Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
Since the invention of computers or machines, scientists and researchers are trying very hard to enhance their capabilities to perform various tasks. As a consequence, the capabilities of computers are growing exponentially day by day in terms of diverse working domains, versatile jobs, processing speed, and reduced size. Now, we are in the race to make the computers or machines as intelligent as human beings. Artificial Intelligence (AI) came up as a way of making a computer or computer software think in the similar manner the intelligent humans think. AI is inspired by the study of human brain like how humans think, learn, decide and act while trying to solve a problem. The outcomes of this study are the basis of developing intelligent software and systems or Intelligent Computing (IC). An IC system has the capability of reasoning, learning, problem solving, perception, and linguistic intelligence. The IC systems consist of AI techniques as well as other emerging techniques that make a system intelligent. The use of intelligent computing has been seen in almost every sub-domain of computer science such as networking, software engineering, gaming, natural language processing, computer vision, image processing, data science, robotics, expert systems, and security. Now a days, the use of IC can also be seen for solving various complex problems in diverse domains such as for predicting disease in medical science, predicting land fertility or crop productivity in agriculture science, predicting market growth in economics, weather forecasting and so on. For all these reasons, this book presents the advances in AI techniques, under the umbrella of IC. In this context, the book includes the recent research works have been done in the areas of machine learning, neural networks, deep learning, evolutionary algorithms, genetic algorithms, swarm intelligence, fuzzy systems and so on. This book provides theoretical, algorithmic, simulation, and implementation-based recent research advancements related to the Intelligent Computing.
Expert advice from several industrial professionals who have worked for some of the world's biggest tech and interactive companies. Best practices that not only prepare writers on how to apply their craft to new fields, but also prepare them for the common ambiguity they will find in corporate and start-up environments. Breakdown of platforms that shows how tech capabilities can fulfill content expectations and how content can fulfill tech expectations. Basic storytelling mechanics customized to today's popular technologies and traditional gaming platforms.
Includes case studies illustrating the business processes that underlines the use of big data and health analytics to improve healthcare delivery Discusses AI based smart paradigms for reliable predictions of infectious disease dynamics which can help or prevent disease transmission Highlights the different aspects of using extended reality for diverse healthcare applications and aggregates the current state of research Offers intelligent models of the smart recommender system for personal well-being services and computer-aided drug discovery and design methods Presents novel innovative techniques for extracting user social behavior known as sentiment analysis for healthcare related purposes
The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises' advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today's age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.
The book emphasizes the predictive models of Big Data, Genetic Algorithm, and IoT with a case study. The book illustrates the predictive models with integrated fuel consumption models for smart and safe traveling. The text is a coordinated amalgamation of research contributions and industrial applications in the field of Intelligent Transportation Systems. The advanced predictive models and research results were achieved with the case studies, deployed in real transportation environments. Features: Provides a smart traffic congestion avoidance system with an integrated fuel consumption model. Predicts traffic in short-term and regular. This is illustrated with a case study. Efficient Traffic light controller and deviation system in accordance with the traffic scenario. IoT based Intelligent Transport Systems in a Global perspective. Intelligent Traffic Light Control System and Ambulance Control System. Provides a predictive framework that can handle the traffic on abnormal days, such as weekends, festival holidays. Bunch of solutions and ideas for smart traffic development in smart cities. This book focuses on advanced predictive models along with offering an efficient solution for smart traffic management system. This book will give a brief idea of the available algorithms/techniques of big data, IoT, and genetic algorithm and guides in developing a solution for smart city applications. This book will be a complete framework for ITS domain with the advanced concepts of Big Data Analytics, Genetic Algorithm and IoT. This book is primarily aimed at IT professionals. Undergraduates, graduates and researchers in the area of computer science and information technology will also find this book useful.
