|
Books > Computing & IT > Computer communications & networking
Data has cemented itself as a building block of daily life.
However, surrounding oneself with great quantities of information
heightens risks to one's personal privacy. Additionally, the
presence of massive amounts of information prompts researchers into
how best to handle and disseminate it. Research is necessary to
understand how to cope with the current technological requirements.
Large-Scale Data Streaming, Processing, and Blockchain Security is
a collection of innovative research that explores the latest
methodologies, modeling, and simulations for coping with the
generation and management of large-scale data in both scientific
and individual applications. Featuring coverage on a wide range of
topics including security models, internet of things, and
collaborative filtering, this book is ideally designed for
entrepreneurs, security analysts, IT consultants, security
professionals, programmers, computer technicians, data scientists,
technology developers, engineers, researchers, academicians, and
students.
In the ever-evolving telecommunication industry, technological
improvements alone are not able to keep up with the significant
growth of mobile broadband traffic. As such, new research on
communications networks is necessary to keep up with rising demand.
Convergence of Broadband, Broadcast, and Cellular Network
Technologies addresses the problems of broadband, broadcast, and
cellular coexistence, including the increasing number of advanced
mobile users and their bandwidth demands. This book will serve as a
link between academia and industry, serving students, researchers,
and industry professionals.
There is a need within radio-frequency identification (RFID) and
other smart technologies to understand related practical
implications. Auto-Identification and Ubiquitous Computing
Applications: RFID and Smart Technologies for Information
Convergence reports on problems related to the primary use of RFID
technologies. This book provides a detailed overview of RFID
literature, specifically in using RFID and smart technologies for
identification, and draws together several different fields of
research across supply chain management, asset tracking, and novel
use of RFID for identification.
This volume elaborates on both the qualitative and quantitative
aspects of resilience. Reviewing the literature exploring the
concept of resilience in engineering, it discusses resilience in
terms of the various definitions used, the methodologies proposed
to characterize resilience, and the metrics put forward to quantify
the resilience of specific service infrastructure systems. The
review also identifies the key factors that contribute to
organizational resilience. The concept of resilience is compared to
other system properties such as reliability, robustness,
flexibility and agility, by taking into consideration what systems
are prepared against (types of failure), the causes of failure in
systems (uncertainty), and how systems react to overcome failure
(level of adaptability). A review is also provided of several
resilience-enabling schemes, which improve resilience by reducing
vulnerability and increasing adaptive capacity. The book puts
forward a new framework, the Networked Infrastructure Resilience
Assessment (NIRA) framework, through which the resilience of
systems can be measured by assessing the impact of disruptions on
key performance measures. By applying the framework to various case
studies, the book demonstrates the ability of the proposed
framework to assess resilience across a wide variety of networked
infrastructure systems. The case studies probe the resilience of
the following critical infrastructure systems in the face of
specific disruptive events: telecommunication, transportation,
maritime transportation and organizational networks. This text is
intended for all levels of academia from undergraduate through to
research level as well as professionals and decision-makers
involved in the development, analysis and evaluation of
infrastructure systems.
From transportation to healthcare, IoT has been heavily implemented
into practically every professional industry, making these systems
highly susceptible to security breaches. Because IoT connects not
just devices but also people and other entities, every component of
an IoT system remains vulnerable to attacks from hackers and other
unauthorized units. This clearly portrays the importance of
security and privacy in IoT, which should be strong enough to keep
the entire platform and stakeholders secure and smooth enough to
not disrupt the lucid flow of communication among IoT entities.
Applied Approach to Privacy and Security for the Internet of Things
is a collection of innovative research on the methods and applied
aspects of security in IoT-based systems by discussing core
concepts and studying real-life scenarios. While highlighting
topics including malware propagation, smart home vulnerabilities,
and bio-sensor safety, this book is ideally designed for security
analysts, software security engineers, researchers, computer
engineers, data scientists, security professionals, practitioners,
academicians, and students seeking current research on the various
aspects of privacy and security within IoT.
Security in Virtual Worlds, 3D Webs, and Immersive Environments:
Models for Development, Interaction, and Management brings together
the issues that managers, practitioners, and researchers must
consider when planning, implementing, working within, and managing
these promising virtual technologies for secure processes and
initiatives. This publication discusses the uses and potential of
these virtual technologies and examines secure policy formation and
practices that can be applied specifically to each.
Data services, especially those involving multimedia applications,
can often be bandwidth intensive and accessed simultaneously by a
large number of users. As such, efforts are being made to replace
conventional network infrastructure, based on copper lines and
coaxial cables, with fiber optic networks for improved performance.
Optical Transmission and Networks for Next Generation Internet
Traffic Highways provides a broader perspective of the parameters
involved in the transmission of optical signals using optical
soliton systems, OCDM-WDM, SCM-WDM and OTDM-WDM. This timely
publication is ideal for use by technical managers, graduate
students, engineers and technicians involved in the fiber-optics
industry, and scientists working in the field of optical
communications.
