forensics Application forensics Hybrid and emerging technologies ELECTRONIC CONTENT INCLUDES: 250 practice exam questions Test engine that provides full-length practice exams and customized quizzes by chapter or by exam domain
- PublicationCEH V11 : Certified Ethical Hacker Version 11 Practice Tests(Sybex, 2022) Messier, RicMaster CEH v11 and identify your weak spots CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence—and skills—you need to pass. These tests cover all section sections of the exam blueprint, allowing you to test your knowledge of Background, Analysis/Assessment, Security, Tools/Systems/Programs, Procedures/Methodology, Regulation/Policy, and Ethics.
- PublicationCEH V12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions(Sybex, 2023) Messier, RicThe latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test Questions Information security and personal privacy remains a growing concern for businesses in every sector. And even as the number of certifications increases, the Certified Ethical Hacker, Version 12 (CEH v12) maintains its place as one of the most sought-after and in-demand credentials in the industry. In CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions, you'll find a comprehensive overview of the CEH certification requirements.
- PublicationCHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide(McGraw Hill, 2015) Brooks, Charles L.An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-Council Get complete coverage of all the material included on version 8 of the EC-Council's Computer Hacking Forensic Investigator exam from this comprehensive resource. Written by an expert information security professional and educator, this authoritative guide addresses the tools and techniques required to successfully conduct a computer forensic investigation. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass this challenging exam, this definitive volume also serves as an essential on-the-job reference. CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide covers all exam topics.
- PublicationCircuits, Packets, and Protocols : Entrepreneurs and Computer Communications, 1968-1988(ACM Books, 2022) Pelkey, James L.; Russell, Andrew L.; Robbins, Loring G.As recently as 1968, computer scientists were uncertain how best to interconnect even two computers. The notion that within a few decades the challenge would be how to interconnect millions of computers around the globe was too far-fetched to contemplate. Yet, by 1988, that is precisely what was happening. The products and devices developed in the intervening years—such as modems, multiplexers, local area networks, and routers—became the linchpins of the global digital society. How did such revolutionary innovation occur? This book tells the story of the entrepreneurs who were able to harness and join two factors: the energy of computer science researchers supported by governments and universities, and the tremendous commercial demand for Internetworking computers.
- PublicationCloud Computing Basics : A Non-Technical Introduction(Apress, 2021) Lisdorf, AndersRegardless of where your organization is in your cloud journey, moving to the cloud is an inevitability in the coming years. The cloud is here to stay, and now is the best time to identify optimal strategies to harness the benefits and mitigate the risks. Cloud Computing Basics is the practical, accessible entry point you have been seeking.Get an introduction to the basics of cloud computing and all five major cloud platforms. Author Anders Lisdorf ensures that you gain a fundamental cloud vocabulary and learn how to translate industry terms used by different vendors. Leveraging the economic and security benefits that the cloud provides can look very different for each organization, and Lisdorf uses his expertise to help you adapt your strategy accordingly.
- PublicationComputer Security and Encryption : An Introduction(Mercury Learning & Information, 2020) Chauhan, S. R.; Jangra, S.Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. The first portion of the book presents the overall system security concepts and provides a general overview of its features, such as object model and inter-object communications. The objective is to provide an understanding of the cryptography underpinnings on which the rest of the book is based.
- PublicationData Mining : Practical Machine Learning Tools and Techniques(Morgan Kaufmann, 2017) Witten, Ian H.; Frank, Eibe; Hall, Mark A.; Pal, Christopher J.Data Mining: Practical Machine Learning Tools and Techniques, Fourth Edition, offers a thorough grounding in machine learning concepts, along with practical advice on applying these tools and techniques in real-world data mining situations. This highly anticipated fourth edition of the most acclaimed work on data mining and machine learning teaches readers everything they need to know to get going, from preparing inputs, interpreting outputs, evaluating results, to the algorithmic methods at the heart of successful data mining approaches. Extensive updates reflect the technical changes and modernizations that have taken place in the field since the last edition, including substantial new chapters on probabilistic methods and on deep learning.
- PublicationData Science and Big Data Analytics : Discovering, Analyzing, Visualizing and Presenting Data(Wiley, 2015) EMC Education ServicesData Science and Big Data Analytics is about harnessing the power of data for new insights. The book covers the breadth of activities and methods and tools that Data Scientists use. The content focuses on concepts, principles and practical applications that are applicable to any industry and technology environment, and the learning is supported and explained with examples that you can replicate using open-source software. This book will help you: Become a contributor on a data science team Deploy a structured lifecycle approach to data analytics problems Apply appropriate analytic techniques and tools to analyzing big data Learn how to tell a compelling story with data to drive business action Prepare for EMC Proven Professional Data Science Certification Get started discovering, analyzing, visualizing, and presenting data in a meaningful way today!
- PublicationData Warehousing For Dummies(Wiley Publishing, 2009) Hammergren, Thomas C.Data warehousing is one of the hottest business topics, and there's more to understanding data warehousing technologies than you might think. Find out the basics of data warehousing and how it facilitates data mining and business intelligence with Data Warehousing For Dummies, 2nd Edition. Data is probably your company's most important asset, so your data warehouse should serve your needs. The fully updated Second Edition of Data Warehousing For Dummies helps you understand, develop, implement, and use data warehouses, and offers a sneak peek into their future. You'll learn to: Analyze top-down and bottom-up data warehouse designs Understand the structure and technologies of data warehouses, operational data stores, and data marts Choose your project team and apply best development practices to your data warehousing projects Implement a data warehouse, step by step, and involve end-users in the process Review and upgrade existing data storage to make it serve your needs Comprehend OLAP, column-wise databases, hardware assisted databases, and middleware
- PublicationDeep Learning-Powered Technologies : Autonomous Driving, Artificial Intelligence of Things (AIoT), Augmented Reality, 5G Communications and Beyond(Springer, 2023) Mohamed, Khaled SalahThis book covers various, leading-edge deep learning technologies. The author discusses new applications of deep learning and gives insight into the integration of deep learning with various application domains, such as autonomous driving, augmented reality, AIOT, 5G and beyond.
