![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides emerging research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. Featuring coverage on a broad range of topics such as clustering protocols, intrusion detection, and energy harvesting, this book is ideally designed for researchers, developers, IT professionals, educators, policymakers, practitioners, scientists, theorists, engineers, academicians, and students seeking current research on integrating intelligent techniques into sensor networks for more reliable security practices.
Drawing on research in the social sciences, communications, and other fields, this book wants to analyze how the online environment is influencing the experience of psychology. However, understanding how the Internet is changing our everyday experience presents a substantial challenge for the psychologists. Now, research in this area is still sparse and limited in both the number and scope of studies: actual research, especially studies with strict methodologies, is only just beginning. The contributions in this book are among the first scientific attempts to take a serious look at various aspects of Internet-related psychology. However, we need not start from scratch. Psychology has a broad knowledge about the factors that affect human behaviour in other setting. So, the papers collected for this book are descriptive and practical-oriented in nature.
Modern businesses are on the lookout for ventures that boost their profits and marketability. Certain new and innovative technological advances can help enterprises accomplish their ambitious goals while providing detailed information to assess all aspects of the business. Global Virtual Enterprises in Cloud Computing Environments is a collection of innovative studies on business processes, procedures, methods, strategy, management thinking, and utilization of technology in cloud computing environments. While highlighting topics including international business strategy, virtual reality, and intellectual capital, this book is ideally designed for corporate executives, research scholars, and students pursuing courses in the areas of management and big data applications seeking current research on effective open innovation strategies in global business.
The optimization of traffic management operations has become a considerable challenge in today's global scope due to the significant increase in the number of vehicles, traffic congestions, and automobile accidents. Fortunately, there has been substantial progress in the application of intelligent computing devices to transportation processes. Vehicular ad-hoc networks (VANETs) are a specific practice that merges the connectivity of wireless technologies with smart vehicles. Despite its relevance, empirical research is lacking on the developments being made in VANETs and how certain intelligent technologies are being applied within transportation systems. IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks provides emerging research exploring the theoretical and practical aspects of intelligent transportation systems and analyzing the modern techniques that are being applied to smart vehicles through cloud technology. Featuring coverage on a broad range of topics such as health monitoring, node localization, and fault tolerance, this book is ideally designed for network designers, developers, analysists, IT specialists, computing professionals, researchers, academics, and post-graduate students seeking current research on emerging computing concepts and developments in vehicular ad-hoc networks.
Modern society has become dependent on technology, allowing personal information to be input and used across a variety of personal and professional systems. From banking to medical records to e-commerce, sensitive data has never before been at such a high risk of misuse. As such, organizations now have a greater responsibility than ever to ensure that their stakeholder data is secured, leading to the increased need for cybersecurity specialists and the development of more secure software and systems. To avoid issues such as hacking and create a safer online space, cybersecurity education is vital and not only for those seeking to make a career out of cybersecurity, but also for the general public who must become more aware of the information they are sharing and how they are using it. It is crucial people learn about cybersecurity in a comprehensive and accessible way in order to use the skills to better protect all data. The Research Anthology on Advancements in Cybersecurity Education discusses innovative concepts, theories, and developments for not only teaching cybersecurity, but also for driving awareness of efforts that can be achieved to further secure sensitive data. Providing information on a range of topics from cybersecurity education requirements, cyberspace security talents training systems, and insider threats, it is ideal for educators, IT developers, education professionals, education administrators, researchers, security analysts, systems engineers, software security engineers, security professionals, policymakers, and students.
As technology continues to expand and develop, the internet of things (IoT) is playing a progressive role in the infrastructure of electronics. The increasing amount of IoT devices, however, has led to the emergence of significant privacy and security challenges. Security and Privacy Issues in Sensor Networks and IoT is a collection of innovative research on the methods and applications of protection disputes in the internet of things and other computing structures. While highlighting topics that include cyber defense, digital forensics, and intrusion detection, this book is ideally designed for security analysts, IT specialists, software developers, computer engineers, industry professionals, academicians, students, and researchers seeking current research on defense concerns in cyber physical systems.
Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional education. However, multidisciplinary research can and will also improve the extent to which a country can protect its critical and vital assets. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism is an essential scholarly publication that provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity to understand the multidisciplinary nature of intelligence and science in order to improve current intelligence activities and contribute to the protection of the nation. Each chapter of the book discusses various components of science that should be applied to the intelligence arena. Featuring coverage on a range of topics including cybersecurity, economics, and political strategy, this book is ideal for law enforcement, intelligence and security practitioners, students, educators, and researchers.
Vehicular traffic congestion and accidents remain universal issues in today's world. Due to the continued growth in the use of vehicles, optimizing traffic management operations is an immense challenge. To reduce the number of traffic accidents, improve the performance of transportation systems, enhance road safety, and protect the environment, vehicular ad-hoc networks have been introduced. Current developments in wireless communication, computing paradigms, big data, and cloud computing enable the enhancement of these networks, equipped with wireless communication capabilities and high-performance processing tools. Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference source that provides vital research on cloud and data analytic applications in intelligent transportation systems. While highlighting topics such as location routing, accident detection, and data warehousing, this publication addresses future challenges in vehicular ad-hoc networks and presents viable solutions. This book is ideally designed for researchers, computer scientists, engineers, automobile industry professionals, IT practitioners, academicians, and students seeking current research on cloud computing models in vehicular networks.