This reference text presents the usage of artificial intelligence in healthcare and discusses the challenges and solutions of using advanced techniques like wearable technologies and image processing in the sector. Features: Focuses on the use of artificial intelligence (AI) in healthcare with issues, applications, and prospects Presents the application of artificial intelligence in medical imaging, fractionalization of early lung tumour detection using a low intricacy approach, etc Discusses an artificial intelligence perspective on wearable technology Analyses cardiac dynamics and assessment of arrhythmia by classifying heartbeat using electrocardiogram (ECG) Elaborates machine learning models for early diagnosis of depressive mental affliction This book serves as a reference for students and researchers analyzing healthcare data. It can also be used by graduate and post graduate students as an elective course.
The book describes state-of-the-art advances in simulators and emulators for quantum computing. It introduces the main concepts of quantum computing, defining q-bits, explaining the parallelism behind any quantum computation, describing measurement of the quantum state of information and explaining the process of quantum bit entanglement, collapsed state and cloning. The book reviews the concept of quantum unitary, binary and ternary quantum operators as well as the computation implied by each operator. It provides details of the quantum processor, providing its architecture, which is validated via execution simulation of some quantum instructions.
The insertion of communication networks in feedback control loops complicates analysis and synthesis of cyber-physical systems (CPSs), and network-induced uncertainties may degrade system control performance. Thus, this book researches networked delay compensation and event-triggered control approaches for a series of CPSs subject to network-induced uncertainties. The authors begin with an introduction to the concepts and challenges of CPSs, followed by an overview of networked control approaches and event-triggered control strategies in CPSs. Then, networked delay compensation and event-triggered control approaches are proposed for CPSs with network communication delay, data dropout, signal quantization, and event-triggered communication. More specifically, networked delay compensation approaches are proposed for linear/nonlinear networked controlled plants with time-varying and random network communication delays and data dropouts. To reduce computational burden and network communication loads in CPSs, event-triggered control, self-triggered control, co-design of event-triggered control and quantized control techniques, and event-triggered disturbance rejection control approaches are also presented. This book is an essential text for researchers and engineers interested in cybersecurity, networked control, and CPSs. It would also prove useful for graduate students in the fields of science, engineering, and computer science.
In this book, fundamental theories and engineering designs of NOMA are organically blended, with comprehensive performance evaluations from both link level and system level simulations.
Unique selling point: * Brings together insights on various fields, and how IoT and AI combined can help bring about sustainable living Core audience: * Researchers and academics - worldwide applicability Place in the market: * Gives a more comprehensive overview of the potential applications of IoT and AI for sustainability than other books on the market
This book cover wireless communication, security issues, advanced wireless sensor networks, routing protocols of WSNs with cross-layer solutions, emerging trends in the advanced WSNs, power management, distributed sensing and data gathering techniques for WSNs, WSNs Security, applications, research of advanced WSNs with simulation results, and simulation tools for WSNs. Features: Covers technologies supporting advanced wireless communication system, sensor networks and the conceptual development of the subject. Discusses advanced data gathering and sharing/ distributed sensing techniques with its business applicability. Includes numerous worked-out mathematical equations/formulas, and essential principles including figures, illustrations, algorithms, and flow charts are included in the book. Provides pervasive background knowledge including both wireless communications and wireless sensor networks Covers wireless networks as well as sensor network models in detailed. This is aimed at graduate students, researchers and academicians working in the field of computer science, wireless communication technology, and advanced wireless sensor networks.
