|
Books > Computing & IT > Computer communications & networking
As technology continues to expand and develop, the internet of
things (IoT) is playing a progressive role in the infrastructure of
electronics. The increasing amount of IoT devices, however, has led
to the emergence of significant privacy and security challenges.
Security and Privacy Issues in Sensor Networks and IoT is a
collection of innovative research on the methods and applications
of protection disputes in the internet of things and other
computing structures. While highlighting topics that include cyber
defense, digital forensics, and intrusion detection, this book is
ideally designed for security analysts, IT specialists, software
developers, computer engineers, industry professionals,
academicians, students, and researchers seeking current research on
defense concerns in cyber physical systems.
Interdisciplinary and multidisciplinary research is slowly yet
steadily revolutionizing traditional education. However,
multidisciplinary research can and will also improve the extent to
which a country can protect its critical and vital assets. Applying
Methods of Scientific Inquiry Into Intelligence, Security, and
Counterterrorism is an essential scholarly publication that
provides personnel directly working in the fields of intelligence,
law enforcement, and science with the opportunity to understand the
multidisciplinary nature of intelligence and science in order to
improve current intelligence activities and contribute to the
protection of the nation. Each chapter of the book discusses
various components of science that should be applied to the
intelligence arena. Featuring coverage on a range of topics
including cybersecurity, economics, and political strategy, this
book is ideal for law enforcement, intelligence and security
practitioners, students, educators, and researchers.
Vehicular traffic congestion and accidents remain universal issues
in today's world. Due to the continued growth in the use of
vehicles, optimizing traffic management operations is an immense
challenge. To reduce the number of traffic accidents, improve the
performance of transportation systems, enhance road safety, and
protect the environment, vehicular ad-hoc networks have been
introduced. Current developments in wireless communication,
computing paradigms, big data, and cloud computing enable the
enhancement of these networks, equipped with wireless communication
capabilities and high-performance processing tools. Cloud-Based Big
Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference
source that provides vital research on cloud and data analytic
applications in intelligent transportation systems. While
highlighting topics such as location routing, accident detection,
and data warehousing, this publication addresses future challenges
in vehicular ad-hoc networks and presents viable solutions. This
book is ideally designed for researchers, computer scientists,
engineers, automobile industry professionals, IT practitioners,
academicians, and students seeking current research on cloud
computing models in vehicular networks.
As the applications of the Internet of Things continue to progress,
so do the security concerns for this technology. The study of
threat prevention in the Internet of Things is necessary, as
security breaches in this field can ruin industries and lives.
Security Breaches and Threat Prevention in the Internet of Things
provides a comprehensive examination of the latest strategies and
methods for tracking and blocking threats within industries that
work heavily with this technology. Featuring chapters on emerging
topics such as security threats in autonomous vehicles, digital
forensics, secure communications, and image encryption, this
critical reference source is a valuable tool for all academicians,
graduate students, practitioners, professionals, and researchers
who are interested in expanding their knowledge of security
practices pertaining to the Internet of Things.
Using a multi-disciplinary and comparative approach, this study
examines emerging and innovative attempts to tackle privacy and
legal issues in cloud computing such as personal data privacy,
security and intellectual property protection. An international
team of legal scholars, computer science researchers, regulators
and practitioners present original and critical responses to the
growing challenges posed by cloud computing. They analyze the
specific legal implications pertaining to jurisdiction, biomedical
practice and information ownership, as well as issues of regulatory
control, competition and cross-border regulation. Law academics,
practitioners and regulators will find this book to be a valuable,
practical and accessible resource, as will computer science
scholars interested in cloud computing issues. Contributors: H.
Chang, A.S.Y. Cheung, A. Chiu, K.P. Chow, E.S. Dove, X. Fan, Y.
Joly, T.S.-H. Kaan, B.M. Knoppers, J. Kong, G. Master, J.-P. Moiny,
C. Reed, D.N. Staiger, G.Y. Tian, R.H. Weber, P.K. Yu
Data stealing is a major concern on the internet as hackers and
criminals have begun using simple tricks to hack social networks
and violate privacy. Cyber-attack methods are progressively modern,
and obstructing the attack is increasingly troublesome, regardless
of whether countermeasures are taken. The Dark Web especially
presents challenges to information privacy and security due to
anonymous behaviors and the unavailability of data. To better
understand and prevent cyberattacks, it is vital to have a forecast
of cyberattacks, proper safety measures, and viable use of
cyber-intelligence that empowers these activities. Dark Web Pattern
Recognition and Crime Analysis Using Machine Intelligence discusses
cyberattacks, security, and safety measures to protect data and
presents the shortcomings faced by researchers and practitioners
due to the unavailability of information about the Dark Web.
