![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
Today more than ever, the line between national security and cyber security is becoming increasingly erased. As recent attacks on US infrastructure show (for example, the oil pipeline hack of 2021), nontraditional threats ranging from hacking for the purposes of extracting ransom to terrorist communications online are emerging as central to national threat assessment. In an innovative fashion that allows for the comparison of approaches to this nexus in the developed and developing countries his volume brings together European and African experts offering an in-depth analysis of the relationship between national and cyber security. The individual chapters theorize the current and future implications of global digitalization; a cogent discussion of the threats French military and security forces face in terms of cyber security failures from within; and an exploration of the relationship between cyber security and national security in the volatile Nigerian context.
Internet of Things (IoTs) are now being integrated at a large scale in fast-developing applications such as healthcare, transportation, education, finance, insurance and retail. The next generation of automated applications will command machines to do tasks better and more efficiently. Both industry and academic researchers are looking at transforming applications using machine learning and deep learning to build better models and by taking advantage of the decentralized nature of Blockchain. But the advent of these new technologies also brings very high expectations to industries, organisations and users. The decrease of computing costs, the improvement of data integrity in Blockchain, and the verification of transactions using Machine Learning are becoming essential goals. This edited book covers the challenges, opportunities, innovations, new concepts and emerging trends related to the use of machine learning, Blockchain and Big Data analytics for IoTs. The book is aimed at a broad audience of ICTs, data science, machine learning and cybersecurity researchers interested in the integration of these disruptive technologies and their applications for IoTs.
Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection.
Although some IoT systems are built for simple event control where a sensor signal triggers a corresponding reaction, many events are far more complex, requiring applications to interpret the event using analytical techniques to initiate proper actions. Artificial intelligence of things (AIoT) applies intelligence to the edge and gives devices the ability to understand the data, observe the environment around them, and decide what to do best with minimum human intervention. With the power of AI, AIoT devices are not just messengers feeding information to control centers. They have evolved into intelligent machines capable of performing self-driven analytics and acting independently. A smart environment uses technologies such as wearable devices, IoT, and mobile internet to dynamically access information, connect people, materials and institutions, and then actively manages and responds to the ecosystem's needs in an intelligent manner. In this edited book, the authors present challenges, technologies, applications and future trends of AI-enabled IoT (AIoT) in realizing smart and intelligent environments, including frameworks and methodologies to apply AIoT in monitoring devices and environments, tools and practices most applicable to product or service development to solve innovation problems, advanced and innovative techniques and practical implementations to enhance future smart environment systems as. They plan to cover a broad range of applications including smart cities, smart transportation and smart agriculture. This book is a valuable resource for industry and academic researchers, scientists, engineers and advanced students in the fields of ICTs and networking, IoT, AI and machine and deep learning, data science, sensing, robotics, automation and smart technologies and smart environments.
Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern, and obstructing the attack is increasingly troublesome, regardless of whether countermeasures are taken. The Dark Web especially presents challenges to information privacy and security due to anonymous behaviors and the unavailability of data. To better understand and prevent cyberattacks, it is vital to have a forecast of cyberattacks, proper safety measures, and viable use of cyber-intelligence that empowers these activities. Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence discusses cyberattacks, security, and safety measures to protect data and presents the shortcomings faced by researchers and practitioners due to the unavailability of information about the Dark Web. Attacker techniques in these Dark Web environments are highlighted, along with intrusion detection practices and crawling of hidden content. Covering a range of topics such as malware and fog computing, this reference work is ideal for researchers, academicians, practitioners, industry professionals, computer scientists, scholars, instructors, and students.
