|
|
Books > Computing & IT > Computer communications & networking
With the continued progression of technologies such as mobile
computing and the internet of things (IoT), cybersecurity has
swiftly risen to a prominent field of global interest. This has led
to cyberattacks and cybercrime becoming much more sophisticated to
a point where cybersecurity can no longer be the exclusive
responsibility of an organization's information technology (IT)
unit. Cyber warfare is becoming a national issue and causing
various governments to reevaluate the current defense strategies
they have in place. Cyber Security Auditing, Assurance, and
Awareness Through CSAM and CATRAM provides emerging research
exploring the practical aspects of reassessing current
cybersecurity measures within organizations and international
governments and improving upon them using audit and awareness
training models, specifically the Cybersecurity Audit Model (CSAM)
and the Cybersecurity Awareness Training Model (CATRAM). The book
presents multi-case studies on the development and validation of
these models and frameworks and analyzes their implementation and
ability to sustain and audit national cybersecurity strategies.
Featuring coverage on a broad range of topics such as forensic
analysis, digital evidence, and incident management, this book is
ideally designed for researchers, developers, policymakers,
government officials, strategists, security professionals,
educators, security analysts, auditors, and students seeking
current research on developing training models within cybersecurity
management and awareness.
The implementation of wireless sensor networks has wide-ranging
applications for monitoring various physical and environmental
settings. However, certain limitations with these technologies must
be addressed in order to effectively utilize them. The Handbook of
Research on Advanced Wireless Sensor Network Applications,
Protocols, and Architectures is a pivotal reference source for the
latest research on recent innovations and developments in the field
of wireless sensors. Examining the advantages and challenges
presented by the application of these networks in various areas,
this book is ideally designed for academics, researchers, students,
and IT developers.
Vehicular traffic congestion and accidents remain universal issues
in today's world. Due to the continued growth in the use of
vehicles, optimizing traffic management operations is an immense
challenge. To reduce the number of traffic accidents, improve the
performance of transportation systems, enhance road safety, and
protect the environment, vehicular ad-hoc networks have been
introduced. Current developments in wireless communication,
computing paradigms, big data, and cloud computing enable the
enhancement of these networks, equipped with wireless communication
capabilities and high-performance processing tools. Cloud-Based Big
Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference
source that provides vital research on cloud and data analytic
applications in intelligent transportation systems. While
highlighting topics such as location routing, accident detection,
and data warehousing, this publication addresses future challenges
in vehicular ad-hoc networks and presents viable solutions. This
book is ideally designed for researchers, computer scientists,
engineers, automobile industry professionals, IT practitioners,
academicians, and students seeking current research on cloud
computing models in vehicular networks.
The enormous spread of devices gives access to virtual networks and
to cyberspace areas where continuous flows of data and information
are exchanged, increasing the risk of information warfare,
cyber-espionage, cybercrime, and identity hacking. The number of
individuals and companies that suffer data breaches has increased
vertically with serious reputational and economic damage
internationally. Thus, the protection of personal data and
intellectual property has become a priority for many governments.
Political Decision-Making and Security Intelligence: Recent
Techniques and Technological Developments is an essential scholarly
publication that aims to explore perspectives and approaches to
intelligence analysis and performance and combines theoretical
underpinnings with practical relevance in order to sensitize
insights into training activities to manage uncertainty and risks
in the decision-making process. Featuring a range of topics such as
crisis management, policy making, and risk analysis, this book is
ideal for managers, analysts, politicians, IT specialists, data
scientists, policymakers, government officials, researchers,
academicians, professionals, and security experts.
Smart Cities and Homes: Key Enabling Technologies explores the
fundamental principles and concepts of the key enabling
technologies for smart cities and homes, disseminating the latest
research and development efforts in the field through the use of
numerous case studies and examples. Smart cities use digital
technologies embedded across all their functions to enhance the
wellbeing of citizens. Cities that utilize these technologies
report enhancements in power efficiency, water use, traffic
congestion, environmental protection, pollution reduction, senior
citizens care, public safety and security, literacy rates, and
more. This book brings together the most important breakthroughs
and advances in a coherent fashion, highlighting the
interconnections between the works in different areas of computing,
exploring both new and emerging computer networking systems and
other computing technologies, such as wireless sensor networks,
vehicle ad hoc networks, smart girds, cloud computing, and data
analytics and their roles in creating environmentally friendly,
secure, and prosperous cities and homes. Intended for researchers
and practitioners, the book discusses the pervasive and cooperative
computing technologies that will perform a central role for
handling the challenges of urbanization and demographic change.
