![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
Between adolescence and adulthood, individuals begin to explore themselves mentally and emotionally in an attempt to figure out who they are and where they fit in society. Social technologies in the modern age have ushered in an era where these evolving adolescents must circumvent the negative pressures of online influences while also still trying to learn how to be utterly independent. Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships is a collection of critical reference materials that provides imperative research on identity exploration in emerging adults and examines how digital media is used to help explore and develop one's identity. While highlighting topics such as mobile addiction, online intimacy, and cyber aggression, this publication explores a crucial developmental period in the human lifespan and how digital media hinders (or helps) maturing adults navigate life. This book is ideally designed for therapists, psychologists, sociologists, psychiatrists, researchers, educators, academicians, and professionals.
Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.
Vehicular traffic congestion and accidents remain universal issues in today's world. Due to the continued growth in the use of vehicles, optimizing traffic management operations is an immense challenge. To reduce the number of traffic accidents, improve the performance of transportation systems, enhance road safety, and protect the environment, vehicular ad-hoc networks have been introduced. Current developments in wireless communication, computing paradigms, big data, and cloud computing enable the enhancement of these networks, equipped with wireless communication capabilities and high-performance processing tools. Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference source that provides vital research on cloud and data analytic applications in intelligent transportation systems. While highlighting topics such as location routing, accident detection, and data warehousing, this publication addresses future challenges in vehicular ad-hoc networks and presents viable solutions. This book is ideally designed for researchers, computer scientists, engineers, automobile industry professionals, IT practitioners, academicians, and students seeking current research on cloud computing models in vehicular networks.
With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization's information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.
The implementation of wireless sensor networks has wide-ranging applications for monitoring various physical and environmental settings. However, certain limitations with these technologies must be addressed in order to effectively utilize them. The Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures is a pivotal reference source for the latest research on recent innovations and developments in the field of wireless sensors. Examining the advantages and challenges presented by the application of these networks in various areas, this book is ideally designed for academics, researchers, students, and IT developers.
The enormous spread of devices gives access to virtual networks and to cyberspace areas where continuous flows of data and information are exchanged, increasing the risk of information warfare, cyber-espionage, cybercrime, and identity hacking. The number of individuals and companies that suffer data breaches has increased vertically with serious reputational and economic damage internationally. Thus, the protection of personal data and intellectual property has become a priority for many governments. Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments is an essential scholarly publication that aims to explore perspectives and approaches to intelligence analysis and performance and combines theoretical underpinnings with practical relevance in order to sensitize insights into training activities to manage uncertainty and risks in the decision-making process. Featuring a range of topics such as crisis management, policy making, and risk analysis, this book is ideal for managers, analysts, politicians, IT specialists, data scientists, policymakers, government officials, researchers, academicians, professionals, and security experts.
Topics in Parallel and Distributed Computing provides resources and guidance for those learning PDC as well as those teaching students new to the discipline. The pervasiveness of computing devices containing multicore CPUs and GPUs, including home and office PCs, laptops, and mobile devices, is making even common users dependent on parallel processing. Certainly, it is no longer sufficient for even basic programmers to acquire only the traditional sequential programming skills. The preceding trends point to the need for imparting a broad-based skill set in PDC technology. However, the rapid changes in computing hardware platforms and devices, languages, supporting programming environments, and research advances, poses a challenge both for newcomers and seasoned computer scientists. This edited collection has been developed over the past several years in conjunction with the IEEE technical committee on parallel processing (TCPP), which held several workshops and discussions on learning parallel computing and integrating parallel concepts into courses throughout computer science curricula.
GPU-based Parallel Implementation of Swarm Intelligence Algorithms combines and covers two emerging areas attracting increased attention and applications: graphics processing units (GPUs) for general-purpose computing (GPGPU) and swarm intelligence. This book not only presents GPGPU in adequate detail, but also includes guidance on the appropriate implementation of swarm intelligence algorithms on the GPU platform. GPU-based implementations of several typical swarm intelligence algorithms such as PSO, FWA, GA, DE, and ACO are presented and having described the implementation details including parallel models, implementation considerations as well as performance metrics are discussed. Finally, several typical applications of GPU-based swarm intelligence algorithms are presented. This valuable reference book provides a unique perspective not possible by studying either GPGPU or swarm intelligence alone. This book gives a complete and whole picture for interested readers and new comers who will find many implementation algorithms in the book suitable for immediate use in their projects. Additionally, some algorithms can also be used as a starting point for further research.
Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms. The field of congestion control has seen many notable advances in recent years and the purpose of this book, which is targeted towards the advanced and intermediate reader, is to inform about the most important developments in this area. The book should enable the reader to gain a good understanding of the application of congestion control theory to a number of application domains such as Data Center Networks, Video Streaming, High Speed Links and Broadband Wireless Networks. When seen through the lens of analytical modeling, there are a number of common threads that run through the design and analysis of congestion control protocols in all these different areas, which are emphasized in this book. The book also cuts a path through the profusion of algorithms in the literature, and puts the topic on a systematic and logical footing. Internet Congestion Control provides practicing network engineers and researchers with a comprehensive and accessible coverage of analytical models of congestion control algorithms, and gives readers everything needed to understand the latest developments and research in this area.
As the world becomes digitalized, developing countries are starting to see an increase in technological advancements being integrated into their society. These advancements are creating opportunities to improve both the economy and the lives of people within these areas. Affordability Issues Surrounding the Use of ICT for Development and Poverty Reduction is a relevant scholarly publication that examines the importance of information and communications technology (ICT) and its ability to aid in developing countries and the methods to make such technologies more accessible and cost less. Featuring coverage on a wide range of topics, including community networks, infrastructure sharing, and the digital divide, this book is geared toward academics, technology developers, researchers, students, practitioners, and professionals interested in the importance of understanding technological innovations.
Wireless Public Safety Networks, Volume One: Overview and Challenges presents the latest advances in the wireless Public Safety Networks (PSNs) field, the networks established by authorities to either prepare the population for an eminent catastrophe, or as support during crisis and normalization phases. Maintaining communication capabilities in a disaster scenario is crucial for avoiding loss of lives and damages to property. Wireless Public Safety Networks examines past communication failures that have directly contributed to the loss of lives. This book will give readers a broad view of the PSNs field, analyzing the benefits PSNs may bring to society, the main challenges related to the establishment and maintenance of these networks, the latest advancements in the field, and future perspectives.
Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.
As the confluence of networks that is the modern Internet grows to encompass everything from nuclear reactors to home appliances, the affordances offered to the average citizen grow as well-but so, too, do the resources made available to those with malicious intent. Through the rise of Big Data and the Internet of Things, terrorist organizations today have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare-which grants great advantage to the attacker-has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. The Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers. Touching on such subjects as cyber-profiling, hacktivism, and digital counterterrorism, this collection offers the tools to begin formulating a ground-up resiliency to cybersecurity threats that starts at the civilian level.
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim's IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.
Shaping Future 6G Networks Discover the societal and technology drivers contributing to build the next generation of wireless telecommunication networks Shaping Future 6G Networks: Needs, Impacts, and Technologies is a holistic snapshot on the evolution of 5G technologies towards 6G. With contributions from international key players in industry and academia, the book presents the hype versus the realistic capabilities of 6G technologies, and delivers cutting-edge business and technological insights into the future wireless telecommunications landscape. You'll learn about: Forthcoming demand for post 5G networks, including new requirements coming from small and large businesses, manufacturing, logistics, and automotive industry Societal implications of 6G, including digital sustainability, strategies for increasing energy efficiency, as well as future open networking ecosystems Impacts of integrating non-terrestrial networks to build the 6G architecture Opportunities for emerging THz radio access technologies in future integrated communications, positioning, and sensing capabilities in 6G Design of highly modular and distributed 6G core networks driven by the ongoing RAN-Core integration and the benefits of AI/ML-based control and management Disruptive architectural considerations influenced by the Post-Shannon Theory The insights in Shaping Future 6G Networks will greatly benefit IT engineers and managers focused on the future of networking, as well as undergraduate and graduate engineering students focusing on the design, implementation, and management of mobile networks and applications. |
You may like...
Machine Vision and Mechatronics in…
John Billingsley, Peter Brett
Hardcover
R4,757
Discovery Miles 47 570
Complex Orthogonal Space-Time Processing…
Le Chung Tran, Tadeusz A. Wysocki, …
Hardcover
R4,150
Discovery Miles 41 500
Optoelectronics in Machine Vision-Based…
Moises Rivas-Lopez, Oleg Sergiyenko, …
Hardcover
R5,649
Discovery Miles 56 490
Infrared Thermography in the Evaluation…
Carosena Meola, Simone Boccardi, …
Hardcover
R3,497
Discovery Miles 34 970
Trends and Advancements of Image…
Prashant Johri, Mario Jose Divan, …
Hardcover
R3,675
Discovery Miles 36 750
|