243,95 €
243,95 €
inkl. MwSt.
Sofort per Download lieferbar
243,95 €
243,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
Als Download kaufen
243,95 €
inkl. MwSt.
Sofort per Download lieferbar
Jetzt verschenken
243,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
  • Format: PDF

This volume contains ten chapters which present recent and future research concepts in computer science research. Chapter One presents new theorems for analysing digital logic gates. The second chapter reviews current work to postulate the future of intrusion detection systems in cloud computing. Chapter Three analyzes the storage structure and management of distributed ledger tecnohlogies in blockchain systems. Chapter Four reviews an experiment testing the bouncing phenomenon of sand particles on a membrane and how their random walk forms Chladni patterns. The fifth chapter discusses a…mehr

Produktbeschreibung
This volume contains ten chapters which present recent and future research concepts in computer science research. Chapter One presents new theorems for analysing digital logic gates. The second chapter reviews current work to postulate the future of intrusion detection systems in cloud computing. Chapter Three analyzes the storage structure and management of distributed ledger tecnohlogies in blockchain systems. Chapter Four reviews an experiment testing the bouncing phenomenon of sand particles on a membrane and how their random walk forms Chladni patterns. The fifth chapter discusses a robust model for the foraging of microorganisms by random walk patterns. Chapter Six presents research into the use of printed circuit board from a recycling based point of view. The seventh chapter is an introduction to sparse distributed representations in text data curation in the context of natural language processing (NLP). The eighth chapter reviews a wide ranging survey of research into intrusion detection systems in the Internet of Things (IoT) model of the world. Chapter Nine provides a far reaching review of modern issues in digital forensic processes in the environment of cloud computing. The tenth and final chapter uses a schema of hegemonic praxis to analyze issues of cyber warfare in the modern world.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.