![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
Edge computing is focused on devices and technologies that are attached to the internet of things (IoT). Identifying IoT use across a range of industries and measuring strategic values helps identify what technologies to pursue and can avoid wasted resources on deployments with limited values. The Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT is a critical research book that provides a complete insight on the recent advancements and integration of intelligence in IoT. This book highlights various topics such as disaster prediction, governance, and healthcare. It is an excellent resource for researchers, working professionals, academicians, policymakers, and defense companies.
The ever-evolving wireless technology industry is demanding new technologies and standards to ensure a higher quality of experience for global end-users. This developing challenge has enabled researchers to identify the present trend of machine learning as a possible solution, but will it meet business velocity demand? Next-Generation Wireless Networks Meet Advanced Machine Learning Applications is a pivotal reference source that provides emerging trends and insights into various technologies of next-generation wireless networks to enable the dynamic optimization of system configuration and applications within the fields of wireless networks, broadband networks, and wireless communication. Featuring coverage on a broad range of topics such as machine learning, hybrid network environments, wireless communications, and the internet of things; this publication is ideally designed for industry experts, researchers, students, academicians, and practitioners seeking current research on various technologies of next-generation wireless networks.
This book delves into the concept of data as a critical enterprise asset needed for informed decision making, compliance, regulatory reporting and insights into trends, behaviors, performance and patterns. With good data being key to staying ahead in a competitive market, enterprises capture and store exponential volumes of data. Considering the business impact of data, there needs to be adequate management around it to derive the best value. Data governance is one of the core data management related functions. However, it is often overlooked, misunderstood or confused with other terminologies and data management functions. Given the pervasiveness of data and the importance of data, this book provides comprehensive understanding of the business drivers for data governance and benefits of data governance, the interactions of data governance function with other data management functions and various components and aspects of data governance that can be facilitated by technology and tools, the distinction between data management tools and data governance tools, the readiness checks to perform before exploring the market to purchase a data governance tool, the different aspects that must be considered when comparing and selecting the appropriate data governance technologies and tools from large number of options available in the marketplace and the different market players that provide tools for supporting data governance. This book combines the data and data governance knowledge that the author has gained over years of working in different industrial and research programs and projects associated with data, processes and technologies with unique perspectives gained through interviews with thought leaders and data experts. This book is highly beneficial for IT students, academicians, information management and business professionals and researchers to enhance their knowledge and get guidance on implementing data governance in their own data initiatives.
Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private "e-Discovery" industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.
Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection.
This book constitutes the refereed proceedings of the 12th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2021, held in Costa de Caparica, Portugal, in July 2021.*The 34 papers presented were carefully reviewed and selected from 92 submissions. The papers present selected results produced in engineering doctoral programs and focus on technological innovation for industry and service systems. Research results and ongoing work are presented, illustrated and discussed in the following areas: collaborative networks; smart manufacturing; cyber-physical systems and digital twins; intelligent decision making; smart energy management; communications and electronics; classification systems; smart healthcare systems; and medical devices. *The conference was held virtually. Chapters "Characteristics of Adaptable Control of Production Systems and the Role of Self-organization Towards Smart Manufacturing" and "Predictive Manufacturing: Enabling Technologies, Frameworks and Applications" are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
The American legal profession and judicial system bear a unique responsibility to set and maintain the balance between defending homeland security and protecting the civil liberties outlined in the Bill of Rights. These competing interests will continue to collide as the threats to our safety grow. Exploring the most significant terrorist cases of the past two decades, Counter Terrorism Issues: Case Studies in the Courtroom presents a panoramic view of the American judiciary's handling of domestic terrorism in the last 20 years. Drawing extensively upon trial transcripts, witness statements, and judicial opinions, the book brings the underlying events back to life and demonstrates how the criminal justice system has sought to grapple with conflicting facts and countervailing legal rights and responsibilities. The book examines some of the most notorious recent cases-the two attacks on the World Trade Center, the Oklahoma City bombing, and the Fort Hood massacre. It also looks at lesser-known but equally important incidents, including those involving animal-rights radicals who harass university researchers and corporate executives, as well as the actions of terrorist "wannabes" who threaten our security. Also discussed are attempts by victims of terrorist attacks to sue state sponsors of terrorism. Through the words of witnesses, judges, and the attorneys who tried these cases in America's courtrooms, the book provides important commentary on the related back-stories and historical/political contexts of these events, enabling readers to understand the significance of these often-infamous attacks on U.S. soil.
Modern society requires a specialized, persistent approach to IT service delivery. Cloud computing offers the most logical answer through a highly dynamic and virtualized resource made available by an increasing number of service providers. Advanced Research on Cloud Computing Design and Applications shares the latest high quality research results on cloud computing and explores the broad applicability and scope of these trends on an international scale, venturing into the hot-button issue of IT services evolution and what we need to do to be prepared for future developments in cloud computing. This book is an essential reference source for researchers and practitioners in the field of cloud computing, as well as a guide for students, academics, or anyone seeking to learn more about advancement in IT services. This publication features chapters covering a broad range of relevant topics, including cloud computing for e-government, cloud computing in the public sector, security in the cloud, hybrid clouds and outsourced data, IT service personalization, and supply chain in the cloud.
