Configuring an anomaly-based Network Intrusion Detection System for cybersecurity of an industrial system in the absence of information on networking infrastructure and programmed deterministic industrial process is challenging. Within the research…
This open access book presents thirteen outstanding doctoral dissertations in Information Technology from the Department of Electronics, Information and Bioengineering, Politecnico di Milano, Italy. Information Technology has always been highly…
This book offers insights on politics and ethics of representation that are relevant to researchers concerned with struggles for justice. It takes moments of discomfort in the qualitative research process as important sites of knowledge for exploring…
Almost all aspects of the historian's research workflow have been transformed by digital technology. The Transformation of Historical Research in the Digital Age equips historians to be self-conscious practitioners by making these shifts explicit and…