Topics in Parallel and Distributed Computing provides resources and
guidance for those learning PDC as well as those teaching students
new to the discipline. The pervasiveness of computing devices
containing multicore CPUs and GPUs, including home and office PCs,
laptops, and mobile devices, is making even common users dependent
on parallel processing. Certainly, it is no longer sufficient for
even basic programmers to acquire only the traditional sequential
programming skills. The preceding trends point to the need for
imparting a broad-based skill set in PDC technology. However, the
rapid changes in computing hardware platforms and devices,
languages, supporting programming environments, and research
advances, poses a challenge both for newcomers and seasoned
computer scientists. This edited collection has been developed over
the past several years in conjunction with the IEEE technical
committee on parallel processing (TCPP), which held several
workshops and discussions on learning parallel computing and
integrating parallel concepts into courses throughout computer
science curricula.
Wireless Public Safety Networks, Volume One: Overview and
Challenges presents the latest advances in the wireless Public
Safety Networks (PSNs) field, the networks established by
authorities to either prepare the population for an eminent
catastrophe, or as support during crisis and normalization phases.
Maintaining communication capabilities in a disaster scenario is
crucial for avoiding loss of lives and damages to property.
Wireless Public Safety Networks examines past communication
failures that have directly contributed to the loss of lives. This
book will give readers a broad view of the PSNs field, analyzing
the benefits PSNs may bring to society, the main challenges related
to the establishment and maintenance of these networks, the latest
advancements in the field, and future perspectives.
Sustainable Wireless Network-on-Chip Architectures focuses on
developing novel Dynamic Thermal Management (DTM) and Dynamic
Voltage and Frequency Scaling (DVFS) algorithms that exploit the
advantages inherent in WiNoC architectures. The methodologies
proposed-combined with extensive experimental
validation-collectively represent efforts to create a sustainable
NoC architecture for future many-core chips. Current research
trends show a necessary paradigm shift towards green and
sustainable computing. As implementing massively parallel
energy-efficient CPUs and reducing resource consumption become
standard, and their speed and power continuously increase, energy
issues become a significant concern. The need for promoting
research in sustainable computing is imperative. As hundreds of
cores are integrated in a single chip, designing effective packages
for dissipating maximum heat is infeasible. Moreover, technology
scaling is pushing the limits of affordable cooling, thereby
requiring suitable design techniques to reduce peak temperatures.
Addressing thermal concerns at different design stages is critical
to the success of future generation systems. DTM and DVFS appear as
solutions to avoid high spatial and temporal temperature variations
among NoC components, and thereby mitigate local network hotspots.
Internet Congestion Control provides a description of some of the
most important topics in the area of congestion control in computer
networks, with special emphasis on the analytical modeling of
congestion control algorithms. The field of congestion control has
seen many notable advances in recent years and the purpose of this
book, which is targeted towards the advanced and intermediate
reader, is to inform about the most important developments in this
area. The book should enable the reader to gain a good
understanding of the application of congestion control theory to a
number of application domains such as Data Center Networks, Video
Streaming, High Speed Links and Broadband Wireless Networks. When
seen through the lens of analytical modeling, there are a number of
common threads that run through the design and analysis of
congestion control protocols in all these different areas, which
are emphasized in this book. The book also cuts a path through the
profusion of algorithms in the literature, and puts the topic on a
systematic and logical footing. Internet Congestion Control
provides practicing network engineers and researchers with a
comprehensive and accessible coverage of analytical models of
congestion control algorithms, and gives readers everything needed
to understand the latest developments and research in this area.
