|
Books > Computing & IT > Computer communications & networking
As the progression of the internet continues, society is finding
easier, quicker ways of simplifying their needs with the use of
technology. With the growth of lightweight devices, such as smart
phones and wearable devices, highly configured hardware is in
heightened demand in order to process the large amounts of raw data
that are acquired. Connecting these devices to fog computing can
reduce bandwidth and latency for data transmission when associated
with centralized cloud solutions and uses machine learning
algorithms to handle large amounts of raw data. The risks that
accompany this advancing technology, however, have yet to be
explored. Architecture and Security Issues in Fog Computing
Applications is a pivotal reference source that provides vital
research on the architectural complications of fog processing and
focuses on security and privacy issues in intelligent fog
applications. While highlighting topics such as machine learning,
cyber-physical systems, and security applications, this publication
explores the architecture of intelligent fog applications enabled
with machine learning. This book is ideally designed for IT
specialists, software developers, security analysts, software
engineers, academicians, students, and researchers seeking current
research on network security and wireless systems.
Industrial internet of things (IIoT) is changing the face of
industry by completely redefining the way stakeholders,
enterprises, and machines connect and interact with each other in
the industrial digital ecosystem. Smart and connected factories, in
which all the machinery transmits real-time data, enable industrial
data analytics for improving operational efficiency, productivity,
and industrial processes, thus creating new business opportunities,
asset utilization, and connected services. IIoT leads factories to
step out of legacy environments and arcane processes towards open
digital industrial ecosystems. Innovations in the Industrial
Internet of Things (IIoT) and Smart Factory is a pivotal reference
source that discusses the development of models and algorithms for
predictive control of industrial operations and focuses on
optimization of industrial operational efficiency, rationalization,
automation, and maintenance. While highlighting topics such as
artificial intelligence, cyber security, and data collection, this
book is ideally designed for engineers, manufacturers,
industrialists, managers, IT consultants, practitioners, students,
researchers, and industrial industry professionals.
If you look around you will find that all computer systems, from
your portable devices to the strongest supercomputers, are
heterogeneous in nature. The most obvious heterogeneity is the
existence of computing nodes of different capabilities (e.g.
multicore, GPUs, FPGAs, ...). But there are also other
heterogeneity factors that exist in computing systems, like the
memory system components, interconnection, etc. The main reason for
these different types of heterogeneity is to have good performance
with power efficiency. Heterogeneous computing results in both
challenges and opportunities. This book discusses both. It shows
that we need to deal with these challenges at all levels of the
computing stack: from algorithms all the way to process technology.
We discuss the topic of heterogeneous computing from different
angles: hardware challenges, current hardware state-of-the-art,
software issues, how to make the best use of the current
heterogeneous systems, and what lies ahead. The aim of this book is
to introduce the big picture of heterogeneous computing. Whether
you are a hardware designer or a software developer, you need to
know how the pieces of the puzzle fit together. The main goal is to
bring researchers and engineers to the forefront of the research
frontier in the new era that started a few years ago and is
expected to continue for decades. We believe that academics,
researchers, practitioners, and students will benefit from this
book and will be prepared to tackle the big wave of heterogeneous
computing that is here to stay.
Society is continually transforming into a digitally powered
reality due to the increased dependence of computing technologies.
The landscape of cyber threats is constantly evolving because of
this, as hackers are finding improved methods of accessing
essential data. Analyzing the historical evolution of cyberattacks
can assist practitioners in predicting what future threats could be
on the horizon. Real-Time and Retrospective Analyses of Cyber
Security is a pivotal reference source that provides vital research
on studying the development of cybersecurity practices through
historical and sociological analyses. While highlighting topics
such as zero trust networks, geopolitical analysis, and cyber
warfare, this publication explores the evolution of cyber threats,
as well as improving security methods and their socio-technological
impact. This book is ideally designed for researchers,
policymakers, strategists, officials, developers, educators,
sociologists, and students seeking current research on the
evolution of cybersecurity methods through historical analysis and
future trends.
