Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation.
Offers a comprehensive guide to sparsity methods for systems and control, from standard sparsity methods in finite-dimensional vector spaces to optimal control methods in infinite-dimensional function spaces.The primary objective of this book is to show how to use sparsity methods for several engineering problems.
Presents integrated (cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, the book introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies.
Introduces a set of novel risk assessment techniques and their role in the IoT security risk management process. Specifically, the book presents architectures and platforms for end-to-end security, including their implementation based on the edge/fog computing paradigm.
The SpiNNaker project has delivered the world's largest neuromorphic computing platform incorporating over a million ARM mobile phone processors and capable of modelling spiking neural networks of the scale of a mouse brain in biological real time. This books tells the story of the origins of the machine, its development and its deployment.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.