In the mid-1970s, Whitfield Diffie and Martin Hellman invented
public key cryptography, an innovation that ultimately changed the
world. Today public key cryptography provides the primary basis for
secure communication over the internet, enabling online work,
socializing, shopping, government services, and much more. While
other books have documented the development of public key
cryptography, this is the first to provide a comprehensive
insiders' perspective on the full impacts of public key
cryptography, including six original chapters by nine distinguished
scholars. The book begins with an original joint biography of the
lives and careers of Diffie and Hellman, highlighting parallels and
intersections, and contextualizing their work. Subsequent chapters
show how public key cryptography helped establish an open
cryptography community and made lasting impacts on computer and
network security, theoretical computer science, mathematics, public
policy, and society. The volume includes particularly influential
articles by Diffie and Hellman, as well as newly transcribed
interviews and Turing Award Lectures by both Diffie and Hellman.
The contributed chapters provide new insights that are accessible
to a wide range of readers, from computer science students and
computer security professionals, to historians of technology and
members of the general public. The chapters can be readily
integrated into undergraduate and graduate courses on a range of
topics, including computer security, theoretical computer science
and mathematics, the history of computing, and science and
technology policy.
IT Security Governance Innovations: Theory and Research provides
extraordinary research which highlights the main contributions and
characteristics of existing approaches, standards, best practices,
and new trends in IT Security Governance. With theoretical and
practical perspectives, the book aims to address IT Security
Governance implementation in corporate organizations. This
collection of works serves as a reference for CEOs and CIOs,
security managers, systems specialists, computer science students,
and much more.
As computer technologies continue to evolve and new security
threats emerge, secure-aware software developments are essential in
the software engineering field. Developing and Evaluating
Security-Aware Software Systems provides innovative ideas and
methods on the development, operation, and maintenance of secure
software systems and aims to highlight the construction of a
functional software system and a secure system simultaneously. This
book is practical for researchers, academics and practitioners in
the software engineering and security fields.
Terroredia is a newly coined term by the editor, Dr. Mahmoud Eid,
to explain the phenomenal, yet under-researched relationship
between terrorists and media professionals in which acts of
terrorism and media coverage are exchanged, influenced, and fueled
by one another. Exchanging Terrorism Oxygen for Media Airwaves: The
Age of Terroredia provides a timely and thorough discussion on a
wide range of issues surrounding terrorism in relation to both
traditional and new media. Comprised of insights and research from
leading experts in the fields of terrorism and media studies, this
publication presents various topics relating to Terroredia:
understanding of terrorism and the role of the media, terrorism
manifestations and media representations of terrorism, types of
terrorism and media stereotypes of terrorism, terrorism tactics and
media strategies, the war on terrorism, the function of terrorism
and the employment of the media, new terrorism and new media,
contemporary cases of terrorist-media interactions, the rationality
behind terrorism and counterterrorism, as well as the
responsibility of the media. This publication is of interest to
government officials, media professionals, researchers, and
upper-level students interested in learning more about the complex
relationship between terrorism and the media.
Technological innovations in the banking sector have provided
numerous benefits to customers and banks alike; however, the use of
e-banking increases vulnerability to system attacks and threats,
making effective security measures more vital than ever. Online
Banking Security Measures and Data Protection is an authoritative
reference source for the latest scholarly material on the
challenges presented by the implementation of e-banking in
contemporary financial systems. Presenting emerging techniques to
secure these systems against potential threats and highlighting
theoretical foundations and real-world case studies, this book is
ideally designed for professionals, practitioners, upper-level
students, and technology developers interested in the latest
developments in e-banking security.
The increasing reliance upon networking and mobile networking
devices in the modern world demands constant improvement of network
Quality of Service (QoS). Intelligent Quality of Service
Technologies and Network Management: Models for Enhancing
Communication explores the interrelated natures of network control
mechanisms and QoS and offers fundamental knowledge on the subject,
describing the significance of network management and the
integration of knowledge to demonstrate how network management is
related to QoS in real applications. Engaging and innovative, this
book provides practical solutions that integrate network management
and QoS strategies for real-world application.
Education and research in the field of electronic commerce
technology can prove problematic without the proper resources and
tools on the most relevant issues, trends, and advancements.
Selected Readings on Electronic Commerce Technologies: Contemporary
Applications supplements course instruction and student research
with quality articles focused on key issues concerning the
technologies and applications of electronic commerce. Containing
over 30 chapters from authors across the globe, these selected
readings in areas such as e-marketing, IT business, and mobile
commerce depict the most relevant and important areas of classroom
discussion within the categories of fundamental concepts and
theories; development and design methodologies; tools and
technologies; application and utilization; critical issues; and
emerging trends.
Radio-frequency (RF) integrated circuits in CMOS technology are
gaining increasing popularity in the commercial world, and CMOS
technology has become the dominant technology for applications such
as GPS receivers, GSM cellular transceivers, wireless LAN, and
wireless short-range personal area networks based on IEEE 802.15.1
(Bluetooth) or IEEE 802.15.4 (ZigBee) standards. Furthermore, the
increasing interest in wireless technologies and the widespread of
wireless communications has prompted an ever increasing demand for
radio frequency transceivers. Wireless Radio-Frequency Standards
and System Design: Advanced Techniques provides perspectives on
radio-frequency circuit and systems design, covering recent topics
and developments in the RF area. Exploring topics such as LNA
linearization, behavioral modeling and co-simulation of analog and
mixed-signal complex blocks for RF applications, integrated passive
devices for RF-ICs and baseband design techniques and wireless
standards, this is a comprehensive reference for students as well
as practicing professionals.
|
You may like...
Captain America
Jack Kirby, Joe Simon, …
Paperback
R543
Discovery Miles 5 430
|