Privacy by design is a proactive approach that promotes privacy and data protection compliance throughout project lifecycles when storing or accessing personal data. Privacy by design is essential for the Internet of Things (IoT) as privacy concerns and accountability are being raised in an increasingly connected world. What becomes of data generated, collected or processed by the IoT is clearly an important question for all involved in the development, manufacturing, applications and use of related technologies. But this IoT concept does not work well with the 'big data' trend of aggregating pools of data for new applications. Developers need to address privacy and security issues and legislative requirements at the design stage, and not as an afterthought. In this edited book, the authors draw on a wealth of interdisciplinary research to delineate the challenges of building accountability into the Internet of Things and solutions for delivering on this critical societal challenge. This advanced book brings together legal-tech scholars, computer scientists, human computer interaction researchers and designers and socials scientists to address these challenges and elaborate solutions. It articulates the accountability principle in law and how it impacts IoT development, presents empirical studies of accountability in action and its implications for IoT development, brings technological responses to the requirements of GDPR and ways of building accountability into the IoT, and covers compliant IoT application development, privacy-preserving data analytics, human-centred IoT security, human-data interaction, and the methodological challenge of understanding and responding to the adoption of future technologies in everyday life.
Cloud computing can provide virtually unlimited scalable high performance computing resources. Cloud workflows often underlie many large scale data/computation intensive e-science applications such as earthquake modelling, weather forecasting and astrophysics. During application modelling, these sophisticated processes are redesigned as cloud workflows, and at runtime, the models are executed by employing the supercomputing and data sharing ability of the underlying cloud computing infrastructures. "Temporal QOS Management in Scientific Cloud Workflow Systems"
focuses on real world scientific applications which often must be
completed by satisfying a set of temporal constraints such as
milestones and deadlines. Meanwhile, activity duration, as a
measurement of system performance, often needs to be monitored and
controlled. This book demonstrates how to guarantee on-time
completion of most, if not all, workflow applications. Offering a
comprehensive framework to support the lifecycle of
time-constrained workflow applications, this book will enhance the
overall performance and usability of scientific cloud workflow
systems.
Radio Frequency Identification (RFID) technology may become one of the most pervasive technologies of the near future. Yet the widespread adoption of this new technology presents security risks that have not been sufficiently addressed.Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID highlights new research regarding wireless identification and sensing platform (WISP) tags, security, and applications. It serves as a reference on WISP technology and presents recent advances in this field. This volume serves as a useful reference for security experts, will introduce RFID professionals to new trends in this area, and can also be used by IT experts looking to utilize this technology.
This book constitutes the refereed proceedings of the IFIP WG 8.2, 9.1, 9.4 Joint Working Conference on the Future of Digital Work: The Challenge of Inequality, IFIPJWC 2020, which was supposed to be held in Hyderabad, India, in December 2020, but was held virtually due to the COVID-19 pandemic. This conference was organized for IFIP's 60th anniversary and to commemorate its mission to "achieve worldwide professional and socially responsible development and application of ICTs."The 22 full papers presented together with an introduction and two keynotes were carefully reviewed and selected from 29 submissions. They are organized in topics on: innovation and entrepreneurship; the social significance of digital platforms; transforming healthcare; and the dark side of digitalization.
The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored by a recognized expert in the field, this authoritative and clear guide explores the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001.
This book is aimed squarely at the Independent Software Vendor (ISV) who is considering Force.com as a route to market their software offerings. Alternatively you could be part of a corporate IT department looking to deliver solutions more quickly for your business users. You have many of the same issues as the ISV, but from a slightly different perspective. This book is intended to be a catalyst for action aimed at a range of people inside and outside your organization
About 25 years ago, the first developments of ANT (Actor-Network Theory) took place, but it wasn t until much later that researchers began to take it seriously. In the late 1990s, ANT began to take hold in the scientific community as a new and exciting approach to socio-technical research and social theory. Actor-Network Theory and Technology Innovation: Advancements and New Concepts provides a comprehensive look at the development of actor-network theory itself, as well as case studies of its use to assist in the explanation of various socio-technical phenomena. This book includes topics relating to technological innovation; both those using actor-network theory as an explanatory framework and those using other approaches. It is an excellent source of information regarding ANT as an approach to technological innovation and its link to ICT (Information Communication Technology).
Computer networks have become essential to the survival of businesses, organizations, and educational institutions, as the number of network users, services, and applications has increased alongside advancements in information technology. Given this, efforts have been put forward by researchers, designers, managers, analysts, and professionals to optimize network performance and satisfy the varied groups that have an interest in network design and implementation. Simulation in Computer Network Design and Modeling: Use and Analysis reviews methodologies in computer network simulation and modeling, illustrates the benefits of simulation in computer networks design, modeling, and analysis, and identifies the main issues that face efficient and effective computer network simulation. This reference will inform the work and research of academics, post-graduate students, developers, network designers, network analysts, telecommunication system designers, and others who are interested in using simulation in computer network design and modeling.
This book is intended to give researchers and practitioners in the cross-cutting fields of artificial intelligence, machine learning (AI/ML) and cyber security up-to-date and in-depth knowledge of recent techniques for improving the vulnerabilities of AI/ML systems against attacks from malicious adversaries. The ten chapters in this book, written by eminent researchers in AI/ML and cyber-security, span diverse, yet inter-related topics including game playing AI and game theory as defenses against attacks on AI/ML systems, methods for effectively addressing vulnerabilities of AI/ML operating in large, distributed environments like Internet of Things (IoT) with diverse data modalities, and, techniques to enable AI/ML systems to intelligently interact with humans that could be malicious adversaries and/or benign teammates. Readers of this book will be equipped with definitive information on recent developments suitable for countering adversarial threats in AI/ML systems towards making them operate in a safe, reliable and seamless manner. |
![]() ![]() You may like...
Biomedical Diagnostics and Clinical…
Manuela Pereira, Mario Freire
Hardcover
R6,675
Discovery Miles 66 750
Web Services - Concepts, Methodologies…
Information Reso Management Association
Hardcover
R9,718
Discovery Miles 97 180
Web-Based Services - Concepts…
Information Reso Management Association
Hardcover
R18,336
Discovery Miles 183 360
Web Technologies & Applications
Sammulal Porika, M Peddi Kishore
Hardcover
|