|
|
Books > Computing & IT > Computer communications & networking
Data Communications and Networking, 6th Edition, teaches the
principles of networking using TCP/IP protocol suite. It employs a
bottom-up approach where each layer in the TCP/IP protocol suite is
built on the services provided by the layer below. This edition has
undergone a major restructuring to reduce the number of chapters
and focus on the organization of TCP/IP protocol suite. It
concludes with three chapters that explore multimedia, network
management, and cryptography/network security. Technologies related
to data communications and networking are among the fastest growing
in our culture today, and there is no better guide to this rapidly
expanding field than Data Communications and Networking.
This book is a general introduction to the statistical analysis of
networks, and can serve both as a research monograph and as a
textbook. Numerous fundamental tools and concepts needed for the
analysis of networks are presented, such as network modeling,
community detection, graph-based semi-supervised learning and
sampling in networks. The description of these concepts is
self-contained, with both theoretical justifications and
applications provided for the presented algorithms.Researchers,
including postgraduate students, working in the area of network
science, complex network analysis, or social network analysis, will
find up-to-date statistical methods relevant to their research
tasks. This book can also serve as textbook material for courses
related to thestatistical approach to the analysis of complex
networks.In general, the chapters are fairly independent and
self-supporting, and the book could be used for course composition
"a la carte". Nevertheless, Chapter 2 is needed to a certain degree
for all parts of the book. It is also recommended to read Chapter 4
before reading Chapters 5 and 6, but this is not absolutely
necessary. Reading Chapter 3 can also be helpful before reading
Chapters 5 and 7. As prerequisites for reading this book, a basic
knowledge in probability, linear algebra and elementary notions of
graph theory is advised. Appendices describing required notions
from the above mentioned disciplines have been added to help
readers gain further understanding.
The Dark Web is a known hub that hosts myriad illegal activities
behind the veil of anonymity for its users. For years now, law
enforcement has been struggling to track these illicit activities
and put them to an end. However, the depth and anonymity of the
Dark Web has made these efforts difficult, and as cyber criminals
have more advanced technologies available to them, the struggle
appears to only have the potential to worsen. Law enforcement and
government organizations also have emerging technologies on their
side, however. It is essential for these organizations to stay up
to date on these emerging technologies, such as computational
intelligence, in order to put a stop to the illicit activities and
behaviors presented in the Dark Web. Using Computational
Intelligence for the Dark Web and Illicit Behavior Detection
presents the emerging technologies and applications of
computational intelligence for the law enforcement of the Dark Web.
It features analysis into cybercrime data, examples of the
application of computational intelligence in the Dark Web, and
provides future opportunities for growth in this field. Covering
topics such as cyber threat detection, crime prediction, and
keyword extraction, this premier reference source is an essential
resource for government organizations, law enforcement agencies,
non-profit organizations, politicians, computer scientists,
researchers, students, and academicians.
Vehicular networks were first developed to ensure safe driving and
to extend the Internet to the road. However, we can now see that
the ability of vehicles to engage in cyber-activity may result in
tracking and privacy violations through the interception of
messages, which are frequently exchanged on road. This book serves
as a guide for students, developers and researchers who are
interested in vehicular networks and the associated security and
privacy issues. It facilitates the understanding of the
technologies used and their various types, highlighting the
importance of privacy and security issues and the direct impact
they have on the safety of their users. It also explains various
solutions and proposals to protect location and identity privacy,
including two anonymous authentication methods that preserve
identity privacy and a total of five schemes that preserve location
privacy in the vehicular ad hoc networks and the cloud-enabled
internet of vehicles, respectively.
First designed to generate personalized recommendations to users in
the 90s, recommender systems apply knowledge discovery techniques
to users' data to suggest information, products, and services that
best match their preferences. In recent decades, we have seen an
exponential increase in the volumes of data, which has introduced
many new challenges. Divided into two volumes, this comprehensive
set covers recent advances, challenges, novel solutions, and
applications in big data recommender systems. Volume 1 contains 14
chapters addressing foundations, algorithms and architectures,
approaches for big data, and trust and security measures. Volume 2
covers a broad range of application paradigms for recommender
systems over 22 chapters.
