|
|
Books > Computing & IT > Computer communications & networking
Since the advent of the internet, online communities have emerged
as a way for users to share their common interests and connect with
others with ease. As the possibilities of the online world grew and
the COVID-19 pandemic raged across the world, many organizations
recognized the utility in not only providing further services
online, but also in transitioning operations typically fulfilled
in-person to an online space. As society approaches a reality in
which most community practices have moved to online spaces, it is
essential that community leaders remain knowledgeable on the best
practices in cultivating engagement. Community Engagement in the
Online Space evaluates key issues and practices pertaining to
community engagement in remote settings. It analyzes various
community engagement efforts within remote education, online
groups, and remote work. This book further reviews the best
practices for community engagement and considerations for the
optimization of these practices for effective virtual delivery to
support emergency environmental challenges, such as pandemic
conditions. Covering topics such as community belonging, global
health virtual practicum, and social media engagement, this premier
reference source is an excellent resource for program directors,
faculty and administrators of both K-12 and higher education,
students of higher education, business leaders and executives, IT
professionals, online community moderators, librarians,
researchers, and academicians.
With the growing maturity and stability of digitization and edge
technologies, vast numbers of digital entities, connected devices,
and microservices interact purposefully to create huge sets of
poly-structured digital data. Corporations are continuously seeking
fresh ways to use their data to drive business innovations and
disruptions to bring in real digital transformation. Data science
(DS) is proving to be the one-stop solution for simplifying the
process of knowledge discovery and dissemination out of massive
amounts of multi-structured data. Supported by query languages,
databases, algorithms, platforms, analytics methods and machine and
deep learning (ML and DL) algorithms, graphs are now emerging as a
new data structure for optimally representing a variety of data and
their intimate relationships. Compared to traditional analytics
methods, the connectedness of data points in graph analytics
facilitates the identification of clusters of related data points
based on levels of influence, association, interaction frequency
and probability. Graph analytics is being empowered through a host
of path-breaking analytics techniques to explore and pinpoint
beneficial relationships between different entities such as
organizations, people and transactions. This edited book aims to
explain the various aspects and importance of graph data science.
The authors from both academia and industry cover algorithms,
analytics methods, platforms and databases that are intrinsically
capable of creating business value by intelligently leveraging
connected data. This book will be a valuable reference for ICTs
industry and academic researchers, scientists and engineers, and
lecturers and advanced students in the fields of data analytics,
data science, cloud/fog/edge architecture, internet of things,
artificial intelligence/machine and deep learning, and related
fields of applications. It will also be of interest to analytics
professionals in industry and IT operations teams.
Network Science Network Science offers comprehensive insight on
network analysis and network optimization algorithms, with simple
step-by-step guides and examples throughout, and a thorough
introduction and history of network science, explaining the key
concepts and the type of data needed for network analysis, ensuring
a smooth learning experience for readers. It also includes a
detailed introduction to multiple network optimization algorithms,
including linear assignment, network flow and routing problems. The
text is comprised of five chapters, focusing on subgraphs, network
analysis, network optimization, and includes a list of case
studies, those of which include influence factors in
telecommunications, fraud detection in taxpayers, identifying the
viral effect in purchasing, finding optimal routes considering
public transportation systems, among many others. This insightful
book shows how to apply algorithms to solve complex problems in
real-life scenarios and shows the math behind these algorithms,
enabling readers to learn how to develop them and scrutinize the
results. Written by a highly qualified author with significant
experience in the field, Network Science also includes information
on: Sub-networks, covering connected components, bi-connected
components, community detection, k-core decomposition, reach
network, projection, nodes similarity and pattern matching Network
centrality measures, covering degree, influence, clustering
coefficient, closeness, betweenness, eigenvector, PageRank, hub and
authority Network optimization, covering clique, cycle, linear
assignment, minimum-cost network flow, maximum network flow
problem, minimum cut, minimum spanning tree, path, shortest path,
transitive closure, traveling salesman problem, vehicle routing
problem and topological sort With in-depth and authoritative
coverage of the subject and many case studies to convey concepts
clearly, Network Science is a helpful training resource for
professional and industry workers in, telecommunications,
insurance, retail, banking, healthcare, public sector, among
others, plus as a supplementary reading for an introductory Network
Science course for undergraduate students.
Cyber security is a key focus in the modern world as more private
information is stored and saved online. In order to ensure vital
information is protected from various cyber threats, it is
essential to develop a thorough understanding of technologies that
can address cyber security challenges. Artificial intelligence has
been recognized as an important technology that can be employed
successfully in the cyber security sector. Due to this, further
study on the potential uses of artificial intelligence is required.
