|
|
Books > Computing & IT > Computer communications & networking
Businesses have had to face many challenges due to the COVID-19
pandemic; to survive in the changing landscape, they had to adapt
quickly and implement new tactics and best practices to stay
competitive. Networking is one of the many areas that looks vastly
different in a post-pandemic world and companies must understand
this change or risk falling behind. Further study is required to
uncover the various difficulties and potential future directions of
networking and innovation within the business landscape. The
Handbook of Research on Digital Innovation and Networking in
Post-COVID-19 Organizations provides a thorough overview of the
ways in which organizations have had to change and adapt to the new
business environments and considers how networking looks different
in a post-COVID-19 world. Covering key topics such as
organizational structures, consumer behavior, teleworking, and
collaborations, this major reference work is ideal for managers,
business owners, industry professionals, policymakers, researchers,
scholars, academicians, practitioners, instructors, and students.
Computational Intelligence for Multimedia Big Data on the Cloud
with Engineering Applications covers timely topics, including the
neural network (NN), particle swarm optimization (PSO),
evolutionary algorithm (GA), fuzzy sets (FS) and rough sets (RS),
etc. Furthermore, the book highlights recent research on
representative techniques to elaborate how a data-centric system
formed a powerful platform for the processing of cloud hosted
multimedia big data and how it could be analyzed, processed and
characterized by CI. The book also provides a view on how
techniques in CI can offer solutions in modeling, relationship
pattern recognition, clustering and other problems in
bioengineering. It is written for domain experts and developers who
want to understand and explore the application of computational
intelligence aspects (opportunities and challenges) for design and
development of a data-centric system in the context of multimedia
cloud, big data era and its related applications, such as smarter
healthcare, homeland security, traffic control trading analysis and
telecom, etc. Researchers and PhD students exploring the
significance of data centric systems in the next paradigm of
computing will find this book extremely useful.
 |
Security of Networks and Services in an All-Connected World
- 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings
(Hardcover)
Daphne Tuncer, Robert Koch, Remi Badonnel
|
R1,344
Discovery Miles 13 440
|
Ships in 18 - 22 working days
|
|
|
Industrial internet of things (IIoT) is changing the face of
industry by completely redefining the way stakeholders,
enterprises, and machines connect and interact with each other in
the industrial digital ecosystem. Smart and connected factories, in
which all the machinery transmits real-time data, enable industrial
data analytics for improving operational efficiency, productivity,
and industrial processes, thus creating new business opportunities,
asset utilization, and connected services. IIoT leads factories to
step out of legacy environments and arcane processes towards open
digital industrial ecosystems. Innovations in the Industrial
Internet of Things (IIoT) and Smart Factory is a pivotal reference
source that discusses the development of models and algorithms for
predictive control of industrial operations and focuses on
optimization of industrial operational efficiency, rationalization,
automation, and maintenance. While highlighting topics such as
artificial intelligence, cyber security, and data collection, this
book is ideally designed for engineers, manufacturers,
industrialists, managers, IT consultants, practitioners, students,
researchers, and industrial industry professionals.
Society is continually transforming into a digitally powered
reality due to the increased dependence of computing technologies.
The landscape of cyber threats is constantly evolving because of
this, as hackers are finding improved methods of accessing
essential data. Analyzing the historical evolution of cyberattacks
can assist practitioners in predicting what future threats could be
on the horizon. Real-Time and Retrospective Analyses of Cyber
Security is a pivotal reference source that provides vital research
on studying the development of cybersecurity practices through
historical and sociological analyses. While highlighting topics
such as zero trust networks, geopolitical analysis, and cyber
warfare, this publication explores the evolution of cyber threats,
as well as improving security methods and their socio-technological
impact. This book is ideally designed for researchers,
policymakers, strategists, officials, developers, educators,
sociologists, and students seeking current research on the
evolution of cybersecurity methods through historical analysis and
future trends.
Technologies in today's society are rapidly developing at a pace
that is challenging to stay up to date with. As an increasing
number of global regions are implementing smart methods and
strategies for sustainable development, they are continually
searching for modern advancements within computer science, sensor
networks, software engineering, and smart technologies. A
compilation of research is needed that displays current
applications of computing methodologies in the progression of
global cities and how smart technologies are being utilized. Sensor
Network Methodologies for Smart Applications is a collection of
innovative research on the methods of intelligent systems and
technologies and their various applications within sustainable
development practices. While highlighting topics including machine
learning, network security, and optimization algorithms, this book
is ideally designed for researchers, scientists, developers,
programmers, engineers, educators, policymakers, geographers,
planners, and students seeking current research on smart
technologies and sensor networks.
Safety and security are crucial to the operations of nuclear power
plants, but cyber threats to these facilities are increasing
significantly. Instrumentation and control systems, which play a
vital role in the prevention of these incidents, have seen major
design modifications with the implementation of digital
technologies. Advanced computing systems are assisting in the
protection and safety of nuclear power plants; however, significant
research on these computational methods is deficient. Cyber
Security and Safety of Nuclear Power Plant Instrumentation and
Control Systems is a pivotal reference source that provides vital
research on the digital developments of instrumentation and control
systems for assuring the safety and security of nuclear power
plants. While highlighting topics such as accident monitoring
systems, classification measures, and UAV fleets, this publication
explores individual cases of security breaches as well as future
methods of practice. This book is ideally designed for engineers,
industry specialists, researchers, policymakers, scientists,
academicians, practitioners, and students involved in the
development and operation of instrumentation and control systems
for nuclear power plants, chemical and petrochemical industries,
transport, and medical equipment.