Modern businesses are on the lookout for ventures that boost their
profits and marketability. Certain new and innovative technological
advances can help enterprises accomplish their ambitious goals
while providing detailed information to assess all aspects of the
business. Global Virtual Enterprises in Cloud Computing
Environments is a collection of innovative studies on business
processes, procedures, methods, strategy, management thinking, and
utilization of technology in cloud computing environments. While
highlighting topics including international business strategy,
virtual reality, and intellectual capital, this book is ideally
designed for corporate executives, research scholars, and students
pursuing courses in the areas of management and big data
applications seeking current research on effective open innovation
strategies in global business.
Digital transformation is a revolutionary technology that will play
a vital role in major industries, including global governments.
These administrations are taking the initiative to incorporate
digital programs with their objective being to provide digital
infrastructure as a basic utility for every citizen, provide on
demand services with superior governance, and empower their
citizens digitally. However, security and privacy are major
barriers in adopting these mechanisms, as organizations and
individuals are concerned about their private and financial data.
Impact of Digital Transformation on Security Policies and Standards
is an essential research book that examines the policies,
standards, and mechanisms for security in all types of digital
applications and focuses on blockchain and its imminent impact on
financial services in supporting smart government, along with
bitcoin and the future of digital payments. Highlighting topics
such as cryptography, privacy management, and e-government, this
book is ideal for security analysts, data scientists, academicians,
policymakers, security professionals, IT professionals, government
officials, finance professionals, researchers, and students.
As the applications of the Internet of Things continue to progress,
so do the security concerns for this technology. The study of
threat prevention in the Internet of Things is necessary, as
security breaches in this field can ruin industries and lives.
Security Breaches and Threat Prevention in the Internet of Things
provides a comprehensive examination of the latest strategies and
methods for tracking and blocking threats within industries that
work heavily with this technology. Featuring chapters on emerging
topics such as security threats in autonomous vehicles, digital
forensics, secure communications, and image encryption, this
critical reference source is a valuable tool for all academicians,
graduate students, practitioners, professionals, and researchers
who are interested in expanding their knowledge of security
practices pertaining to the Internet of Things.
As society continues to heavily rely on software and databases, the
risks for cyberattacks have increased rapidly. As the dependence on
computers has become gradually widespread throughout communities
and governments, there is a need for cybersecurity programs that
can assist in protecting sizeable networks and significant amounts
of data at once. Implementing overarching security policies for
software systems is integral to protecting community-wide data from
harmful attacks. Establishing Cyber Security Programs Through the
Community Cyber Security Maturity Model (CCSMM) is an essential
reference source that discusses methods in applying sustainable
cybersecurity programs and policies within organizations,
governments, and other communities. Featuring research on topics
such as community engagement, incident planning methods, and
information sharing, this book is ideally designed for
cybersecurity professionals, security analysts, managers,
researchers, policymakers, students, practitioners, and
academicians seeking coverage on novel policies and programs in
cybersecurity implementation.
The optimization of traffic management operations has become a
considerable challenge in today's global scope due to the
significant increase in the number of vehicles, traffic
congestions, and automobile accidents. Fortunately, there has been
substantial progress in the application of intelligent computing
devices to transportation processes. Vehicular ad-hoc networks
(VANETs) are a specific practice that merges the connectivity of
wireless technologies with smart vehicles. Despite its relevance,
empirical research is lacking on the developments being made in
VANETs and how certain intelligent technologies are being applied
within transportation systems. IoT and Cloud Computing Advancements
in Vehicular Ad-Hoc Networks provides emerging research exploring
the theoretical and practical aspects of intelligent transportation
systems and analyzing the modern techniques that are being applied
to smart vehicles through cloud technology. Featuring coverage on a
broad range of topics such as health monitoring, node localization,
and fault tolerance, this book is ideally designed for network
designers, developers, analysists, IT specialists, computing
professionals, researchers, academics, and post-graduate students
seeking current research on emerging computing concepts and
developments in vehicular ad-hoc networks.
