|
|
Books > Computing & IT > Computer communications & networking
Edge computing is focused on devices and technologies that are
attached to the internet of things (IoT). Identifying IoT use
across a range of industries and measuring strategic values helps
identify what technologies to pursue and can avoid wasted resources
on deployments with limited values. The Handbook of Research on
Edge Computing and Computational Intelligence Paradigms for the IoT
is a critical research book that provides a complete insight on the
recent advancements and integration of intelligence in IoT. This
book highlights various topics such as disaster prediction,
governance, and healthcare. It is an excellent resource for
researchers, working professionals, academicians, policymakers, and
defense companies.
The ever-evolving wireless technology industry is demanding new
technologies and standards to ensure a higher quality of experience
for global end-users. This developing challenge has enabled
researchers to identify the present trend of machine learning as a
possible solution, but will it meet business velocity demand?
Next-Generation Wireless Networks Meet Advanced Machine Learning
Applications is a pivotal reference source that provides emerging
trends and insights into various technologies of next-generation
wireless networks to enable the dynamic optimization of system
configuration and applications within the fields of wireless
networks, broadband networks, and wireless communication. Featuring
coverage on a broad range of topics such as machine learning,
hybrid network environments, wireless communications, and the
internet of things; this publication is ideally designed for
industry experts, researchers, students, academicians, and
practitioners seeking current research on various technologies of
next-generation wireless networks.
Cloud Computing Service and Deployment Models: Layers and
Management presents a collection of diverse perspectives on cloud
computing and its vital role in all components of organizations.
With its intent to benefit practitioners and industry
professionals, this book aims to improve the understanding of cloud
computing and tackle related concerns such as change management,
security, processing approaches, and much more.
While there are many positive aspects in which RFID devices are
useful, there have also been increased concerns over the privacy
and security of personal information. Advanced Security and Privacy
for RFID Technologies addresses these concerns with its
comprehensive coverage on current issues with security models and
everyday threats and vulnerabilities. This informative publication
not only addresses the security risks involved with RFID
technologies, but also gives insight on some possible solutions and
preventions. Researchers, professionals, and practitioners aiming
to better understand the risks involved with these developing
technologies will benefit from this book s expansive coverage on
the topic.
Technology trends may come and go, but cloud computing technologies
have been gaining consideration in the commercial world due to its
ability to provide on-demand access to resources, control the
software environment, and supplement existing systems. Pervasive
Cloud Computing Technologies: Future Outlooks and Interdisciplinary
Perspectives explores the latest innovations with cloud computing
and the impact of these new models and technologies. This book will
present case studies and research on the future of cloud computing
technologies and its ability to increase connectivity of various
entities of the world. It is an essential resource for technology
practitioners, engineers, managers, and academics aiming to gain
the knowledge of these novel and pervasive technologies.
Security in Virtual Worlds, 3D Webs, and Immersive Environments:
Models for Development, Interaction, and Management brings together
the issues that managers, practitioners, and researchers must
consider when planning, implementing, working within, and managing
these promising virtual technologies for secure processes and
initiatives. This publication discusses the uses and potential of
these virtual technologies and examines secure policy formation and
practices that can be applied specifically to each.
There is a need within radio-frequency identification (RFID) and
other smart technologies to understand related practical
implications. Auto-Identification and Ubiquitous Computing
Applications: RFID and Smart Technologies for Information
Convergence reports on problems related to the primary use of RFID
technologies. This book provides a detailed overview of RFID
literature, specifically in using RFID and smart technologies for
identification, and draws together several different fields of
research across supply chain management, asset tracking, and novel
use of RFID for identification.
Seven Deadliest Network Attacks identifies seven classes of network
attacks and discusses how the attack works, including tools to
accomplish the attack, the risks of the attack, and how to defend
against the attack. This book pinpoints the most dangerous hacks
and exploits specific to networks, laying out the anatomy of these
attacks including how to make your system more secure. You will
discover the best ways to defend against these vicious hacks with
step-by-step instruction and learn techniques to make your computer
and network impenetrable. The book consists of seven chapters that
deal with the following attacks: denial of service; war dialing;
penetration testing; protocol tunneling; spanning tree attacks;
man-in-the-middle; and password replay. These attacks are not
mutually exclusive and were chosen because they help illustrate
different aspects of network security. The principles on which they
rely are unlikely to vanish any time soon, and they allow for the
possibility of gaining something of interest to the attacker, from
money to high-value data. This book is intended to provide
practical, usable information. However, the world of network
security is evolving very rapidly, and the attack that works today
may (hopefully) not work tomorrow. It is more important, then, to
understand the principles on which the attacks and exploits are
based in order to properly plan either a network attack or a
network defense. Seven Deadliest Network Attacks will appeal to
information security professionals of all levels, network admins,
and recreational hackers.