The Reference Model of Open Distributed Processing (RM-ODP) is an international standard that provides a solid basis for describing and building widely distributed systems and applications in a systematic way. It stresses the need to build these systems with evolution in mind by identifying the concerns of major stakeholders and then expressing the design as a series of linked viewpoints. Although RM-ODP has been a standard for more than ten years, many practitioners are still unaware of it. Building Enterprise Systems with ODP: An Introduction to Open Distributed Processing offers a gentle pathway to the essential ideas that constitute ODP and shows how these ideas can be applied when designing and building challenging systems. It provides an accessible introduction to the design principles for software engineers and enterprise architects. The book also explains the benefits of using viewpoints to produce simpler and more flexible designs and how ODP can be applied to service engineering, open enterprise, and cloud computing. The authors include guidelines for using the Unified Modeling Language (TM) (UML) notation and for structuring and writing system specifications. They elucidate how this fits into the model-driven engineering tool chain via approaches, such as Model-Driven Architecture (R) (MDA). They also demonstrate the power of RM-ODP for the design and organization of complex distributed IT systems in e-government, e-health, and energy and transportation industries. All concepts and ideas in the book are illustrated through a single running example that describes the IT support needed by a medium-sized company as it grows and develops. Complete UML models and more are available at http://theodpbook.lcc.uma.es/
The Architectural Imagination at the Digital Turn asks what it means to speak of a "digital turn" in architecture. It examines how architects at the time engaged with the digital and imagined future modes of practice, and looks at the technological, conceptual and economic phenomena behind this engagement. It argues that the adoption of digital technology in architecture was far from linear but depended on complex factors, from the operative logic of the technology itself to the context in which it was used and the people who interacted with it. Creating a mosaic-like account, the book presents debates, projects and publications that changed how architecture was visualized, fabricated and experienced using digital technology. Spanning the university, new media art institutes, ecologies, architectural bodies, fabrication and the city, it re-evaluates familiar narratives that emphasized formal explorations; instead, the book aims to complicate the "myth" of the digital by presenting a nuanced analysis of the material and social context behind each case study. During the 1990s, architects repurposed software and technological concepts from other disciplines and tested them in a design environment. Some architects were fascinated by its effects, others were more critical. Through its discussion on case studies, places and themes that fundamentally influenced discourse formation in the era, this book offers scholars, researchers and students fresh insights into how architecture can engage with the digital realm today.
This book looks at relationships between the organisation of physical objects in space and the organisation of ideas. Historical, philosophical, psychological and architectural knowledge are united to develop an understanding of the relationship between information and its representation. Despite its potential to break the mould, digital information has relied on metaphors from a pre-digital era. In particular, architectural ideas have pervaded discussions of digital information, from the urbanisation of cyberspace in science fiction, through to the adoption of spatial visualisations in the design of graphical user interfaces. This book tackles: * the historical importance of physical places to the organisation and expression of knowledge * the limitations of using the physical organisation of objects as the basis for systems of categorisation and taxonomy * the emergence of digital technologies and the 20th century new conceptual understandings of knowledge and its organisation * the concept of disconnecting storage of information objects from their presentation and retrieval * ideas surrounding semantic space' * the realities of the types of user interface which now dominate modern computing.
Discusses the requirements and establishment of a layered protocol architecture. Highlights the importance of cable media in getting a high-speed network. Covers the fundamental concepts and advanced topics such as metro ethernet, and ethernet first mile in the field of networking. Presents important topics such as multiprotocol label switching, cloud computing in networking, and the internet of things. Explores the necessity of software-defined networking and network functions virtualization.
Unique selling point: * Systematically introduces the basic knowledge and state-of-the-art on UDHNs Core audience: * Researchers, engineers and postgraduates working on UDHNs Place in the market: * Includes the latest case studies and applications
A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.
* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.
In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing, detecting, characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students, faculty, research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics, including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems
Why learn functional programming? Isn't that some complicated ivory-tower technique used only in obscure languages like Haskell? In fact, functional programming is actually very simple. It's also very powerful, as Haskell demonstrates by throwing away all the conventional programming tools and using only functional programming features. But it doesn't have to be done that way. Functional programming is a power tool that you can use in addition to all your usual tools, to whatever extent your current mainstream language supports it. Most languages have at least basic support. In this book we use Python and Java and, as a bonus, Scala. If you prefer another language, there will be minor differences in syntax, but the concepts are the same. Give functional programming a try. You may be surprised how much a single power tool can help you in your day-to-day programming.
