|
|
Books > Computing & IT > Computer communications & networking
Advances in Delay-Tolerant Networks: Architecture and Enhanced
Performance, Second Edition provides an important overview of
delay-tolerant networks (DTNs) for researchers in electronics,
computer engineering, telecommunications and networking for those
in academia and R&D in industrial sectors. Part I reviews the
technology involved and the prospects for improving performance,
including different types of DTN and their applications, such as
satellite and deep-space communications and vehicular
communications. Part II focuses on how the technology can be
further improved, addressing topics, such as data bundling,
opportunistic routing, reliable data streaming, and the potential
for rapid selection and dissemination of urgent messages.
Opportunistic, delay-tolerant networks address the problem of
intermittent connectivity in a network where there are long delays
between sending and receiving messages, or there are periods of
disconnection.
Each Student Book and ActiveBook have has clearly laid out pages
with a range of supportive features to aid learning and teaching:
Getting to know your unit sections ensure learners understand the
grading criteria and unit requirements. Getting ready for
Assessment sections focus on preparation for external assessment
with guidance for learners on what to expect. Hints and tips will
help them prepare for assessment and sample answers are provided
for a range of question types including, short and long answer
questions, all with a supporting commentary. Learners can also
prepare for internal assessment using this feature. A case study of
a learner completing the internal assessment for that unit covering
'How I got started', 'How I brought it all together' and 'What I
got from the experience'. Pause Point feature provide opportunities
for learners to self-evaluate their learning at regular intervals.
Each Pause Point point feature gives learners a Hint or Extend
option to either revisit and reinforce the topic or to encourage
independent research or study skills. Case Study and Theory into
Practice features enable development of problem-solving skills and
place the theory into real life situations learners could
encounter. Assessment Activity/Practice provide scaffolded
assessment practice activities that help prepare learners for
assessment. Within each assessment practice activity, a Plan, Do
and Review section supports learners' formative assessment by
making sure they fully understand what they are being asked to do,
what their goals are and how to evaluate the task and consider how
they could improve. Dedicated Think Future pages provide case
studies from the industry, with a focus on aspects of skills
development that can be put into practice in a real work
environment and further study.
During the COVID-19 era, the functions of social policy and public
administration have undergone a meaningful change, especially with
the advancement of digital elements and online and virtual
functions. Cyber developments, cyber threats, and the effects of
cyberwar on the public administrations of countries have become
critical research subjects, and it is important to have resources
that can introduce and guide users through the current best
practices, laboratory methods, policies, protocols, and more within
cyber public administration and social policy. The Handbook of
Research on Cyber Approaches to Public Administration and Social
Policy focuses on the post-pandemic changes in the functions of
social policy and public administration. It also examines the
implications of the cyber cosmos on public and social policies and
practices from a broad perspective. Covering topics such as
intersectional racism, cloud computing applications, and public
policies, this major reference work is an essential resource for
scientists, laboratory technicians, professionals, technologists,
computer scientists, policymakers, students, educators,
researchers, and academicians.
The use of digital images in today's modernized market is rapidly
increasing throughout organizations due to the prevalence of social
media and digital content. Companies who wish to distribute their
content over the internet face numerous security risks such as
copyright violation. Advanced methods for the protection and
security of digital data are constantly emerging, and up-to-date
research in this area is lacking. Advancements in Security and
Privacy Initiatives for Multimedia Images is a collection of
innovative research on the methods and applications of contemporary
techniques for the security and copyright protection of images and
their distribution. While highlighting topics including
simulation-based security, digital watermarking protocols, and
counterfeit prevention, this book is ideally designed for security
analysts, researchers, developers, programmers, academicians,
practitioners, students, executives, educators, and policymakers
seeking current research on modern security improvements for
multimedia images.
Security in IoT Social Networks takes a deep dive into security
threats and risks, focusing on real-world social and financial
effects. Mining and analyzing enormously vast networks is a vital
part of exploiting Big Data. This book provides insight into the
technological aspects of modeling, searching, and mining for
corresponding research issues, as well as designing and analyzing
models for resolving such challenges. The book will help start-ups
grow, providing research directions concerning security mechanisms
and protocols for social information networks. The book covers
structural analysis of large social information networks,
elucidating models and algorithms and their fundamental properties.
Moreover, this book includes smart solutions based on artificial
intelligence, machine learning, and deep learning for enhancing the
performance of social information network security protocols and
models. This book is a detailed reference for academicians,
professionals, and young researchers. The wide range of topics
provides extensive information and data for future research
challenges in present-day social information networks.
Cybersecurity has been gaining serious attention and recently has
become an important topic of concern for organizations, government
institutions, and largely for people interacting with digital
online systems. As many individual and organizational activities
continue to grow and are conducted in the digital environment, new
vulnerabilities have arisen which have led to cybersecurity
threats. The nature, source, reasons, and sophistication for
cyberattacks are not clearly known or understood, and many times
invisible cyber attackers are never traced or can never be found.
Cyberattacks can only be known once the attack and the destruction
have already taken place long after the attackers have left.
Cybersecurity for computer systems has increasingly become
important because the government, military, corporate, financial,
critical infrastructure, and medical organizations rely heavily on
digital network systems, which process and store large volumes of
data on computer devices that are exchanged on the internet, and
they are vulnerable to ""continuous"" cyberattacks. As
cybersecurity has become a global concern, it needs to be clearly
understood, and innovative solutions are required. Advancing
Cybersecurity for Digital Transformation: Opportunities and
Challenges looks deeper into issues, problems, and innovative
solutions and strategies that are linked to cybersecurity. This
book will provide important knowledge that can impact the
improvement of cybersecurity, which can add value in terms of
innovation to solving cybersecurity threats. The chapters cover
cybersecurity challenges, technologies, and solutions in the
context of different industries and different types of threats.
This book is ideal for cybersecurity researchers, professionals,
scientists, scholars, and managers, as well as practitioners,
stakeholders, researchers, academicians, and students interested in
the latest advancements in cybersecurity for digital
transformation.
More individuals than ever are utilizing internet technologies to
work from home, teach and learn, shop, interact with peers, review
medical records, and more. While it is certainly convenient to
conduct such tasks via the internet, this increased internet
presence has also led to a rise in the search and availability of
personal information, which in turn is resulting in more
cyber-attacks, privacy breaches, and information leaks. Cyber
criminals are using such opportunities to attack governments,
organizations, and individuals, making it necessary to anticipate,
assess, and mitigate privacy and security threats during this
infodemic. The Handbook of Research on Technical, Privacy, and
Security Challenges in a Modern World discusses the design and
development of different machine learning systems, including next
generation applications, in order to mitigate cyber-attacks and
address security challenges in everyday technologies. It further
explores select methods and algorithms of learning for implementing
better security methods in fields such as business and healthcare.
It recognizes the future of privacy and the importance of
preserving data through recommended practice, feedback loops, and
smart agents. Covering topics such as face mask detection, gesture
recognition, and botnet attacks and detection, this major reference
work is a dynamic resource for medical professionals, healthcare
administrators, government officials, business executives and
managers, IT managers, students and faculty of higher education,
librarians, researchers, and academicians.
This book serves as a guide to help the reader develop an awareness
of security vulnerabilities and attacks, and encourages them to be
circumspect when using the various computer resources and tools
available today. For experienced users, Computer Science Security
presents a wide range of tools to secure legacy software and
hardware. Computing has infiltrated all fields nowadays. No one can
escape this wave and be immune to security attacks, which continue
to evolve, gradually reducing the level of expertise needed by
hackers. It is high time for each and every user to acquire basic
knowledge of computer security, which would enable them to mitigate
the threats they may face both personally and professionally. It is
this combined expertise of individuals and organizations that will
guarantee a minimum level of security for families, schools, the
workplace and society in general.
The Internet of Edges is a new paradigm whose objective is to keep
data and processing close to the user. This book presents three
different levels of Edge networking: MEC (Multi-access Edge
Computing), Fog and Far Edge (sometimes called Mist or Skin). It
also reviews participatory networks, in which user equipment
provides the resources for the Edge network. Edge networks can be
disconnected from the core Internet, and the interconnection of
autonomous edge networks can then form the Internet of Edges. This
book analyzes the characteristics of Edge networks in detail,
showing their capacity to replace the imposing Clouds of core
networks due to their superior server response time, data security
and energy saving.
Most of our everyday life experiences are multisensory in nature;
that is, they consist of what we see, hear, feel, taste, smell, and
much more. Almost any experience you can think of, such as eating a
meal or going to the cinema, involves a magnificent sensory world.
In recent years, many of these experiences have been increasingly
transformed and capitalised on through advancements that adapt the
world around us - through technology, products, and services - to
suit our ever more computerised environment. Multisensory
Experiences: Where the senses meet technology looks at this trend
and offers a comprehensive introduction to the dynamic world of
multisensory experiences and design. It takes the reader from the
fundamentals of multisensory experiences, through the relationship
between the senses and technology, to finally what the future of
those experiences may look like, and our responsibility in it. This
book empowers you to shape your own and other people's experiences
by considering the multisensory worlds that we live in through a
journey that marries science and practice. It also shows how we can
take advantage of the senses and how they shape our experiences
through intelligent technological design.