Certification and Security in Health-Related Web Applications:
Concepts and Solutions aims to bridge the worlds of healthcare and
information technology, increase the security awareness of
professionals, students and users and highlight the recent advances
in certification and security in health-related Web applications.
In today's globalized world, businesses and governments rely
heavily on technology for storing and protecting essential
information and data. Despite the benefits that computing systems
offer, there remains an assortment of issues and challenges in
maintaining the integrity and confidentiality of these databases.
As professionals become more dependent cyberspace, there is a need
for research on modern strategies and concepts for improving the
security and safety of these technologies. Modern Theories and
Practices for Cyber Ethics and Security Compliance is a collection
of innovative research on the concepts, models, issues, challenges,
innovations, and mitigation strategies needed to improve cyber
protection. While highlighting topics including database
governance, cryptography, and intrusion detection, this book
provides guidelines for the protection, safety, and security of
business data and national infrastructure from cyber-attacks. It is
ideally designed for security analysts, law enforcement,
researchers, legal practitioners, policymakers, business
professionals, governments, strategists, educators, and students
seeking current research on combative solutions for cyber threats
and attacks.
In this day of frequent acquisitions and perpetual application
integrations, systems are often an amalgamation of multiple
programming languages and runtime platforms using new and legacy
content. Systems of such mixed origins are increasingly vulnerable
to defects and subversion.
System Assurance: Beyond Detecting Vulnerabilities addresses
these critical issues. As a practical resource for security
analysts and engineers tasked with system assurance, the book
teaches you how to use the Object Management Group s (OMG)
expertise and unique standards to obtain accurate knowledge about
your existing software and compose objective metrics for system
assurance. OMG s Assurance Ecosystem provides a common framework
for discovering, integrating, analyzing, and distributing facts
about your existing enterprise software. Its foundation is the
standard protocol for exchanging system facts, defined as the OMG
Knowledge Discovery Metamodel (KDM). In addition, the Semantics of
Business Vocabularies and Business Rules (SBVR) defines a standard
protocol for exchanging security policy rules and assurance
patterns. Using these standards together, you will learn how to
leverage the knowledge of the cybersecurity community and bring
automation to protect your system.
Provides end-to-end methodology for systematic, repeatable, and
affordable System Assurance.Includes an overview of OMG Software
Assurance Ecosystem protocols that integrate risk, architecture and
code analysis guided by the assurance argument.Case Study
illustrating the steps of the System Assurance Methodology using
automated tools."
Terroredia is a newly coined term by the editor, Dr. Mahmoud Eid,
to explain the phenomenal, yet under-researched relationship
between terrorists and media professionals in which acts of
terrorism and media coverage are exchanged, influenced, and fueled
by one another. Exchanging Terrorism Oxygen for Media Airwaves: The
Age of Terroredia provides a timely and thorough discussion on a
wide range of issues surrounding terrorism in relation to both
traditional and new media. Comprised of insights and research from
leading experts in the fields of terrorism and media studies, this
publication presents various topics relating to Terroredia:
understanding of terrorism and the role of the media, terrorism
manifestations and media representations of terrorism, types of
terrorism and media stereotypes of terrorism, terrorism tactics and
media strategies, the war on terrorism, the function of terrorism
and the employment of the media, new terrorism and new media,
contemporary cases of terrorist-media interactions, the rationality
behind terrorism and counterterrorism, as well as the
responsibility of the media. This publication is of interest to
government officials, media professionals, researchers, and
upper-level students interested in learning more about the complex
relationship between terrorism and the media.
Virtualization and Forensics: A Digital Forensic Investigators
Guide to Virtual Environments offers an in-depth view into the
world of virtualized environments and the implications they have on
forensic investigations. Named a 2011 Best Digital Forensics Book
by InfoSec Reviews, this guide gives you the end-to-end knowledge
needed to identify server, desktop, and portable virtual
environments, including: VMware, Parallels, Microsoft, and Sun. It
covers technological advances in virtualization tools, methods, and
issues in digital forensic investigations, and explores trends and
emerging technologies surrounding virtualization technology. This
book consists of three parts. Part I explains the process of
virtualization and the different types of virtualized environments.
Part II details how virtualization interacts with the basic
forensic process, describing the methods used to find
virtualization artifacts in dead and live environments as well as
identifying the virtual activities that affect the examination
process. Part III addresses advanced virtualization issues, such as
the challenges of virtualized environments, cloud computing, and
the future of virtualization. This book will be a valuable resource
for forensic investigators (corporate and law enforcement) and
incident response professionals.
