|
|
Books > Computing & IT > Computer communications & networking
Big Data analytics is the complex process of examining big data to
uncover information such as correlations, hidden patterns, trends
and user and customer preferences, to allow organizations and
businesses to make more informed decisions. These methods and
technologies have become ubiquitous in all fields of science,
engineering, business and management due to the rise of data-driven
models as well as data engineering developments using parallel and
distributed computational analytics frameworks, data and algorithm
parallelization, and GPGPU programming. However, there remain
potential issues that need to be addressed to enable big data
processing and analytics in real time. In the first volume of this
comprehensive two-volume handbook, the authors present several
methodologies to support Big Data analytics including database
management, processing frameworks and architectures, data lakes,
query optimization strategies, towards real-time data processing,
data stream analytics, Fog and Edge computing, and Artificial
Intelligence and Big Data. The second volume is dedicated to a wide
range of applications in secure data storage, privacy-preserving,
Software Defined Networks (SDN), Internet of Things (IoTs),
behaviour analytics, traffic predictions, gender based
classification on e-commerce data, recommender systems, Big Data
regression with Apache Spark, visual sentiment analysis, wavelet
Neural Network via GPU, stock market movement predictions, and
financial reporting. The two-volume work is aimed at providing a
unique platform for researchers, engineers, developers, educators
and advanced students in the field of Big Data analytics.
Data Communications and Networking, 6th Edition, teaches the
principles of networking using TCP/IP protocol suite. It employs a
bottom-up approach where each layer in the TCP/IP protocol suite is
built on the services provided by the layer below. This edition has
undergone a major restructuring to reduce the number of chapters
and focus on the organization of TCP/IP protocol suite. It
concludes with three chapters that explore multimedia, network
management, and cryptography/network security. Technologies related
to data communications and networking are among the fastest growing
in our culture today, and there is no better guide to this rapidly
expanding field than Data Communications and Networking.
This book is a general introduction to the statistical analysis of
networks, and can serve both as a research monograph and as a
textbook. Numerous fundamental tools and concepts needed for the
analysis of networks are presented, such as network modeling,
community detection, graph-based semi-supervised learning and
sampling in networks. The description of these concepts is
self-contained, with both theoretical justifications and
applications provided for the presented algorithms.Researchers,
including postgraduate students, working in the area of network
science, complex network analysis, or social network analysis, will
find up-to-date statistical methods relevant to their research
tasks. This book can also serve as textbook material for courses
related to thestatistical approach to the analysis of complex
networks.In general, the chapters are fairly independent and
self-supporting, and the book could be used for course composition
"a la carte". Nevertheless, Chapter 2 is needed to a certain degree
for all parts of the book. It is also recommended to read Chapter 4
before reading Chapters 5 and 6, but this is not absolutely
necessary. Reading Chapter 3 can also be helpful before reading
Chapters 5 and 7. As prerequisites for reading this book, a basic
knowledge in probability, linear algebra and elementary notions of
graph theory is advised. Appendices describing required notions
from the above mentioned disciplines have been added to help
readers gain further understanding.
The emergence of cloud computing, internet of things, mobile
technologies, and social networking have created better-connected
members of the public who are digitally linked with each other in
real time. Establishing this two-way interaction between citizens
and governments has thus become attractive and an expected feature
of governments worldwide. Previously, federal and local governments
relied on first-generation technologies to provide basic levels of
automation and digitization. Now, because of their desire to become
more open, transparent, accountable, and connected, newer
technologies including cloud computing, mobile networking, big data
analytics, Web 2.0, and social media must be developed and
utilized. Web 2.0 and Cloud Technologies for Implementing Connected
Government is an essential reference source that presents various
dimensions of connected government and connected e-governance
visions as well as the latest emerging technologies. Offering
development methodologies, practical examples, best practices, case
studies, and the latest research, this book covers new strategies
for implementing better-connected government models and the
technologies that serve to establish these frameworks, including
in-depth examinations of mobile technologies, automation, business
intelligence, etc. as well as the various ethical and security
issues surrounding the use and protection of data. This book is
essential for federal, state, and local government officials;
policymakers; civil servants; IT specialists; security analysts;
academicians; researchers; and students.
First designed to generate personalized recommendations to users in
the 90s, recommender systems apply knowledge discovery techniques
to users' data to suggest information, products, and services that
best match their preferences. In recent decades, we have seen an
exponential increase in the volumes of data, which has introduced
many new challenges. Divided into two volumes, this comprehensive
set covers recent advances, challenges, novel solutions, and
applications in big data recommender systems. Volume 1 contains 14
chapters addressing foundations, algorithms and architectures,
approaches for big data, and trust and security measures. Volume 2
covers a broad range of application paradigms for recommender
systems over 22 chapters.
Modern businesses are on the lookout for ventures that boost their
profits and marketability. Certain new and innovative technological
advances can help enterprises accomplish their ambitious goals
while providing detailed information to assess all aspects of the
business. Global Virtual Enterprises in Cloud Computing
Environments is a collection of innovative studies on business
processes, procedures, methods, strategy, management thinking, and
utilization of technology in cloud computing environments. While
highlighting topics including international business strategy,
virtual reality, and intellectual capital, this book is ideally
designed for corporate executives, research scholars, and students
pursuing courses in the areas of management and big data
applications seeking current research on effective open innovation
strategies in global business.
Digital transformation is a revolutionary technology that will play
a vital role in major industries, including global governments.
These administrations are taking the initiative to incorporate
digital programs with their objective being to provide digital
infrastructure as a basic utility for every citizen, provide on
demand services with superior governance, and empower their
citizens digitally. However, security and privacy are major
barriers in adopting these mechanisms, as organizations and
individuals are concerned about their private and financial data.
Impact of Digital Transformation on Security Policies and Standards
is an essential research book that examines the policies,
standards, and mechanisms for security in all types of digital
applications and focuses on blockchain and its imminent impact on
financial services in supporting smart government, along with
bitcoin and the future of digital payments. Highlighting topics
such as cryptography, privacy management, and e-government, this
book is ideal for security analysts, data scientists, academicians,
policymakers, security professionals, IT professionals, government
officials, finance professionals, researchers, and students.
Ongoing advancements in modern technology have led to significant
developments with smart technologies. With the numerous
applications available, it becomes imperative to conduct research
and make further progress in this field. Smart Technologies:
Breakthroughs in Research and Practice provides comprehensive and
interdisciplinary research on the most emerging areas of
information science and technology. Including innovative studies on
image and speech recognition, human-computer interface, and
wireless technologies, this multi-volume book is an ideal source
for researchers, academicians, practitioners, and students
interested in advanced technological applications and developments.
As the applications of the Internet of Things continue to progress,
so do the security concerns for this technology. The study of
threat prevention in the Internet of Things is necessary, as
security breaches in this field can ruin industries and lives.
Security Breaches and Threat Prevention in the Internet of Things
provides a comprehensive examination of the latest strategies and
methods for tracking and blocking threats within industries that
work heavily with this technology. Featuring chapters on emerging
topics such as security threats in autonomous vehicles, digital
forensics, secure communications, and image encryption, this
critical reference source is a valuable tool for all academicians,
graduate students, practitioners, professionals, and researchers
who are interested in expanding their knowledge of security
practices pertaining to the Internet of Things.
As society continues to heavily rely on software and databases, the
risks for cyberattacks have increased rapidly. As the dependence on
computers has become gradually widespread throughout communities
and governments, there is a need for cybersecurity programs that
can assist in protecting sizeable networks and significant amounts
of data at once. Implementing overarching security policies for
software systems is integral to protecting community-wide data from
harmful attacks. Establishing Cyber Security Programs Through the
Community Cyber Security Maturity Model (CCSMM) is an essential
reference source that discusses methods in applying sustainable
cybersecurity programs and policies within organizations,
governments, and other communities. Featuring research on topics
such as community engagement, incident planning methods, and
information sharing, this book is ideally designed for
cybersecurity professionals, security analysts, managers,
researchers, policymakers, students, practitioners, and
academicians seeking coverage on novel policies and programs in
cybersecurity implementation.
Steganography is the art of secret writing. The purpose of
steganography is to hide the presence of a message from the
intruder by using state-of-the-art methods, algorithms,
architectures, models, and methodologies in the domains of cloud,
internet of things (IoT), and the Android platform. Though security
controls in cloud computing, IoT, and Android platforms are not
much different than security controls in an IT environment, they
might still present different types of risks to an organization
than the classic IT solutions. Therefore, a detailed discussion is
needed in case there is a breach in security. It is important to
review the security aspects of cloud, IoT, and Android platforms
related to steganography to determine how this new technology is
being utilized and improved continuously to protect information
digitally. The benefits and challenges, along with the current and
potential developments for the future, are important keystones in
this critical area of security research. Multidisciplinary Approach
to Modern Digital Steganography reviews the security aspects of
cloud, IoT, and Android platforms related to steganography and
addresses emerging security concerns, new algorithms, and case
studies in the field. Furthermore, the book presents a new approach
to secure data storage on cloud infrastructure and IoT along with
including discussions on optimization models and security controls
that could be implemented. Other important topics include data
transmission, deep learning techniques, machine learning, and both
image and text stenography. This book is essential for forensic
engineers, forensic analysts, cybersecurity analysts, cyber
forensic examiners, security engineers, cybersecurity network
analysts, cyber network defense analysts, and digital forensic
examiners along with practitioners, researchers, academicians, and
students interested in the latest techniques and state-of-the-art
methods in digital steganography.
|
You may like...
The Party
Elizabeth Day
Paperback
(1)
R290
R264
Discovery Miles 2 640
|