|
|
Books > Computing & IT > Computer communications & networking
This is the first book describing cable networks, services, and
their management in greater detail by thirteen experts in various
fields covering network architectures and services, operations,
administration, maintenance, provisioning, troubleshooting (OAMPT)
for residential services; network architectures, services, and
OAMPT for business services; Software Defined Networks (SDN) and
Virtualization concepts Comprehensive reference book useful for
people working for a multiple systems operator Includes chapter
introductions Written by 13 experts in various fields such as
network services and soft defined networks
Fourth generation wireless networks are expected to provide
comprehensive and secure IP-based solutions, facilitating existing
and emerging services such as voice, data, streamed multimedia,
sensory, e-health, and social networking. It is expected that 4G
will be provided to users on an "Anytime, Anywhere" basis and at
much higher data rates compared to the current and previous mobile
generations. Fourth-Generation Wireless Networks: Applications and
Innovations presents a vision for the coming years in terms of
emerging fourth generation (4G) wireless technology trends and best
practices. It explores the resulting challenges and technical
opportunities that will arise in creating and delivering 4G
networks for the emerging applications and services. This book also
examines the fundamentals of advanced physical layer and radio
resource management as the basis for cross layer and cross network
optimization that will emerge for increased mobility and services
in video, cloud computing virtualization, entertainment, education,
health, and security. This book have been organized especially for
researchers, students, network engineers and designers and leaders
of emerging companies, decision makers in standards, consumers, and
product developers.
There is an enhanced level of connectivity available in modern
society through the increased usage of various technological
devices. Such developments have led to the integration of smart
objects into the Internet of Things (IoT), an emerging paradigm in
the digital age. Game Theory Solutions for the Internet of Things:
Emerging Research and Opportunities examines the latest strategies
for the management of IoT systems and the application of
theoretical models to enhance real-world applications and improve
system efficiency. Highlighting innovative algorithms and methods,
as well as coverage on cloud computing, cross-domain applications,
and energy control, this book is a pivotal source of information
for researchers, practitioners, graduate students, professionals,
and academics interested in the game theoretic solutions for IoT
applications.
E-governance is an application of IT; holding uses for the delivery
of Government services, information exchange between Government to
public, e-business, and various. However, the aim of cybersecurity
is to provide security from cyber-attacks from the view of emerging
technology is used by hackers. Hence, it is important to provide
fast protection application software and structure. In this
scenario, the government may be focused to provide capable Internet
carefully without the risk of fraud. These days the study
deliberates about the issue of the world while technology is
helping and fruitful on each step of life like e-Governance
applications. Though, has been limited study has been done by a
previous study on protocols of cybersecurity for e-Governance.
Can we rebuild trust in a time of increasing conflict and
paralysis? Or rather, can we build trust, for the first time, wide
and strong enough to bring us together to work on the complex
problems of our age? Relations of trust have been weakened over the
past century by a historic expansion of communication and
cross-cultural interaction, and the advance of complex, fluid
relationships. Now the rapid rise of the internet has accelerated
the disruption. Many long for the comfort and security of relations
in which one knew whom to trust and what to expect; yet at the same
time they may embrace the dynamism and creativity that comes from
mixing of cultures and perspectives. This book explores current
conflicts and confusions of relations and identities, using both
general theory and specific cases. It argues that we are at a
catalyzing moment in a long transition from a community in which
the prime rule was tolerance, to one with a commitment to
understanding; from one where it was considered wrong to argue
about cultural differences, to one where such arguments are
essential. The development of this rich community is essential as
well as difficult. Complex societies produce complex challenges,
from climate change to inequality to the risk-laden opportunities
of bioengineering, that demand collaboration among people with
widely varying views. Such brewing crises cannot be worked through
without far more deliberate discussion and cooperation, and higher
levels of trust, than we have today. This book explores many
challenges ahead and suggests some practical directions for
resolving them.
This book presents the outcomes of the 17th IEEE/ACIS International
Conference on Computer and Information Science (ICIS 2018), which
was held in Singapore on June 6-8, 2018. The aim of the conference
was to bring together researchers and scientists, businessmen and
entrepreneurs, teachers, engineers, computer users, and students to
discuss the various fields of computer science and to share their
experiences, and to exchange new ideas and information in a
meaningful way. The book includes findings on all aspects (theory,
applications and tools) of computer and information science and
discusses related practical challenges and the solutions adopted to
solve them. The conference organizers selected the best papers from
those accepted for presentation. The papers were chosen based on
review scores submitted by members of the program committee and
underwent a further rigorous round of review. From this second
round, 13 of the conference's most promising papers were then
published in this Springer (SCI) book and not the conference
proceedings. We impatiently await the important contributions that
we know these authors will make to the field of computer and
information science.
 |
Big Data Security
(Hardcover)
Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
|
R3,625
Discovery Miles 36 250
|
Ships in 10 - 15 working days
|
|
|
After a short description of the key concepts of big data the book
explores on the secrecy and security threats posed especially by
cloud based data storage. It delivers conceptual frameworks and
models along with case studies of recent technology.
