|
|
Books > Computing & IT > Computer communications & networking
In today's modern age of information, new technologies are quickly
emerging and being deployed into the field of information
technology. Cloud computing is a tool that has proven to be a
versatile piece of software within IT. Unfortunately, the high
usage of Cloud has raised many concerns related to privacy,
security, and data protection that have prevented cloud computing
solutions from becoming the prevalent alternative for mission
critical systems. Up-to-date research and current techniques are
needed to help solve these vulnerabilities in cloud computing.
Modern Principles, Practices, and Algorithms for Cloud Security is
a pivotal reference source that provides vital research on the
application of privacy and security in cloud computing. While
highlighting topics such as chaos theory, soft computing, and cloud
forensics, this publication explores present techniques and
methodologies, as well as current trends in cloud protection. This
book is ideally designed for IT specialists, scientists, software
developers, security analysts, computer engineers, academicians,
researchers, and students seeking current research on the defense
of cloud services.
Cyber-attacks are rapidly becoming one of the most prevalent issues
globally, and as they continue to escalate, it is imperative to
explore new approaches and technologies that help ensure the
security of the online community. Beyond cyber-attacks, personal
information is now routinely and exclusively housed in cloud-based
systems. The rising use of information technologies requires
stronger information security and system procedures to reduce the
risk of information breaches. Advanced Methodologies and
Technologies in System Security, Information Privacy, and Forensics
presents emerging research and methods on preventing information
breaches and further securing system networks. While highlighting
the rising concerns in information privacy and system security,
this book explores the cutting-edge methods combatting digital
risks and cyber threats. This book is an important resource for
information technology professionals, cybercrime researchers,
network analysts, government agencies, business professionals,
academicians, and practitioners seeking the most up-to-date
information and methodologies on cybercrime, digital terrorism,
network security, and information technology ethics.
SECURITY AND PRIVACY VISION IN 6G Prepare for the future of mobile
communication with this comprehensive study 6G is the next frontier
in mobile communication, with development of 6G standards slated to
begin as early as 2026. As telecommunications networks become
faster and more intelligent, security and privacy concerns are
critical. In an increasingly connected world, there is an urgent
need for user data to be safeguarded and system security enhanced
against a new generation of threats. Security and Privacy Vision in
6G provides a comprehensive survey of these threats and the
emerging techniques for safeguarding against them. It includes
mechanisms for prediction, detection, mitigation, and prevention,
such that threats to privacy and security can be forestalled at any
stage. Fully engaged with proposed 6G architectures, it is an
essential resource for mobile communications professionals looking
for a head start on the technology of the future. Security and
Privacy Vision in 6G readers will also find: Detailed coverage of
topics including edge intelligence and cloudification, industrial
automation, collaborative robots, and more Treatment balancing the
practical and the theoretical An editorial team with decades of
international network technology experience in both industry and
academia Security and Privacy Vision in 6G is a vital reference for
network security professionals and for postgraduate and advanced
undergraduate students in mobile communications and network
security-related fields.
Wireless sensor networks have gained significant attention
industrially and academically due to their wide range of uses in
various fields. Because of their vast amount of applications,
wireless sensor networks are vulnerable to a variety of security
attacks. The protection of wireless sensor networks remains a
challenge due to their resource-constrained nature, which is why
researchers have begun applying several branches of artificial
intelligence to advance the security of these networks. Research is
needed on the development of security practices in wireless sensor
networks by using smart technologies. Deep Learning Strategies for
Security Enhancement in Wireless Sensor Networks provides emerging
research exploring the theoretical and practical advancements of
security protocols in wireless sensor networks using artificial
intelligence-based techniques. Featuring coverage on a broad range
of topics such as clustering protocols, intrusion detection, and
energy harvesting, this book is ideally designed for researchers,
developers, IT professionals, educators, policymakers,
practitioners, scientists, theorists, engineers, academicians, and
students seeking current research on integrating intelligent
techniques into sensor networks for more reliable security
practices.
