Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking
This book brings together papers presented at The 2nd International Conference on Artificial Intelligence in China (ChinaAI) 2020, which provides a venue to disseminate the latest developments and to discuss the interactions and links between these multidisciplinary fields. Spanning topics covering all topics in artificial intelligence with new development in China, this book is aimed at undergraduate and graduate students in Electrical Engineering, Computer Science and Mathematics, researchers and engineers from academia and industry as well as government employees (such as NSF, DOD and DOE).
This book delves into the concept of data as a critical enterprise asset needed for informed decision making, compliance, regulatory reporting and insights into trends, behaviors, performance and patterns. With good data being key to staying ahead in a competitive market, enterprises capture and store exponential volumes of data. Considering the business impact of data, there needs to be adequate management around it to derive the best value. Data governance is one of the core data management related functions. However, it is often overlooked, misunderstood or confused with other terminologies and data management functions. Given the pervasiveness of data and the importance of data, this book provides comprehensive understanding of the business drivers for data governance and benefits of data governance, the interactions of data governance function with other data management functions and various components and aspects of data governance that can be facilitated by technology and tools, the distinction between data management tools and data governance tools, the readiness checks to perform before exploring the market to purchase a data governance tool, the different aspects that must be considered when comparing and selecting the appropriate data governance technologies and tools from large number of options available in the marketplace and the different market players that provide tools for supporting data governance. This book combines the data and data governance knowledge that the author has gained over years of working in different industrial and research programs and projects associated with data, processes and technologies with unique perspectives gained through interviews with thought leaders and data experts. This book is highly beneficial for IT students, academicians, information management and business professionals and researchers to enhance their knowledge and get guidance on implementing data governance in their own data initiatives.
This book provides an overview of fake news detection, both through a variety of tutorial-style survey articles that capture advancements in the field from various facets and in a somewhat unique direction through expert perspectives from various disciplines. The approach is based on the idea that advancing the frontier on data science approaches for fake news is an interdisciplinary effort, and that perspectives from domain experts are crucial to shape the next generation of methods and tools. The fake news challenge cuts across a number of data science subfields such as graph analytics, mining of spatio-temporal data, information retrieval, natural language processing, computer vision and image processing, to name a few. This book will present a number of tutorial-style surveys that summarize a range of recent work in the field. In a unique feature, this book includes perspective notes from experts in disciplines such as linguistics, anthropology, medicine and politics that will help to shape the next generation of data science research in fake news. The main target groups of this book are academic and industrial researchers working in the area of data science, and with interests in devising and applying data science technologies for fake news detection. For young researchers such as PhD students, a review of data science work on fake news is provided, equipping them with enough know-how to start engaging in research within the area. For experienced researchers, the detailed descriptions of approaches will enable them to take seasoned choices in identifying promising directions for future research.
This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.
This book focuses on the fundamentals of blockchain technology along with the means and methods of its integration with Internet of Things (IoT). The book allows the reader to have a deeper understanding of blockchain technology, IoT and various application areas wherein both technologies can be implemented. The book serves the purpose of providing knowledge about the fundamentals of blockchain and IoT to a common reader along with allowing a research scholar to identify some futuristic problem areas that emerge from the convergence of both technologies. Furthermore, the authors discuss relevant application areas such as smart city, e-healthcare, smart travel, etc. throughout the course of the book. The book also talks through a few case studies illustrating the implementation and benefits of using blockchain and IoT. Provides a comprehensive view of blockchain technology and its integration with IoT; Facilitates in having a valuable understanding of various application areas pertaining to blockchain and IoT; Assists the reader in exploring new research areas wherein blockchain and IoT can find their applicability based upon their list of benefits.
While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks and will serve as a reference for graduate students, professors, and researchers in this emerging field.
This book presents best selected papers presented at the International Conference on Emerging Wireless Communication Technologies and Information Security (EWCIS 2020), held from 8th & 9th October 2020 at Amity University Jharkhand, Ranchi, India. The book includes papers in the research area of wireless communications and intelligent systems, signal and image processing in engineering applications, data communication and information security, IoT and cloud computing. The contribution ranges from scientists, engineers and technologists from academia as well as from industry.
