|
|
Books > Computing & IT > Computer communications & networking
Malware Diffusion Models for Wireless Complex Networks: Theory and
Applications provides a timely update on malicious software
(malware), a serious concern for all types of network users, from
laymen to experienced administrators. As the proliferation of
portable devices, namely smartphones and tablets, and their
increased capabilities, has propelled the intensity of malware
spreading and increased its consequences in social life and the
global economy, this book provides the theoretical aspect of
malware dissemination, also presenting modeling approaches that
describe the behavior and dynamics of malware diffusion in various
types of wireless complex networks. Sections include a systematic
introduction to malware diffusion processes in computer and
communications networks, an analysis of the latest state-of-the-art
malware diffusion modeling frameworks, such as queuing-based
techniques, calculus of variations based techniques, and game
theory based techniques, also demonstrating how the methodologies
can be used for modeling in more general applications and practical
scenarios.
Meeting People via WiFi and Bluetooth will contain an overview of
how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi)
and Bluetooth 802.15 Radio Frequencies. The content contained here
came from research and materials originally presented at Defcon
Wireless CTF Village in August 2015 entitled "Meeting People Via
Wi-Fi". The book will go over the hardware and software needed in
order to do this tracking, how to use these particular tools in
order to do attribution, and tips for protecting yourself from
being attributed via those signals.
As the confluence of networks that is the modern Internet grows to
encompass everything from nuclear reactors to home appliances, the
affordances offered to the average citizen grow as well-but so,
too, do the resources made available to those with malicious
intent. Through the rise of Big Data and the Internet of Things,
terrorist organizations today have been freed from geographic and
logistical confines and now have more power than ever before to
strike the average citizen directly at home. This, coupled with the
inherently asymmetrical nature of cyberwarfare-which grants great
advantage to the attacker-has created an unprecedented national
security risk that both governments and their citizens are woefully
ill-prepared to face. The Handbook of Research on Civil Society and
National Security in the Era of Cyber Warfare addresses the problem
of cyber terrorism head-on, first through a review of current
literature, and then through a series of progressive proposals
aimed at researchers, professionals, and policymakers. Touching on
such subjects as cyber-profiling, hacktivism, and digital
counterterrorism, this collection offers the tools to begin
formulating a ground-up resiliency to cybersecurity threats that
starts at the civilian level.
Mobile Ad Hoc Networks (MANETs) are a popular form of network for
data transfer due to the fact that they are dynamic, require no
fixed infrastructure, and are scalable. However, MANETs are
particularly susceptible to several different types of widely
perpetrated cyberattack. One of the most common hacks aimed at
MANETs is the Black Hole attack, in which a particular node within
the network displays itself as having the shortest path for the
node whose packets it wants to intercept. Once the packets are
drawn to the Black Hole, they are then dropped instead of relayed,
and the communication of the MANET is thereby disrupted, without
knowledge of the other nodes in the network. Due to the
sophistication of the Black Hole attack, there has been a lot of
research conducted on how to detect it and prevent it. The authors
of this short format title provide their research results on
providing an effective solution to Black Hole attacks, including
introduction of new MANET routing protocols that can be implemented
in order to improve detection accuracy and network parameters such
as total dropped packets, end-to-end delay, packet delivery ratio,
and routing request overhead.
Shaping Future 6G Networks Discover the societal and technology
drivers contributing to build the next generation of wireless
telecommunication networks Shaping Future 6G Networks: Needs,
Impacts, and Technologies is a holistic snapshot on the evolution
of 5G technologies towards 6G. With contributions from
international key players in industry and academia, the book
presents the hype versus the realistic capabilities of 6G
technologies, and delivers cutting-edge business and technological
insights into the future wireless telecommunications landscape.
You'll learn about: Forthcoming demand for post 5G networks,
including new requirements coming from small and large businesses,
manufacturing, logistics, and automotive industry Societal
implications of 6G, including digital sustainability, strategies
for increasing energy efficiency, as well as future open networking
ecosystems Impacts of integrating non-terrestrial networks to build
the 6G architecture Opportunities for emerging THz radio access
technologies in future integrated communications, positioning, and
sensing capabilities in 6G Design of highly modular and distributed
6G core networks driven by the ongoing RAN-Core integration and the
benefits of AI/ML-based control and management Disruptive
architectural considerations influenced by the Post-Shannon Theory
The insights in Shaping Future 6G Networks will greatly benefit IT
engineers and managers focused on the future of networking, as well
as undergraduate and graduate engineering students focusing on the
design, implementation, and management of mobile networks and
applications.
The Smart Grid security ecosystem is complex and
multi-disciplinary, and relatively under-researched compared to the
traditional information and network security disciplines. While the
Smart Grid has provided increased efficiencies in monitoring power
usage, directing power supplies to serve peak power needs and
improving efficiency of power delivery, the Smart Grid has also
opened the way for information security breaches and other types of
security breaches. Potential threats range from meter manipulation
to directed, high-impact attacks on critical infrastructure that
could bring down regional or national power grids. It is essential
that security measures are put in place to ensure that the Smart
Grid does not succumb to these threats and to safeguard this
critical infrastructure at all times. Dr. Florian Skopik is one of
the leading researchers in Smart Grid security, having organized
and led research consortia and panel discussions in this field.
