![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
As technology continues to advance and the interconnection of various devices makes our lives easier, it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms, turn on or off the lights, and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However, the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain, an encrypted, distributed computer filing system, can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable, secure, and permanent method of recording data processed by "smart" machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids, smart cities, and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems
This book vividly illustrates all the promising and potential machine learning (ML) and deep learning (DL) algorithms through a host of real-world and real-time business use cases. Machines and devices can be empowered to self-learn and exhibit intelligent behavior. Also, Big Data combined with real-time and runtime data can lead to personalized, prognostic, predictive, and prescriptive insights. This book examines the following topics: Cognitive machines and devices Cyber physical systems (CPS) The Internet of Things (IoT) and industrial use cases Industry 4.0 for smarter manufacturing Predictive and prescriptive insights for smarter systems Machine vision and intelligence Natural interfaces K-means clustering algorithm Support vector machine (SVM) algorithm A priori algorithms Linear and logistic regression Applied Learning Algorithms for Intelligent IoT clearly articulates ML and DL algorithms that can be used to unearth predictive and prescriptive insights out of Big Data. Transforming raw data into information and relevant knowledge is gaining prominence with the availability of data processing and mining, analytics algorithms, platforms, frameworks, and other accelerators discussed in the book. Now, with the emergence of machine learning algorithms, the field of data analytics is bound to reach new heights. This book will serve as a comprehensive guide for AI researchers, faculty members, and IT professionals. Every chapter will discuss one ML algorithm, its origin, challenges, and benefits, as well as a sample industry use case for explaining the algorithm in detail. The book's detailed and deeper dive into ML and DL algorithms using a practical use case can foster innovative research.
Assistive Technology Intervention in Healthcare focuses on various applications of intelligent techniques in biomedical engineering and health informatics. It aims to create awareness about disability reduction and recovery of accidental disability with the help of various rehabilitative systems. Novel technologies in disability treatment, management and assistance, including healthcare devices and their utility from home to hospital, are described. The book deals with simulation, modeling, measurement, control, analysis, information extraction and monitoring of physiological data in clinical medicine and biology. Features Covers the latest evolutionary approaches to solve optimization problems in the biomedical engineering field Explains machine learning-based approaches to improvement in health engineering areas Reviews the IoT, cloud computing and data analytics in healthcare informatics Discusses modeling and simulations in the design of biomedical equipment Explores monitoring of physiological data This book is aimed at researchers and graduate students in biomedical engineering, clinical engineering and bioinformatics.
5G NR: Architecture, Technology, Implementation, and Operation of 3GPP New Radio Standards is an in-depth, systematic, technical reference on 3GPP's New Radio standards (Release 15 and beyond), covering the underlying theory, functional descriptions, practical considerations, and implementation of the 5G new radio access technology. The book describes the design and operation of individual components and shows how they are integrated into the overall system and operate from a system's perspective. Uniquely, this book gives detailed information on RAN protocol layers, transports, network architectures, and services, as well as practical implementation and deployment issues, making it suitable for researchers and engineers who are designing and developing 5G systems. Reflecting on the author's 30 plus years of experience in signal processing, microelectronics, and wireless communication system design, this book is ideal for professional engineers, researchers, and graduate students who are working and researching in cellular communication systems and protocols as well as mobile broadband wireless standards.
This comprehensive new collection provides a careful selection of the major writings to have appeared in the field of foreign direct investment (FDI) and technological change since 1966. It has been prepared by one of the leading contributors and pioneers in this field, and is an area of research that has attracted a steady growth in interest over the last thirty years. After a new introduction which critically surveys the literature, the collection provides a comprehensive coverage that incorporates the early analysis of FDI and technology; the theoretical foundations of the analysis of technological change in multinational firms; theoretical models and empirical studies of technology transfer; the internationalization of technology creation; technology-based inter-company alliances; the co-evolution of FDI and technological development at country level; the geographical localization of the technological efforts of foreign-owned affiliates and technology spillovers between firms.
The widespread adoption of smartphones has led to an explosion of mobile social media data, more than a billion messages per day that continuously track location, content, and time. Social Media in the Contemporary City focuses on the effects of social media on local communities and urban space in a variety of political and economic settings related to social activism, informal economic activity, public art, and global extremism. The book covers events ranging from Banksy art installations, mobile food trucks, and underground restaurants, to a Black Lives Matter protest, the Christchurch mosque shootings, and the Pulse nightclub shooting. The interplay between urban space, local community, and social media in each case study requires diverse methodologies that are both computational (i.e. machine learning, social network analysis, and natural language processing) and ethnographic (i.e. semi-structured interviews, thematic analysis, and site analysis). The book views social media not as a replacement for the local community or urban space but rather as a translation of the uses and meanings of all three realms. The book will be of interest to students, researchers, and instructors in a number of disciplines including urban design/planning, media studies, geography, and communications.
In this book, first published in 1983, experts in US national, state, and regional network associations provide stimulating discussions of their experiences, problems, and successes. This volume is based on the symposium, 'Networking: Where From Here?'.
This book provides step by step directions for organizations to adopt a security and compliance related architecture according to mandatory legal provisions and standards prescribed for their industry, as well as the methodology to maintain the compliances. It sets a unique mechanism for monitoring controls and a dashboard to maintain the level of compliances. It aims at integration and automation to reduce the fatigue of frequent compliance audits and build a standard baseline of controls to comply with the applicable standards and regulations to which the organization is subject. It is a perfect reference book for professionals in the field of IT governance, risk management, and compliance. The book also illustrates the concepts with charts, checklists, and flow diagrams to enable management to map controls with compliances.
Features: A systematic and comprehensive understanding of the Block chain technology and the potential in Healthcare. How security and privacy concerns of healthcare data can be addressed using Blockchain Technology. Concept of smart contracts for performing advance level scripting to create a blockchain network for providing a platform for the development of decentralized applications is discussed Chapter on role of blockchain based insurance application using Ethereum/Hyperledger is included Use cases of blockchain for various aspects of drug manufacturing and pharma supply chain..
The agile transformation is an act of transforming an organization's form or nature gradually to one that can embrace and thrive in a flexible, collaborative, self-organizing, and fast-changing environment. It seems like most of the companies starting an agile transformation never reach the goal of agility, but there are those few that truly become agile and reap incredible benefits by utilizing DevOps as well. This book introduces the theory and practice of the "double-flywheels model" of Continuous Delivery 2.0: Discovery Loop, which allows information technology (IT) organizations to help businesses figure out the most efficacious ways to develop. Additionally, it explores applications of the Verification Loop that allows IT organizations to deliver value quickly and safely with high quality. Along the way, the book provides an array of insights and case studies that dive into all the aspects of software delivery, and how to implement Continuous Delivery in the most economical way for long-run business development. Features Organization culture and software architecture Business requirement management Pipeline and tooling Branching and releasing strategy Automation strategy Configuration and artefacts management Deployment and production healthy The case studies at the end of the book-scenarios in which the author was personally involved-are explored in depth and meticulously detailed in order to represent typical agile transition scenarios that will benefit all readers.
This book primarily focuses on providing deep insight into the concepts of network security, network forensics, botnet forensics, ethics and incident response in global perspectives. It also covers the dormant and contentious issues of the subject in most scientific and objective manner. Various case studies addressing contemporary network forensics issues are also included in this book to provide practical know - how of the subject. Network Forensics: A privacy & Security provides a significance knowledge of network forensics in different functions and spheres of the security. The book gives the complete knowledge of network security, all kind of network attacks, intention of an attacker, identification of attack, detection, its analysis, incident response, ethical issues, botnet and botnet forensics. This book also refer the recent trends that comes under network forensics. It provides in-depth insight to the dormant and latent issues of the acquisition and system live investigation too. Features: Follows an outcome-based learning approach. A systematic overview of the state-of-the-art in network security, tools, Digital forensics. Differentiation among network security, computer forensics, network forensics and botnet forensics. Discussion on various cybercrimes, attacks and cyber terminologies. Discussion on network forensics process model. Network forensics tools and different techniques Network Forensics analysis through case studies. Discussion on evidence handling and incident response. System Investigations and the ethical issues on network forensics. This book serves as a reference book for post graduate and research investigators who need to study in cyber forensics. It can also be used as a textbook for a graduate level course in Electronics & Communication, Computer Science and Computer Engineering.
This book offers a comprehensive overview of basic communication and networking technologies. It focuses on emerging technologies, such as Software-Defined Network (SDN)-based ad hoc networks, 5G, Machine Learning, and Deep Learning solutions for communication and networking, Cloud Computing, etc. It also includes discussions on practical and innovative applications, including Network Security, Smart Cities, e-health, and Intelligent Systems. Future Trends in 5G and 6G: Challenges, Architecture, and Applications addresses several key issues in SDN energy-efficient systems, the Internet of Things, Big Data, Cloud Computing and Virtualization, Machine Learning, Deep Learning, Cryptography, and 6G wireless technology and its future. It provides students, researchers, and practicing engineers with an expert guide to the fundamental concepts, challenges, architecture, applications, and state-of-the-art developments in communication and networking.
Digitalization of Higher Education using Cloud Computing: Implications, Risk, and Challenges provides an insight into the latest technology and tools being used to explore learning in Higher Educational Institutions (HEIs). Cloud computing, being an up-and-coming technology, integrates with academia and industry, thereby enhancing the quality of education. The opportunities and challenges faced by HEIs in recent times due to technological disruptions have forced both academia and industry to realign their strategies for survival and growth. With the acceleration of cloud computing in higher education, it has now become imperative for educators to constantly upskill and reskill in order to meet the requirements of the future of work, particularly in the digital age. Technological advancement is an unstoppable wave and the lack of relevant skills to handle the disruptions in higher education will become a huge challenge if not addressed promptly. This is the new phase of Education 4.0 where HEIs are aligning themselves using cloud computing implications, and thus are preparing both faculties and students to embrace the changes happening in the teaching and learning processes. This book focuses on multi-faceted strategies to be adopted by HEIs to deal with the emerging issues related to teaching-learning processes using cloud computing, technological interventions, curriculum overhaul, experiential learning, multi-disciplinary approaches, and continuous innovations and digitalization. The book offers comprehensive coverage of many academic areas, with the most essential topics including: * Pedagogies in digital education using a cloud environment * Risks and challenges in cloud platforms for teaching and learning * Collaborative and group learning in a cloud environment * Enhancing quality of education using e-learning methodologies The sections in this book are "Cloud Enabled Digitalization of Higher Education" and "Innovations and Applications of Digitalization of Higher Education: A Cloud Perspective". The book will be useful for undergraduates, graduates, academicians, scholars, and policy makers. It will help readers acquire skills for a smooth transition from face-to-face teaching to cloud-based teaching.
The Cloud is an advanced and fast-growing technology in the current era. The computing paradigm has changed drastically. It provided a new insight into the computing world with new characteristics including on-demand, virtualization, scalability and many more. Utility computing, virtualization and service-oriented architecture (SoA) are the key characteristics of Cloud computing. The Cloud provides distinct IT services over the web on a pay-as-you-go and on-demand basis. Cloud Computing Technologies for Smart Agriculture and Healthcare covers Cloud management and its framework. It also focuses how the Cloud computing framework can be integrated with applications based on agriculture and healthcare. Features: Contains a systematic overview of the state-of-the-art, basic theories, challenges, implementation, and case studies on Cloud technology Discusses of recent research results and future advancement in virtualization technology Focuses on core theories, architectures, and technologies necessary to develop and understand the computing models and its applications Includes a wide range of examples that uses Cloud technology for increasing farm profitability and sustainable production Presents the farming industry with Cloud technology that allows it toaggregate, analyze, and share data across farms and the world Includes Cloud-based electronic health records with privacy and security features Offers suitable IT solutions to the global issues in the domain of agriculture and health care for society This reference book is aimed at undergraduate and post-graduate programs. It will also help research scholars in their research work. This book also benefits like scientists, business innovators, entrepreneurs, professionals, and practitioners.
The modern realities of cybersecurity have uncovered the unpreparedness of many sectors and industries to deal with emerging threats. One of these sectors is the healthcare industry. The pervasiveness and proliferation of digital innovation, systems, and applications in global healthcare, especially powered by modern information and communications technologies, have created a threat domain wherein policy and regulation struggle to keep pace with development, standardization faces contextual challenges, and technical capacity is largely deficient. It is now urgent that healthcare professionals understand the most relevant concepts and fundamentals of global cybersecurity related to healthcare (particularly eHealth). Cybersecurity for eHealth: A Practical Guide for Non-Technical Healthcare Stakeholders & Practitioners combines a rigorous academic and practical professional approach in covering the essentials of cybersecurity. This book Distills foundational knowledge and presents it in a concise manner that is easily assimilated Draws lessons from real-life case studies across the global healthcare industry to drive home complex concepts, principles, and insights Helps eHealth professionals to deal more knowledgeably and effectively with the realities of cybersecurity Written for healthcare professionals without a background in the technical workings of information and communication technologies, this book presents the basics of cybersecurity and an overview of eHealth. It covers the foundational concepts, perspectives, and applications of cybersecurity in the context of eHealth, and traverses the cybersecurity threat landscape to eHealth, including Threat categories, agents, and objectives Strategies and approaches deployed by various threat agents Predisposing risk factors in cybersecurity threat situations Basic practical techniques for protecting against cybersecurity incidents at the personal and institutional levels A comprehensive and practical guide, this book discusses approaches and best practices for enhancing personal cybersecurity, covers the basics of data and information security in healthcare, and presents an overview of the goals and responsibilities of governance, ethics, and regulation in eHealth. Who should use this book? Healthcare stakeholders and practitioners seeking a better understanding of cybersecurity as it pertains to healthcare information and communication technologies Regulatory and Board Authorities seeking to design comprehensive and foundational training programs in cybersecurity for healthcare stakeholders and practitioners Chief Information Officers and Chief Information Security Officers of healthcare organizations needing a basic internal training resource for healthcare professionals Non-technical enthusiasts seeking to understand the threat landscape and realities of cybersecurity in healthcare
The modern realities of cybersecurity have uncovered the unpreparedness of many sectors and industries to deal with emerging threats. One of these sectors is the healthcare industry. The pervasiveness and proliferation of digital innovation, systems, and applications in global healthcare, especially powered by modern information and communications technologies, have created a threat domain wherein policy and regulation struggle to keep pace with development, standardization faces contextual challenges, and technical capacity is largely deficient. It is now urgent that healthcare professionals understand the most relevant concepts and fundamentals of global cybersecurity related to healthcare (particularly eHealth). Cybersecurity for eHealth: A Practical Guide for Non-Technical Healthcare Stakeholders & Practitioners combines a rigorous academic and practical professional approach in covering the essentials of cybersecurity. This book Distills foundational knowledge and presents it in a concise manner that is easily assimilated Draws lessons from real-life case studies across the global healthcare industry to drive home complex concepts, principles, and insights Helps eHealth professionals to deal more knowledgeably and effectively with the realities of cybersecurity Written for healthcare professionals without a background in the technical workings of information and communication technologies, this book presents the basics of cybersecurity and an overview of eHealth. It covers the foundational concepts, perspectives, and applications of cybersecurity in the context of eHealth, and traverses the cybersecurity threat landscape to eHealth, including Threat categories, agents, and objectives Strategies and approaches deployed by various threat agents Predisposing risk factors in cybersecurity threat situations Basic practical techniques for protecting against cybersecurity incidents at the personal and institutional levels A comprehensive and practical guide, this book discusses approaches and best practices for enhancing personal cybersecurity, covers the basics of data and information security in healthcare, and presents an overview of the goals and responsibilities of governance, ethics, and regulation in eHealth. Who should use this book? Healthcare stakeholders and practitioners seeking a better understanding of cybersecurity as it pertains to healthcare information and communication technologies Regulatory and Board Authorities seeking to design comprehensive and foundational training programs in cybersecurity for healthcare stakeholders and practitioners Chief Information Officers and Chief Information Security Officers of healthcare organizations needing a basic internal training resource for healthcare professionals Non-technical enthusiasts seeking to understand the threat landscape and realities of cybersecurity in healthcare
Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm, it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity. Cloud Security: Attacks, Techniques, Tools, and Challenges, provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers but also for professional cloud security analysts for conducting security procedures, and all those who are curious in the field of cloud security The book offers comprehensive coverage of the most essential topics, including: Basic fundamentals of Cloud Computing Cloud security concepts, vulnerabilities, security standards and reference models Cloud security goals, key issues and privacy requirements Threat model, detailed taxonomy of cloud attacks, Attack feature analysis - case study A detailed taxonomy of IDS techniques and Cloud Intrusion Detection Systems (IDS) Attack and security tools, LibVMI - case study Advanced approaches: Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI) Container security: threat model, attacks and defense systems This book is intended for both academic and professional audience. It could also be used as a textbook, for a semester course at undergraduate and post graduate level in Computer Science, Information Technology, Information Security, and Information Science & Management. The book serves as basic reference volume for researchers in cloud security. It will be useful to practitioners, cloud security team, and the cloud security auditor as well. To get the most out of this book, the reader should have a working knowledge of various operating system environments, hypervisors, cloud computing fundamentals, programming languages like Python and a working knowledge of security tools.
As enterprise access networks evolve with a larger number of mobile users, a wide range of devices and new cloud-based applications, managing user performance on an end-to-end basis has become rather challenging. Recent advances in big data network analytics combined with AI and cloud computing are being leveraged to tackle this growing problem. AI is becoming further integrated with software that manage networks, storage, and can compute. This edited book focuses on how new network analytics, IoTs and Cloud Computing platforms are being used to ingest, analyse and correlate a myriad of big data across the entire network stack in order to increase quality of service and quality of experience (QoS/QoE) and to improve network performance. From big data and AI analytical techniques for handling the huge amount of data generated by IoT devices, the authors cover cloud storage optimization, the design of next generation access protocols and internet architecture, fault tolerance and reliability in intelligent networks, and discuss a range of emerging applications. This book will be useful to researchers, scientists, engineers, professionals, advanced students and faculty members in ICTs, data science, networking, AI, machine learning and sensing. It will also be of interest to professionals in data science, AI, cloud and IoT start-up companies, as well as developers and designers.
Reviews IoT software architecture and middleware, data processing and management, security, privacy and reliability, architectures, protocols, technologies, algorithms, and smart objects, sensors, and actuators Explores IoT as it applies to energy, including energy efficiency and management, intelligent energy management, smart energy through blockchain and energy-efficient/aware routing/scheduling challenges and issues Examines IoT as it applies to healthcare including biomedical image and signal analysis, and disease prediction and diagnosis Examines IoT as it applies to smart industry including architecture, blockchain, and Industry 4.0 Discusses different ways to create a better IoT network or IoT platform
What debates have caused spectrum policy to change course and which will determine its future direction? This book examines these issues through a series of chapters from a range of notable experts. The backdrop is a period of turbulent change in what was once a quiet backwater. The past quarter century has seen wireless connectivity go from nice-to-have luxury to the cornerstone of success as nations battle for leadership of the digital economy. The change has been reflected in the crucial role now played by market's mechanisms in a field once dominated by administrative decisions. Spectrum policy's goals have moved far beyond the efficient use of the airwaves to include encouraging economic development, investment, innovation, sustainability and digital inclusivity. Are historic procedures still appropriate in the face of this multiplicity of demands? Are market mechanisms like auctions still the best way to deliver what has become essential infrastructure? Does the process of international coordination need to change? Is spectrum policy's effectiveness limited by the power of global economic forces? Can it reduce rather than add to global warming? Where does 6G and AI fit in? Is public perception the new spectrum policy battle ground? These are all issues examined in The Debates Shaping Spectrum Policy.
