|
|
Books > Computing & IT > Computer communications & networking
Although some IoT systems are built for simple event control where
a sensor signal triggers a corresponding reaction, many events are
far more complex, requiring applications to interpret the event
using analytical techniques to initiate proper actions. Artificial
intelligence of things (AIoT) applies intelligence to the edge and
gives devices the ability to understand the data, observe the
environment around them, and decide what to do best with minimum
human intervention. With the power of AI, AIoT devices are not just
messengers feeding information to control centers. They have
evolved into intelligent machines capable of performing self-driven
analytics and acting independently. A smart environment uses
technologies such as wearable devices, IoT, and mobile internet to
dynamically access information, connect people, materials and
institutions, and then actively manages and responds to the
ecosystem's needs in an intelligent manner. In this edited book,
the authors present challenges, technologies, applications and
future trends of AI-enabled IoT (AIoT) in realizing smart and
intelligent environments, including frameworks and methodologies to
apply AIoT in monitoring devices and environments, tools and
practices most applicable to product or service development to
solve innovation problems, advanced and innovative techniques and
practical implementations to enhance future smart environment
systems as. They plan to cover a broad range of applications
including smart cities, smart transportation and smart agriculture.
This book is a valuable resource for industry and academic
researchers, scientists, engineers and advanced students in the
fields of ICTs and networking, IoT, AI and machine and deep
learning, data science, sensing, robotics, automation and smart
technologies and smart environments.
Cognitive networks can be crucial for the evolution of future
communication systems; however, current trends have indicated major
movement in other relevant fields towards the integration of
different techniques for the realization of self-aware and
self-adaptive communication systems. Evolution of Cognitive
Networks and Self-Adaptive Communication Systems overviews
innovative technologies combined for the formation of self-aware,
self-adaptive, and self-organizing networks. By aiming to inform
the research community and the related industry of solutions for
cognitive networks, this book is essential for researchers,
instructors, and professionals interested in clarifying the latest
trends resulting in a unified realization for cognitive networking
and communication systems.
Cyber attacks are rapidly becoming one of the most prevalent issues
in the world. As cyber crime continues to escalate, it is
imperative to explore new approaches and technologies that help
ensure the security of the online community. Threat Detection and
Countermeasures in Network Security presents the latest
methodologies and trends in detecting and preventing network
threats. Investigating the potential of current and emerging
security technologies, this publication is an all-inclusive
reference source for academicians, researchers, students,
professionals, practitioners, network analysts, and technology
specialists interested in the simulation and application of
computer network protection.
Computer networks have become essential to the survival of
businesses, organizations, and educational institutions, as the
number of network users, services, and applications has increased
alongside advancements in information technology. Given this,
efforts have been put forward by researchers, designers, managers,
analysts, and professionals to optimize network performance and
satisfy the varied groups that have an interest in network design
and implementation. Simulation in Computer Network Design and
Modeling: Use and Analysis reviews methodologies in computer
network simulation and modeling, illustrates the benefits of
simulation in computer networks design, modeling, and analysis, and
identifies the main issues that face efficient and effective
computer network simulation. This reference will inform the work
and research of academics, post-graduate students, developers,
network designers, network analysts, telecommunication system
designers, and others who are interested in using simulation in
computer network design and modeling.
Big data has been upgraded to our national strategy and has become
a catalyst for national and local economic development. With the
further promotion of big data and artificial intelligence (AI), the
new business model needs to optimize and upgrade. The integration
of the blockchain industry will fully implement the digital China
strategy and promote the application of big data in China.This
unique compendium gives a comprehensive understanding of the
blockchain content through the path of technological innovation. It
enables readers to fully understand the role of blockchain in
promoting the digital economy.The volume will be a useful reference
guide for relevant personnel in state ministries and commissions,
state-owned enterprises, big data, AI, as well as teachers,
researchers and students in higher education institutions.
The worldwide reach of the Internet allows malicious cyber
criminals to coordinate and launch attacks on both cyber and
cyber-physical infrastructure from anywhere in the world. This
purpose of this handbook is to introduce the theoretical
foundations and practical solution techniques for securing critical
cyber and physical infrastructures as well as their underlying
computing and communication architectures and systems. Examples of
such infrastructures include utility networks (e.g., electrical
power grids), ground transportation systems (automotives, roads,
bridges and tunnels), airports and air traffic control systems,
wired and wireless communication and sensor networks, systems for
storing and distributing water and food supplies, medical and
healthcare delivery systems, as well as financial, banking and
commercial transaction assets. The handbook focus mostly on the
scientific foundations and engineering techniques - while also
addressing the proper integration of policies and access control
mechanisms, for example, how human-developed policies can be
properly enforced by an automated system.