Technologies in today's society are rapidly developing at a pace
that is challenging to stay up to date with. As an increasing
number of global regions are implementing smart methods and
strategies for sustainable development, they are continually
searching for modern advancements within computer science, sensor
networks, software engineering, and smart technologies. A
compilation of research is needed that displays current
applications of computing methodologies in the progression of
global cities and how smart technologies are being utilized. Sensor
Network Methodologies for Smart Applications is a collection of
innovative research on the methods of intelligent systems and
technologies and their various applications within sustainable
development practices. While highlighting topics including machine
learning, network security, and optimization algorithms, this book
is ideally designed for researchers, scientists, developers,
programmers, engineers, educators, policymakers, geographers,
planners, and students seeking current research on smart
technologies and sensor networks.
|
Security of Networks and Services in an All-Connected World
- 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings
(Hardcover)
Daphne Tuncer, Robert Koch, Remi Badonnel
|
R1,403
Discovery Miles 14 030
|
Ships in 10 - 15 working days
|
|
In recent years, smart cities have been an emerging area of
interest across the world. Due to this, numerous technologies and
tools, such as building information modeling (BIM) and digital
twins, have been developed to help achieve smart cities. To ensure
research is continuously up to date and new technologies are
considered within the field, further study is required. The
Research Anthology on BIM and Digital Twins in Smart Cities
considers the uses, challenges, and opportunities of BIM and
digital twins within smart cities. Covering key topics such as
data, design, urban areas, technology, and sustainability, this
major reference work is ideal for industry professionals,
government officials, computer scientists, policymakers,
researchers, scholars, practitioners, instructors, and students.
Distributed systems intertwine with our everyday lives. The
benefits and current shortcomings of the underpinning technologies
are experienced by a wide range of people and their smart devices.
With the rise of large-scale IoT and similar distributed systems,
cloud bursting technologies, and partial outsourcing solutions,
private entities are encouraged to increase their efficiency and
offer unparalleled availability and reliability to their users.
Applying Integration Techniques and Methods in Distributed Systems
is a critical scholarly publication that defines the current state
of distributed systems, determines further goals, and presents
architectures and service frameworks to achieve highly integrated
distributed systems and presents solutions to integration and
efficient management challenges faced by current and future
distributed systems. Highlighting topics such as multimedia,
programming languages, and smart environments, this book is ideal
for system administrators, integrators, designers, developers,
researchers, and academicians.
Explore everything you need to know to set up secure remote access,
harden your firewall deployment, and protect against phishing Key
Features Learn the ins and outs of log forwarding and
troubleshooting issues Set up GlobalProtect satellite connections,
configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an
in-depth understanding of user credential detection to prevent data
leaks Book DescriptionThis book builds on the content found in
Mastering Palo Alto Networks, focusing on the different methods of
establishing remote connectivity, automating log actions, and
protecting against phishing attacks through user credential
detection. Complete with step-by-step instructions, practical
examples, and troubleshooting tips, you will gain a solid
understanding of how to configure and deploy Palo Alto Networks
remote access products. As you advance, you will learn how to
design, deploy, and troubleshoot large-scale end-to-end user VPNs.
Later, you will explore new features and discover how to
incorporate them into your environment. By the end of this Palo
Alto Networks book, you will have mastered the skills needed to
design and configure SASE-compliant remote connectivity and prevent
credential theft with credential detection. What you will learn
Understand how log forwarding is configured on the firewall Focus
on effectively enabling remote access Explore alternative ways for
connecting users and remote networks Protect against phishing with
credential detection Understand how to troubleshoot complex issues
confidently Strengthen the security posture of your firewalls Who
this book is forThis book is for anyone who wants to learn more
about remote access for users and remote locations by using
GlobalProtect and Prisma access and by deploying Large Scale VPN.
Basic knowledge of Palo Alto Networks, network protocols, and
network design will be helpful, which is why reading Mastering Palo
Alto Networks is recommended first to help you make the most of
this book.
Harden your business against internal and external cybersecurity
threats with a single accessible resource. In 8 Steps to Better
Security: A Simple Cyber Resilience Guide for Business,
cybersecurity researcher and writer Kim Crawley delivers a grounded
and practical roadmap to cyber resilience in any organization.
