|
|
Books > Computing & IT > Computer communications & networking
Steganography is the art of secret writing. The purpose of
steganography is to hide the presence of a message from the
intruder by using state-of-the-art methods, algorithms,
architectures, models, and methodologies in the domains of cloud,
internet of things (IoT), and the Android platform. Though security
controls in cloud computing, IoT, and Android platforms are not
much different than security controls in an IT environment, they
might still present different types of risks to an organization
than the classic IT solutions. Therefore, a detailed discussion is
needed in case there is a breach in security. It is important to
review the security aspects of cloud, IoT, and Android platforms
related to steganography to determine how this new technology is
being utilized and improved continuously to protect information
digitally. The benefits and challenges, along with the current and
potential developments for the future, are important keystones in
this critical area of security research. Multidisciplinary Approach
to Modern Digital Steganography reviews the security aspects of
cloud, IoT, and Android platforms related to steganography and
addresses emerging security concerns, new algorithms, and case
studies in the field. Furthermore, the book presents a new approach
to secure data storage on cloud infrastructure and IoT along with
including discussions on optimization models and security controls
that could be implemented. Other important topics include data
transmission, deep learning techniques, machine learning, and both
image and text stenography. This book is essential for forensic
engineers, forensic analysts, cybersecurity analysts, cyber
forensic examiners, security engineers, cybersecurity network
analysts, cyber network defense analysts, and digital forensic
examiners along with practitioners, researchers, academicians, and
students interested in the latest techniques and state-of-the-art
methods in digital steganography.
6G Key Technologies An accessible and integrated roadmap to the
technologies enabling 6G development In 6G Key Technologies: A
Comprehensive Guide, two internationally well-recognized experts
deliver a thoroughly original and comprehensive exploration of the
technologies enabling and contributing to the development of 6G.
The book presents the vision of 6G by reviewing the evolution of
communications technologies toward 6G and examining the factors
driving that development, as well as their requirements, use cases,
key performance indicators, and more. Readers will discover:
Thorough introductions to the standardization and technology
evolution toward 6G, as well as the vision behind the development
of 6G in terms of architectures, algorithms, protocols, and
applications. In-depth explorations of full-spectrum wireless
technologies in 6G, including enhanced millimeter wave
technologies, terahertz-based communications and networking,
visible-light and optical wireless communications. Fulsome
discussions of smart radio networks and new air interface
technologies for 6G including intelligent reflecting surface,
cellular massive MIMO, cell-free massive MIMO, adaptive and
non-orthogonal multiple access technologies. Perfect for
professional engineers, researchers, manufacturers, network
operators, and software developers, 6G Key Technologies: A
Comprehensive Guide will also earn a place in the libraries of
graduate students studying in wireless communications, artificial
intelligence, signal processing, microwave technology, information
theory, antenna and propagation, system-on-chip implementation, and
computer networks.
Interdisciplinary and multidisciplinary research is slowly yet
steadily revolutionizing traditional education. However,
multidisciplinary research can and will also improve the extent to
which a country can protect its critical and vital assets. Applying
Methods of Scientific Inquiry Into Intelligence, Security, and
Counterterrorism is an essential scholarly publication that
provides personnel directly working in the fields of intelligence,
law enforcement, and science with the opportunity to understand the
multidisciplinary nature of intelligence and science in order to
improve current intelligence activities and contribute to the
protection of the nation. Each chapter of the book discusses
various components of science that should be applied to the
intelligence arena. Featuring coverage on a range of topics
including cybersecurity, economics, and political strategy, this
book is ideal for law enforcement, intelligence and security
practitioners, students, educators, and researchers.
Complex Systems and Clouds: A Self-Organization and Self-Management
Perspective provides insights into the intricate world of
self-organizing systems. Large scale distributed computer systems
have evolved into very complex systems and are at the point where
they need to borrow self-adapting organizing concepts from nature.