*Addresses the technical challenges facing design of secure
infrastructures by providing examples of problems and solutions
from a wide variety of internal and external attack scenarios
*Includes contributions from leading researchers and
practitioners in relevant application areas such as smart power
grid, intelligent transportation systems, healthcare industry and
so on.
*Loaded with examples of real world problems and pathways to
solutions utilizing specific tools and techniques described in
detail throughout
Service Oriented Architecture (SOA) is the paradigm for software
and system specification, design, implementation and management
that intends to shape and dominate IT and business landscapes in
the near future. Non-Functional Properties in Service Oriented
Architecture: Requirements, Models and Methods offers a selection
of chapters that cover three important aspects related to the use
of non-functional properties in SOA: requirements specification
with respect to non-functional properties, modeling non-functional
properties and implementation of non-functional properties. This
book serves as both a practical reference and an advanced
scientific source for those interested in current issues, new
trends, and yet-unresolved areas of the discipline.
Dynamic, trustworthy and reliable service delivery in Service
Oriented Architectures (SOA) is one of the main preconditions for
successful and sustainable business operations. Service and
business process reliability is, therefore, of paramount importance
and cannot be compromised. Engineering Reliable Service Oriented
Architecture: Managing Complexity and Service Level Agreements
presents a guide to engineering reliable SOA systems and enhances
current understanding of service reliability. It is an essential
reference for both practitioners and researchers wishing to explore
state-of-the art results from the field of reliable SOA application
engineering.
In today's globalized world, businesses and governments rely
heavily on technology for storing and protecting essential
information and data. Despite the benefits that computing systems
offer, there remains an assortment of issues and challenges in
maintaining the integrity and confidentiality of these databases.
As professionals become more dependent cyberspace, there is a need
for research on modern strategies and concepts for improving the
security and safety of these technologies. Modern Theories and
Practices for Cyber Ethics and Security Compliance is a collection
of innovative research on the concepts, models, issues, challenges,
innovations, and mitigation strategies needed to improve cyber
protection. While highlighting topics including database
governance, cryptography, and intrusion detection, this book
provides guidelines for the protection, safety, and security of
business data and national infrastructure from cyber-attacks. It is
ideally designed for security analysts, law enforcement,
researchers, legal practitioners, policymakers, business
professionals, governments, strategists, educators, and students
seeking current research on combative solutions for cyber threats
and attacks.
Privacy protection within large databases can be a challenge. By
examining the current problems and challenges this domain is
facing, more efficient strategies can be established to safeguard
personal information against invasive pressures. HCI Challenges and
Privacy Preservation in Big Data Security is an informative
scholarly publication that discusses how human-computer interaction
impacts privacy and security in almost all sectors of modern life.
Featuring relevant topics such as large scale security data, threat
detection, big data encryption, and identity management, this
reference source is ideal for academicians, researchers,
advanced-level students, and engineers that are interested in
staying current on the advancements and drawbacks of human-computer
interaction within the world of big data.
The growth of innovative cyber threats, many based on
metamorphosing techniques, has led to security breaches and the
exposure of critical information in sites that were thought to be
impenetrable. The consequences of these hacking actions were,
inevitably, privacy violation, data corruption, or information
leaking. Machine learning and data mining techniques have
significant applications in the domains of privacy protection and
cybersecurity, including intrusion detection, authentication, and
website defacement detection, that can help to combat these
breaches. Applications of Machine Learning and Deep Learning for
Privacy and Cybersecurity provides machine and deep learning
methods for analysis and characterization of events regarding
privacy and anomaly detection as well as for establishing
predictive models for cyber attacks or privacy violations. It
provides case studies of the use of these techniques and discusses
the expected future developments on privacy and cybersecurity
applications. Covering topics such as behavior-based
authentication, machine learning attacks, and privacy preservation,
this book is a crucial resource for IT specialists, computer
engineers, industry professionals, privacy specialists, security
professionals, consultants, researchers, academicians, and students
and educators of higher education.