Digital Health: Mobile and Wearable Devices for Participatory
Health Applications is a key reference for engineering and clinical
professionals considering the development or implementation of
mobile and wearable solutions in the healthcare domain. The book
presents a comprehensive overview of devices and appropriateness
for the respective applications. It also explores the ethical,
privacy, and cybersecurity aspects inherent in networked and mobile
technologies. It offers expert perspectives on various approaches
to the implementation and integration of these devices and
applications across all areas of healthcare. The book is designed
with a multidisciplinary audience in mind; from software developers
and biomedical engineers who are designing these devices to
clinical professionals working with patients and engineers on
device testing, human factors design, and user
engagement/compliance.
5G NR: The Next Generation Wireless Access Technology, Second
Edition, follows the authors' highly celebrated books on 3G and 4G
and provides a new level of insight into 5G NR. After background
discussion of 5G, including requirements, spectrum aspects, and the
standardization timeline, all technology features of the first
phase of NR are described in detail. The book covers the NR
physical-layer structure and higher-layer protocols, RF and
spectrum aspects, and co-existence and interworking with LTE. The
book provides a good foundation in NR and different NR technology
components, giving insight into why a certain solution has been
selected. This second edition is updated to reflect the latest
developments in Release 16 and includes brand new chapters on: NR
in unlicensed spectrum; NR-U in Rel-16; IAB; V2X and sidelink in
Rel-16; industrial IoT; IIoT and referring to the URLLC
enhancements for PDCCH; RIM/CL; and positioning. Also included are
the key radio-related requirements of NR; design principles;
technical features of basic NR transmission structure-showing where
it was inherited from LTE, where it deviates from it, and the
reasons why- NR multi-antenna transmission functionality; detailed
description of the signals and functionality of the initial NR
access, including signals for synchronization and system
information; random access and paging; LTE/NR co-existence in the
same spectrum and the benefits of their interworking as one system;
and different aspects of mobility in NR. RF requirements for NR are
described for BS and UE, the legacy bands, and for the new mm-wave
bands.
The Art of Investigative Interviewing, Fourth Edition, builds on
the successes of the previous editions providing the reader
guidance on conducting investigative interviews, both ethically and
professionally. The book can be used by anyone who is involved in
investigative interviewing. It is a perfect combination of real,
practical, and effective techniques, procedures, and actual cases.
The reader learns key elements of investigative interviewing, such
as human psychology, proper interview preparation, tactical
concepts, controlling the interview environment, and evaluating the
evidence obtained from the interview. New to this edition will be
coverage of Open Source Intelligence (OSINT) tools, workplace
investigations, fraud investigations and the role of audit. Larry
Fennelly joins original author Inge Sebyan Black, both well-known
and respected in the field, providing everything an interviewer
needs to know in order to conduct successful interviews with
integrity and within the law. Written for anyone involved in
investigative interviewing.
The key parameter that needs to be considered when planning the
management of resources in futuristic wireless networks is a
balanced approach to resource distribution. A balanced approach is
necessary to provide an unbiased working environment for the
distribution, sharing, allocation, and supply of resources among
the devices of the wireless network. Equal resource distribution
also maintains balance and stability between the operations of
communication systems and thus improves the performance of wireless
networks. Managing Resources for Futuristic Wireless Networks is a
pivotal reference source that presents research related to the
control and management of key parameters of bandwidth, spectrum
sensing, channel selection, resource sharing, and task scheduling,
which is necessary to ensure the efficient operation of wireless
networks. Featuring topics that include vehicular ad-hoc networks,
resource management, and the internet of things, this publication
is ideal for professionals and researchers working in the field of
networking, information and knowledge management, and communication
sciences. Moreover, the book will provide insights and support
executives concerned with the management of expertise, knowledge,
information, and organizational development in different types of
work communities and environments.
The damaging effects of cyberattacks to an industry like the
Cooperative Connected and Automated Mobility (CCAM) can be
tremendous. From the least important to the worst ones, one can
mention for example the damage in the reputation of vehicle
manufacturers, the increased denial of customers to adopt CCAM, the
loss of working hours (having direct impact on the European GDP),
material damages, increased environmental pollution due e.g., to
traffic jams or malicious modifications in sensors' firmware, and
ultimately, the great danger for human lives, either they are
drivers, passengers or pedestrians. Connected vehicles will soon
become a reality on our roads, bringing along new services and
capabilities, but also technical challenges and security threats.
To overcome these risks, the CARAMEL project has developed several
anti-hacking solutions for the new generation of vehicles. CARAMEL
(Artificial Intelligence-based Cybersecurity for Connected and
Automated Vehicles), a research project co-funded by the European
Union under the Horizon 2020 framework programme, is a project
consortium with 15 organizations from 8 European countries together
with 3 Korean partners. The project applies a proactive approach
based on Artificial Intelligence and Machine Learning techniques to
detect and prevent potential cybersecurity threats to autonomous
and connected vehicles. This approach has been addressed based on
four fundamental pillars, namely: Autonomous Mobility, Connected
Mobility, Electromobility, and Remote Control Vehicle. This book
presents theory and results from each of these technical
directions.