Digital Triage Forensics: Processing the Digital Crime Scene
provides the tools, training, and techniques in Digital Triage
Forensics (DTF), a procedural model for the investigation of
digital crime scenes including both traditional crime scenes and
the more complex battlefield crime scenes. The DTF is used by the
U.S. Army and other traditional police agencies for current digital
forensic applications. The tools, training, and techniques from
this practice are being brought to the public in this book for the
first time. Now corporations, law enforcement, and consultants can
benefit from the unique perspectives of the experts who coined
Digital Triage Forensics. The text covers the collection of digital
media and data from cellular devices and SIM cards. It also
presents outlines of pre- and post- blast investigations. This book
is divided into six chapters that present an overview of the age of
warfare, key concepts of digital triage and battlefield forensics,
and methods of conducting pre/post-blast investigations. The first
chapter considers how improvised explosive devices (IEDs) have
changed from basic booby traps to the primary attack method of the
insurgents in Iraq and Afghanistan. It also covers the emergence of
a sustainable vehicle for prosecuting enemy combatants under the
Rule of Law in Iraq as U.S. airmen, marines, sailors, and soldiers
perform roles outside their normal military duties and
responsibilities. The remaining chapters detail the benefits of DTF
model, the roles and responsibilities of the weapons intelligence
team (WIT), and the challenges and issues of collecting digital
media in battlefield situations. Moreover, data collection and
processing as well as debates on the changing role of digital
forensics investigators are explored. This book will be helpful to
forensic scientists, investigators, and military personnel, as well
as to students and beginners in forensics.
Developing countries are persistently looking for efficient and
cost-effective methods for transforming their communities into
smart cities. Unfortunately, energy crises have increased in these
regions due to a lack of awareness and proper utilization of
technological methods. These communities must explore and implement
innovative solutions in order to enhance citizen enrollment,
quality of government, and city intelligence. IoT Architectures,
Models, and Platforms for Smart City Applications provides emerging
research exploring the theoretical and practical aspects of
transforming cities into intelligent systems using IoT-based design
models and sustainable development projects. This publication looks
at how cities can be built as smart cities within limited resources
and existing advanced technologies. Featuring coverage on a broad
range of topics such as cloud computing, human machine interface,
and ad hoc networks, this book is ideally designed for urban
planners, engineers, IT specialists, computer engineering students,
research scientists, academicians, technology developers,
policymakers, researchers, and designers seeking current research
on smart applications within urban development.
In the ever-evolving telecommunication industry, technological
improvements alone are not able to keep up with the significant
growth of mobile broadband traffic. As such, new research on
communications networks is necessary to keep up with rising demand.
Convergence of Broadband, Broadcast, and Cellular Network
Technologies addresses the problems of broadband, broadcast, and
cellular coexistence, including the increasing number of advanced
mobile users and their bandwidth demands. This book will serve as a
link between academia and industry, serving students, researchers,
and industry professionals.
The increasing reliance upon networking and mobile networking
devices in the modern world demands constant improvement of network
Quality of Service (QoS). Intelligent Quality of Service
Technologies and Network Management: Models for Enhancing
Communication explores the interrelated natures of network control
mechanisms and QoS and offers fundamental knowledge on the subject,
describing the significance of network management and the
integration of knowledge to demonstrate how network management is
related to QoS in real applications. Engaging and innovative, this
book provides practical solutions that integrate network management
and QoS strategies for real-world application.
The "11th Hour Network+ Study Guide" is keyed to theN10-004
revision of the CompTIA Network+ exam. This book is streamlined to
include only core certification information and is presented for
ease of last-minute studying. Main objectives of the exam are
covered with key concepts highlighted. Fast Facts quickly review
fundamentalsExam Warnings highlight particularly tough sections of
the examCrunch Time sidebars point out key concepts to rememberDid
You Know? sidebars cover sometimes forgotten detailsTop Five
Toughest Questions and answers help you to prepare
The 11th Hour Study Guide Series focuses on just the essentials
needed to pass your certification exam and make the most of the
last days before the test
The only book keyed to the new 2009 objectives that has
beencrafted for last minute cramming
Easy to find, essential material with no fluff this book does not
talk about security in general, just how it applies to the
test
Includesreview of five toughest questions by topic- sure to
improve your score"
Education and research in the field of electronic commerce
technology can prove problematic without the proper resources and
tools on the most relevant issues, trends, and advancements.
Selected Readings on Electronic Commerce Technologies: Contemporary
Applications supplements course instruction and student research
with quality articles focused on key issues concerning the
technologies and applications of electronic commerce. Containing
over 30 chapters from authors across the globe, these selected
readings in areas such as e-marketing, IT business, and mobile
commerce depict the most relevant and important areas of classroom
discussion within the categories of fundamental concepts and
theories; development and design methodologies; tools and
technologies; application and utilization; critical issues; and
emerging trends.
|
|