|
|
Books > Computing & IT > Computer communications & networking
Advances in Computers carries on a tradition of excellence,
presenting detailed coverage of innovations in computer hardware,
software, theory, design, and applications. The book provides
contributors with a medium in which they can explore their subjects
in greater depth and breadth than journal articles typically allow.
The articles included in this book will become standard references,
with lasting value in this rapidly expanding field.
Between adolescence and adulthood, individuals begin to explore
themselves mentally and emotionally in an attempt to figure out who
they are and where they fit in society. Social technologies in the
modern age have ushered in an era where these evolving adolescents
must circumvent the negative pressures of online influences while
also still trying to learn how to be utterly independent. Recent
Advances in Digital Media Impacts on Identity, Sexuality, and
Relationships is a collection of critical reference materials that
provides imperative research on identity exploration in emerging
adults and examines how digital media is used to help explore and
develop one's identity. While highlighting topics such as mobile
addiction, online intimacy, and cyber aggression, this publication
explores a crucial developmental period in the human lifespan and
how digital media hinders (or helps) maturing adults navigate life.
This book is ideally designed for therapists, psychologists,
sociologists, psychiatrists, researchers, educators, academicians,
and professionals.
Data Breach Preparation and Response: Breaches are Certain, Impact
is Not is the first book to provide 360 degree visibility and
guidance on how to proactively prepare for and manage a data breach
and limit impact. Data breaches are inevitable incidents that can
disrupt business operations and carry severe reputational and
financial impact, making them one of the largest risks facing
organizations today. The effects of a breach can be felt across
multiple departments within an organization, who will each play a
role in effectively managing the breach. Kevvie Fowler has
assembled a team of leading forensics, security, privacy, legal,
public relations and cyber insurance experts to create the
definitive breach management reference for the whole organization.
Vehicular traffic congestion and accidents remain universal issues
in today's world. Due to the continued growth in the use of
vehicles, optimizing traffic management operations is an immense
challenge. To reduce the number of traffic accidents, improve the
performance of transportation systems, enhance road safety, and
protect the environment, vehicular ad-hoc networks have been
introduced. Current developments in wireless communication,
computing paradigms, big data, and cloud computing enable the
enhancement of these networks, equipped with wireless communication
capabilities and high-performance processing tools. Cloud-Based Big
Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference
source that provides vital research on cloud and data analytic
applications in intelligent transportation systems. While
highlighting topics such as location routing, accident detection,
and data warehousing, this publication addresses future challenges
in vehicular ad-hoc networks and presents viable solutions. This
book is ideally designed for researchers, computer scientists,
engineers, automobile industry professionals, IT practitioners,
academicians, and students seeking current research on cloud
computing models in vehicular networks.
With the continued progression of technologies such as mobile
computing and the internet of things (IoT), cybersecurity has
swiftly risen to a prominent field of global interest. This has led
to cyberattacks and cybercrime becoming much more sophisticated to
a point where cybersecurity can no longer be the exclusive
responsibility of an organization's information technology (IT)
unit. Cyber warfare is becoming a national issue and causing
various governments to reevaluate the current defense strategies
they have in place. Cyber Security Auditing, Assurance, and
Awareness Through CSAM and CATRAM provides emerging research
exploring the practical aspects of reassessing current
cybersecurity measures within organizations and international
governments and improving upon them using audit and awareness
training models, specifically the Cybersecurity Audit Model (CSAM)
and the Cybersecurity Awareness Training Model (CATRAM). The book
presents multi-case studies on the development and validation of
these models and frameworks and analyzes their implementation and
ability to sustain and audit national cybersecurity strategies.
Featuring coverage on a broad range of topics such as forensic
analysis, digital evidence, and incident management, this book is
ideally designed for researchers, developers, policymakers,
government officials, strategists, security professionals,
educators, security analysts, auditors, and students seeking
current research on developing training models within cybersecurity
management and awareness.
The implementation of wireless sensor networks has wide-ranging
applications for monitoring various physical and environmental
settings. However, certain limitations with these technologies must
be addressed in order to effectively utilize them. The Handbook of
Research on Advanced Wireless Sensor Network Applications,
Protocols, and Architectures is a pivotal reference source for the
latest research on recent innovations and developments in the field
of wireless sensors. Examining the advantages and challenges
presented by the application of these networks in various areas,
this book is ideally designed for academics, researchers, students,
and IT developers.