Interest in developing smart cities has grown exponentially over
the years with many governments across the world hoping to initiate
these projects in their own countries. One of the key challenges
for the success of any smart city project is the assurance of smart
security and privacy of the citizens. Due to the use of a wide
range of interconnected cyber-physical systems, traditional
security solutions cannot be applied to smart city applications,
and new practices must be sought. Secure Cyber-Physical Systems for
Smart Cities is an essential reference publication that examines
information security and privacy in smart city settings including
discussions on new security frameworks, solutions, cybersecurity
laws and regulations, and risk management frameworks for smart city
environments. Covering a wide range of topics including wireless
networks, security, and cyber-physical systems, this book is
ideally designed for IT specialists and consultants, engineers,
government officials, policymakers, researchers, academicians, and
industry professionals.
Data Communications and Networking, 6th Edition, teaches the
principles of networking using TCP/IP protocol suite. It employs a
bottom-up approach where each layer in the TCP/IP protocol suite is
built on the services provided by the layer below. This edition has
undergone a major restructuring to reduce the number of chapters
and focus on the organization of TCP/IP protocol suite. It
concludes with three chapters that explore multimedia, network
management, and cryptography/network security. Technologies related
to data communications and networking are among the fastest growing
in our culture today, and there is no better guide to this rapidly
expanding field than Data Communications and Networking.
With the internet of things (IoT), it is proven that enormous
networks can be created to interconnect objects and facilitate
daily life in a variety of domains. Research is needed to study how
these improvements can be applied in different ways, using
different technologies, and through the creation of different
applications. IoT Protocols and Applications for Improving
Industry, Environment, and Society contains the latest research on
the most important areas and challenges in the internet of things
and its intersection with technologies and tools such as artificial
intelligence, blockchain, model-driven engineering, and cloud
computing. The book covers subfields that examine smart homes,
smart towns, smart earth, and the industrial internet of things in
order to improve daily life, protect the environment, and create
safer and easier jobs. While covering a range of topics within IoT
including Industry 4.0, security, and privacy, this book is ideal
for computer scientists, engineers, practitioners, stakeholders,
researchers, academicians, and students who are interested in the
latest applications of IoT.
As technology continues to expand and develop, the internet of
things (IoT) is playing a progressive role in the infrastructure of
electronics. The increasing amount of IoT devices, however, has led
to the emergence of significant privacy and security challenges.
Security and Privacy Issues in Sensor Networks and IoT is a
collection of innovative research on the methods and applications
of protection disputes in the internet of things and other
computing structures. While highlighting topics that include cyber
defense, digital forensics, and intrusion detection, this book is
ideally designed for security analysts, IT specialists, software
developers, computer engineers, industry professionals,
academicians, students, and researchers seeking current research on
defense concerns in cyber physical systems.
In the world of mathematics and computer science, technological
advancements are constantly being researched and applied to ongoing
issues. Setbacks in social networking, engineering, and automation
are themes that affect everyday life, and researchers have been
looking for new techniques in which to solve these challenges.
Graph theory is a widely studied topic that is now being applied to
real-life problems. Advanced Applications of Graph Theory in Modern
Society is an essential reference source that discusses recent
developments on graph theory, as well as its representation in
social networks, artificial neural networks, and many complex
networks. The book aims to study results that are useful in the
fields of robotics and machine learning and will examine different
engineering issues that are closely related to fuzzy graph theory.
Featuring research on topics such as artificial neural systems and
robotics, this book is ideally designed for mathematicians,
research scholars, practitioners, professionals, engineers, and
students seeking an innovative overview of graphic theory.
In this day of frequent acquisitions and perpetual application
integrations, systems are often an amalgamation of multiple
programming languages and runtime platforms using new and legacy
content. Systems of such mixed origins are increasingly vulnerable
to defects and subversion.
System Assurance: Beyond Detecting Vulnerabilities addresses
these critical issues. As a practical resource for security
analysts and engineers tasked with system assurance, the book
teaches you how to use the Object Management Group s (OMG)
expertise and unique standards to obtain accurate knowledge about
your existing software and compose objective metrics for system
assurance. OMG s Assurance Ecosystem provides a common framework
for discovering, integrating, analyzing, and distributing facts
about your existing enterprise software. Its foundation is the
standard protocol for exchanging system facts, defined as the OMG
Knowledge Discovery Metamodel (KDM). In addition, the Semantics of
Business Vocabularies and Business Rules (SBVR) defines a standard
protocol for exchanging security policy rules and assurance
patterns. Using these standards together, you will learn how to
leverage the knowledge of the cybersecurity community and bring
automation to protect your system.
