And those examples are barely the tip of the iceberg. As with major paradigm shifts that preceded it, blockchain technology will create winners and losers. This book shines a light on where it can lead us in the next decade and beyond.
Since the early 1980s, a prominent and consistent conclusion drawn from research on China's defense-industrial complex has been that China's defense-production capabilities are rife with weaknesses and limitations.
This third edition has added the section "Ransomware threat detection", where we describe a ransomware attack scenario within an environment to leverage IBM Spectrum Scale File Audit logs integration with IBM QRadar.
In the tradition of international bestsellers, Future Shock and Megatrends, Michael J. Saylor, CEO of MicroStrategy, brings TheMobile Wave, a ground-breaking analysis of the impact of mobile intelligence -- the fifth wave of computer ...
A riveting, behind-the-scenes account of the near collapse of the Ford Motor Company, which in 2008 was close to bankruptcy, and CEO Alan Mulally's hard-fought effort and bold plan--including his decision not to take federal bailout money- ...
This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental ...