![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages, which are frequently exchanged on road. This book serves as a guide for students, developers and researchers who are interested in vehicular networks and the associated security and privacy issues. It facilitates the understanding of the technologies used and their various types, highlighting the importance of privacy and security issues and the direct impact they have on the safety of their users. It also explains various solutions and proposals to protect location and identity privacy, including two anonymous authentication methods that preserve identity privacy and a total of five schemes that preserve location privacy in the vehicular ad hoc networks and the cloud-enabled internet of vehicles, respectively.
First designed to generate personalized recommendations to users in the 90s, recommender systems apply knowledge discovery techniques to users' data to suggest information, products, and services that best match their preferences. In recent decades, we have seen an exponential increase in the volumes of data, which has introduced many new challenges. Divided into two volumes, this comprehensive set covers recent advances, challenges, novel solutions, and applications in big data recommender systems. Volume 1 contains 14 chapters addressing foundations, algorithms and architectures, approaches for big data, and trust and security measures. Volume 2 covers a broad range of application paradigms for recommender systems over 22 chapters.
Modern businesses are on the lookout for ventures that boost their profits and marketability. Certain new and innovative technological advances can help enterprises accomplish their ambitious goals while providing detailed information to assess all aspects of the business. Global Virtual Enterprises in Cloud Computing Environments is a collection of innovative studies on business processes, procedures, methods, strategy, management thinking, and utilization of technology in cloud computing environments. While highlighting topics including international business strategy, virtual reality, and intellectual capital, this book is ideally designed for corporate executives, research scholars, and students pursuing courses in the areas of management and big data applications seeking current research on effective open innovation strategies in global business.
Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data. Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standards, and mechanisms for security in all types of digital applications and focuses on blockchain and its imminent impact on financial services in supporting smart government, along with bitcoin and the future of digital payments. Highlighting topics such as cryptography, privacy management, and e-government, this book is ideal for security analysts, data scientists, academicians, policymakers, security professionals, IT professionals, government officials, finance professionals, researchers, and students.
As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.
As society continues to heavily rely on software and databases, the risks for cyberattacks have increased rapidly. As the dependence on computers has become gradually widespread throughout communities and governments, there is a need for cybersecurity programs that can assist in protecting sizeable networks and significant amounts of data at once. Implementing overarching security policies for software systems is integral to protecting community-wide data from harmful attacks. Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) is an essential reference source that discusses methods in applying sustainable cybersecurity programs and policies within organizations, governments, and other communities. Featuring research on topics such as community engagement, incident planning methods, and information sharing, this book is ideally designed for cybersecurity professionals, security analysts, managers, researchers, policymakers, students, practitioners, and academicians seeking coverage on novel policies and programs in cybersecurity implementation.
The optimization of traffic management operations has become a considerable challenge in today's global scope due to the significant increase in the number of vehicles, traffic congestions, and automobile accidents. Fortunately, there has been substantial progress in the application of intelligent computing devices to transportation processes. Vehicular ad-hoc networks (VANETs) are a specific practice that merges the connectivity of wireless technologies with smart vehicles. Despite its relevance, empirical research is lacking on the developments being made in VANETs and how certain intelligent technologies are being applied within transportation systems. IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks provides emerging research exploring the theoretical and practical aspects of intelligent transportation systems and analyzing the modern techniques that are being applied to smart vehicles through cloud technology. Featuring coverage on a broad range of topics such as health monitoring, node localization, and fault tolerance, this book is ideally designed for network designers, developers, analysists, IT specialists, computing professionals, researchers, academics, and post-graduate students seeking current research on emerging computing concepts and developments in vehicular ad-hoc networks.
Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms related to steganography to determine how this new technology is being utilized and improved continuously to protect information digitally. The benefits and challenges, along with the current and potential developments for the future, are important keystones in this critical area of security research. Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with including discussions on optimization models and security controls that could be implemented. Other important topics include data transmission, deep learning techniques, machine learning, and both image and text stenography. This book is essential for forensic engineers, forensic analysts, cybersecurity analysts, cyber forensic examiners, security engineers, cybersecurity network analysts, cyber network defense analysts, and digital forensic examiners along with practitioners, researchers, academicians, and students interested in the latest techniques and state-of-the-art methods in digital steganography.