As the world becomes digitalized, developing countries are starting
to see an increase in technological advancements being integrated
into their society. These advancements are creating opportunities
to improve both the economy and the lives of people within these
areas. Affordability Issues Surrounding the Use of ICT for
Development and Poverty Reduction is a relevant scholarly
publication that examines the importance of information and
communications technology (ICT) and its ability to aid in
developing countries and the methods to make such technologies more
accessible and cost less. Featuring coverage on a wide range of
topics, including community networks, infrastructure sharing, and
the digital divide, this book is geared toward academics,
technology developers, researchers, students, practitioners, and
professionals interested in the importance of understanding
technological innovations.
Malware Diffusion Models for Wireless Complex Networks: Theory and
Applications provides a timely update on malicious software
(malware), a serious concern for all types of network users, from
laymen to experienced administrators. As the proliferation of
portable devices, namely smartphones and tablets, and their
increased capabilities, has propelled the intensity of malware
spreading and increased its consequences in social life and the
global economy, this book provides the theoretical aspect of
malware dissemination, also presenting modeling approaches that
describe the behavior and dynamics of malware diffusion in various
types of wireless complex networks. Sections include a systematic
introduction to malware diffusion processes in computer and
communications networks, an analysis of the latest state-of-the-art
malware diffusion modeling frameworks, such as queuing-based
techniques, calculus of variations based techniques, and game
theory based techniques, also demonstrating how the methodologies
can be used for modeling in more general applications and practical
scenarios.
Meeting People via WiFi and Bluetooth will contain an overview of
how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi)
and Bluetooth 802.15 Radio Frequencies. The content contained here
came from research and materials originally presented at Defcon
Wireless CTF Village in August 2015 entitled "Meeting People Via
Wi-Fi". The book will go over the hardware and software needed in
order to do this tracking, how to use these particular tools in
order to do attribution, and tips for protecting yourself from
being attributed via those signals.
As the confluence of networks that is the modern Internet grows to
encompass everything from nuclear reactors to home appliances, the
affordances offered to the average citizen grow as well-but so,
too, do the resources made available to those with malicious
intent. Through the rise of Big Data and the Internet of Things,
terrorist organizations today have been freed from geographic and
logistical confines and now have more power than ever before to
strike the average citizen directly at home. This, coupled with the
inherently asymmetrical nature of cyberwarfare-which grants great
advantage to the attacker-has created an unprecedented national
security risk that both governments and their citizens are woefully
ill-prepared to face. The Handbook of Research on Civil Society and
National Security in the Era of Cyber Warfare addresses the problem
of cyber terrorism head-on, first through a review of current
literature, and then through a series of progressive proposals
aimed at researchers, professionals, and policymakers. Touching on
such subjects as cyber-profiling, hacktivism, and digital
counterterrorism, this collection offers the tools to begin
formulating a ground-up resiliency to cybersecurity threats that
starts at the civilian level.
Researchers have harnessed the flood of personal information and
opinions shared on social media platforms in a variety of ways.
People communicate not only what they imagine they are purposely
sharing but also unintentionally leak information, which allows
others to glimpse a sense of the subconscious and unconscious at a
macro level. Electronic Hive Minds on Social Media: Emerging
Research and Opportunities explores various research techniques to
profile the electronic hive mind around social topics as expressed
on various modalities of social media, from human, bot, and cyborg
social media accounts, and proposes new research methods for
harnessing public data from social media platforms. Highlighting
topics such as knowledge sharing, swarm intelligence, and social
psychology, this publication is designed for researchers, social
psychologists, practitioners, and students in marketing,
communications, mass media, and similar fields.
Denial of Service (DoS) attacks are a form of attack that seeks to
make a network resource unavailable due to overloading the resource
or machine with an overwhelming number of packets, thereby crashing
or severely slowing the performance of the resource. Distributed
Denial of Service (DDoS) is a large scale DoS attack which is
distributed in the Internet. Every computer which has access to the
Internet can behave as an attacker. Typically bandwidth depletion
can be categorized as either a flood or an amplification attack.
Flood attacks can be done by generating ICMP packets or UDP packets
in which it can utilize stationary or random variable ports. Smurf
and Fraggle attacks are used for amplification attacks. DDoS Smurf
attacks are an example of an amplification attack where the
attacker sends packets to a network amplifier with the return
address spoofed to the victim's IP address. This book presents new
research and methodologies along with a proposed algorithm for
prevention of DoS attacks that has been written based on
cryptographic concepts such as birthday attacks to estimate the
rate of attacks generated and passed along the routers.