The Handbook of Research on Cyber Security Intelligence and
Analytics discusses critical artificial intelligence technologies
that are utilized in cyber security and considers various cyber
security issues and their optimal solutions supported by artificial
intelligence. Covering a range of topics such as malware, smart
grid, data breachers, and machine learning, this major reference
work is ideal for security analysts, cyber security specialists,
data analysts, security professionals, computer scientists,
government officials, researchers, scholars, academicians,
practitioners, instructors, and students.
In recent years, falsification and digital modification of video
clips, images, as well as textual contents have become widespread
and numerous, especially when deepfake technologies are adopted in
many sources. Due to adopted deepfake techniques, a lot of content
currently cannot be recognized from its original sources. As a
result, the field of study previously devoted to general multimedia
forensics has been revived. The Handbook of Research on Advanced
Practical Approaches to Deepfake Detection and Applications
discusses the recent techniques and applications of illustration,
generation, and detection of deepfake content in multimedia. It
introduces the techniques and gives an overview of deepfake
applications, types of deepfakes, the algorithms and applications
used in deepfakes, recent challenges and problems, and practical
applications to identify, generate, and detect deepfakes. Covering
topics such as anomaly detection, intrusion detection, and security
enhancement, this major reference work is a comprehensive resource
for cyber security specialists, government officials, law
enforcement, business leaders, students and faculty of higher
education, librarians, researchers, and academicians.
The concept of autonomic computing seeks to reduce the complexity
of pervasively ubiquitous system management and maintenance by
shifting the responsibility for low-level tasks from humans to the
system while allowing humans to concentrate on high-level tasks.
This is achieved by building self-managing systems that are
generally capable of self-configuring, self-healing,
self-optimising, and self-protecting. Trustworthy autonomic
computing technologies are being applied in datacentre and cloud
management, smart cities and autonomous systems including
driverless cars. However, there are still significant challenges to
achieving trustworthiness. This book covers challenges and
solutions in autonomic computing trustworthiness from methods and
techniques to achieve consistent and reliable system
self-management. Researchers, developers and users need to be
confident that an autonomic self-managing system will remain
correct in the face of any possible contexts and environmental
inputs. The book is aimed at researchers in autonomic computing,
autonomics and trustworthy autonomics. This will be a go-to book
for foundational knowledge, proof of concepts and novel trustworthy
autonomic techniques and approaches. It will be useful to lecturers
and students of autonomic computing, autonomics and multi-agent
systems who need an easy-to-use text with sample codes, exercises,
use-case demonstrations. This is also an ideal tutorial guide for
independent study with simple and well documented diagrams to
explain techniques and processes.
Recent years have seen a proliferation of cybersecurity guidance in
the form of government regulations and standards with which
organizations must comply. As society becomes more heavily
dependent on cyberspace, increasing levels of security measures
will need to be established and maintained to protect the
confidentiality, integrity, and availability of information; the
privacy of consumers; and the continuity of economic activity.
Compliance is a measure of the extent to which a current state is
in conformance with a desired state. The desired state is commonly
operationalized through specific business objectives, professional
standards, and regulations. Assurance services provide a means of
evaluating the level of compliance with various cybersecurity
requirements. The proposed book will summarize current
cybersecurity guidance and provide a compendium of innovative and
state-of-the-art compliance and assurance practices and tools that
can function both as a reference and pedagogical source for
practitioners and educators. This publication will provide a
synopsis of current cybersecurity guidance that organizations
should consider in establishing and updating their cybersecurity
systems. Assurance services will also be addressed so that
management and their auditors can regularly evaluate their extent
of compliance. This book should be published because its theme will
provide company management, practitioners, and academics with a
good summary of current guidance and how to conduct assurance of
appropriate compliance.
Digital transformation in organizations optimizes the business
processes but also brings additional challenges in the form of
security threats and vulnerabilities. Cyberattacks incur financial
losses for organizations and can affect their reputations. Due to
this, cybersecurity has become critical for business enterprises.
Extensive technological adoption in businesses and the evolution of
FinTech applications require reasonable cybersecurity measures to
protect organizations from internal and external security threats.
Recent advances in the cybersecurity domain such as zero trust
architecture, application of machine learning, and quantum and
post-quantum cryptography have colossal potential to secure
technological infrastructures. Cybersecurity Issues and Challenges
for Business and FinTech Applications discusses theoretical
foundations and empirical studies of cybersecurity implications in
global digital transformation and considers cybersecurity
challenges in diverse business areas. Covering essential topics
such as artificial intelligence, social commerce, and data leakage,
this reference work is ideal for cybersecurity professionals,
business owners, managers, policymakers, researchers, scholars,
academicians, practitioners, instructors, and students.