As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.
One of the single greatest challenges to security professionals in the 21st century is terrorism. In the last several years, we have heard a lot about the importance of preparing for terrorist attacks. This book offers a way to prevent terrorist attacks. Providing security managers with a clear and simple methodology to protect their organizations, Antiterrorism and Threat Response uses an adaptation of the U.S. Department of Defense's antiterrorism fundamentals and applies it to the private sector to protect companies, facilities, and infrastructures. The book's antiterrorism planning strategies enable security professionals to seize the initiative away from terrorists-setting them off balance and keeping them off balance-thereby disrupting their planning cycle and thwarting attack. The book helps security managers to: Understand the terrorist attack planning cycle Conduct a terrorism threat vulnerability assessment Develop an observation plan and the corresponding verification plan Understand how surveillance detection works Learn how pattern analysis wheels can be used to find weaknesses in security operations Appreciate the role of random antiterrorism measures and learn how to develop them Establish response plans for a wide variety of contingencies related to terrorist attack Adapt this methodology to maritime operations against piracy, individual protection, and travel security in high-risk environments Work with other security departments, the police, and the public to create infrastructure protection zones that will enhance the detection of suspicious events and reduce the likelihood of terrorist attack The book aims to show that terrorists are not defeated by technology alone, but instead by collaboration and the timely passage of relevant information and intelligence. Terrorism is, above all, an act of communication. The terrorists communicate to us through their acts and their carefully crafted communiques. Security professionals need to send the terrorists a clear and simple message in the language they understand: You will not succeed here.
The Dark Web is a known hub that hosts myriad illegal activities behind the veil of anonymity for its users. For years now, law enforcement has been struggling to track these illicit activities and put them to an end. However, the depth and anonymity of the Dark Web has made these efforts difficult, and as cyber criminals have more advanced technologies available to them, the struggle appears to only have the potential to worsen. Law enforcement and government organizations also have emerging technologies on their side, however. It is essential for these organizations to stay up to date on these emerging technologies, such as computational intelligence, in order to put a stop to the illicit activities and behaviors presented in the Dark Web. Using Computational Intelligence for the Dark Web and Illicit Behavior Detection presents the emerging technologies and applications of computational intelligence for the law enforcement of the Dark Web. It features analysis into cybercrime data, examples of the application of computational intelligence in the Dark Web, and provides future opportunities for growth in this field. Covering topics such as cyber threat detection, crime prediction, and keyword extraction, this premier reference source is an essential resource for government organizations, law enforcement agencies, non-profit organizations, politicians, computer scientists, researchers, students, and academicians.
With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization's information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.
As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.
As computers continue to remain essential tools for the pursuit of physics, medicine, economics, social sciences, and more, supercomputers are proving that they can further extend and greatly enhance as-of-yet undiscovered knowledge and solve the world's most complex problems. As these instruments continue to lead to groundbreaking discoveries and breakthroughs, it is imperative that research remains up to date with the latest findings and uses. The Handbook of Research on Methodologies and Applications of Supercomputing is a comprehensive and critical reference book that provides research on the latest advances of control flow and dataflow supercomputing and highlights selected emerging big data applications needing high acceleration and/or low power. Consequently, this book advocates the need for hybrid computing, where the control flow part represents the host architecture and dataflow part represents the acceleration architecture. These issues cover the initial eight chapters. The remaining eight chapters cover selected modern applications that are best implemented on a hybrid computer, in which the transactional parts (serial code) are implemented on the control flow part and the loops (parallel code) on the dataflow part. These final eight chapters cover two major application domains: scientific computing and computing for digital economy. This book offers applications in marketing, medicine, energy systems, and library science, among others, and is an essential source for scientists, programmers, engineers, practitioners, researchers, academicians, and students interested in the latest findings and advancements in supercomputing. |
![]() ![]() You may like...
Fractals in Multimedia
Michael F. Barnsley, Dietmar Saupe, …
Hardcover
R4,434
Discovery Miles 44 340
Demand-Driven Web Services - Theory…
Zhaohao Sun, John Yearwood
Hardcover
R8,817
Discovery Miles 88 170
Implementing Distributed Systems with…
Markus Aleksy, Axel Korthaus, …
Hardcover
R1,729
Discovery Miles 17 290
Performance and Dependability in Service…
Valeria Cardellini, Emiliano Casalicchio, …
Hardcover
R5,423
Discovery Miles 54 230
PHP and MySQL Manual - Simple, yet…
Simon Stobart, Mike Vassileiou
Hardcover
R3,372
Discovery Miles 33 720
Securing the Internet of Things…
Information Reso Management Association
Hardcover
R11,237
Discovery Miles 112 370
Web Portal Design, Implementation…
Jana Polgar, Greg Adamson
Hardcover
R5,203
Discovery Miles 52 030
Emerging Technologies of Augmented…
Michael Haller, Mark Billinghurst, …
Hardcover
R2,868
Discovery Miles 28 680
|