The American legal profession and judicial system bear a unique responsibility to set and maintain the balance between defending homeland security and protecting the civil liberties outlined in the Bill of Rights. These competing interests will continue to collide as the threats to our safety grow. Exploring the most significant terrorist cases of the past two decades, Counter Terrorism Issues: Case Studies in the Courtroom presents a panoramic view of the American judiciary's handling of domestic terrorism in the last 20 years. Drawing extensively upon trial transcripts, witness statements, and judicial opinions, the book brings the underlying events back to life and demonstrates how the criminal justice system has sought to grapple with conflicting facts and countervailing legal rights and responsibilities. The book examines some of the most notorious recent cases-the two attacks on the World Trade Center, the Oklahoma City bombing, and the Fort Hood massacre. It also looks at lesser-known but equally important incidents, including those involving animal-rights radicals who harass university researchers and corporate executives, as well as the actions of terrorist "wannabes" who threaten our security. Also discussed are attempts by victims of terrorist attacks to sue state sponsors of terrorism. Through the words of witnesses, judges, and the attorneys who tried these cases in America's courtrooms, the book provides important commentary on the related back-stories and historical/political contexts of these events, enabling readers to understand the significance of these often-infamous attacks on U.S. soil.
The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project's methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics.
Wireless networks have become essential for delivering content and knowledge in the information age. Ever-increasing demands are made on these infrastructures as more and more sophisticated knowledge is consumed worldwide. Developments in Wireless Network Prototyping, Design, and Deployment: Future Generations highlights the current design issues in wireless networks, informing scholars and practitioners about advanced prototyping innovations in this field. This book will empower readers to make further advancements in networking and serves as a comprehensive reference for graduate students, scholars, and practitioners alike.
The computer game industry is clearly growing in the direction of multiplayer, online games. Understanding the demands of games on IP (Internet Protocol) networks is essential for ISP (Internet Service Provider) engineers to develop appropriate IP services. Correspondingly, knowledge of the underlying network's capabilities is vital for game developers. "Networking and Online Games" concisely draws together and illustrates the overlapping and interacting technical concerns of these sectors. The text explains the principles behind modern multiplayer communication systems and the techniques underlying contemporary networked games. The traffic patterns that modern games impose on networks, and how network performance and service level limitations impact on game designers and player experiences, are covered in-depth, giving the reader the knowledge necessary to develop better gaming products and network services. Examples of real-world multiplayer online games illustrate the theory throughout. "Networking and Online Games: " Provides a comprehensive, cutting-edge guide to the development and service provision needs of online, networked games. Contrasts the considerations of ISPs (e.g. predicting traffic loads) with those of game developers (e.g. sources of lag/jitter), clarifying coinciding requirements. Explains how different technologies such as cable, ADSL (Asymmetric Digital Subscriber Line) and wireless, etc., affect online game-play experience, and how different game styles impose varying traffic dynamics and requirements on the network. Discusses future directions brought by emerging technologies such as UMTS (Universal Mobile Telephone Service), GPRS (General Packet RadioService), Wireless LANs, IP service Quality, and NAPT/NAT (Network Address Port Translation/Network Address Translation) Illustrates the concepts using high-level examples of existing multiplayer online games (such as Quake III Arena, Wolfenstein Enemy Territory, and Half-Life 2). "Networking and Online Games" will be an invaluable resource for games developers, engineers and technicians at Internet Service Providers, as well as advanced undergraduate and graduate students in Electrical Engineering, Computer Science and Multimedia Engineering.
This book provides an up-to-date, accessible guide to the growing threats in cyberspace that affects everyone from private individuals to businesses to national governments. Cyber Warfare: How Conflicts In Cyberspace Are Challenging America and Changing The World is a comprehensive and highly topical one-stop source for cyber conflict issues that provides scholarly treatment of the subject in a readable format. The book provides a level-headed, concrete analytical foundation for thinking about cybersecurity law and policy questions, covering the entire range of cyber issues in the 21st century, including topics such as malicious software, encryption, hardware intrusions, privacy and civil liberties concerns, and other interesting aspects of the problem. In Part I, the author describes the nature of cyber threats, including the threat of cyber warfare. Part II describes the policies and practices currently in place, while Part III proposes optimal responses to the challenges we face. The work should be considered essential reading for national and homeland security professionals as well as students and lay readers wanting to understand of the scope of our shared cybersecurity problem.
Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to these networks' shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives but also by an inherent logistical bias that grants advantage to attackers. Research Anthology on Combating Denial-of-Service Attacks examines the latest research on the development of intrusion detection systems and best practices for preventing and combatting cyber-attacks intended to disrupt business and user experience. Highlighting a range of topics such as network administration, application-layer protocols, and malware detection, this publication is an ideal reference source for cybersecurity professionals, IT specialists, policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.
With the rapid development of computing hardware, high-speed network, web programming, distributed and parallel computing, and other technologies, cloud computing has recently emerged as a commercial reality. Software Reuse in the Emerging Cloud Computing Era targets a spectrum of readers, including researcher, practitioners, educators, and students and even part of the end users in software engineering, computing, networks and distributed systems, and information systems. The handbook will help to clarify the present fast-advancing literature of the current state of art and knowledge in the areas of the development and reuse of reusable assets in emerging software systems and applications, as part of the information science and technology literature. It will no doubt expand the above literature, and promote the exchange and evolution of the above advances in software reuse and cloud computing among multiple disciplines, and a wide spectrum of research, industry, and user communities.
In Interop , technology experts John Palfrey and Urs Gasser explore the immense importance of interoperability,the standardization and integration of technology,and show how this simple principle will hold the key to our success in the coming decades and beyond. The practice of standardization has been facilitating innovation and economic growth for centuries. The standardization of the railroad gauge revolutionized the flow of commodities, the standardization of money revolutionized debt markets and simplified trade, and the standardization of credit networks has allowed for the purchase of goods using money deposited in a bank half a world away. These advancements did not eradicate the different systems they affected instead, each system has been transformed so that it can interoperate with systems all over the world, while still preserving local diversity. As Palfrey and Gasser show, interoperability is a critical aspect of any successful system,and now it is more important than ever. Today we are confronted with challenges that affect us on a global scale: the financial crisis, the quest for sustainable energy, and the need to reform health care systems and improve global disaster response systems. The successful flow of information across systems is crucial if we are to solve these problems, but we must also learn to manage the vast degree of interconnection inherent in each system involved. Interoperability offers a number of solutions to these global challenges, but Palfrey and Gasser also consider its potential negative effects, especially with respect to privacy, security, and co-dependence of states indeed, interoperability has already sparked debates about document data formats, digital music, and how to create successful yet safe cloud computing. Interop demonstrates that, in order to get the most out of interoperability while minimizing its risks, we will need to fundamentally revisit our understanding of how it works, and how it can allow for improvements in each of its constituent parts. In Interop , Palfrey and Gasser argue that there needs to be a nuanced, stable theory of interoperability,one that still generates efficiencies, but which also ensures a sustainable mode of interconnection. Pointing the way forward for the new information economy, Interop provides valuable insights into how technological integration and innovation can flourish in the twenty-first century.
Emerging as an effective alternative to organization-based information systems, cloud computing has been adopted by many businesses around the world. Despite the increased popularity, there remain concerns about the security of data in the cloud since users have become accustomed to having control over their hardware and software. Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments compiles the research and views of cloud computing from various individuals around the world. Detailing cloud security, regulatory and industry compliance, and trust building in the cloud, this book is an essential reference source for practitioners, professionals, and researchers worldwide, as well as business managers interested in an assembled collection of solutions provided by a variety of cloud users. |
You may like...
CCNA 200-301 Network Simulator
Sean Wilkins
Digital product license key
R4,960
Discovery Miles 49 600
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, …
Hardcover
R8,396
Discovery Miles 83 960
Research Anthology on Architectures…
Information R Management Association
Hardcover
R13,718
Discovery Miles 137 180
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig
Hardcover
R6,414
Discovery Miles 64 140
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, …
Hardcover
R7,886
Discovery Miles 78 860
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, …
Hardcover
|