Many professional fields have been affected by the rapid growth of
technology and information. Included in this are the business and
management markets as the implementation of e-commerce and cloud
computing have caused enterprises to make considerable changes to
their practices. With the swift advancement of this technology,
professionals need proper research that provides solutions to the
various issues that come with data integration and shifting to a
technology-driven environment. Cloud Computing Applications and
Techniques for E-Commerce is an essential reference source that
discusses the implementation of data and cloud technology within
the fields of business and information management. Featuring
research on topics such as content delivery networks,
virtualization, and software resources, this book is ideally
designed for managers, educators, administrators, researchers,
computer scientists, business practitioners, economists,
information analysists, sociologists, and students seeking coverage
on the recent advancements of e-commerce using cloud computing
techniques.
Smart homes use Internet-connected devices, artificial
intelligence, protocols and numerous technologies to enable people
to remotely monitor their home, as well as manage various systems
within it via the Internet using a smartphone or a computer. A
smart home is programmed to act autonomously to improve comfort
levels, save energy and potentially ensure safety; the result is a
better way of life. Innovative solutions continue to be developed
by researchers and engineers and thus smart home technologies are
constantly evolving. By the same token, cybercrime is also becoming
more prevalent. Indeed, a smart home system is made up of connected
devices that cybercriminals can infiltrate to access private
information, commit cyber vandalism or infect devices using
botnets. This book addresses cyber attacks such as sniffing, port
scanning, address spoofing, session hijacking, ransomware and
denial of service. It presents, analyzes and discusses the various
aspects of cybersecurity as well as solutions proposed by the
research community to counter the risks. Cybersecurity in Smart
Homes is intended for people who wish to understand the
architectures, protocols and different technologies used in smart
homes.
Cybersecurity is vital for all businesses, regardless of sector.
With constant threats and potential online dangers, businesses must
remain aware of the current research and information available to
them in order to protect themselves and their employees.
Maintaining tight cybersecurity can be difficult for businesses as
there are so many moving parts to contend with, but remaining
vigilant and having protective measures and training in place is
essential for a successful company. The Research Anthology on
Business Aspects of Cybersecurity considers all emerging aspects of
cybersecurity in the business sector including frameworks, models,
best practices, and emerging areas of interest. This comprehensive
reference source is split into three sections with the first
discussing audits and risk assessments that businesses can conduct
to ensure the security of their systems. The second section covers
training and awareness initiatives for staff that promotes a
security culture. The final section discusses software and systems
that can be used to secure and manage cybersecurity threats.
Covering topics such as audit models, security behavior, and
insider threats, it is ideal for businesses, business
professionals, managers, security analysts, IT specialists,
executives, academicians, researchers, computer engineers, graduate
students, and practitioners.
Opinion Mining and Text Analytics on Literary Works and Social
Media introduces the use of artificial intelligence and big data
analytics techniques which can apply opinion mining and text
analytics on literary works and social media. This book focuses on
theories, method and approaches in which data analytic techniques
can be used to analyze data from social media, literary books,
novels, news, texts, and beyond to provide a meaningful pattern.
The subject area of this book is multidisciplinary; related to data
science, artificial intelligence, social science and humanities,
and literature. This is an essential resource for scholars,
Students and lecturers from various fields of data science,
artificial intelligence, social science and humanities, and
literature, university libraries, new agencies, and many more.
Data Communications and Networking, 6th Edition, teaches the
principles of networking using TCP/IP protocol suite. It employs a
bottom-up approach where each layer in the TCP/IP protocol suite is
built on the services provided by the layer below. This edition has
undergone a major restructuring to reduce the number of chapters
and focus on the organization of TCP/IP protocol suite. It
concludes with three chapters that explore multimedia, network
management, and cryptography/network security. Technologies related
to data communications and networking are among the fastest growing
in our culture today, and there is no better guide to this rapidly
expanding field than Data Communications and Networking.
Deep Reinforcement Learning for Wireless Communications and
Networking Comprehensive guide to Deep Reinforcement Learning (DRL)
as applied to wireless communication systems Deep Reinforcement
Learning for Wireless Communications and Networking presents an
overview of the development of DRL while providing fundamental
knowledge about theories, formulation, design, learning models,
algorithms and implementation of DRL together with a particular
case study to practice. The book also covers diverse applications
of DRL to address various problems in wireless networks, such as
caching, offloading, resource sharing, and security. The authors
discuss open issues by introducing some advanced DRL approaches to
address emerging issues in wireless communications and networking.