Data is an intrinsic part of our daily lives. Everything we do is a data point. Many of these data points are recorded with the intent to help us lead more efficient lives. We have apps that track our workouts, sleep, food intake, and personal finance. We use the data to make changes to our lives based on goals we have set for ourselves. Businesses use vast collections of data to determine strategy and marketing. Data scientists take data, analyze it, and create models to help solve problems. You may have heard of companies having data management teams or chief information officers (CIOs) or chief data officers (CDOs), etc. They are all people who work with data, but their function is more related to vetting data and preparing it for use by data scientists. The jump from personal data usage for self-betterment to mass data analysis for business process improvement often feels bigger to us than it is. In turn, we often think big data analysis requires tools held only by advanced degree holders. Although advanced degrees are certainly valuable, this book illustrates how it is not a requirement to adequately run a data science project. Because we are all already data users, with some simple strategies and exposure to basic analytical software programs, anyone who has the proper tools and determination can solve data science problems. The process presented in this book will help empower individuals to work on and solve data-related challenges. The goal of this book is to provide a step-by-step guide to the data science process so that you can feel confident in leading your own data science project. To aid with clarity and understanding, the author presents a fictional restaurant chain to use as a case study, illustrating how the various topics discussed can be applied. Essentially, this book helps traditional businesspeople solve data-related problems on their own without any hesitation or fear. The powerful methods are presented in the form of conversations, examples, and case studies. The conversational style is engaging and provides clarity.
The Russian regime's struggle for internal control drives multifaceted actions in cyberspace that do not stop at national borders. Cybercrime, technical hacking, and disinformation are complementary tools to preserve national power internally while projecting effects onto myriad neighbors and rivals. Russian activity in the cyber domain is infamous in the United States and other Western countries. Weaponizing Cyberspace explores the Russian proclivity, particularly in the 21st century, for using cyberspace as an environment in which to launch technical attacks and disinformation campaigns that sow chaos and distraction in ways that provide short-term advantage to autocrats in the Kremlin. Arguing that Russia's goal is to divide people, Sambaluk explains that Russia's modus operandi in disinformation campaigning is specifically to find and exploit existing sore spots in other countries. In the U.S., this often means inflaming political tensions among people on the far left and far right. Russia's actions have taken different forms, including the sophisticated surveillance and sabotage of critical infrastructure, the ransoming of data by criminal groups, and a welter of often mutually contradictory disinformation messages that pollute online discourse within and beyond Russia. Whether deployed to contribute to hybrid war or to psychological fracture and disillusionment in targeted societies, the threat is real and must be understood and effectively addressed. Explains how the legacy of Soviet information operations and the modern examples of Russian information operations are similar but not identical to one another Explores the development of Russian domestic information operations techniques that can now be applied against foreign powers Describes the relationships between technical attacks and disinformation often used in confrontations with countries along Russia's borders Examines the role of Russian information operations in U.S. social and political discourse Considers the implications of other countries' reactions that attempt to eliminate the Russian information operation's ability to influence society
Service Oriented Architecture (SOA) is the paradigm for software and system specification, design, implementation and management that intends to shape and dominate IT and business landscapes in the near future. Non-Functional Properties in Service Oriented Architecture: Requirements, Models and Methods offers a selection of chapters that cover three important aspects related to the use of non-functional properties in SOA: requirements specification with respect to non-functional properties, modeling non-functional properties and implementation of non-functional properties. This book serves as both a practical reference and an advanced scientific source for those interested in current issues, new trends, and yet-unresolved areas of the discipline.
With the increased functionality demand for mobile speed and access in our everyday lives, broadband wireless networks have emerged as the solution in providing high data rate communications systems to meet these growing needs. Broadband Wireless Access Networks for 4G: Theory, Application, and Experimentation presents the latest trends and research on mobile ad hoc networks, vehicular ad hoc networks, and routing algorithms which occur within various mobile networks. This publication smartly combines knowledge and experience from enthusiastic scholars and expert researchers in the area of wideband and broadband wireless networks. Students, professors, researchers, and other professionals in the field will benefit from this book s practical applications and relevant studies."
Cloud computing can provide virtually unlimited scalable high performance computing resources. Cloud workflows often underlie many large scale data/computation intensive e-science applications such as earthquake modelling, weather forecasting and astrophysics. During application modelling, these sophisticated processes are redesigned as cloud workflows, and at runtime, the models are executed by employing the supercomputing and data sharing ability of the underlying cloud computing infrastructures. "Temporal QOS Management in Scientific Cloud Workflow Systems"
focuses on real world scientific applications which often must be
completed by satisfying a set of temporal constraints such as
milestones and deadlines. Meanwhile, activity duration, as a
measurement of system performance, often needs to be monitored and
controlled. This book demonstrates how to guarantee on-time
completion of most, if not all, workflow applications. Offering a
comprehensive framework to support the lifecycle of
time-constrained workflow applications, this book will enhance the
overall performance and usability of scientific cloud workflow
systems.
