![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't know what to look for and, as a result, often wind up selecting based on price instead of value. This results in service failures and vendors that just milk their customers for as long as they can. " Assessing Vendors "shows you how to walk the line between under-
and over-assessing, so decisions can be made on sufficient data
without wasting time, digging too deeply, or making decisions too
quickly. This hands-on guide will show you how to use an iterative
approach to vendor analysis, so you can rapidly filter out the
vendors that are clear failures and then select likely winners. It
will then show you how to do progressively deeper dives into the
likely winners so you can select a preferred vendor. Finally, you
will learn how to negotiate with your preferred vendor to get
reasonable prices and services. Provides an iterative approach to
vendor assessment, showing you how to make decisions on sufficient
data without wasting time Includes checklists to help you navigate
the decision-making process, while considering all the important
factors needed to make a sound decision Helps you understand and
evaluate vendors based on key concepts such as performance
criteria, functional testing, production, and price
Wireless networks have become essential for delivering content and knowledge in the information age. Ever-increasing demands are made on these infrastructures as more and more sophisticated knowledge is consumed worldwide. Developments in Wireless Network Prototyping, Design, and Deployment: Future Generations highlights the current design issues in wireless networks, informing scholars and practitioners about advanced prototyping innovations in this field. This book will empower readers to make further advancements in networking and serves as a comprehensive reference for graduate students, scholars, and practitioners alike.
Cloud computing is a new paradigm devoted to the provision of every network resource available as a service to a variety of users. Open Source Cloud Computing Systems: Practices and Paradigms bridges the gap between solutions and users' needs. This book presents the most relevant open source cloud technologies available today. It offers a practical compendium of cloud technologies while also providing information on where to access these technologies, how to install them, and when it is appropriate to use one technology over another. For those deciding to start the endeavor of creating their own cloud, this book serves as a starting point for research on practical purposes and systems design.
This book provides an up-to-date, accessible guide to the growing threats in cyberspace that affects everyone from private individuals to businesses to national governments. Cyber Warfare: How Conflicts In Cyberspace Are Challenging America and Changing The World is a comprehensive and highly topical one-stop source for cyber conflict issues that provides scholarly treatment of the subject in a readable format. The book provides a level-headed, concrete analytical foundation for thinking about cybersecurity law and policy questions, covering the entire range of cyber issues in the 21st century, including topics such as malicious software, encryption, hardware intrusions, privacy and civil liberties concerns, and other interesting aspects of the problem. In Part I, the author describes the nature of cyber threats, including the threat of cyber warfare. Part II describes the policies and practices currently in place, while Part III proposes optimal responses to the challenges we face. The work should be considered essential reading for national and homeland security professionals as well as students and lay readers wanting to understand of the scope of our shared cybersecurity problem.
Java Card is one of the latest developments in the area of multi-application and platform-independent smart cards. As a working tool for professionals, this easy-to-understand resource provides clear, detailed guidance on smart cards, credit and debit cards, Java Card and Open Card Framework (OCF). It offers in-depth coverage of important standards, open specifications and critical security issues, including common threats and security mechanisms regarding the card and its connection interface. The book explains how to program a Java Card applet, an OCF card service and a terminal application. What's more, the book presents an informative case study on the credit-debit application, offering a detailed road map of the application development process.
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.
"Linux Malware Incident Response" is a "first look" at the "Malware
Forensics Field Guide for Linux Systems," exhibiting the first
steps in investigating Linux-based incidents. The Syngress Digital
Forensics Field Guides series includes companions for any digital
and computer forensic investigator and analyst. Each book is a
"toolkit" with checklists for specific tasks, case studies of
difficult situations, and expert analyst tips. This compendium of
tools for computer forensics analysts and investigators is
presented in a succinct outline format with cross-references to
supplemental appendices. It is designed to provide the digital
investigator clear and concise guidance in an easily accessible
format for responding to an incident or conducting analysis in a
lab.
This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.
Particularly in the fields of software engineering, virtual reality, and computer science, data mining techniques play a critical role in the success of a variety of projects and endeavors. Understanding the available tools and emerging trends in this field is an important consideration for any organization. Data Mining and Analysis in the Engineering Field explores current research in data mining, including the important trends and patterns and their impact in fields such as software engineering. With a focus on modern techniques as well as past experiences, this vital reference work will be of greatest use to engineers, researchers, and practitioners in scientific-, engineering-, and business-related fields.