Consequently, attackers would be identified and prohibited from
sending spam traffic to the server which can cause DDoS attacks.
Due to the prevalence of DoS attacks, there has been a lot of
research conducted on how to detect them and prevent them. The
authors of this short format title provide their research results
on providing an effective solution to DoS attacks, including
introduction of the new algorithm that can be implemented in order
to deny DoS attacks.
Mobile Ad Hoc Networks (MANETs) are a popular form of network for
data transfer due to the fact that they are dynamic, require no
fixed infrastructure, and are scalable. However, MANETs are
particularly susceptible to several different types of widely
perpetrated cyberattack. One of the most common hacks aimed at
MANETs is the Black Hole attack, in which a particular node within
the network displays itself as having the shortest path for the
node whose packets it wants to intercept. Once the packets are
drawn to the Black Hole, they are then dropped instead of relayed,
and the communication of the MANET is thereby disrupted, without
knowledge of the other nodes in the network. Due to the
sophistication of the Black Hole attack, there has been a lot of
research conducted on how to detect it and prevent it. The authors
of this short format title provide their research results on
providing an effective solution to Black Hole attacks, including
introduction of new MANET routing protocols that can be implemented
in order to improve detection accuracy and network parameters such
as total dropped packets, end-to-end delay, packet delivery ratio,
and routing request overhead.
CORPORATE CYBERSECURITY An insider's guide showing companies how to
spot and remedy vulnerabilities in their security programs A bug
bounty program is offered by organizations for people to receive
recognition and compensation for reporting bugs, especially those
pertaining to security exploits and vulnerabilities. Corporate
Cybersecurity gives cyber and application security engineers (who
may have little or no experience with a bounty program) a hands-on
guide for creating or managing an effective bug bounty program.
Written by a cyber security expert, the book is filled with the
information, guidelines, and tools that engineers can adopt to
sharpen their skills and become knowledgeable in researching,
configuring, and managing bug bounty programs. This book addresses
the technical aspect of tooling and managing a bug bounty program
and discusses common issues that engineers may run into on a daily
basis. The author includes information on the often-overlooked
communication and follow-through approaches of effective
management. Corporate Cybersecurity provides a much-needed resource
on how companies identify and solve weaknesses in their security
program. This important book: Contains a much-needed guide aimed at
cyber and application security engineers Presents a unique
defensive guide for understanding and resolving security
vulnerabilities Encourages research, configuring, and managing
programs from the corporate perspective Topics covered include bug
bounty overview; program set-up; vulnerability reports and
disclosure; development and application Security Collaboration;
understanding safe harbor and SLA Written for professionals working
in the application and cyber security arena, Corporate
Cybersecurity offers a comprehensive resource for building and
maintaining an effective bug bounty program.
Shaping Future 6G Networks Discover the societal and technology
drivers contributing to build the next generation of wireless
telecommunication networks Shaping Future 6G Networks: Needs,
Impacts, and Technologies is a holistic snapshot on the evolution
of 5G technologies towards 6G. With contributions from
international key players in industry and academia, the book
presents the hype versus the realistic capabilities of 6G
technologies, and delivers cutting-edge business and technological
insights into the future wireless telecommunications landscape.
You'll learn about: Forthcoming demand for post 5G networks,
including new requirements coming from small and large businesses,
manufacturing, logistics, and automotive industry Societal
implications of 6G, including digital sustainability, strategies
for increasing energy efficiency, as well as future open networking
ecosystems Impacts of integrating non-terrestrial networks to build
the 6G architecture Opportunities for emerging THz radio access
technologies in future integrated communications, positioning, and
sensing capabilities in 6G Design of highly modular and distributed
6G core networks driven by the ongoing RAN-Core integration and the
benefits of AI/ML-based control and management Disruptive
architectural considerations influenced by the Post-Shannon Theory
The insights in Shaping Future 6G Networks will greatly benefit IT
engineers and managers focused on the future of networking, as well
as undergraduate and graduate engineering students focusing on the
design, implementation, and management of mobile networks and
applications.
|
|