This book reviews the concept of Software-Defined Networking (SDN)
by studying the SDN architecture. It provides a detailed analysis
of state-of-the-art distributed SDN controller platforms by
assessing their advantages and drawbacks and classifying them in
novel ways according to various criteria. Additionally, a thorough
examination of the major challenges of existing distributed SDN
controllers is provided along with insights into emerging and
future trends in that area. Decentralization challenges in
large-scale networks are tackled using three novel approaches,
applied to the SDN control plane presented in the book. The first
approach addresses the SDN controller placement optimization
problem in large-scale IoT-like networks by proposing novel
scalability and reliability aware controller placement strategies.
The second and third approaches tackle the knowledge sharing
problem between the distributed controllers by suggesting adaptive
multilevel consistency models following the concept of continuous
Quorum-based consistency. These approaches have been validated
using different SDN applications, developed from real-world SDN
controllers.
Smart Cities Cybersecurity and Privacy examines the latest research
developments and their outcomes for safe, secure, and trusting
smart cities residents. Smart cities improve the quality of life of
citizens in their energy and water usage, healthcare, environmental
impact, transportation needs, and many other critical city
services. Recent advances in hardware and software, have fueled the
rapid growth and deployment of ubiquitous connectivity between a
city's physical and cyber components. This connectivity however
also opens up many security vulnerabilities that must be mitigated.
Smart Cities Cybersecurity and Privacy helps researchers,
engineers, and city planners develop adaptive, robust, scalable,
and reliable security and privacy smart city applications that can
mitigate the negative implications associated with cyber-attacks
and potential privacy invasion. It provides insights into
networking and security architectures, designs, and models for the
secure operation of smart city applications.
In today's modern age of information, new technologies are quickly
emerging and being deployed into the field of information
technology. Cloud computing is a tool that has proven to be a
versatile piece of software within IT. Unfortunately, the high
usage of Cloud has raised many concerns related to privacy,
security, and data protection that have prevented cloud computing
solutions from becoming the prevalent alternative for mission
critical systems. Up-to-date research and current techniques are
needed to help solve these vulnerabilities in cloud computing.
Modern Principles, Practices, and Algorithms for Cloud Security is
a pivotal reference source that provides vital research on the
application of privacy and security in cloud computing. While
highlighting topics such as chaos theory, soft computing, and cloud
forensics, this publication explores present techniques and
methodologies, as well as current trends in cloud protection. This
book is ideally designed for IT specialists, scientists, software
developers, security analysts, computer engineers, academicians,
researchers, and students seeking current research on the defense
of cloud services.
Cyber-attacks are rapidly becoming one of the most prevalent issues
globally, and as they continue to escalate, it is imperative to
explore new approaches and technologies that help ensure the
security of the online community. Beyond cyber-attacks, personal
information is now routinely and exclusively housed in cloud-based
systems. The rising use of information technologies requires
stronger information security and system procedures to reduce the
risk of information breaches. Advanced Methodologies and
Technologies in System Security, Information Privacy, and Forensics
presents emerging research and methods on preventing information
breaches and further securing system networks. While highlighting
the rising concerns in information privacy and system security,
this book explores the cutting-edge methods combatting digital
risks and cyber threats. This book is an important resource for
information technology professionals, cybercrime researchers,
network analysts, government agencies, business professionals,
academicians, and practitioners seeking the most up-to-date
information and methodologies on cybercrime, digital terrorism,
network security, and information technology ethics.
SECURITY AND PRIVACY VISION IN 6G Prepare for the future of mobile
communication with this comprehensive study 6G is the next frontier
in mobile communication, with development of 6G standards slated to
begin as early as 2026. As telecommunications networks become
faster and more intelligent, security and privacy concerns are
critical. In an increasingly connected world, there is an urgent
need for user data to be safeguarded and system security enhanced
against a new generation of threats. Security and Privacy Vision in
6G provides a comprehensive survey of these threats and the
emerging techniques for safeguarding against them. It includes
mechanisms for prediction, detection, mitigation, and prevention,
such that threats to privacy and security can be forestalled at any
stage. Fully engaged with proposed 6G architectures, it is an
essential resource for mobile communications professionals looking
for a head start on the technology of the future. Security and
Privacy Vision in 6G readers will also find: Detailed coverage of
topics including edge intelligence and cloudification, industrial
automation, collaborative robots, and more Treatment balancing the
practical and the theoretical An editorial team with decades of
international network technology experience in both industry and
academia Security and Privacy Vision in 6G is a vital reference for
network security professionals and for postgraduate and advanced
undergraduate students in mobile communications and network
security-related fields.
As a result of its widespread implementation in economic and social
structures, the network concept appears to be a paradigm of the
contemporary world. The need for various services - transport,
energy, consumption of manufacturing goods, provision of care,
information and communication, etc. - draws users into interwoven
networks which are meshes of material and immaterial flows. In this
context, the user is a consumer of goods and services from
industries and administrations, or they themselves are part of the
organization (digital social networks). This book examines the
invariants that unify networks in their diversity, as well as the
specificities that differentiate them. It provides a reading grid
that distinguishes a generic level where these systems find a
common interpretation, and a specific level where appropriate
analytical methods are used. Three case studies from different
fields are presented to illustrate the purpose of the book in
detail.
|
You may like...
The Wish
Nicholas Sparks
Paperback
R383
Discovery Miles 3 830
Crooked Seeds
Karen Jennings
Paperback
R340
R314
Discovery Miles 3 140
|