Offering you the lessons she learned while working for major tech
companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and
Venafi, Crawley condenses the essence of business cybersecurity
into eight steps. Written to be accessible to non-technical
businesspeople as well as security professionals, and with insights
from other security industry leaders, this important book will walk
you through how to: Foster a strong security culture that extends
from the custodial team to the C-suite Build an effective security
team, regardless of the size or nature of your business Comply with
regulatory requirements, including general data privacy rules and
industry-specific legislation Test your cybersecurity, including
third-party penetration testing and internal red team specialists
Perfect for CISOs, security leaders, non-technical businesspeople,
and managers at any level, 8 Steps to Better Security is also a
must-have resource for companies of all sizes, and in all
industries.
Nowadays it is impossible to imagine a business without technology
as most industries are becoming ""smarter"" and more tech-driven,
ranging from small individual tech initiatives to complete business
models with intertwined supply chains and ""platform""-based
business models. New ways of working, such as agile and DevOps,
have been introduced, leading to new risks. These risks come in the
form of new challenges for teams working together in a distributed
manner, privacy concerns, human autonomy, and cybersecurity
concerns. Technology is now integrated into the business discipline
and is here to stay leading to the need for a thorough
understanding of how to address these risks and all the potential
problems that could arise. With the advent of organized crime, such
as hacks and denial-of-service attacks, all kinds of malicious
actors are infiltrating the digital society in new and unique ways.
Systems with poor design, implementation, and configurations are
easily taken advantage of. When it comes to integrating business
and technology, there needs to be approaches for assuring security
against risks that can threaten both businesses and their digital
platforms. Strategic Approaches to Digital Platform Security
Assurance offers comprehensive design science research approaches
to extensively examine risks in digital platforms and offer
pragmatic solutions to these concerns and challenges. This book
addresses significant problems when transforming an organization
embracing API-based platform models, the use of DevOps teams, and
issues in technological architectures. Each section will examine
the status quo for business technologies, the current challenges,
and core success factors and approaches that have been used. This
book is ideal for security analysts, software engineers, computer
engineers, executives, managers, IT consultants, business
professionals, researchers, academicians, and students who want to
gain insight and deeper knowledge of security in digital platforms
and gain insight into the most important success factors and
approaches utilized by businesses.
In Online Predators, An Internet Insurgency: A Field Manual for
Teaching and Parenting in the Digital Arena Jeffrey A. Lee brings
his ten plus years' experience in the fight against online child
exploitation to bear in an easy to follow guide for all with a
stake in the life of a child. This book equips parents, guardians,
extended family, and educational professionals with practical
strategies to help keep kids safe in a technology connected world.
Instead of focusing on ever changing technology, Lee proposes a key
fundamental change in the fight against online predation-to develop
an insatiable curiosity about their child's online life, then get
in the front lines and stay there.
More individuals than ever are utilizing internet technologies to
work from home, teach and learn, shop, interact with peers, review
medical records, and more. While it is certainly convenient to
conduct such tasks via the internet, this increased internet
presence has also led to a rise in the search and availability of
personal information, which in turn is resulting in more
cyber-attacks, privacy breaches, and information leaks. Cyber
criminals are using such opportunities to attack governments,
organizations, and individuals, making it necessary to anticipate,
assess, and mitigate privacy and security threats during this
infodemic. The Handbook of Research on Technical, Privacy, and
Security Challenges in a Modern World discusses the design and
development of different machine learning systems, including next
generation applications, in order to mitigate cyber-attacks and
address security challenges in everyday technologies. It further
explores select methods and algorithms of learning for implementing
better security methods in fields such as business and healthcare.
It recognizes the future of privacy and the importance of
preserving data through recommended practice, feedback loops, and
smart agents. Covering topics such as face mask detection, gesture
recognition, and botnet attacks and detection, this major reference
work is a dynamic resource for medical professionals, healthcare
administrators, government officials, business executives and
managers, IT managers, students and faculty of higher education,
librarians, researchers, and academicians.
|
|