"Models of Scenario Building and Planning offers a unique and innovative exploration of the scenario approach. Importance is given to the analysis of the competitors' behaviour. If Models of Scenario Building Planning (MSBP) is there to serve strategy, it should consider with the utmost care the interaction between the concerned company and its competitors as well as its possible consequences. …
This is the second volume in a trilogy on modern Signal Processing. The three books provide a concise exposition of signal processing topics, and a guide to support individual practical exploration based on MATLAB programs. This second book focuses on recent developments in response to the demands of new digital technologies. It is divided into two parts: the first part includes four chapters o…
pt. ONE ON VALUE ch. 1 Going All Out to Create Value 1.1.Managing human resources to create value 1.2.Source of value creation 1.3.Elements of value creation 1.4.Cultural factors that support value creation 1.5.Two wheels of value creation 1.6.Reducing reliance on three elements ch. 2 Objectively Assessing Value 2.1.Orientations and principles of value assessments 2.2.Method…
This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0. Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical …
This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threats and risks. Cyber security technologies discussed in this book are futuristic and current. Advanced security topics such as secure remote work, data security, n…
Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use. Each chapter of this book starts with an introduction to the concepts on which cryptographic algorithms are based and how they are used in practice, providing fully working examples for each of the algorithms presented. Implementation sections will guide you through the entire process of writing …
This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the l…
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey Features* Learn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptography* Explore vulnerability and new logical attacks on the most-used algorithms* Understand the practical implementation of …