Ahmed Banafa
Quantum Computing and Other Transformative Technologies (eBook, ePUB)
109,95 €
109,95 €
inkl. MwSt.
Sofort per Download lieferbar
55 °P sammeln
109,95 €
Als Download kaufen
109,95 €
inkl. MwSt.
Sofort per Download lieferbar
55 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
109,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
55 °P sammeln
Ahmed Banafa
Quantum Computing and Other Transformative Technologies (eBook, ePUB)
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. It also explains the concept of dark, small, thick data, and clarifies what the concept of a data lake.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 22MB
Andere Kunden interessierten sich auch für
- Ahmed BanafaQuantum Computing and Other Transformative Technologies (eBook, PDF)109,95 €
- High Performance Embedded Computing (eBook, ePUB)0,99 €
- Ahmed BanafaBlockchain Technology and Applications (eBook, ePUB)91,95 €
- Antoni GobeoGDPR and Cyber Security for Business Information Systems (eBook, ePUB)64,95 €
- Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing (eBook, ePUB)0,99 €
- Hongjian SunBlockchain and Artificial Intelligence Technologies for Smart Energy Systems (eBook, ePUB)52,95 €
- Sergei PetrenkoDeveloping a Cybersecurity Immune System for Industry 4.0 (eBook, ePUB)100,95 €
-
-
-
This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. It also explains the concept of dark, small, thick data, and clarifies what the concept of a data lake.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 285
- Erscheinungstermin: 17. März 2023
- Englisch
- ISBN-13: 9781000797480
- Artikelnr.: 67297477
- Verlag: Taylor & Francis
- Seitenzahl: 285
- Erscheinungstermin: 17. März 2023
- Englisch
- ISBN-13: 9781000797480
- Artikelnr.: 67297477
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Ahmed Banafa, Professor, Award Winning Author, Technology Expert and International Keynote Speaker, has extensive experience in research, operations and management, with a focus on IoT, blockchain, cybersecurity and AI. He is the recipient of a Certificate of Honor from the City and County of San Francisco and the Author & Artist Award 2019 of San Jose State University. He was named as number 1 tech voice to follow, technology fortune teller and influencer by LinkedIn in 2018, his research has featured in Forbes, IEEE and MIT Technology Review, and he has been interviewed by ABC, CBS, NBC, CNN, BBC, NPR and Fox. He is a member of the MIT Technology Review Global Panel. He is the author of the book Secure and Smart Internet of Things (IoT) using Blockchain and Artificial Intelligence (AI) which won 3 awards, the San Jose State University Author and Artist Award, One of the Best Technology eBooks of all Time Award, and One of the Best AI Models Books of All Time Award. His second book was Blockchain Technology and Applications used at Stanford University and other prestigious schools in the USA. He studied Electrical Engineering at Lehigh University, Cybersecurity at Harvard University and Digital Transformation at Massachusetts Institute of Technology (MIT).
Part 1: Quantum Computing 1. What is Quantum Computing 2. Quantum
Cryptography 3. Quantum Internet 4. Quantum Teleportation 5. Quantum
Computing and IoT 6. Quantum Computing and Blockchain: Myths and Facts 7.
Quantum Computing and AI: A Mega-Buzzword 8. Quantum Computing Trends Part
2: Other Computing Technologies 9. What is Deep Learning? 10. Affective
Computing 11. Autonomic Computing Part 3: Big Data, Dark Data, Thick Data,
and Small Data 12. Thick Data vs. Big Data 13. Understanding Dark Data 14.
Small Data vs. Big Data: Back to the Basics 15. What is a Data Lake? Part
4: Cloud Computing 16. Edge Computing Paradigm 17. The Internet of
Everything 18. Content Delivery Networks - CDNs 19. Network Functions
Virtualization (NFV) or Software-Defined Networking (SDN)? 20. What is
Virtualization? 21. Risks of Cloud Computing Explained (Both Sides) 22.
Cloud-of-Clouds or (Intercloud) 23. Myths and Facts About Cloud Computing
Part 5: Security 24. Zero-Day Vulnerability and Heuristic Analysis 25. The
Zero Trust Model 26. Cloud Computing Security 27. First Line of Defense for
Cybersecurity: AI 28. Second Line of Defense for Cybersecurity: Blockchain
29. Network Security Needs Big Data Part 6: Blockchain 30. Blockchain
Technology and COVID-19 31. How Blockchain is Revolutionizing Crowdfunding
32. Blockchain Technology and Supply Chain Management Part 7: IoT 33. IoT
and COVID-19 34. IoT and 5G Convergence Part 8: Wearable and Mobile
Technology 35. The Smart Platform: Wearable Computing Devices (WCD) 36.
Your Smart Device Will Feel Your Pain and Fear 37. Technology Under Your
Skin: Three Challenges of Microchip Implants Part 9: Future Trends in
Technology 38. The Metaverse: A Different Perspective 39. The Metaverse:
Myths and Facts 40. Eight Key Tech Trends in a Post-COVID-19 World
Cryptography 3. Quantum Internet 4. Quantum Teleportation 5. Quantum
Computing and IoT 6. Quantum Computing and Blockchain: Myths and Facts 7.
Quantum Computing and AI: A Mega-Buzzword 8. Quantum Computing Trends Part
2: Other Computing Technologies 9. What is Deep Learning? 10. Affective
Computing 11. Autonomic Computing Part 3: Big Data, Dark Data, Thick Data,
and Small Data 12. Thick Data vs. Big Data 13. Understanding Dark Data 14.