Steganography is the art of secret writing. The purpose of
steganography is to hide the presence of a message from the
intruder by using state-of-the-art methods, algorithms,
architectures, models, and methodologies in the domains of cloud,
internet of things (IoT), and the Android platform. Though security
controls in cloud computing, IoT, and Android platforms are not
much different than security controls in an IT environment, they
might still present different types of risks to an organization
than the classic IT solutions. Therefore, a detailed discussion is
needed in case there is a breach in security. It is important to
review the security aspects of cloud, IoT, and Android platforms
related to steganography to determine how this new technology is
being utilized and improved continuously to protect information
digitally. The benefits and challenges, along with the current and
potential developments for the future, are important keystones in
this critical area of security research. Multidisciplinary Approach
to Modern Digital Steganography reviews the security aspects of
cloud, IoT, and Android platforms related to steganography and
addresses emerging security concerns, new algorithms, and case
studies in the field. Furthermore, the book presents a new approach
to secure data storage on cloud infrastructure and IoT along with
including discussions on optimization models and security controls
that could be implemented. Other important topics include data
transmission, deep learning techniques, machine learning, and both
image and text stenography. This book is essential for forensic
engineers, forensic analysts, cybersecurity analysts, cyber
forensic examiners, security engineers, cybersecurity network
analysts, cyber network defense analysts, and digital forensic
examiners along with practitioners, researchers, academicians, and
students interested in the latest techniques and state-of-the-art
methods in digital steganography.
6G Key Technologies An accessible and integrated roadmap to the
technologies enabling 6G development In 6G Key Technologies: A
Comprehensive Guide, two internationally well-recognized experts
deliver a thoroughly original and comprehensive exploration of the
technologies enabling and contributing to the development of 6G.
The book presents the vision of 6G by reviewing the evolution of
communications technologies toward 6G and examining the factors
driving that development, as well as their requirements, use cases,
key performance indicators, and more. Readers will discover:
Thorough introductions to the standardization and technology
evolution toward 6G, as well as the vision behind the development
of 6G in terms of architectures, algorithms, protocols, and
applications. In-depth explorations of full-spectrum wireless
technologies in 6G, including enhanced millimeter wave
technologies, terahertz-based communications and networking,
visible-light and optical wireless communications. Fulsome
discussions of smart radio networks and new air interface
technologies for 6G including intelligent reflecting surface,
cellular massive MIMO, cell-free massive MIMO, adaptive and
non-orthogonal multiple access technologies. Perfect for
professional engineers, researchers, manufacturers, network
operators, and software developers, 6G Key Technologies: A
Comprehensive Guide will also earn a place in the libraries of
graduate students studying in wireless communications, artificial
intelligence, signal processing, microwave technology, information
theory, antenna and propagation, system-on-chip implementation, and
computer networks.
Data is the most important commodity, which is why data protection
has become a global priority. Data breaches and security flaws can
jeopardize the global economy. Organizations face a greater risk of
failing to achieve strategy and business goals as cyber threat
behavior grows in frequency, sophistication, and destructiveness. A
breach can result in data loss, business interruption, brand and
reputation harm, as well as regulatory and legal consequences. A
company needs a well-thought-out cybersecurity strategy to secure
its critical infrastructure and information systems in order to
overcome these challenges. Cross-Industry Applications of Cyber
Security Frameworks provides an understanding of the specific,
standards-based security controls that make up a best practice
cybersecurity program. It is equipped with cross-industry
applications of cybersecurity frameworks, best practices for common
practices, and suggestions that may be highly relevant or
appropriate in every case. Covering topics such as legal
frameworks, cybersecurity in FinTech, and open banking, this
premier reference source is an essential resource for executives,
business leaders, managers, entrepreneurs, IT professionals,
government officials, hospital administrators, educational
administrators, privacy specialists, researchers, and academicians.
|
You may like...
Bird Box
Josh Malerman
Paperback
(1)
R322
R294
Discovery Miles 2 940
Whistle
Linwood Barclay
Paperback
R440
R393
Discovery Miles 3 930
Mothtown
Caroline Hardaker
Paperback
R296
R271
Discovery Miles 2 710
|