Computation and Storage in the Cloud is the first comprehensive
and systematic work investigating the issue of computation and
storage trade-off in the cloud in order to reduce the overall
application cost. Scientific applications are usually computation
and data intensive, where complex computation tasks take a long
time for execution and the generated datasets are often terabytes
or petabytes in size. Storing valuable generated application
datasets can save their regeneration cost when they are reused, not
to mention the waiting time caused by regeneration. However, the
large size of the scientific datasets is a big challenge for their
storage. By proposing innovative concepts, theorems and algorithms,
this book will help bring the cost down dramatically for both cloud
users and service providers to run computation and data intensive
scientific applications in the cloud. Covers cost models and
benchmarking that explain the necessary tradeoffs for both cloud
providers and usersDescribes several novel strategies for storing
application datasets in the cloudIncludes real-world case studies
of scientific research applications Describes several novel strategies for storing application datasets in the cloud Includes real-world case studies of scientific research applications
This book provides an overview of fake news detection, both through a variety of tutorial-style survey articles that capture advancements in the field from various facets and in a somewhat unique direction through expert perspectives from various disciplines. The approach is based on the idea that advancing the frontier on data science approaches for fake news is an interdisciplinary effort, and that perspectives from domain experts are crucial to shape the next generation of methods and tools. The fake news challenge cuts across a number of data science subfields such as graph analytics, mining of spatio-temporal data, information retrieval, natural language processing, computer vision and image processing, to name a few. This book will present a number of tutorial-style surveys that summarize a range of recent work in the field. In a unique feature, this book includes perspective notes from experts in disciplines such as linguistics, anthropology, medicine and politics that will help to shape the next generation of data science research in fake news. The main target groups of this book are academic and industrial researchers working in the area of data science, and with interests in devising and applying data science technologies for fake news detection. For young researchers such as PhD students, a review of data science work on fake news is provided, equipping them with enough know-how to start engaging in research within the area. For experienced researchers, the detailed descriptions of approaches will enable them to take seasoned choices in identifying promising directions for future research.
This book brings together papers presented at The 2nd International Conference on Artificial Intelligence in China (ChinaAI) 2020, which provides a venue to disseminate the latest developments and to discuss the interactions and links between these multidisciplinary fields. Spanning topics covering all topics in artificial intelligence with new development in China, this book is aimed at undergraduate and graduate students in Electrical Engineering, Computer Science and Mathematics, researchers and engineers from academia and industry as well as government employees (such as NSF, DOD and DOE).
In Interop , technology experts John Palfrey and Urs Gasser explore the immense importance of interoperability,the standardization and integration of technology,and show how this simple principle will hold the key to our success in the coming decades and beyond. The practice of standardization has been facilitating innovation and economic growth for centuries. The standardization of the railroad gauge revolutionized the flow of commodities, the standardization of money revolutionized debt markets and simplified trade, and the standardization of credit networks has allowed for the purchase of goods using money deposited in a bank half a world away. These advancements did not eradicate the different systems they affected instead, each system has been transformed so that it can interoperate with systems all over the world, while still preserving local diversity. As Palfrey and Gasser show, interoperability is a critical aspect of any successful system,and now it is more important than ever. Today we are confronted with challenges that affect us on a global scale: the financial crisis, the quest for sustainable energy, and the need to reform health care systems and improve global disaster response systems. The successful flow of information across systems is crucial if we are to solve these problems, but we must also learn to manage the vast degree of interconnection inherent in each system involved. Interoperability offers a number of solutions to these global challenges, but Palfrey and Gasser also consider its potential negative effects, especially with respect to privacy, security, and co-dependence of states indeed, interoperability has already sparked debates about document data formats, digital music, and how to create successful yet safe cloud computing. Interop demonstrates that, in order to get the most out of interoperability while minimizing its risks, we will need to fundamentally revisit our understanding of how it works, and how it can allow for improvements in each of its constituent parts. In Interop , Palfrey and Gasser argue that there needs to be a nuanced, stable theory of interoperability,one that still generates efficiencies, but which also ensures a sustainable mode of interconnection. Pointing the way forward for the new information economy, Interop provides valuable insights into how technological integration and innovation can flourish in the twenty-first century.
As data hiding detection and forensic techniques have matured,
people are creating more advanced stealth methods for spying,
corporate espionage, terrorism, and cyber warfare all to avoid
detection. "Data Hiding "provides an exploration into the present
day and next generation of tools and techniques used in covert
communications, advanced malware methods and data concealment
tactics. The hiding techniques outlined include the latest
technologies including mobile devices, multimedia, virtualization
and others. These concepts provide corporate, goverment and
military personnel with the knowledge to investigate and defend
against insider threats, spy techniques, espionage, advanced
malware and secret communications. By understanding the plethora of
threats, you will gain an understanding of the methods to defend
oneself from these threats through detection, investigation,
mitigation and prevention.
