Title: Unleashing the Power of Blockchain and IoT for Water Informatics, Author: Sur Singh Rawat
Title: Transforming Healthcare: Mode, Technologies, and Implementation, Author: Ankush Jain
Title: The Smart Life Revolution: Embracing AI and IoT in Society, Author: Connie Tee
Title: The Semantic Web: 22nd European Semantic Web Conference, ESWC 2025, Portoroz, Slovenia, June 1-5, 2025, Proceedings, Part I, Author: Edward Curry
Title: The De Gruyter Handbook on Law and Digital Technologies, Author: Massimo Durante
Title: The Computer Security Workbook: A Course Companion Resource, Author: Juan Tapiador
Title: The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership, Author: Walt Powell
Explore Series
Title: The AI Music Problem: Why Machine Learning Conflicts With Musical Creativity, Author: Christopher W. White
Title: Systematic Security: A CISO's Playbook, Author: Timur Qader
Title: System Programming in Linux: A Hands-On Introduction, Author: Stewart Weiss
Title: Symbolic Mathematics with Python, Author: Hugo D. Junghenn
Title: Sustainable Dual-Track Development: The Future of Software Engineering for Co-located, Remote, and Hybrid Teams, Author: Todd Sedano
Title: Sustainable Blind Quantum Computing, Author: Srinjoy Ganguly
Title: Structural Information and Communication Complexity: 32nd International Colloquium, SIROCCO 2025, Delphi, Greece, June 2-4, 2025, Proceedings, Author: Ulrich Schmid
Title: Society 5.0: A Transformation towards Human-Centered Artificial Intelligence, Author: Biswaranjan Acharya
Title: Smarter Cyber Physical Systems: Enabling Methodologies and Applications, Author: Yan Wan
Title: Simulating the Brain: A Four-Step Method Using Ordinary Differential Equations and Python, Author: Daniele Caligiore
Title: Security Technologies for Law Enforcement Agencies, Author: Kazim Duraklar
Title: Security and Privacy: 3rd International Conference, ICSP 2024, Jamshedpur, India, November 20-21, 2024, Proceedings, Author: Sihem Mesnager
Title: Secure Online Voting Using Biometric Authentication and Public Key Encryption, Author: Ajish S

Pagination Links