6G Key Technologies An accessible and integrated roadmap to the technologies enabling 6G development In 6G Key Technologies: A Comprehensive Guide, two internationally well-recognized experts deliver a thoroughly original and comprehensive exploration of the technologies enabling and contributing to the development of 6G. The book presents the vision of 6G by reviewing the evolution of communications technologies toward 6G and examining the factors driving that development, as well as their requirements, use cases, key performance indicators, and more. Readers will discover: Thorough introductions to the standardization and technology evolution toward 6G, as well as the vision behind the development of 6G in terms of architectures, algorithms, protocols, and applications. In-depth explorations of full-spectrum wireless technologies in 6G, including enhanced millimeter wave technologies, terahertz-based communications and networking, visible-light and optical wireless communications. Fulsome discussions of smart radio networks and new air interface technologies for 6G including intelligent reflecting surface, cellular massive MIMO, cell-free massive MIMO, adaptive and non-orthogonal multiple access technologies. Perfect for professional engineers, researchers, manufacturers, network operators, and software developers, 6G Key Technologies: A Comprehensive Guide will also earn a place in the libraries of graduate students studying in wireless communications, artificial intelligence, signal processing, microwave technology, information theory, antenna and propagation, system-on-chip implementation, and computer networks.
Data is the most important commodity, which is why data protection has become a global priority. Data breaches and security flaws can jeopardize the global economy. Organizations face a greater risk of failing to achieve strategy and business goals as cyber threat behavior grows in frequency, sophistication, and destructiveness. A breach can result in data loss, business interruption, brand and reputation harm, as well as regulatory and legal consequences. A company needs a well-thought-out cybersecurity strategy to secure its critical infrastructure and information systems in order to overcome these challenges. Cross-Industry Applications of Cyber Security Frameworks provides an understanding of the specific, standards-based security controls that make up a best practice cybersecurity program. It is equipped with cross-industry applications of cybersecurity frameworks, best practices for common practices, and suggestions that may be highly relevant or appropriate in every case. Covering topics such as legal frameworks, cybersecurity in FinTech, and open banking, this premier reference source is an essential resource for executives, business leaders, managers, entrepreneurs, IT professionals, government officials, hospital administrators, educational administrators, privacy specialists, researchers, and academicians.
Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional education. However, multidisciplinary research can and will also improve the extent to which a country can protect its critical and vital assets. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism is an essential scholarly publication that provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity to understand the multidisciplinary nature of intelligence and science in order to improve current intelligence activities and contribute to the protection of the nation. Each chapter of the book discusses various components of science that should be applied to the intelligence arena. Featuring coverage on a range of topics including cybersecurity, economics, and political strategy, this book is ideal for law enforcement, intelligence and security practitioners, students, educators, and researchers.
Complex Systems and Clouds: A Self-Organization and Self-Management Perspective provides insights into the intricate world of self-organizing systems. Large scale distributed computer systems have evolved into very complex systems and are at the point where they need to borrow self-adapting organizing concepts from nature. The book explores complexity in big distributed systems and in the natural processes in physics and chemistry, building a platform for understanding how self-organization in big distributed systems can be achieved. It goes beyond the theoretical description of self-organization to present principles for designing self-organizing systems, and concludes by showing the need for a paradigm shift in the development of large-scale systems from strictly deterministic to non-deterministic and adaptive.
|
You may like...
Feature Selection for High-Dimensional…
Veronica Bolon-Canedo, Noelia Sanchez-Marono, …
Hardcover
Sparse Grids and Applications…
Jochen Garcke, Dirk Pfluger
Hardcover
Development of Navigation Technology for…
Baburov S.V., Bestugin A.R., …
Hardcover
R3,124
Discovery Miles 31 240
Handbook of Research on Modeling…
Sujata Dash, B. K. Tripathy, …
Hardcover
R6,518
Discovery Miles 65 180
Glowworm Swarm Optimization - Theory…
Krishnanand N. Kaipa, Debasish Ghose
Hardcover
Optimization and Its Applications in…
Boris Goldengorin
Hardcover
|