|
|
Books > Computing & IT > Computer communications & networking
First designed to generate personalized recommendations to users in
the 90s, recommender systems apply knowledge discovery techniques
to users' data to suggest information, products, and services that
best match their preferences. In recent decades, we have seen an
exponential increase in the volumes of data, which has introduced
many new challenges. Divided into two volumes, this comprehensive
set covers recent advances, challenges, novel solutions, and
applications in big data recommender systems. Volume 1 contains 14
chapters addressing foundations, algorithms and architectures,
approaches for big data, and trust and security measures. Volume 2
covers a broad range of application paradigms for recommender
systems over 22 chapters.
Modern businesses are on the lookout for ventures that boost their
profits and marketability. Certain new and innovative technological
advances can help enterprises accomplish their ambitious goals
while providing detailed information to assess all aspects of the
business. Global Virtual Enterprises in Cloud Computing
Environments is a collection of innovative studies on business
processes, procedures, methods, strategy, management thinking, and
utilization of technology in cloud computing environments. While
highlighting topics including international business strategy,
virtual reality, and intellectual capital, this book is ideally
designed for corporate executives, research scholars, and students
pursuing courses in the areas of management and big data
applications seeking current research on effective open innovation
strategies in global business.
Digital transformation is a revolutionary technology that will play
a vital role in major industries, including global governments.
These administrations are taking the initiative to incorporate
digital programs with their objective being to provide digital
infrastructure as a basic utility for every citizen, provide on
demand services with superior governance, and empower their
citizens digitally. However, security and privacy are major
barriers in adopting these mechanisms, as organizations and
individuals are concerned about their private and financial data.
Impact of Digital Transformation on Security Policies and Standards
is an essential research book that examines the policies,
standards, and mechanisms for security in all types of digital
applications and focuses on blockchain and its imminent impact on
financial services in supporting smart government, along with
bitcoin and the future of digital payments. Highlighting topics
such as cryptography, privacy management, and e-government, this
book is ideal for security analysts, data scientists, academicians,
policymakers, security professionals, IT professionals, government
officials, finance professionals, researchers, and students.
As the applications of the Internet of Things continue to progress,
so do the security concerns for this technology. The study of
threat prevention in the Internet of Things is necessary, as
security breaches in this field can ruin industries and lives.
Security Breaches and Threat Prevention in the Internet of Things
provides a comprehensive examination of the latest strategies and
methods for tracking and blocking threats within industries that
work heavily with this technology. Featuring chapters on emerging
topics such as security threats in autonomous vehicles, digital
forensics, secure communications, and image encryption, this
critical reference source is a valuable tool for all academicians,
graduate students, practitioners, professionals, and researchers
who are interested in expanding their knowledge of security
practices pertaining to the Internet of Things.
As society continues to heavily rely on software and databases, the
risks for cyberattacks have increased rapidly. As the dependence on
computers has become gradually widespread throughout communities
and governments, there is a need for cybersecurity programs that
can assist in protecting sizeable networks and significant amounts
of data at once. Implementing overarching security policies for
software systems is integral to protecting community-wide data from
harmful attacks. Establishing Cyber Security Programs Through the
Community Cyber Security Maturity Model (CCSMM) is an essential
reference source that discusses methods in applying sustainable
cybersecurity programs and policies within organizations,
governments, and other communities. Featuring research on topics
such as community engagement, incident planning methods, and
information sharing, this book is ideally designed for
cybersecurity professionals, security analysts, managers,
researchers, policymakers, students, practitioners, and
academicians seeking coverage on novel policies and programs in
cybersecurity implementation.
The optimization of traffic management operations has become a
considerable challenge in today's global scope due to the
significant increase in the number of vehicles, traffic
congestions, and automobile accidents. Fortunately, there has been
substantial progress in the application of intelligent computing
devices to transportation processes. Vehicular ad-hoc networks
(VANETs) are a specific practice that merges the connectivity of
wireless technologies with smart vehicles. Despite its relevance,
empirical research is lacking on the developments being made in
VANETs and how certain intelligent technologies are being applied
within transportation systems. IoT and Cloud Computing Advancements
in Vehicular Ad-Hoc Networks provides emerging research exploring
the theoretical and practical aspects of intelligent transportation
systems and analyzing the modern techniques that are being applied
to smart vehicles through cloud technology. Featuring coverage on a
broad range of topics such as health monitoring, node localization,
and fault tolerance, this book is ideally designed for network
designers, developers, analysists, IT specialists, computing
professionals, researchers, academics, and post-graduate students
seeking current research on emerging computing concepts and
developments in vehicular ad-hoc networks.
Steganography is the art of secret writing. The purpose of
steganography is to hide the presence of a message from the
intruder by using state-of-the-art methods, algorithms,
architectures, models, and methodologies in the domains of cloud,
internet of things (IoT), and the Android platform. Though security
controls in cloud computing, IoT, and Android platforms are not
much different than security controls in an IT environment, they
might still present different types of risks to an organization
than the classic IT solutions. Therefore, a detailed discussion is
needed in case there is a breach in security. It is important to
review the security aspects of cloud, IoT, and Android platforms
related to steganography to determine how this new technology is
being utilized and improved continuously to protect information
digitally. The benefits and challenges, along with the current and
potential developments for the future, are important keystones in
this critical area of security research. Multidisciplinary Approach
to Modern Digital Steganography reviews the security aspects of
cloud, IoT, and Android platforms related to steganography and
addresses emerging security concerns, new algorithms, and case
studies in the field. Furthermore, the book presents a new approach
to secure data storage on cloud infrastructure and IoT along with
including discussions on optimization models and security controls
that could be implemented. Other important topics include data
transmission, deep learning techniques, machine learning, and both
image and text stenography. This book is essential for forensic
engineers, forensic analysts, cybersecurity analysts, cyber
forensic examiners, security engineers, cybersecurity network
analysts, cyber network defense analysts, and digital forensic
examiners along with practitioners, researchers, academicians, and
students interested in the latest techniques and state-of-the-art
methods in digital steganography.