Small Data vs. Big Data: Back to the Basics 15. What is a Data Lake? Part
4: Cloud Computing 16. Edge Computing Paradigm 17. The Internet of
Everything 18. Content Delivery Networks - CDNs 19. Network Functions
Virtualization (NFV) or Software-Defined Networking (SDN)? 20. What is
Virtualization? 21. Risks of Cloud Computing Explained (Both Sides) 22.
Cloud-of-Clouds or (Intercloud) 23. Myths and Facts About Cloud Computing
Part 5: Security 24. Zero-Day Vulnerability and Heuristic Analysis 25. The
Zero Trust Model 26. Cloud Computing Security 27. First Line of Defense for
Cybersecurity: AI 28. Second Line of Defense for Cybersecurity: Blockchain
29. Network Security Needs Big Data Part 6: Blockchain 30. Blockchain
Technology and COVID-19 31. How Blockchain is Revolutionizing Crowdfunding
32. Blockchain Technology and Supply Chain Management Part 7: IoT 33. IoT
and COVID-19 34. IoT and 5G Convergence Part 8: Wearable and Mobile
Technology 35. The Smart Platform: Wearable Computing Devices (WCD) 36.
Your Smart Device Will Feel Your Pain and Fear 37. Technology Under Your
Skin: Three Challenges of Microchip Implants Part 9: Future Trends in
Technology 38. The Metaverse: A Different Perspective 39. The Metaverse:
Myths and Facts 40. Eight Key Tech Trends in a Post-COVID-19 World
Part 1: Quantum Computing 1. What is Quantum Computing 2. Quantum
Cryptography 3. Quantum Internet 4. Quantum Teleportation 5. Quantum
Computing and IoT 6. Quantum Computing and Blockchain: Myths and Facts 7.
Quantum Computing and AI: A Mega-Buzzword 8. Quantum Computing Trends Part
2: Other Computing Technologies 9. What is Deep Learning? 10. Affective
Computing 11. Autonomic Computing Part 3: Big Data, Dark Data, Thick Data,
and Small Data 12. Thick Data vs. Big Data 13. Understanding Dark Data 14.
Small Data vs. Big Data: Back to the Basics 15. What is a Data Lake? Part
4: Cloud Computing 16. Edge Computing Paradigm 17. The Internet of
Everything 18. Content Delivery Networks - CDNs 19. Network Functions
Virtualization (NFV) or Software-Defined Networking (SDN)? 20. What is
Virtualization? 21. Risks of Cloud Computing Explained (Both Sides) 22.
Cloud-of-Clouds or (Intercloud) 23. Myths and Facts About Cloud Computing
Part 5: Security 24. Zero-Day Vulnerability and Heuristic Analysis 25. The
Zero Trust Model 26. Cloud Computing Security 27. First Line of Defense for
Cybersecurity: AI 28. Second Line of Defense for Cybersecurity: Blockchain
29. Network Security Needs Big Data Part 6: Blockchain 30. Blockchain
Technology and COVID-19 31. How Blockchain is Revolutionizing Crowdfunding
32. Blockchain Technology and Supply Chain Management Part 7: IoT 33. IoT
and COVID-19 34. IoT and 5G Convergence Part 8: Wearable and Mobile
Technology 35. The Smart Platform: Wearable Computing Devices (WCD) 36.
Your Smart Device Will Feel Your Pain and Fear 37. Technology Under Your
Skin: Three Challenges of Microchip Implants Part 9: Future Trends in
Technology 38. The Metaverse: A Different Perspective 39. The Metaverse:
Myths and Facts 40. Eight Key Tech Trends in a Post-COVID-19 World
Cryptography 3. Quantum Internet 4. Quantum Teleportation 5. Quantum
Computing and IoT 6. Quantum Computing and Blockchain: Myths and Facts 7.
Quantum Computing and AI: A Mega-Buzzword 8. Quantum Computing Trends Part
2: Other Computing Technologies 9. What is Deep Learning? 10. Affective
Computing 11. Autonomic Computing Part 3: Big Data, Dark Data, Thick Data,
and Small Data 12. Thick Data vs. Big Data 13. Understanding Dark Data 14.
Small Data vs. Big Data: Back to the Basics 15. What is a Data Lake? Part
4: Cloud Computing 16. Edge Computing Paradigm 17. The Internet of
Everything 18. Content Delivery Networks - CDNs 19. Network Functions
Virtualization (NFV) or Software-Defined Networking (SDN)? 20. What is
Virtualization? 21. Risks of Cloud Computing Explained (Both Sides) 22.
Cloud-of-Clouds or (Intercloud) 23. Myths and Facts About Cloud Computing
Part 5: Security 24. Zero-Day Vulnerability and Heuristic Analysis 25. The
Zero Trust Model 26. Cloud Computing Security 27. First Line of Defense for
Cybersecurity: AI 28. Second Line of Defense for Cybersecurity: Blockchain
29. Network Security Needs Big Data Part 6: Blockchain 30. Blockchain
Technology and COVID-19 31. How Blockchain is Revolutionizing Crowdfunding
32. Blockchain Technology and Supply Chain Management Part 7: IoT 33. IoT
and COVID-19 34. IoT and 5G Convergence Part 8: Wearable and Mobile
Technology 35. The Smart Platform: Wearable Computing Devices (WCD) 36.
Your Smart Device Will Feel Your Pain and Fear 37. Technology Under Your
Skin: Three Challenges of Microchip Implants Part 9: Future Trends in
Technology 38. The Metaverse: A Different Perspective 39. The Metaverse:
Myths and Facts 40. Eight Key Tech Trends in a Post-COVID-19 World