The Internet of Things (IoT) is an interconnection of several devices, networks, technologies, and human resources to achieve a common goal. A variety of IoT-based applications are being used in different sectors and have succeeded in providing huge benefits to the users. As a revolution, IoT overtook the entire global landscape with its presence in almost every sector, including smart cities, smart grid, intelligent transportation, healthcare, education, and so on. This technological revolution also moved to the machines, converting them into intelligent computers that can make real-time decisions and communicate with each other, forming an Internet of Systems/Machines. The use of secure light-weight protocols will help us in developing environment-friendly and energy-efficient IoT systems. IoT is an emerging and recent area of research, adopted for many applications, and there is a need to investigate further challenges in all aspects of it. This book will provide information on fundamentals, architectures, communication protocols, use of AI, existing applications, and emerging research trends in IoT. It follows a theoretical approach to describe the fundamentals for beginners as well as a practical approach with the implementation of case studies for intermediate and advanced readers. The book will be beneficial for academicians, researchers, developers, and engineers who work in or are interested in fields related to IoT. This book serves as a reference for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.
Google's Programmable Search Engines (PSEs, previously called Custom Search Engines) provide search opportunities that are unavailable with any other tool. PSEs have advanced settings and search operators that are not supported by "regular" Google. With PSEs, it is possible to perform filtered searches within parts of the web as if they were databases! While lots of professionals use existing PSEs to source for talent or with other research goals, few people have experience creating them. Even fewer know about powerful PSE-only search operators. The main reason PSEs are not as popular as they should be is that it is not easy to get educated on PSE creation. There is little information online and no books (other than this one) on the subject. Even less info is available on the "structured" operators that allow for filtered searches. The first of its kind, this book hopes to popularize these fun and powerful tools so that many more people can include PSEs in their work. Key Features: A detailed introduction to creating PSEs, including info absent in Google's help A "hack" for creating PSEs that look for profiles in seconds An introduction to advanced PSE-only search operators allowed to perform filtered searches of parts of the web A "hack" for expanding Google's search limits to 500 terms Use cases, examples, and approaches that would be educational for those doing online research This book will be of interest to researchers, OSINT specialists, investigative journalists, Competitive Intelligence people, recruiters, and Sourcers, to name a few categories, and to the general public interested in how to search better.
i. This book will contain AI, ML, DL, big data and security never before considered ii. Innovative artificial intelligence techniques and algorithms iii. Only emerging from recent research and development, e.g. AI for big data from security perspective, which are not covered in any existing texts iv. Artificial Intelligence for big data and security Applications with advanced features v. Key new finding of machine learning and deep learning for Security Applications
1. Covers latest concepts in intelligent analytics for industry 4.0. 2. Presents the applications of intelligent analytics for various industry 4.0 domains. 3. Covers latest research topics in the field. 4. Written in a comprehensive and simple manner. 5. The text is accompanied by tables and illustrative figures for better understanding of the topic. |
You may like...
Empowered or Left Behind - Use of…
DeeDee M. Bennett Gayle, Xiaojun (Jenny) Yuan
Hardcover
R1,420
Discovery Miles 14 200
Edge-AI in Healthcare - Trends and…
Sonali Vyas, Akanksha Upadhyaya, …
Hardcover
R2,593
Discovery Miles 25 930
SRv6 Network Programming - Ushering in a…
Zhenbin Li, Zhibo Hu, …
Hardcover
R3,876
Discovery Miles 38 760
Cloud-based Multi-Modal Information…
Srinidhi Hiriyannaiah, Siddesh G.M., …
Hardcover
R2,678
Discovery Miles 26 780
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson
Paperback
R1,394
Discovery Miles 13 940
The Adventurous and Practical Journey to…
FANAP Studies & Research Center
Hardcover
R2,971
Discovery Miles 29 710
Understanding Computers - Today and…
Charles Parker, Deborah Morley
Paperback
|