- PublicationDigital Watermarking and Steganography : Fundamentals and Techniques, Second Edition(CRC Press, 2017) Shih, Frank Y.This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Multimedia security and steganography is especially relevant due to the global scale of digital multimedia and the rapid growth of the Internet. Digital watermarking technology can be used to guarantee authenticity and can be applied as proof that the content has not been altered since insertion. Updated techniques and advances in watermarking are explored in this new edition. The combinational spatial and frequency domains watermarking technique provides a new concept of enlarging the embedding capacity of watermarks. The genetic algorithm (GA) based watermarking technique solves the rounding error problem and provide an efficient embedding approach.
- PublicationEssentials of Python for Artificial Intelligence and Machine Learning(Springer, 2024) Gupta, Pramod; Bagchi, AnupamThis book introduces the essentials of Python for the emerging fields of Machine Learning (ML) and Artificial Intelligence (AI). The authors explore the use of Python's advanced module features and apply them in probability, statistical testing, signal processing, financial forecasting, and various other applications. This includes mathematical operations with array data structures, Data Manipulation, Data Cleaning, machine learning, Data pipeline, probability density functions, interpolation, visualization, and other high-performance benefits using the core scientific packages NumPy, Pandas, SciPy, Sklearn/Scikit learn and Matplotlib. Readers will gain a deep understanding with problem-solving experience on these powerful platforms when dealing with engineering and scientific problems related to Machine Learning and Artificial Intelligence.
- PublicationIntroduction to Network Simulator NS2(Springer, 2012) Issariyakul, Teerawat; Hossain, EkramIntroduction to Network Simulator NS2 is a primer providing materials for NS2 beginners, whether students, professors, or researchers for understanding the architecture of Network Simulator 2 (NS2) and for incorporating simulation modules into NS2. The authors discuss the simulation architecture and the key components of NS2 including simulation-related objects, network objects, packet-related objects, and helper objects. The NS2 modules included within are nodes, links, SimpleLink objects, packets, agents, and applications. Further, the book covers three helper modules: timers, random number generators, and error models.
- PublicationJava EE 8 Recipes : A Problem-Solution Approach(Apress, 2018) Juneau, JoshQuickly find solutions to dozens of common programming problems with the Java Enterprise Edition Platform for small business web applications, enterprise database applications, and microservices solutions. Content is presented in the popular problem-solution format. Look up the programming problem that you want to solve. Read the solution. Apply the solution directly in your own code. Problem solved!Java EE 8 Recipes provides you with effective and proven solutions that can be used to accomplish just about any task that you may encounter. You can feel confident using the reliable solutions that are demonstrated in this book in your personal or corporate environment.Java is a mature programming language that has been refined over the years into a productive and lucrative language for those with the skills to wield it.
- PublicationLearning SQL : Generate, Manipulate, and Retrieve Data(O'Reilly Media, 2020) Beaulieu, AlanAs data floods into your company, you need to put it to work right away—and SQL is the best tool for the job. With the latest edition of this introductory guide, author Alan Beaulieu helps developers get up to speed with SQL fundamentals for writing database applications, performing administrative tasks, and generating reports. You'll find new chapters on SQL and big data, analytic functions, and working with very large databases.Each chapter presents a self-contained lesson on a key SQL concept or technique using numerous illustrations and annotated examples. Exercises let you practice the skills you learn. Knowledge of SQL is a must for interacting with data.
- PublicationLearning Web Design : A Beginner's Guide to HTML, CSS, JavaScript, and Web Graphics(O'Reilly Media, 2018) Robbins, JenniferDo you want to build web pages but have no prior experience? This friendly guide is the perfect place to start. You'll begin at square one, learning how the web and web pages work, and then steadily build from there. By the end of the book, you'll have the skills to create a simple site with multicolumn pages that adapt for mobile devices.Each chapter provides exercises to help you learn various techniques and short quizzes to make sure you understand key concepts.This thoroughly revised edition is ideal for students and professionals of all backgrounds and skill levels. It is simple and clear enough for beginners, yet thorough enough to be a useful reference for experienced developers keeping their skills up to date.
- PublicationLimits of AI - Theoretical, Practical, Ethical(Springer, 2024) Mainzer, Klaus; Kahle, ReinhardArtificial intelligence is a key technology with great expectations in science, industry, and everyday life. This book discusses both the perspectives and the limitations of this technology. This concerns the practical, theoretical, and conceptual challenges that AI has to face. In an early phase of symbolic AI, AI focused on formal programs (e.g., expert systems), in which rule-based knowledge was processed with the help of symbolic logic. Today, AI is dominated by statistics-based machine learning methods and Big Data. While this sub-symbolic AI is extremely successful (e.g., chatbots like ChatGPT), it is often not transparent. The book argues for explainable and reliable AI, in which the logical and mathematical foundations of AI-algorithms become understandable and verifiable.