![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
Shaping Future 6G Networks Discover the societal and technology drivers contributing to build the next generation of wireless telecommunication networks Shaping Future 6G Networks: Needs, Impacts, and Technologies is a holistic snapshot on the evolution of 5G technologies towards 6G. With contributions from international key players in industry and academia, the book presents the hype versus the realistic capabilities of 6G technologies, and delivers cutting-edge business and technological insights into the future wireless telecommunications landscape. You'll learn about: Forthcoming demand for post 5G networks, including new requirements coming from small and large businesses, manufacturing, logistics, and automotive industry Societal implications of 6G, including digital sustainability, strategies for increasing energy efficiency, as well as future open networking ecosystems Impacts of integrating non-terrestrial networks to build the 6G architecture Opportunities for emerging THz radio access technologies in future integrated communications, positioning, and sensing capabilities in 6G Design of highly modular and distributed 6G core networks driven by the ongoing RAN-Core integration and the benefits of AI/ML-based control and management Disruptive architectural considerations influenced by the Post-Shannon Theory The insights in Shaping Future 6G Networks will greatly benefit IT engineers and managers focused on the future of networking, as well as undergraduate and graduate engineering students focusing on the design, implementation, and management of mobile networks and applications.
The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times. Dr. Florian Skopik is one of the leading researchers in Smart Grid security, having organized and led research consortia and panel discussions in this field. Smart Grid Security will provide the first truly holistic view of leading edge Smart Grid security research. This book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of Smart Grid security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology.
As information resources migrate to the Cloud and to local and global networks, protecting sensitive data becomes ever more important. In the modern, globally-interconnected world, security and privacy are ubiquitous concerns. Next Generation Wireless Network Security and Privacy addresses real-world problems affecting the security of information communications in modern networks. With a focus on recent developments and solutions, as well as common weaknesses and threats, this book benefits academicians, advanced-level students, researchers, computer scientists, and software development specialists. This cutting-edge reference work features chapters on topics including UMTS security, procedural and architectural solutions, common security issues, and modern cryptographic algorithms, among others.
This book provides an authoritative guide for postgraduate students and academic researchers in electronics, computer and network engineering, telecommunications, energy technology and home automation, as well as R&D managers in industrial sectors such as wireless technology, consumer electronics, telecommunications and networking, information technology, energy technology and home automation. Part One outlines the key principles and technologies needed for ecological smart home networks. Beginning with a thorough overview of the concept behind ecological smart home network design, the book reviews such important areas as power line communications, hybrid systems and middleware platforms. Part Two then goes on to discuss some important applications of this technology, with wireless smart sensor networks for home and telecare, and smart home networking for content and energy management (including the intelligent Zero Emission Urban System), all explored in detail.
The emerging field of network science represents a new style of research that can unify such traditionally-diverse fields as sociology, economics, physics, biology, and computer science. It is a powerful tool in analyzing both natural and man-made systems, using the relationships between players within these networks and between the networks themselves to gain insight into the nature of each field. Until now, studies in network science have been focused on particular relationships that require varied and sometimes-incompatible datasets, which has kept it from being a truly universal discipline. Computational Network Science seeks to unify the methods used to analyze these diverse fields. This book provides an introduction to the field of Network Science and provides the groundwork for a computational, algorithm-based approach to network and system analysis in a new and important way. This new approach would remove the need for tedious human-based analysis of different datasets and help researchers spend more time on the qualitative aspects of network science research.
As computers continue to remain essential tools for the pursuit of physics, medicine, economics, social sciences, and more, supercomputers are proving that they can further extend and greatly enhance as-of-yet undiscovered knowledge and solve the world's most complex problems. As these instruments continue to lead to groundbreaking discoveries and breakthroughs, it is imperative that research remains up to date with the latest findings and uses. The Handbook of Research on Methodologies and Applications of Supercomputing is a comprehensive and critical reference book that provides research on the latest advances of control flow and dataflow supercomputing and highlights selected emerging big data applications needing high acceleration and/or low power. Consequently, this book advocates the need for hybrid computing, where the control flow part represents the host architecture and dataflow part represents the acceleration architecture. These issues cover the initial eight chapters. The remaining eight chapters cover selected modern applications that are best implemented on a hybrid computer, in which the transactional parts (serial code) are implemented on the control flow part and the loops (parallel code) on the dataflow part. These final eight chapters cover two major application domains: scientific computing and computing for digital economy. This book offers applications in marketing, medicine, energy systems, and library science, among others, and is an essential source for scientists, programmers, engineers, practitioners, researchers, academicians, and students interested in the latest findings and advancements in supercomputing.
Advancing technologies, especially computer technologies, have necessitated the creation of a comprehensive investigation and collection methodology for digital and online evidence. The goal of cyber forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device or on a network and who was responsible for it. Critical Concepts, Standards, and Techniques in Cyber Forensics is a critical research book that focuses on providing in-depth knowledge about online forensic practices and methods. Highlighting a range of topics such as data mining, digital evidence, and fraud investigation, this book is ideal for security analysts, IT specialists, software engineers, researchers, security professionals, criminal science professionals, policymakers, academicians, and students.
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.
Vehicular Communications and Networks: Architectures, Protocols, Operation and Deployment discusses VANETs (Vehicular Ad-hoc Networks) or VCS (Vehicular Communication Systems), which can improve safety, decrease fuel consumption, and increase the capacity of existing roadways and which is critical for the Intelligent Transportation System (ITS) industry. Part one covers architectures for VCS, part two describes the physical layer, antenna technologies and propagation models, part three explores protocols, algorithms, routing and information dissemination, and part four looks at the operation and deployment of vehicular communications and networks.
In the modern age of urbanisation, the mass population is becoming progressively reliant on technical infrastructures. These industrial buildings provide integral services to the general public including the delivery of energy, information and communication technologies, and maintenance of transport networks. The safety and security of these structures is crucial as new threats are continually emerging. Safety and Security Issues in Technical Infrastructures is a pivotal reference source that provides vital research on the modernisation of occupational security and safety practices within information technology-driven buildings. While highlighting topics such as explosion process safety, nanotechnology, and infrastructural risk analysis, this publication explores current risks and uncertainties and the raising of comprehensive awareness for experts in this field. This book is ideally designed for security managers, safety personnel, civil engineers, architects, researchers, construction professionals, strategists, educators, material scientists, property owners, and students.
Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field. This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey.
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools - most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.
The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC(2). The new HCISPP certification, focused on health care information security and privacy, is similar to the CISSP, but has only six domains and is narrowly targeted to the special demands of health care information security. Tim Virtue and Justin Rainey have created the HCISPP Study Guide to walk you through all the material covered in the exam's Common Body of Knowledge. The six domains are covered completely and as concisely as possible with an eye to acing the exam. Each of the six domains has its own chapter that includes material to aid the test-taker in passing the exam, as well as a chapter devoted entirely to test-taking skills, sample exam questions, and everything you need to schedule a test and get certified. Put yourself on the forefront of health care information privacy and security with the HCISPP Study Guide and this valuable certification.
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography. |
You may like...
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao
Paperback
The Host in the Machine - Examining the…
Angela Thomas-Jones
Paperback
R1,318
Discovery Miles 13 180
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders
Paperback
R1,469
Discovery Miles 14 690
CCNA 200-301 Network Simulator
Sean Wilkins
Digital product license key
R2,877
Discovery Miles 28 770
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, …
Paperback
R1,452
Discovery Miles 14 520
|