Provides end-to-end methodology for systematic, repeatable, and
affordable System Assurance.Includes an overview of OMG Software
Assurance Ecosystem protocols that integrate risk, architecture and
code analysis guided by the assurance argument.Case Study
illustrating the steps of the System Assurance Methodology using
automated tools."
The emergence of cloud computing, internet of things, mobile
technologies, and social networking have created better-connected
members of the public who are digitally linked with each other in
real time. Establishing this two-way interaction between citizens
and governments has thus become attractive and an expected feature
of governments worldwide. Previously, federal and local governments
relied on first-generation technologies to provide basic levels of
automation and digitization. Now, because of their desire to become
more open, transparent, accountable, and connected, newer
technologies including cloud computing, mobile networking, big data
analytics, Web 2.0, and social media must be developed and
utilized. Web 2.0 and Cloud Technologies for Implementing Connected
Government is an essential reference source that presents various
dimensions of connected government and connected e-governance
visions as well as the latest emerging technologies. Offering
development methodologies, practical examples, best practices, case
studies, and the latest research, this book covers new strategies
for implementing better-connected government models and the
technologies that serve to establish these frameworks, including
in-depth examinations of mobile technologies, automation, business
intelligence, etc. as well as the various ethical and security
issues surrounding the use and protection of data. This book is
essential for federal, state, and local government officials;
policymakers; civil servants; IT specialists; security analysts;
academicians; researchers; and students.
In recent years, smart cities have been an emerging area of
interest across the world. Due to this, numerous technologies and
tools, such as building information modeling (BIM) and digital
twins, have been developed to help achieve smart cities. To ensure
research is continuously up to date and new technologies are
considered within the field, further study is required. The
Research Anthology on BIM and Digital Twins in Smart Cities
considers the uses, challenges, and opportunities of BIM and
digital twins within smart cities. Covering key topics such as
data, design, urban areas, technology, and sustainability, this
major reference work is ideal for industry professionals,
government officials, computer scientists, policymakers,
researchers, scholars, practitioners, instructors, and students.
This book is a general introduction to the statistical analysis of
networks, and can serve both as a research monograph and as a
textbook. Numerous fundamental tools and concepts needed for the
analysis of networks are presented, such as network modeling,
community detection, graph-based semi-supervised learning and
sampling in networks. The description of these concepts is
self-contained, with both theoretical justifications and
applications provided for the presented algorithms.Researchers,
including postgraduate students, working in the area of network
science, complex network analysis, or social network analysis, will
find up-to-date statistical methods relevant to their research
tasks. This book can also serve as textbook material for courses
related to thestatistical approach to the analysis of complex
networks.In general, the chapters are fairly independent and
self-supporting, and the book could be used for course composition
"a la carte". Nevertheless, Chapter 2 is needed to a certain degree
for all parts of the book. It is also recommended to read Chapter 4
before reading Chapters 5 and 6, but this is not absolutely
necessary. Reading Chapter 3 can also be helpful before reading
Chapters 5 and 7. As prerequisites for reading this book, a basic
knowledge in probability, linear algebra and elementary notions of
graph theory is advised. Appendices describing required notions
from the above mentioned disciplines have been added to help
readers gain further understanding.
The Dark Web is a known hub that hosts myriad illegal activities
behind the veil of anonymity for its users. For years now, law
enforcement has been struggling to track these illicit activities
and put them to an end. However, the depth and anonymity of the
Dark Web has made these efforts difficult, and as cyber criminals
have more advanced technologies available to them, the struggle
appears to only have the potential to worsen. Law enforcement and
government organizations also have emerging technologies on their
side, however. It is essential for these organizations to stay up
to date on these emerging technologies, such as computational
intelligence, in order to put a stop to the illicit activities and
behaviors presented in the Dark Web. Using Computational
Intelligence for the Dark Web and Illicit Behavior Detection
presents the emerging technologies and applications of
computational intelligence for the law enforcement of the Dark Web.
It features analysis into cybercrime data, examples of the
application of computational intelligence in the Dark Web, and
provides future opportunities for growth in this field. Covering
topics such as cyber threat detection, crime prediction, and
keyword extraction, this premier reference source is an essential
resource for government organizations, law enforcement agencies,
non-profit organizations, politicians, computer scientists,
researchers, students, and academicians.
|
|