The enormous spread of devices gives access to virtual networks and
to cyberspace areas where continuous flows of data and information
are exchanged, increasing the risk of information warfare,
cyber-espionage, cybercrime, and identity hacking. The number of
individuals and companies that suffer data breaches has increased
vertically with serious reputational and economic damage
internationally. Thus, the protection of personal data and
intellectual property has become a priority for many governments.
Political Decision-Making and Security Intelligence: Recent
Techniques and Technological Developments is an essential scholarly
publication that aims to explore perspectives and approaches to
intelligence analysis and performance and combines theoretical
underpinnings with practical relevance in order to sensitize
insights into training activities to manage uncertainty and risks
in the decision-making process. Featuring a range of topics such as
crisis management, policy making, and risk analysis, this book is
ideal for managers, analysts, politicians, IT specialists, data
scientists, policymakers, government officials, researchers,
academicians, professionals, and security experts.
Topics in Parallel and Distributed Computing provides resources and
guidance for those learning PDC as well as those teaching students
new to the discipline. The pervasiveness of computing devices
containing multicore CPUs and GPUs, including home and office PCs,
laptops, and mobile devices, is making even common users dependent
on parallel processing. Certainly, it is no longer sufficient for
even basic programmers to acquire only the traditional sequential
programming skills. The preceding trends point to the need for
imparting a broad-based skill set in PDC technology. However, the
rapid changes in computing hardware platforms and devices,
languages, supporting programming environments, and research
advances, poses a challenge both for newcomers and seasoned
computer scientists. This edited collection has been developed over
the past several years in conjunction with the IEEE technical
committee on parallel processing (TCPP), which held several
workshops and discussions on learning parallel computing and
integrating parallel concepts into courses throughout computer
science curricula.
GPU-based Parallel Implementation of Swarm Intelligence Algorithms
combines and covers two emerging areas attracting increased
attention and applications: graphics processing units (GPUs) for
general-purpose computing (GPGPU) and swarm intelligence. This book
not only presents GPGPU in adequate detail, but also includes
guidance on the appropriate implementation of swarm intelligence
algorithms on the GPU platform. GPU-based implementations of
several typical swarm intelligence algorithms such as PSO, FWA, GA,
DE, and ACO are presented and having described the implementation
details including parallel models, implementation considerations as
well as performance metrics are discussed. Finally, several typical
applications of GPU-based swarm intelligence algorithms are
presented. This valuable reference book provides a unique
perspective not possible by studying either GPGPU or swarm
intelligence alone. This book gives a complete and whole picture
for interested readers and new comers who will find many
implementation algorithms in the book suitable for immediate use in
their projects. Additionally, some algorithms can also be used as a
starting point for further research.
Internet Congestion Control provides a description of some of the
most important topics in the area of congestion control in computer
networks, with special emphasis on the analytical modeling of
congestion control algorithms. The field of congestion control has
seen many notable advances in recent years and the purpose of this
book, which is targeted towards the advanced and intermediate
reader, is to inform about the most important developments in this
area. The book should enable the reader to gain a good
understanding of the application of congestion control theory to a
number of application domains such as Data Center Networks, Video
Streaming, High Speed Links and Broadband Wireless Networks. When
seen through the lens of analytical modeling, there are a number of
common threads that run through the design and analysis of
congestion control protocols in all these different areas, which
are emphasized in this book. The book also cuts a path through the
profusion of algorithms in the literature, and puts the topic on a
systematic and logical footing. Internet Congestion Control
provides practicing network engineers and researchers with a
comprehensive and accessible coverage of analytical models of
congestion control algorithms, and gives readers everything needed
to understand the latest developments and research in this area.
As the world becomes digitalized, developing countries are starting
to see an increase in technological advancements being integrated
into their society. These advancements are creating opportunities
to improve both the economy and the lives of people within these
areas. Affordability Issues Surrounding the Use of ICT for
Development and Poverty Reduction is a relevant scholarly
publication that examines the importance of information and
communications technology (ICT) and its ability to aid in
developing countries and the methods to make such technologies more
accessible and cost less. Featuring coverage on a wide range of
topics, including community networks, infrastructure sharing, and
the digital divide, this book is geared toward academics,
technology developers, researchers, students, practitioners, and
professionals interested in the importance of understanding
technological innovations.