The future has already begin. The banking industry needs to adjust, or it will disappear in the next decade. With the help of 5G, next-generation intelligent ATM-like devices will have highly integrated functions and use technologies such as artificial intelligences-assisted self-service contactless interfaces with facial recognition and digital signatures. This book focuses on new experiences that clients can expect when connected to a 5G network with a 5G device. By 2022 we hope that 5G will: Drive accelerated mBanking growth Power augmented reality /virtual reality Make Video shopping experiences more widespread and compelling Enable banks to deploy highly personalized customer service experiences Support time-sensitive banking applications, like online stock trading where milliseconds can determine a gain or loss Improve security and fraud prevention bycomputing and exchanging more data traveling between parties in real-time Enhance mPOS transactions and utilization. 5G holds the potential to accelerate mobile point of sale (MPOS) transaction processing time and improve connectivity In order to explore these topics, this book covers: * Decentralization of the banks * Banking without banks * 5G will change the modern banking industry * Blockchain adoption by the banking industry
Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture. Supplying an authoritative review of the key concepts and requirements of the ISSAP CBK, the Official (ISC)2(r) Guide to the ISSAP(r) CBK(r), Second Edition provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Access Control Systems and Methodology, Communications and Network Security, Cryptology, Security Architecture Analysis, BCP/DRP, and Physical Security Considerations. Newly Enhanced Design This Guide Has It All Only guide endorsed by (ISC)2 Most up-to-date CISSP-ISSAP CBK Evolving terminology and changing requirements for security professionals Practical examples that illustrate how to apply concepts in real-life situations Chapter outlines and objectives Review questions and answers References to free study resources Read It. Study It. Refer to It Often. Build your knowledge and improve your chance of achieving certification the first time around. Endorsed by (ISC)2 and compiled and reviewed by CISSP-ISSAPs and (ISC)2 members, this book provides unrivaled preparation for the certification exam and is a reference that will serve you well into your career. Earning your ISSAP is a deserving achievement that gives you a competitive advantage and makes you a member of an elite network of professionals worldwide.
This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks, while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobiles, IoT (Internet of Things) devices for shopping and password management, and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.
This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks, while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobiles, IoT (Internet of Things) devices for shopping and password management, and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.
Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security. It also covers the future research directions in this domain. In this evolving era, nanotechnology is converting semiconductor devices dimensions from micron technology to nanotechnology. Nanoelectronics would be the key enabler for innovation in nanoscale devices, circuits, and systems. The motive for this research book is to provide relevant theoretical frameworks that include device physics, modeling, circuit design, and the latest developments in experimental fabrication in the field of nanotechnology for hardware/software security. There are numerous challenges in the development of models for nanoscale devices (e.g., FinFET, gate-all-around devices, TFET, etc.), short channel effects, fringing effects, high leakage current, and power dissipation, among others. This book will help to identify areas where there are challenges and apply nanodevice and circuit techniques to address hardware/software security issues. |
![]() ![]() You may like...
Sustainable Development Dimensions and…
Alessandra Battisti, Serena Baiani
Hardcover
R2,840
Discovery Miles 28 400
Media ethics in South African context…
Lucas M. Oosthuizen
Paperback
![]()
|