Cybersecurity threats have become ubiquitous and continue to topple
every facet of the digital realm as they are a problem for anyone
with a gadget or hardware device. However, there are some actions
and safeguards that can assist in avoiding these threats and
challenges; further study must be done to ensure businesses and
users are aware of the current best practices. Cybersecurity
Issues, Challenges, and Solutions in the Business World considers
cybersecurity innovation alongside the methods and strategies for
its joining with the business industry and discusses pertinent
application zones such as smart city, e-social insurance, shrewd
travel, and more. Covering key topics such as blockchain, data
mining, privacy, security issues, and social media, this reference
work is ideal for security analysts, forensics experts, business
owners, computer scientists, policymakers, industry professionals,
researchers, scholars, academicians, practitioners, instructors,
and students.
Get ready for a career in IT security and efficiently prepare for
the SY0-601 exam with a single, comprehensive resource CompTIA
Security+ Practice Tests: Exam SY0-601, Second Edition efficiently
prepares you for the CompTIA Security+ SY0-601 Exam with one
practice exam and domain-by-domain questions. With a total of 1,000
practice questions, you'll be as prepared as possible to take Exam
SY0-601. Written by accomplished author and IT security expert
David Seidl, the 2nd Edition of CompTIA Security+ Practice Tests
includes questions covering all five crucial domains and objectives
on the SY0-601 exam: Attacks, Threats, and Vulnerabilities
Architecture and Design Implementation Operations and Incident
Response Governance, Risk, and Compliance Perfect for anyone
looking to prepare for the SY0-601 Exam, upgrade their skills by
earning a high-level security certification (like CASP+, CISSP, or
CISA), as well as anyone hoping to get into the IT security field,
CompTIA Security+ Practice Tests allows for efficient and
comprehensive preparation and study.
Recent technology trends involving the combination of mobile
networks and cloud computing have offered new chances for mobile
network providers to use specific carrier-cloud services. These
advancements will enhance the utilization of the mobile cloud in
industry and corporate settings. Mobile Networks and Cloud
Computing Convergence for Progressive Services and Applications is
a fundamental source for the advancement of knowledge, application,
and practice in the interdisciplinary areas of mobile network and
cloud computing. By addressing innovative concepts and critical
issues, this book is essential for researchers, practitioners, and
students interested in the emerging field of vehicular wireless
networks.
Private cloud computing enables you to consolidate diverse
enterprise systems into one that is cloud-based and can be accessed
by end-users seamlessly, regardless of their location or changes in
overall demand. Expert authors Steve Smoot and Nam K. Tan distill
their years of networking experience to describe how to build
enterprise networks to create a private cloud. With their
techniques you'll create cost-saving designs and increase the
flexibility of your enterprise, while maintaining the security and
control of an internal network. "Private Cloud Computing "offers a
complete cloud architecture for enterprise networking by
synthesizing WAN optimization, next-generation data centers, and
virtualization in a network-friendly way, tying them together into
a complete solution that can be progressively migrated to as time
and resources permit.
Describes next-generation data center architectures such as the
virtual access-layer, the unified data center fabric and the
"rack-and-roll" deployment modelProvides an overview of cloud
security and cloud management from the server virtualization
perspectivePresents real-world case studies, configuration and
examples that allow you to easily apply practical know-how to your
existing enterprise environmentOffers effective private cloud
computing solutions to simplify the costly and problematic
challenge of enterprise networking and branch server
consolidation
Radio Frequency Identification (RFID) technology may become one of
the most pervasive technologies of the near future. Yet the
widespread adoption of this new technology presents security risks
that have not been sufficiently addressed.Security and Trends in
Wireless Identification and Sensing Platform Tags: Advancements in
RFID highlights new research regarding wireless identification and
sensing platform (WISP) tags, security, and applications. It serves
as a reference on WISP technology and presents recent advances in
this field. This volume serves as a useful reference for security
experts, will introduce RFID professionals to new trends in this
area, and can also be used by IT experts looking to utilize this
technology.
About 25 years ago, the first developments of ANT (Actor-Network
Theory) took place, but it wasn t until much later that researchers
began to take it seriously. In the late 1990s, ANT began to take
hold in the scientific community as a new and exciting approach to
socio-technical research and social theory. Actor-Network Theory
and Technology Innovation: Advancements and New Concepts provides a
comprehensive look at the development of actor-network theory
itself, as well as case studies of its use to assist in the
explanation of various socio-technical phenomena. This book
includes topics relating to technological innovation; both those
using actor-network theory as an explanatory framework and those
using other approaches. It is an excellent source of information
regarding ANT as an approach to technological innovation and its
link to ICT (Information Communication Technology).
|
|