In diesem Open-Access-Buch stehen die wirtschaftliche Verwertung von Daten und die dazu gehörenden technischen und organisatorischen Prozesse und Strukturen in Unternehmen im Fokus. Es behandelt Themen wie Datenmonetarisierung, Datenverträge, Data Governance, Informationssicherheit, Datenschutz und die Vertrauenswürdigkeit von Daten. Seit Jahren wird davon gesprochen, dass „Daten das …
In diesem Open-Access-Buch stehen die wirtschaftliche Verwertung von Daten und die dazu gehörenden technischen und organisatorischen Prozesse und Strukturen in Unternehmen im Fokus. Es behandelt Themen wie Datenmonetarisierung, Datenverträge, Data Governance, Informationssicherheit, Datenschutz und die Vertrauenswürdigkeit von Daten.
This open-access book aims to highlight the coming surge of 5G network-based applications and predicts that the centralized networks and their current capacity will be incapable of meeting the demands. The book emphasizes the benefits and challenges associated with the integration of 5G networks with varied applications. Further, the book gathers and investigates the most recent 5G-based resear…
This book presents the state-of-the-art in supercomputer simulation. It includes the latest findings from leading researchers using systems from the High Performance Computing Center Stuttgart (HLRS). The reports cover all fields of computational science and engineering ranging from CFD to computational physics and from chemistry to computer science with a special emphasis on industrially relev…
From the Foreword:'John Anderson's book represents a milestone in aviation literature. For the first time aviation enthusiasts - both specialists and popular readers alike - possess an authoritative history of aerodynamic theory. Not only is this study authoritative, it is also highly readable and linked to the actual (and more familiar) story of how the airplane evolved. The book touches on al…
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…
Tunnelling has become a fragmented process, excessively influenced by lawyers'notions of confrontational contractual bases. This prevents the pooling of skills, essential to the achievement of the promoters' objectives. Tunnelling: Management by Design seeks the reversal of this trend. After a brief historical treatment of selected developments, th
This book discusses a broad range of cyber security issues, addressing global concerns regarding cyber security in the modern era. The growth of Information and Communication Technology (ICT) and the prevalence of mobile devices make cyber security a highly topical and relevant issue. The transition from 4G to 5G mobile communication, while bringing convenience, also means cyber threats are gro…
This book presents the fundamental concepts, recent advancements, and opportunities for future research in various key enabling technologies in next-generation wireless communications. The book serves as a comprehensive source of information in all areas of wireless communications with a particular emphasis on physical (PHY) layer techniques related to 5G wireless systems and beyond. In particu…
This book provides a broad understanding of the fundamental tools and methods from information theory and mathematical programming, as well as specific applications in 6G and beyond system designs. The contents focus on not only both theories but also their intersection in 6G. Motivations are from the multitude of new developments which will arise once 6G systems integrate new communication net…