Dynamic, trustworthy and reliable service delivery in Service Oriented Architectures (SOA) is one of the main preconditions for successful and sustainable business operations. Service and business process reliability is, therefore, of paramount importance and cannot be compromised. Engineering Reliable Service Oriented Architecture: Managing Complexity and Service Level Agreements presents a guide to engineering reliable SOA systems and enhances current understanding of service reliability. It is an essential reference for both practitioners and researchers wishing to explore state-of-the art results from the field of reliable SOA application engineering.
Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.
Cognitive networks can be crucial for the evolution of future communication systems; however, current trends have indicated major movement in other relevant fields towards the integration of different techniques for the realization of self-aware and self-adaptive communication systems. Evolution of Cognitive Networks and Self-Adaptive Communication Systems overviews innovative technologies combined for the formation of self-aware, self-adaptive, and self-organizing networks. By aiming to inform the research community and the related industry of solutions for cognitive networks, this book is essential for researchers, instructors, and professionals interested in clarifying the latest trends resulting in a unified realization for cognitive networking and communication systems.
Recently, the event-based paradigm, a burgeoning technology receiving attention in research as well as industry, has gained momentum in the commercial world causing a need for further research in the field. Principles and Applications of Distributed Event-Based Systems showcases event-based systems in real-world applications, providing an overview of relevant terminology and content approachable for readers from a variety of backgrounds. Containing expert international contributions, this advanced publication provides professionals, researchers, and students in systems design with a rich compendium of latest applications in the field.
Privacy by design is a proactive approach that promotes privacy and data protection compliance throughout project lifecycles when storing or accessing personal data. Privacy by design is essential for the Internet of Things (IoT) as privacy concerns and accountability are being raised in an increasingly connected world. What becomes of data generated, collected or processed by the IoT is clearly an important question for all involved in the development, manufacturing, applications and use of related technologies. But this IoT concept does not work well with the 'big data' trend of aggregating pools of data for new applications. Developers need to address privacy and security issues and legislative requirements at the design stage, and not as an afterthought. In this edited book, the authors draw on a wealth of interdisciplinary research to delineate the challenges of building accountability into the Internet of Things and solutions for delivering on this critical societal challenge. This advanced book brings together legal-tech scholars, computer scientists, human computer interaction researchers and designers and socials scientists to address these challenges and elaborate solutions. It articulates the accountability principle in law and how it impacts IoT development, presents empirical studies of accountability in action and its implications for IoT development, brings technological responses to the requirements of GDPR and ways of building accountability into the IoT, and covers compliant IoT application development, privacy-preserving data analytics, human-centred IoT security, human-data interaction, and the methodological challenge of understanding and responding to the adoption of future technologies in everyday life.
Radio Frequency Identification (RFID) technology may become one of the most pervasive technologies of the near future. Yet the widespread adoption of this new technology presents security risks that have not been sufficiently addressed.Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID highlights new research regarding wireless identification and sensing platform (WISP) tags, security, and applications. It serves as a reference on WISP technology and presents recent advances in this field. This volume serves as a useful reference for security experts, will introduce RFID professionals to new trends in this area, and can also be used by IT experts looking to utilize this technology.
About 25 years ago, the first developments of ANT (Actor-Network Theory) took place, but it wasn t until much later that researchers began to take it seriously. In the late 1990s, ANT began to take hold in the scientific community as a new and exciting approach to socio-technical research and social theory. Actor-Network Theory and Technology Innovation: Advancements and New Concepts provides a comprehensive look at the development of actor-network theory itself, as well as case studies of its use to assist in the explanation of various socio-technical phenomena. This book includes topics relating to technological innovation; both those using actor-network theory as an explanatory framework and those using other approaches. It is an excellent source of information regarding ANT as an approach to technological innovation and its link to ICT (Information Communication Technology).
|
You may like...
Virtual and Augmented Reality…
Information Reso Management Association
Hardcover
R9,445
Discovery Miles 94 450
Essential Java for Scientists and…
Brian Hahn, Katherine Malan
Paperback
R1,266
Discovery Miles 12 660
Computer Aided Software Engineering
Hausi A. Muller, Ronald J. Norman, …
Hardcover
R5,253
Discovery Miles 52 530
|