Wireless Public Safety Networks, Volume One: Overview and
Challenges presents the latest advances in the wireless Public
Safety Networks (PSNs) field, the networks established by
authorities to either prepare the population for an eminent
catastrophe, or as support during crisis and normalization phases.
Maintaining communication capabilities in a disaster scenario is
crucial for avoiding loss of lives and damages to property.
Wireless Public Safety Networks examines past communication
failures that have directly contributed to the loss of lives. This
book will give readers a broad view of the PSNs field, analyzing
the benefits PSNs may bring to society, the main challenges related
to the establishment and maintenance of these networks, the latest
advancements in the field, and future perspectives.
Meeting People via WiFi and Bluetooth will contain an overview of
how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi)
and Bluetooth 802.15 Radio Frequencies. The content contained here
came from research and materials originally presented at Defcon
Wireless CTF Village in August 2015 entitled "Meeting People Via
Wi-Fi". The book will go over the hardware and software needed in
order to do this tracking, how to use these particular tools in
order to do attribution, and tips for protecting yourself from
being attributed via those signals.
As the confluence of networks that is the modern Internet grows to
encompass everything from nuclear reactors to home appliances, the
affordances offered to the average citizen grow as well-but so,
too, do the resources made available to those with malicious
intent. Through the rise of Big Data and the Internet of Things,
terrorist organizations today have been freed from geographic and
logistical confines and now have more power than ever before to
strike the average citizen directly at home. This, coupled with the
inherently asymmetrical nature of cyberwarfare-which grants great
advantage to the attacker-has created an unprecedented national
security risk that both governments and their citizens are woefully
ill-prepared to face. The Handbook of Research on Civil Society and
National Security in the Era of Cyber Warfare addresses the problem
of cyber terrorism head-on, first through a review of current
literature, and then through a series of progressive proposals
aimed at researchers, professionals, and policymakers. Touching on
such subjects as cyber-profiling, hacktivism, and digital
counterterrorism, this collection offers the tools to begin
formulating a ground-up resiliency to cybersecurity threats that
starts at the civilian level.
Denial of Service (DoS) attacks are a form of attack that seeks to
make a network resource unavailable due to overloading the resource
or machine with an overwhelming number of packets, thereby crashing
or severely slowing the performance of the resource. Distributed
Denial of Service (DDoS) is a large scale DoS attack which is
distributed in the Internet. Every computer which has access to the
Internet can behave as an attacker. Typically bandwidth depletion
can be categorized as either a flood or an amplification attack.
Flood attacks can be done by generating ICMP packets or UDP packets
in which it can utilize stationary or random variable ports. Smurf
and Fraggle attacks are used for amplification attacks. DDoS Smurf
attacks are an example of an amplification attack where the
attacker sends packets to a network amplifier with the return
address spoofed to the victim's IP address. This book presents new
research and methodologies along with a proposed algorithm for
prevention of DoS attacks that has been written based on
cryptographic concepts such as birthday attacks to estimate the
rate of attacks generated and passed along the routers.
Consequently, attackers would be identified and prohibited from
sending spam traffic to the server which can cause DDoS attacks.
Due to the prevalence of DoS attacks, there has been a lot of
research conducted on how to detect them and prevent them. The
authors of this short format title provide their research results
on providing an effective solution to DoS attacks, including
introduction of the new algorithm that can be implemented in order
to deny DoS attacks.
Mobile Ad Hoc Networks (MANETs) are a popular form of network for
data transfer due to the fact that they are dynamic, require no
fixed infrastructure, and are scalable. However, MANETs are
particularly susceptible to several different types of widely
perpetrated cyberattack. One of the most common hacks aimed at
MANETs is the Black Hole attack, in which a particular node within
the network displays itself as having the shortest path for the
node whose packets it wants to intercept. Once the packets are
drawn to the Black Hole, they are then dropped instead of relayed,
and the communication of the MANET is thereby disrupted, without
knowledge of the other nodes in the network. Due to the
sophistication of the Black Hole attack, there has been a lot of
research conducted on how to detect it and prevent it. The authors
of this short format title provide their research results on
providing an effective solution to Black Hole attacks, including
introduction of new MANET routing protocols that can be implemented
in order to improve detection accuracy and network parameters such
as total dropped packets, end-to-end delay, packet delivery ratio,
and routing request overhead.
|
You may like...
Essential
Dougie MacLean
CD
R584
Discovery Miles 5 840
|