Covering new advanced models of DRL, e.g., deep dueling
architecture and generative adversarial networks, as well as
emerging problems considered in wireless networks, e.g., ambient
backscatter communication, intelligent reflecting surfaces and edge
intelligence, this is the first comprehensive book studying
applications of DRL for wireless networks that presents the
state-of-the-art research in architecture, protocol, and
application design. Deep Reinforcement Learning for Wireless
Communications and Networking covers specific topics such as: Deep
reinforcement learning models, covering deep learning, deep
reinforcement learning, and models of deep reinforcement learning
Physical layer applications covering signal detection, decoding,
and beamforming, power and rate control, and physical-layer
security Medium access control (MAC) layer applications, covering
resource allocation, channel access, and user/cell association
Network layer applications, covering traffic routing, network
classification, and network slicing With comprehensive coverage of
an exciting and noteworthy new technology, Deep Reinforcement
Learning for Wireless Communications and Networking is an essential
learning resource for researchers and communications engineers,
along with developers and entrepreneurs in autonomous systems, who
wish to harness this technology in practical applications.
Industrial internet of things (IIoT) is changing the face of
industry by completely redefining the way stakeholders,
enterprises, and machines connect and interact with each other in
the industrial digital ecosystem. Smart and connected factories, in
which all the machinery transmits real-time data, enable industrial
data analytics for improving operational efficiency, productivity,
and industrial processes, thus creating new business opportunities,
asset utilization, and connected services. IIoT leads factories to
step out of legacy environments and arcane processes towards open
digital industrial ecosystems. Innovations in the Industrial
Internet of Things (IIoT) and Smart Factory is a pivotal reference
source that discusses the development of models and algorithms for
predictive control of industrial operations and focuses on
optimization of industrial operational efficiency, rationalization,
automation, and maintenance. While highlighting topics such as
artificial intelligence, cyber security, and data collection, this
book is ideally designed for engineers, manufacturers,
industrialists, managers, IT consultants, practitioners, students,
researchers, and industrial industry professionals.
Wireless Communication Networks Supported by Autonomous UAVs and
Mobile Ground Robots covers wireless sensor networks and cellular
networks. For wireless sensor networks, the book presents
approaches using mobile robots or UAVs to collect sensory data from
sensor nodes. For cellular networks, it discusses the approaches to
using UAVs to work as aerial base stations to serve cellular users.
In addition, the book covers the challenges involved in these two
networks, existing approaches (e.g., how to use the public
transportation vehicles to play the role of mobile sinks to collect
sensory data from sensor nodes), and potential methods to address
open questions.
Every day approximately three-hundred thousand to four-hundred
thousand new malware are registered, many of them being adware and
variants of previously known malware. Anti-virus companies and
researchers cannot deal with such a deluge of malware - to analyze
and build patches. The only way to scale the efforts is to build
algorithms to enable machines to analyze malware and classify and
cluster them to such a level of granularity that it will enable
humans (or machines) to gain critical insights about them and build
solutions that are specific enough to detect and thwart existing
malware and generic-enough to thwart future variants. Advances in
Malware and Data-Driven Network Security comprehensively covers
data-driven malware security with an emphasis on using statistical,
machine learning, and AI as well as the current trends in
ML/statistical approaches to detecting, clustering, and
classification of cyber-threats. Providing information on advances
in malware and data-driven network security as well as future
research directions, it is ideal for graduate students,
academicians, faculty members, scientists, software developers,
security analysts, computer engineers, programmers, IT specialists,
and researchers who are seeking to learn and carry out research in
the area of malware and data-driven network security.
The artificial intelligence subset machine learning has become a
popular technique in professional fields as many are finding new
ways to apply this trending technology into their everyday
practices. Two fields that have majorly benefited from this are
pattern recognition and information security. The ability of these
intelligent algorithms to learn complex patterns from data and
attain new performance techniques has created a wide variety of
uses and applications within the data security industry. There is a
need for research on the specific uses machine learning methods
have within these fields, along with future perspectives. Machine
Learning Techniques for Pattern Recognition and Information
Security is a collection of innovative research on the current
impact of machine learning methods within data security as well as
its various applications and newfound challenges. While
highlighting topics including anomaly detection systems,
biometrics, and intrusion management, this book is ideally designed
for industrial experts, researchers, IT professionals, network
developers, policymakers, computer scientists, educators, and
students seeking current research on implementing machine learning
tactics to enhance the performance of information security.
The cybersecurity of connected medical devices is one of the
biggest challenges facing healthcare today. The compromise of a
medical device can result in severe consequences for both patient
health and patient data. Cybersecurity for Connected Medical
Devices covers all aspects of medical device cybersecurity, with a
focus on cybersecurity capability development and maintenance,
system and software threat modeling, secure design of medical
devices, vulnerability management, and integrating cybersecurity
design aspects into a medical device manufacturer's Quality
Management Systems (QMS). This book is geared towards engineers
interested in the medical device cybersecurity space, regulatory,
quality, and human resources specialists, and organizational
leaders interested in building a medical device cybersecurity
program.
|
|