Today, more than 80% of the data transmitted over networks and
archived on our computers, tablets, cell phones or clouds is
multimedia data - images, videos, audio, 3D data. The applications
of this data range from video games to healthcare, and include
computer-aided design, video surveillance and biometrics. It is
becoming increasingly urgent to secure this data, not only during
transmission and archiving, but also during its retrieval and use.
Indeed, in today's "all-digital" world, it is becoming ever-easier
to copy data, view it unrightfully, steal it or falsify it.
Multimedia Security 2 analyzes issues relating to biometrics,
protection, integrity and encryption of multimedia data. It also
covers aspects such as crypto-compression of images and videos,
homomorphic encryption, data hiding in the encrypted domain and
secret sharing.
Cybersecurity has become a topic of concern over the past decade as
private industry, public administration, commerce, and
communication have gained a greater online presence. As many
individual and organizational activities continue to evolve in the
digital sphere, new vulnerabilities arise. Cybersecurity Policies
and Strategies for Cyberwarfare Prevention serves as an integral
publication on the latest legal and defensive measures being
implemented to protect individuals, as well as organizations, from
cyber threats. Examining online criminal networks and threats in
both the public and private spheres, this book is a necessary
addition to the reference collections of IT specialists,
administrators, business managers, researchers, and students
interested in uncovering new ways to thwart cyber breaches and
protect sensitive digital information.
Wireless networking is considered by many to be the future of
communication technology, as the demand for high quality, mobile
connection increases across the world. Wireless Network Traffic and
Quality of Service Support: Trends and Standards examines cutting
edge approaches for the provision of Quality of Service (QoS) in
wireless local area networks, presenting the latest solutions
towards the optimization of the channel management and routing in
infrastructure and ad hoc wireless networks. This book also
analyzes traffic categorization issues and methods that can predict
the available QoS, as well as managing wireless mesh networks and
wireless sensor networks. It also examines the entire user
experience, by treating energy conservation techniques to maximize
mobile devices' battery lifetime. It is a vital foundation for
researchers dealing with the problems of today to create the new
networks of the future.
Java Card is one of the latest developments in the area of
multi-application and platform-independent smart cards. As a
working tool for professionals, this easy-to-understand resource
provides clear, detailed guidance on smart cards, credit and debit
cards, Java Card and Open Card Framework (OCF). It offers in-depth
coverage of important standards, open specifications and critical
security issues, including common threats and security mechanisms
regarding the card and its connection interface. The book explains
how to program a Java Card applet, an OCF card service and a
terminal application. What's more, the book presents an informative
case study on the credit-debit application, offering a detailed
road map of the application development process.
Cybersecurity threats have become ubiquitous and continue to topple
every facet of the digital realm as they are a problem for anyone
with a gadget or hardware device. However, there are some actions
and safeguards that can assist in avoiding these threats and
challenges; further study must be done to ensure businesses and
users are aware of the current best practices. Cybersecurity
Issues, Challenges, and Solutions in the Business World considers
cybersecurity innovation alongside the methods and strategies for
its joining with the business industry and discusses pertinent
application zones such as smart city, e-social insurance, shrewd
travel, and more. Covering key topics such as blockchain, data
mining, privacy, security issues, and social media, this reference
work is ideal for security analysts, forensics experts, business
owners, computer scientists, policymakers, industry professionals,
researchers, scholars, academicians, practitioners, instructors,
and students.
Cloud technologies have revolutionized the way we store information
and perform various computing tasks. With the rise of this new
technology, the ability to secure information stored on the cloud
becomes a concern. The Handbook of Research on Securing Cloud-Based
Databases with Biometric Applications explores the latest
innovations in promoting cloud security through human
authentication techniques. Exploring methods of access by
identification, including the analysis of facial features,
fingerprints, DNA, dental characteristics, and voice patterns, this
publication is designed especially for IT professionals,
academicians, and upper-level students seeking current research
surrounding cloud security.