Attacker techniques in these Dark Web environments are highlighted,
along with intrusion detection practices and crawling of hidden
content. Covering a range of topics such as malware and fog
computing, this reference work is ideal for researchers,
academicians, practitioners, industry professionals, computer
scientists, scholars, instructors, and students.
With the continued progression of technologies such as mobile
computing and the internet of things (IoT), cybersecurity has
swiftly risen to a prominent field of global interest. This has led
to cyberattacks and cybercrime becoming much more sophisticated to
a point where cybersecurity can no longer be the exclusive
responsibility of an organization's information technology (IT)
unit. Cyber warfare is becoming a national issue and causing
various governments to reevaluate the current defense strategies
they have in place. Cyber Security Auditing, Assurance, and
Awareness Through CSAM and CATRAM provides emerging research
exploring the practical aspects of reassessing current
cybersecurity measures within organizations and international
governments and improving upon them using audit and awareness
training models, specifically the Cybersecurity Audit Model (CSAM)
and the Cybersecurity Awareness Training Model (CATRAM). The book
presents multi-case studies on the development and validation of
these models and frameworks and analyzes their implementation and
ability to sustain and audit national cybersecurity strategies.
Featuring coverage on a broad range of topics such as forensic
analysis, digital evidence, and incident management, this book is
ideally designed for researchers, developers, policymakers,
government officials, strategists, security professionals,
educators, security analysts, auditors, and students seeking
current research on developing training models within cybersecurity
management and awareness.
As computers continue to remain essential tools for the pursuit of
physics, medicine, economics, social sciences, and more,
supercomputers are proving that they can further extend and greatly
enhance as-of-yet undiscovered knowledge and solve the world's most
complex problems. As these instruments continue to lead to
groundbreaking discoveries and breakthroughs, it is imperative that
research remains up to date with the latest findings and uses. The
Handbook of Research on Methodologies and Applications of
Supercomputing is a comprehensive and critical reference book that
provides research on the latest advances of control flow and
dataflow supercomputing and highlights selected emerging big data
applications needing high acceleration and/or low power.
Consequently, this book advocates the need for hybrid computing,
where the control flow part represents the host architecture and
dataflow part represents the acceleration architecture. These
issues cover the initial eight chapters. The remaining eight
chapters cover selected modern applications that are best
implemented on a hybrid computer, in which the transactional parts
(serial code) are implemented on the control flow part and the
loops (parallel code) on the dataflow part. These final eight
chapters cover two major application domains: scientific computing
and computing for digital economy. This book offers applications in
marketing, medicine, energy systems, and library science, among
others, and is an essential source for scientists, programmers,
engineers, practitioners, researchers, academicians, and students
interested in the latest findings and advancements in
supercomputing.
Digital transformation is a revolutionary technology that will play
a vital role in major industries, including global governments.
These administrations are taking the initiative to incorporate
digital programs with their objective being to provide digital
infrastructure as a basic utility for every citizen, provide on
demand services with superior governance, and empower their
citizens digitally. However, security and privacy are major
barriers in adopting these mechanisms, as organizations and
individuals are concerned about their private and financial data.
Impact of Digital Transformation on Security Policies and Standards
is an essential research book that examines the policies,
standards, and mechanisms for security in all types of digital
applications and focuses on blockchain and its imminent impact on
financial services in supporting smart government, along with
bitcoin and the future of digital payments. Highlighting topics
such as cryptography, privacy management, and e-government, this
book is ideal for security analysts, data scientists, academicians,
policymakers, security professionals, IT professionals, government
officials, finance professionals, researchers, and students.
Ongoing advancements in modern technology have led to significant
developments with smart technologies. With the numerous
applications available, it becomes imperative to conduct research
and make further progress in this field. Smart Technologies:
Breakthroughs in Research and Practice provides comprehensive and
interdisciplinary research on the most emerging areas of
information science and technology. Including innovative studies on
image and speech recognition, human-computer interface, and
wireless technologies, this multi-volume book is an ideal source
for researchers, academicians, practitioners, and students
interested in advanced technological applications and developments.
|
|