Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking
Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.
This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication. The book also describes algorithmic approaches based on all transformations along with implementation details and results. Further topics include embedding and extraction into the spatial domain, tuning using GA-based approaches and embedding into imaginary coefficients of the Z domain. Featuring detailed algorithms for encryption and descriptions of all techniques, including embedding techniques for all transform-based steganographic processes, the book also explores the adjustment of pixel values after embedding and presents numerical examples of reversible computations. In the context of chaos-based authentication, it also describes testing the quality of generator is using Monobit, Serial and Poker tests. The book then outlines 15 test cases recommended by NIST fifteen test cases, along with their implementation on six evolutionary algorithms for neural cryptographic systems in the context of wireless computations - TPM, KSOMSCT, DHLPSCT, CHDLPSCT, CTHLPSCT and CGTHLPSCT - and verifies their satisfiability based on the implementations of these six techniques. Lastly it presents various metrics of image processing systems. This book is a valuable reference resource for research scholars, PG/UG students and practicing engineers
Service Oriented Architecture (SOA) is the paradigm for software and system specification, design, implementation and management that intends to shape and dominate IT and business landscapes in the near future. Non-Functional Properties in Service Oriented Architecture: Requirements, Models and Methods offers a selection of chapters that cover three important aspects related to the use of non-functional properties in SOA: requirements specification with respect to non-functional properties, modeling non-functional properties and implementation of non-functional properties. This book serves as both a practical reference and an advanced scientific source for those interested in current issues, new trends, and yet-unresolved areas of the discipline.
The two-volume set IFIP AICT 591 and 592 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2020, held in Novi Sad, Serbia, in August/September 2020.The 164 papers presented were carefully reviewed and selected from 199 submissions. They discuss globally pressing issues in smart manufacturing, operations management, supply chain management, and Industry 4.0. The papers are organized in the following topical sections: Part I: advanced modelling, simulation and data analytics in production and supply networks; advanced, digital and smart manufacturing; digital and virtual quality management systems; cloud-manufacturing; cyber-physical production systems and digital twins; IIOT interoperability; supply chain planning and optimization; digital and smart supply chain management; intelligent logistics networks management; artificial intelligence and blockchain technologies in logistics and DSN; novel production planning and control approaches; machine learning and artificial intelligence; connected, smart factories of the future; manufacturing systems engineering: agile, flexible, reconfigurable; digital assistance systems: augmented reality and virtual reality; circular products design and engineering; circular, green, sustainable manufacturing; environmental and social lifecycle assessments; socio-cultural aspects in production systems; data-driven manufacturing and services operations management; product-service systems in DSN; and collaborative design and engineering Part II: the Operator 4.0: new physical and cognitive evolutionary paths; digital transformation approaches in production management; digital transformation for more sustainable supply chains; data-driven applications in smart manufacturing and logistics systems; data-driven services: characteristics, trends and applications; the future of lean thinking and practice; digital lean manufacturing and its emerging practices; new reconfigurable, flexible or agile production systems in the era of industry 4.0; operations management in engineer-to-order manufacturing; production management in food supply chains; gastronomic service system design; product and asset life cycle management in the circular economy; and production ramp-up strategies for product
Recently, the event-based paradigm, a burgeoning technology receiving attention in research as well as industry, has gained momentum in the commercial world causing a need for further research in the field. Principles and Applications of Distributed Event-Based Systems showcases event-based systems in real-world applications, providing an overview of relevant terminology and content approachable for readers from a variety of backgrounds. Containing expert international contributions, this advanced publication provides professionals, researchers, and students in systems design with a rich compendium of latest applications in the field.
Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one's personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the current technological requirements. Large-Scale Data Streaming, Processing, and Blockchain Security is a collection of innovative research that explores the latest methodologies, modeling, and simulations for coping with the generation and management of large-scale data in both scientific and individual applications. Featuring coverage on a wide range of topics including security models, internet of things, and collaborative filtering, this book is ideally designed for entrepreneurs, security analysts, IT consultants, security professionals, programmers, computer technicians, data scientists, technology developers, engineers, researchers, academicians, and students.
Dynamic, trustworthy and reliable service delivery in Service Oriented Architectures (SOA) is one of the main preconditions for successful and sustainable business operations. Service and business process reliability is, therefore, of paramount importance and cannot be compromised. Engineering Reliable Service Oriented Architecture: Managing Complexity and Service Level Agreements presents a guide to engineering reliable SOA systems and enhances current understanding of service reliability. It is an essential reference for both practitioners and researchers wishing to explore state-of-the art results from the field of reliable SOA application engineering.
This book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 13 full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: teaching methods and tools; cybersecurity knowledge within the organization; and teaching of detection and forensics.
This book sets the stage of the evolution of corporate governance, laws and regulations, other forms of governance, and the interaction between data governance and other corporate governance sub-disciplines. Given the continuously evolving and complex regulatory landscape and the growing number of laws and regulations, compliance is a widely discussed issue in the field of data. This book considers the cost of non-compliance bringing in examples from different industries of instances in which companies failed to comply with rules, regulations, and other legal obligations, and goes on to explain how data governance helps in avoiding such pitfalls. The first in a three-volume series on data governance, this book does not assume any prior or specialist knowledge in data governance and will be highly beneficial for IT, management and law students, academics, information management and business professionals, and researchers to enhance their knowledge and get guidance in managing their own data governance projects from a governance and compliance perspective.
Certification and Security in Health-Related Web Applications: Concepts and Solutions aims to bridge the worlds of healthcare and information technology, increase the security awareness of professionals, students and users and highlight the recent advances in certification and security in health-related Web applications.
Recent technology trends involving the combination of mobile networks and cloud computing have offered new chances for mobile network providers to use specific carrier-cloud services. These advancements will enhance the utilization of the mobile cloud in industry and corporate settings. Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications is a fundamental source for the advancement of knowledge, application, and practice in the interdisciplinary areas of mobile network and cloud computing. By addressing innovative concepts and critical issues, this book is essential for researchers, practitioners, and students interested in the emerging field of vehicular wireless networks.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Computing and Network Communications (CoCoNet'20), October 14-17, 2020, Chennai, India. The papers presented were carefully reviewed and selected from several initial submissions. The papers are organized in topical sections on Signal, Image and Speech Processing, Wireless and Mobile Communication, Internet of Things, Cloud and Edge Computing, Distributed Systems, Machine Intelligence, Data Analytics, Cybersecurity, Artificial Intelligence and Cognitive Computing and Circuits and Systems. The book is directed to the researchers and scientists engaged in various fields of computing and network communication domains.
From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.
This book highlights research and survey articles dedicated to big data techniques for cyber-physical system (CPS), which addresses the close interactions and feedback controls between cyber components and physical components. The book first discusses some fundamental big data problems and solutions in large scale distributed CPSs. The book then addresses the design and control challenges in multiple CPS domains such as vehicular system, smart city, smart building, and digital microfluidic biochips. This book also presents the recent advances and trends in the maritime simulation system and the flood defence system.
This book constitutes the refereed proceedings of the 22nd IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2021, held in Saint-Etienne, and virtually in November 2021. The 70 papers (15 full and 55 short) presented with 5 industrial workshop papers were carefully reviewed and selected from 189 submissions. They provide a comprehensive overview of major challenges and recent advances in various domains related to the digital transformation and collaborative networks and their applications with a strong focus on the following areas related to the main theme of the conference: sustainable collaborative networks; sustainability via digitalization; analysis and assessment of business ecosystems; human factors in collaboration 4.0; maintenance and life-cycle management; policies and new digital services; safety and collaboration management; simulation and optimization; complex collaborative systems and ontologies; value co-creation in digitally enabled ecosystems; digitalization strategy in collaborative enterprises' networks; pathways and tools for DIHs; socio-technical perspectives on smart product-service systems; knowledge transfer and accelerated innovation in FoF; interoperability of IoT and CPS for industrial CNs; sentient immersive response network; digital tools and applications for collaborative healthcare; collaborative networks and open innovation in education 4.0; collaborative learning networks with industry and academia; and industrial workshop.
This comprehensive book is primarily intended for researchers, engineers, mathematicians and computer security specialists who are interested in multimedia security, steganography, encryption, and related research fields. It is also a valuable reference resource for postgraduate and senior undergraduate students who are studying multimedia, multimedia security, and information security, as well as for professionals in the IT industry.
In the ever-evolving telecommunication industry, technological improvements alone are not able to keep up with the significant growth of mobile broadband traffic. As such, new research on communications networks is necessary to keep up with rising demand. Convergence of Broadband, Broadcast, and Cellular Network Technologies addresses the problems of broadband, broadcast, and cellular coexistence, including the increasing number of advanced mobile users and their bandwidth demands. This book will serve as a link between academia and industry, serving students, researchers, and industry professionals.
This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.
|
You may like...
CCNA 200-301 Network Simulator
Sean Wilkins
Digital product license key
R4,838
Discovery Miles 48 380
Research Anthology on Architectures…
Information R Management Association
Hardcover
R13,378
Discovery Miles 133 780
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl
Paperback
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig
Hardcover
R6,256
Discovery Miles 62 560
Community Engagement in the Online Space
Michelle Dennis, James H Albert
Hardcover
R5,631
Discovery Miles 56 310
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, …
Hardcover
|