Smart Grid Security will provide the first truly holistic view of
leading edge Smart Grid security research. This book does not focus
on vendor-specific solutions, instead providing a complete
presentation of forward-looking research in all areas of Smart Grid
security. The book will enable practitioners to learn about
upcoming trends, scientists to share new directions in research,
and government and industry decision-makers to prepare for major
strategic decisions regarding implementation of Smart Grid
technology.
The Western cultural trend of self-representation is transcending
borders as it permeates the online world. A prime example of this
trend is selfies, and how they have evolved into more than just
self-portraits. Selfies as a Mode of Social Media and Work Space
Research is a comprehensive reference source for the latest
research on explicit and implicit messaging of self-portraiture and
its indications about individuals, groups, and societies. Featuring
coverage on a broad range of topics including dating, job hunting,
and marketing, this publication is ideally designed for
academicians, researchers, and professionals interested in the
current phenomenon of selfies and their impact on society.
As computers continue to remain essential tools for the pursuit of
physics, medicine, economics, social sciences, and more,
supercomputers are proving that they can further extend and greatly
enhance as-of-yet undiscovered knowledge and solve the world's most
complex problems. As these instruments continue to lead to
groundbreaking discoveries and breakthroughs, it is imperative that
research remains up to date with the latest findings and uses. The
Handbook of Research on Methodologies and Applications of
Supercomputing is a comprehensive and critical reference book that
provides research on the latest advances of control flow and
dataflow supercomputing and highlights selected emerging big data
applications needing high acceleration and/or low power.
Consequently, this book advocates the need for hybrid computing,
where the control flow part represents the host architecture and
dataflow part represents the acceleration architecture. These
issues cover the initial eight chapters. The remaining eight
chapters cover selected modern applications that are best
implemented on a hybrid computer, in which the transactional parts
(serial code) are implemented on the control flow part and the
loops (parallel code) on the dataflow part. These final eight
chapters cover two major application domains: scientific computing
and computing for digital economy. This book offers applications in
marketing, medicine, energy systems, and library science, among
others, and is an essential source for scientists, programmers,
engineers, practitioners, researchers, academicians, and students
interested in the latest findings and advancements in
supercomputing.
The emerging field of network science represents a new style of
research that can unify such traditionally-diverse fields as
sociology, economics, physics, biology, and computer science. It is
a powerful tool in analyzing both natural and man-made systems,
using the relationships between players within these networks and
between the networks themselves to gain insight into the nature of
each field. Until now, studies in network science have been focused
on particular relationships that require varied and
sometimes-incompatible datasets, which has kept it from being a
truly universal discipline. Computational Network Science seeks to
unify the methods used to analyze these diverse fields. This book
provides an introduction to the field of Network Science and
provides the groundwork for a computational, algorithm-based
approach to network and system analysis in a new and important way.
This new approach would remove the need for tedious human-based
analysis of different datasets and help researchers spend more time
on the qualitative aspects of network science research.
CORPORATE CYBERSECURITY An insider's guide showing companies how to
spot and remedy vulnerabilities in their security programs A bug
bounty program is offered by organizations for people to receive
recognition and compensation for reporting bugs, especially those
pertaining to security exploits and vulnerabilities. Corporate
Cybersecurity gives cyber and application security engineers (who
may have little or no experience with a bounty program) a hands-on
guide for creating or managing an effective bug bounty program.
Written by a cyber security expert, the book is filled with the
information, guidelines, and tools that engineers can adopt to
sharpen their skills and become knowledgeable in researching,
configuring, and managing bug bounty programs. This book addresses
the technical aspect of tooling and managing a bug bounty program
and discusses common issues that engineers may run into on a daily
basis. The author includes information on the often-overlooked
communication and follow-through approaches of effective
management. Corporate Cybersecurity provides a much-needed resource
on how companies identify and solve weaknesses in their security
program. This important book: Contains a much-needed guide aimed at
cyber and application security engineers Presents a unique
defensive guide for understanding and resolving security
vulnerabilities Encourages research, configuring, and managing
programs from the corporate perspective Topics covered include bug
bounty overview; program set-up; vulnerability reports and
disclosure; development and application Security Collaboration;
understanding safe harbor and SLA Written for professionals working
in the application and cyber security arena, Corporate
Cybersecurity offers a comprehensive resource for building and
maintaining an effective bug bounty program.
Advancing technologies, especially computer technologies, have
necessitated the creation of a comprehensive investigation and
collection methodology for digital and online evidence. The goal of
cyber forensics is to perform a structured investigation while
maintaining a documented chain of evidence to find out exactly what
happened on a computing device or on a network and who was
responsible for it. Critical Concepts, Standards, and Techniques in
Cyber Forensics is a critical research book that focuses on
providing in-depth knowledge about online forensic practices and
methods. Highlighting a range of topics such as data mining,
digital evidence, and fraud investigation, this book is ideal for
security analysts, IT specialists, software engineers, researchers,
security professionals, criminal science professionals,
policymakers, academicians, and students.
Securing VoIP: Keeping Your VoIP Network Safe will show you how to
take the initiative to prevent hackers from recording and
exploiting your company's secrets. Drawing upon years of practical
experience and using numerous examples and case studies, technology
guru Bud Bates discusses the business realities that necessitate
VoIP system security and the threats to VoIP over both wire and
wireless networks. He also provides essential guidance on how to
conduct system security audits and how to integrate your existing
IT security plan with your VoIP system and security plans, helping
you prevent security breaches and eavesdropping.
|
|