6G Key Technologies An accessible and integrated roadmap to the
technologies enabling 6G development In 6G Key Technologies: A
Comprehensive Guide, two internationally well-recognized experts
deliver a thoroughly original and comprehensive exploration of the
technologies enabling and contributing to the development of 6G.
The book presents the vision of 6G by reviewing the evolution of
communications technologies toward 6G and examining the factors
driving that development, as well as their requirements, use cases,
key performance indicators, and more. Readers will discover:
Thorough introductions to the standardization and technology
evolution toward 6G, as well as the vision behind the development
of 6G in terms of architectures, algorithms, protocols, and
applications. In-depth explorations of full-spectrum wireless
technologies in 6G, including enhanced millimeter wave
technologies, terahertz-based communications and networking,
visible-light and optical wireless communications. Fulsome
discussions of smart radio networks and new air interface
technologies for 6G including intelligent reflecting surface,
cellular massive MIMO, cell-free massive MIMO, adaptive and
non-orthogonal multiple access technologies. Perfect for
professional engineers, researchers, manufacturers, network
operators, and software developers, 6G Key Technologies: A
Comprehensive Guide will also earn a place in the libraries of
graduate students studying in wireless communications, artificial
intelligence, signal processing, microwave technology, information
theory, antenna and propagation, system-on-chip implementation, and
computer networks.
Data is the most important commodity, which is why data protection
has become a global priority. Data breaches and security flaws can
jeopardize the global economy. Organizations face a greater risk of
failing to achieve strategy and business goals as cyber threat
behavior grows in frequency, sophistication, and destructiveness. A
breach can result in data loss, business interruption, brand and
reputation harm, as well as regulatory and legal consequences. A
company needs a well-thought-out cybersecurity strategy to secure
its critical infrastructure and information systems in order to
overcome these challenges. Cross-Industry Applications of Cyber
Security Frameworks provides an understanding of the specific,
standards-based security controls that make up a best practice
cybersecurity program. It is equipped with cross-industry
applications of cybersecurity frameworks, best practices for common
practices, and suggestions that may be highly relevant or
appropriate in every case. Covering topics such as legal
frameworks, cybersecurity in FinTech, and open banking, this
premier reference source is an essential resource for executives,
business leaders, managers, entrepreneurs, IT professionals,
government officials, hospital administrators, educational
administrators, privacy specialists, researchers, and academicians.
Interdisciplinary and multidisciplinary research is slowly yet
steadily revolutionizing traditional education. However,
multidisciplinary research can and will also improve the extent to
which a country can protect its critical and vital assets. Applying
Methods of Scientific Inquiry Into Intelligence, Security, and
Counterterrorism is an essential scholarly publication that
provides personnel directly working in the fields of intelligence,
law enforcement, and science with the opportunity to understand the
multidisciplinary nature of intelligence and science in order to
improve current intelligence activities and contribute to the
protection of the nation. Each chapter of the book discusses
various components of science that should be applied to the
intelligence arena. Featuring coverage on a range of topics
including cybersecurity, economics, and political strategy, this
book is ideal for law enforcement, intelligence and security
practitioners, students, educators, and researchers.
Complex Systems and Clouds: A Self-Organization and Self-Management
Perspective provides insights into the intricate world of
self-organizing systems. Large scale distributed computer systems
have evolved into very complex systems and are at the point where
they need to borrow self-adapting organizing concepts from nature.
The book explores complexity in big distributed systems and in the
natural processes in physics and chemistry, building a platform for
understanding how self-organization in big distributed systems can
be achieved. It goes beyond the theoretical description of
self-organization to present principles for designing
self-organizing systems, and concludes by showing the need for a
paradigm shift in the development of large-scale systems from
strictly deterministic to non-deterministic and adaptive.
Autonomic networking aims to solve the mounting problems created by
increasingly complex networks, by enabling devices and
service-providers to decide, preferably without human intervention,
what to do at any given moment, and ultimately to create
self-managing networks that can interface with each other, adapting
their behavior to provide the best service to the end-user in all
situations. This book gives both an understanding and an assessment
of the principles, methods and architectures in autonomous network
management, as well as lessons learned from, the ongoing
initiatives in the field. It includes contributions from industry
groups at Orange Labs, Motorola, Ericsson, the ANA EU Project and
leading universities. These groups all provide chapters examining
the international research projects to which they are contributing,
such as the EU Autonomic Network Architecture Project and Ambient
Networks EU Project, reviewing current developments and
demonstrating how autonomic management principles are used to
define new architectures, models, protocols, and mechanisms for
future network equipment.
Network Function Virtualization provides an architectural,
vendor-neutral level overview of the issues surrounding the large
levels of data storage and transmission requirements needed for
today's companies, also enumerating the benefits of NFV for the
enterprise. Drawing upon years of practical experience, and using
numerous examples and an easy-to-understand framework, authors Tom
Nadeau and Ken Gary discuss the relevancy of NFV and how it can be
effectively used to create and deploy new services. Readers will
learn how to determine if network function virtualization is right
for their enterprise network, be able to use hands-on, step-by-step
guides to design, deploy, and manage NFV in an enterprise, and
learn how to evaluate all relevant NFV standards, including ETSI,
IETF, Openstack, and Open Daylight.
|
|