This book focuses on the fundamentals of blockchain technology along with the means and methods of its integration with Internet of Things (IoT). The book allows the reader to have a deeper understanding of blockchain technology, IoT and various application areas wherein both technologies can be implemented. The book serves the purpose of providing knowledge about the fundamentals of blockchain and IoT to a common reader along with allowing a research scholar to identify some futuristic problem areas that emerge from the convergence of both technologies. Furthermore, the authors discuss relevant application areas such as smart city, e-healthcare, smart travel, etc. throughout the course of the book. The book also talks through a few case studies illustrating the implementation and benefits of using blockchain and IoT. Provides a comprehensive view of blockchain technology and its integration with IoT; Facilitates in having a valuable understanding of various application areas pertaining to blockchain and IoT; Assists the reader in exploring new research areas wherein blockchain and IoT can find their applicability based upon their list of benefits.
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm identities and to control individuals access to resources and services. However, administering digital identities and system access rights can be challenging even under stable conditions. Digital Identity and Access Management: Technologies and Frameworks explores important and emerging advancements in DIAM systems. The book helps researchers and practitioners in digital identity management to generate innovative answers to an assortment of problems, as system managers are faced with major organizational, economic and market changes and are also expected to increase reach and ease of access to users across cyberspace while guaranteeing the reliability and privacy of highly sensitive data.
This book presents best selected papers presented at the International Conference on Emerging Wireless Communication Technologies and Information Security (EWCIS 2020), held from 8th & 9th October 2020 at Amity University Jharkhand, Ranchi, India. The book includes papers in the research area of wireless communications and intelligent systems, signal and image processing in engineering applications, data communication and information security, IoT and cloud computing. The contribution ranges from scientists, engineers and technologists from academia as well as from industry.
Cognitive networks can be crucial for the evolution of future communication systems; however, current trends have indicated major movement in other relevant fields towards the integration of different techniques for the realization of self-aware and self-adaptive communication systems. Evolution of Cognitive Networks and Self-Adaptive Communication Systems overviews innovative technologies combined for the formation of self-aware, self-adaptive, and self-organizing networks. By aiming to inform the research community and the related industry of solutions for cognitive networks, this book is essential for researchers, instructors, and professionals interested in clarifying the latest trends resulting in a unified realization for cognitive networking and communication systems.
With the increased functionality demand for mobile speed and access in our everyday lives, broadband wireless networks have emerged as the solution in providing high data rate communications systems to meet these growing needs. Broadband Wireless Access Networks for 4G: Theory, Application, and Experimentation presents the latest trends and research on mobile ad hoc networks, vehicular ad hoc networks, and routing algorithms which occur within various mobile networks. This publication smartly combines knowledge and experience from enthusiastic scholars and expert researchers in the area of wideband and broadband wireless networks. Students, professors, researchers, and other professionals in the field will benefit from this book s practical applications and relevant studies."
Edge computing is focused on devices and technologies that are attached to the internet of things (IoT). Identifying IoT use across a range of industries and measuring strategic values helps identify what technologies to pursue and can avoid wasted resources on deployments with limited values. The Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT is a critical research book that provides a complete insight on the recent advancements and integration of intelligence in IoT. This book highlights various topics such as disaster prediction, governance, and healthcare. It is an excellent resource for researchers, working professionals, academicians, policymakers, and defense companies.
This book delves into the concept of data as a critical enterprise asset needed for informed decision making, compliance, regulatory reporting and insights into trends, behaviors, performance and patterns. With good data being key to staying ahead in a competitive market, enterprises capture and store exponential volumes of data. Considering the business impact of data, there needs to be adequate management around it to derive the best value. Data governance is one of the core data management related functions. However, it is often overlooked, misunderstood or confused with other terminologies and data management functions. Given the pervasiveness of data and the importance of data, this book provides comprehensive understanding of the business drivers for data governance and benefits of data governance, the interactions of data governance function with other data management functions and various components and aspects of data governance that can be facilitated by technology and tools, the distinction between data management tools and data governance tools, the readiness checks to perform before exploring the market to purchase a data governance tool, the different aspects that must be considered when comparing and selecting the appropriate data governance technologies and tools from large number of options available in the marketplace and the different market players that provide tools for supporting data governance. This book combines the data and data governance knowledge that the author has gained over years of working in different industrial and research programs and projects associated with data, processes and technologies with unique perspectives gained through interviews with thought leaders and data experts. This book is highly beneficial for IT students, academicians, information management and business professionals and researchers to enhance their knowledge and get guidance on implementing data governance in their own data initiatives.
Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private "e-Discovery" industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.
|
![]() ![]() You may like...
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders
Paperback
R1,557
Discovery Miles 15 570
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, …
Paperback
R1,540
Discovery Miles 15 400
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
|