Computing in Communication Networks: From Theory to Practice
provides comprehensive details and practical implementation tactics
on the novel concepts and enabling technologies at the core of the
paradigm shift from store and forward (dumb) to compute and forward
(intelligent) in future communication networks and systems. The
book explains how to create virtualized large scale testbeds using
well-established open source software, such as Mininet and Docker.
It shows how and where to place disruptive techniques, such as
machine learning, compressed sensing, or network coding in a newly
built testbed. In addition, it presents a comprehensive overview of
current standardization activities. Specific chapters explore
upcoming communication networks that support verticals in
transportation, industry, construction, agriculture, health care
and energy grids, underlying concepts, such as network slicing and
mobile edge cloud, enabling technologies, such as SDN/NFV/ ICN,
disruptive innovations, such as network coding, compressed sensing
and machine learning, how to build a virtualized network
infrastructure testbed on one's own computer, and more.
Cellular Internet of Things: From Massive Deployments to Critical
5G Applications, Second Edition, gives insights into the recent and
rapid work performed by the 3rd Generation Partnership Project
(3GPP) and the Multefire Alliance (MFA) to develop systems for the
Cellular IoT. Beyond the technologies, readers will learn what the
mMTC and cMTC market segments look like, deployment options and
expected performance in terms of system capacity, expected battery
lifetime, data throughput, access delay time and device cost,
regulations for operation in unlicensed frequency bands, and how
they impact system design and performance. This new edition
contains updated content on the latest EC-GSM IoT, LTE-M and NB-IoT
features in 3GPP Release 15, critical communication, i.e. URLLC,
specified in 3GPP Release 15 for both LTE and NR, LTE-M and NB-IoT
for unlicensed frequency bands specified in the Multefire Alliance
(MFA), and an updated outlook of what the future holds in
Industrial IoT and drone communications, amongst other topics.
Air Route Networks through Complex Networks Theory connects theory
research with network connectivity analysis, providing
practitioners with the tools they need to develop more efficient,
resilient and profitable air route networks. The book helps airline
route planners and executives create more robust route networks
that are less vulnerable to disruptions, such as node isolation.
The book further explores errors and attacks in complex networks,
strategies for detecting critical nodes and cascading failure
models to assess and maximize robustness. The book explains how to
measure air route network connectivity with complex network
representations. Air transport is among the most dynamic and
toughest competition industries in today's global economy. The
quality of air route network design is a key strategic factor in an
airline's viability. These robust networks provide for more stable
and secure carrier operations vs. those based simply on existing
supply and demand volumes. Node-specific and network-specific
representations are covered, along with in-depth coverage of
connectivity in special and temporal networks. These collective
tools serve as a guide for practitioners seeking to apply complex
network theory to the airline industry.
Nowadays it is impossible to imagine a business without technology
as most industries are becoming ""smarter"" and more tech-driven,
ranging from small individual tech initiatives to complete business
models with intertwined supply chains and ""platform""-based
business models. New ways of working, such as agile and DevOps,
have been introduced, leading to new risks. These risks come in the
form of new challenges for teams working together in a distributed
manner, privacy concerns, human autonomy, and cybersecurity
concerns. Technology is now integrated into the business discipline
and is here to stay leading to the need for a thorough
understanding of how to address these risks and all the potential
problems that could arise. With the advent of organized crime, such
as hacks and denial-of-service attacks, all kinds of malicious
actors are infiltrating the digital society in new and unique ways.
Systems with poor design, implementation, and configurations are
easily taken advantage of. When it comes to integrating business
and technology, there needs to be approaches for assuring security
against risks that can threaten both businesses and their digital
platforms. Strategic Approaches to Digital Platform Security
Assurance offers comprehensive design science research approaches
to extensively examine risks in digital platforms and offer
pragmatic solutions to these concerns and challenges. This book
addresses significant problems when transforming an organization
embracing API-based platform models, the use of DevOps teams, and
issues in technological architectures. Each section will examine
the status quo for business technologies, the current challenges,
and core success factors and approaches that have been used. This
book is ideal for security analysts, software engineers, computer
engineers, executives, managers, IT consultants, business
professionals, researchers, academicians, and students who want to
gain insight and deeper knowledge of security in digital platforms
and gain insight into the most important success factors and
approaches utilized by businesses.
|
You may like...
Booth
Karen Joy Fowler
Paperback
R463
R260
Discovery Miles 2 600
Die Onsigbare
PJO Jonker
Paperback
R340
R304
Discovery Miles 3 040
|