The book explores complexity in big distributed systems and in the
natural processes in physics and chemistry, building a platform for
understanding how self-organization in big distributed systems can
be achieved. It goes beyond the theoretical description of
self-organization to present principles for designing
self-organizing systems, and concludes by showing the need for a
paradigm shift in the development of large-scale systems from
strictly deterministic to non-deterministic and adaptive.
Autonomic networking aims to solve the mounting problems created by
increasingly complex networks, by enabling devices and
service-providers to decide, preferably without human intervention,
what to do at any given moment, and ultimately to create
self-managing networks that can interface with each other, adapting
their behavior to provide the best service to the end-user in all
situations. This book gives both an understanding and an assessment
of the principles, methods and architectures in autonomous network
management, as well as lessons learned from, the ongoing
initiatives in the field. It includes contributions from industry
groups at Orange Labs, Motorola, Ericsson, the ANA EU Project and
leading universities. These groups all provide chapters examining
the international research projects to which they are contributing,
such as the EU Autonomic Network Architecture Project and Ambient
Networks EU Project, reviewing current developments and
demonstrating how autonomic management principles are used to
define new architectures, models, protocols, and mechanisms for
future network equipment.
Network Function Virtualization provides an architectural,
vendor-neutral level overview of the issues surrounding the large
levels of data storage and transmission requirements needed for
today's companies, also enumerating the benefits of NFV for the
enterprise. Drawing upon years of practical experience, and using
numerous examples and an easy-to-understand framework, authors Tom
Nadeau and Ken Gary discuss the relevancy of NFV and how it can be
effectively used to create and deploy new services. Readers will
learn how to determine if network function virtualization is right
for their enterprise network, be able to use hands-on, step-by-step
guides to design, deploy, and manage NFV in an enterprise, and
learn how to evaluate all relevant NFV standards, including ETSI,
IETF, Openstack, and Open Daylight.
With the internet of things (IoT), it is proven that enormous
networks can be created to interconnect objects and facilitate
daily life in a variety of domains. Research is needed to study how
these improvements can be applied in different ways, using
different technologies, and through the creation of different
applications. IoT Protocols and Applications for Improving
Industry, Environment, and Society contains the latest research on
the most important areas and challenges in the internet of things
and its intersection with technologies and tools such as artificial
intelligence, blockchain, model-driven engineering, and cloud
computing. The book covers subfields that examine smart homes,
smart towns, smart earth, and the industrial internet of things in
order to improve daily life, protect the environment, and create
safer and easier jobs. While covering a range of topics within IoT
including Industry 4.0, security, and privacy, this book is ideal
for computer scientists, engineers, practitioners, stakeholders,
researchers, academicians, and students who are interested in the
latest applications of IoT.
Researchers have harnessed the flood of personal information and
opinions shared on social media platforms in a variety of ways.
People communicate not only what they imagine they are purposely
sharing but also unintentionally leak information, which allows
others to glimpse a sense of the subconscious and unconscious at a
macro level. Electronic Hive Minds on Social Media: Emerging
Research and Opportunities explores various research techniques to
profile the electronic hive mind around social topics as expressed
on various modalities of social media, from human, bot, and cyborg
social media accounts, and proposes new research methods for
harnessing public data from social media platforms. Highlighting
topics such as knowledge sharing, swarm intelligence, and social
psychology, this publication is designed for researchers, social
psychologists, practitioners, and students in marketing,
communications, mass media, and similar fields.
Cyber-Physical Systems: Foundations, Principles and Applications
explores the core system science perspective needed to design and
build complex cyber-physical systems. Using Systems Science's
underlying theories, such as probability theory, decision theory,
game theory, organizational sociology, behavioral economics, and
cognitive psychology, the book addresses foundational issues
central across CPS applications, including System Design -- How to
design CPS to be safe, secure, and resilient in rapidly evolving
environments, System Verification -- How to develop effective
metrics and methods to verify and certify large and complex CPS,
Real-time Control and Adaptation -- How to achieve real-time
dynamic control and behavior adaptation in a diverse environments,
such as clouds and in network-challenged spaces, Manufacturing --
How to harness communication, computation, and control for
developing new products, reducing product concepts to realizable
designs, and producing integrated software-hardware systems at a
pace far exceeding today's timeline. The book is part of the
Intelligent Data-Centric Systems: Sensor-Collected Intelligence
series edited by Fatos Xhafa, Technical University of Catalonia.