Describing the technologies to combine language resources flexibly
as web services, this book provides valuable case studies for those
who work in services computing, language resources, human-computer
interaction (HCI), computer-supported cooperative work (CSCW), and
service science. The authors have been operating the Language Grid,
which wraps existing language resources as atomic language services
and enables users to compose new services by combining them. From
architecture level to service composition level, the book explains
how to resolve infrastructural and operational difficulties in
sharing and combining language resources, including
interoperability of language service infrastructures, various types
of language service policies, human services, and service
failures.The research based on the authors' operating experiences
of handling complicated issues such as intellectual property and
interoperability of language resources contributes to exploitation
of language resources as a service. On the other hand, both the
analysis based on using services and the design of new services can
bring significant results. A new style of multilingual
communication supported by language services is worthy of analysis
in HCI/CSCW, and the design process of language services is the
focus of valuable case studies in service science. By using
language resources in different ways based on the Language Grid,
many activities are highly regarded by diverse communities. This
book consists of four parts: (1) two types of language service
platforms to interconnect language services across service grids,
(2) various language service composition technologies that improve
the reusability, efficiency, and accuracy of composite services,
(3) research work and activities in creating language resources and
services, and (4) various applications and tools for understanding
and designing language services that well support intercultural
collaboration.
The Internet of Things is a technological revolution that
represents the future of computing and communications. Even though
efforts have been made to standardize Internet of Things devices
and how they communicate with the web, a uniform architecture is
not followed. This inconsistency directly impacts and limits
security standards that need to be put in place to secure the data
being exchanged across networks. Cryptographic Security Solutions
for the Internet of Things is an essential reference source that
discusses novel designs and recent developments in cryptographic
security control procedures to improve the efficiency of existing
security mechanisms that can help in securing sensors, devices,
networks, communication, and data in the Internet of Things. With
discussions on cryptographic algorithms, encryption techniques, and
authentication procedures, this book is ideally designed for
managers, IT consultants, startup companies, ICT procurement
managers, systems and network integrators, infrastructure service
providers, students, researchers, and academic professionals.
This bestselling on-the-job reference and test preparation guide
has been fully revised for new 2022 exam objectives This fully
revised and updated resource offers complete coverage of the latest
release of CompTIA A+ exams 220-1101 & 220-1102. You'll find
learning objectives at the beginning of each chapter, exam tips,
practice exam questions, and in-depth explanations. Designed to
help you pass the CompTIA A+ exams with ease, this definitive guide
also serves as an essential on-the-job IT reference. Covers all
exam topics, including how to: Work with CPUs, RAM, BIOS,
motherboards, power supplies, and other personal computer
components Install, configure, and maintain hard drives Manage
input devices and removable media Set up, upgrade, and maintain
Microsoft Windows Troubleshoot and fix computer problems Install
printers and other peripherals Configure and secure mobile devices
>Connect to the Internet Set up wired and wireless networks
Protect your personal computer and your network Implement
virtualization and cloud-based technologies Online content
includes: Practice exams for 1101 & 1102 with hundreds of
questions One hour of video training from Mike Meyers TotalSim
simulations of performance-based questions A collection of Mike
Meyers' favorite shareware and freeware PC tools and utilities
This text is appropriate for those courses with an emphasis on e-commerce and the Internet, as well as short courses or MBA/IS courses that want a modern approach. Networking has changed dramatically over the past ten years. Most texts have focused on network layers and their concepts and then on how the different technologies are implemented; however with the number of viable technologies shrinking, it makes less sense to focus on concepts first and technologies second. Networking in the Internet Age first edition integrates the discussion of concepts and technologies so they appear in one place, organized by layers.
Over the past decade, the Command and Control (C2) field has been
making a transformation from top-down, directive command to Network
Centric Operations (NCO), peer-to-peer negation,
self-synchronization, and agility. As the terms NCO and NEC
suggest, C2 systems are regarded as networks, rather than a
hierarchy. Accordingly, it is appropriate to view the C2 process
and C2 systems through the lens of network theory. Network Topology
in Command and Control: Organization, Operation, and Evolution aims
to connect the fields of C2 and network science. Featuring timely
research on topics pertaining to the C2 network evolution,
security, and modelling, this publication is ideal for reference
use by students, academicians, and security professionals in the
fields of C2 and network science.
The continuing growth of wireless networks is being driven by ease
of installation, flexibility and mobility, offering gains in
efficiency, accuracy and lower business costs. This fresh
perspective from two experts in the field provides professionals
with a practical approach to design implementation, evaluation and
problem-solving, which underscores its uniqueness as a hands-on
guide to next generation wireless communications systems. The book
offers practitioners a wealth of information on WLAN (wireless
local area network) implementation, deployment and results. Key
topics include: IP networking for wireless; wireless networking and
Internet access standards; changes in the IEEE 802.11 standard;
system design and implementation; and performance analysis.
|
You may like...
Joburg Noir
Niq Mhlongo
Paperback
(2)
R325
Discovery Miles 3 250
Intruders
Mohale Mashigo
Paperback
(1)
R250
R227
Discovery Miles 2 270
|