Indexing: The books of this series are submitted to EI-Compendex
and SCOPUS
Modern society has become dependent on technology, allowing
personal information to be input and used across a variety of
personal and professional systems. From banking to medical records
to e-commerce, sensitive data has never before been at such a high
risk of misuse. As such, organizations now have a greater
responsibility than ever to ensure that their stakeholder data is
secured, leading to the increased need for cybersecurity
specialists and the development of more secure software and
systems. To avoid issues such as hacking and create a safer online
space, cybersecurity education is vital and not only for those
seeking to make a career out of cybersecurity, but also for the
general public who must become more aware of the information they
are sharing and how they are using it. It is crucial people learn
about cybersecurity in a comprehensive and accessible way in order
to use the skills to better protect all data. The Research
Anthology on Advancements in Cybersecurity Education discusses
innovative concepts, theories, and developments for not only
teaching cybersecurity, but also for driving awareness of efforts
that can be achieved to further secure sensitive data. Providing
information on a range of topics from cybersecurity education
requirements, cyberspace security talents training systems, and
insider threats, it is ideal for educators, IT developers,
education professionals, education administrators, researchers,
security analysts, systems engineers, software security engineers,
security professionals, policymakers, and students.
The development of software has expanded substantially in recent
years. As these technologies continue to advance, well-known
organizations have begun implementing these programs into the ways
they conduct business. These large companies play a vital role in
the economic environment, so understanding the software that they
utilize is pertinent in many aspects. Researching and analyzing the
tools that these corporations use will assist in the practice of
software engineering and give other organizations an outline of how
to successfully implement their own computational methods. Tools
and Techniques for Software Development in Large Organizations:
Emerging Research and Opportunities is an essential reference
source that discusses advanced software methods that prominent
companies have adopted to develop high quality products. This book
will examine the various devices that organizations such as Google,
Cisco, and Facebook have implemented into their production and
development processes. Featuring research on topics such as
database management, quality assurance, and machine learning, this
book is ideally designed for software engineers, data scientists,
developers, programmers, professors, researchers, and students
seeking coverage on the advancement of software devices in today's
major corporations.
RFID and Wireless Sensors using Ultra-Wideband Technology explores
how RFID-based technologies are becoming the first choice to
realize the last (wireless) link in the chain between each element
and the Internet due to their low cost and simplicity. Each day,
more and more elements are being connected to the Internet of
Things. In this book, ultra-wideband radio technology (in time
domain) is exploited to realize this wireless link. Chipless,
semi-passive and active RFID systems and wireless sensors and
prototypes are proposed in terms of reader (setup and signal
processing techniques) and tags (design, integration of sensors and
performance). The authors include comprehensive theories, proposals
of advanced techniques, and their implementation to help readers
develop time-domain ultra-wideband radio technology for a variety
of applications. This book is suitable for post-doctoral
candidates, experienced researchers, and engineers developing RFID,
tag antenna designs, chipless RFID, and sensor integration.
Wireless Public Safety Networks, Volume Two: A Systematic Approach
presents the latest advances in the wireless Public Safety Networks
(PSNs) field, the networks established by authorities to either
prepare the population for an eminent catastrophe, or those used
for support during crisis and normalization phases. Maintaining
communication capabilities in a disaster scenario is crucial for
avoiding loss of lives and damages to property. This book examines
past communication failures that have directly contributed to the
loss of lives, giving readers in-depth discussions of the public
networks that impact emergency management, covering social media,
crowdsourcing techniques, wearable wireless sensors, moving-cells
scenarios, mobility management protocols, 5G networks, broadband
networks, data dissemination, and the resources of the frequency
spectrum.
|
|