![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
Knowledge management innovations provide essential pathways through which teachers, researchers, students, and knowledge management professionals who are interested in understanding and applying knowledge management theory and practice can transfer their insights and experiences into both organizational and educational settings. Knowledge Management Innovations for Interdisciplinary Education: Organizational Applications is a detailed resource on knowledge management and innovations that has been written and edited to provide flexibility and in-depth knowledge management innovations, strategies, and practices. The combination of a primary emphasis on theory and practice with applications to interdisciplinary education, as well as organizational environments, makes this book unique among the burgeoning literature on knowledge management.
This book contains extended and revised versions of the best papers presented at the 27th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2019, held in Cusco, Peru, in October 2019. The 15 full papers included in this volume were carefully reviewed and selected from the 28 papers (out of 82 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like heterogeneous, neuromorphic and brain-inspired, biologically-inspired, approximate computing systems.
Popular among online shoppers, comparison-shopping provides a new sales channel for small to medium enterprises to contend with brand name vendors. ""Comparison-Shopping Services and Agent Designs"" provides a collection of comprehensive research articles on the latest technologies involved with online consumer services. This ""Premier Reference Source"" provides e-commerce and agent technology researchers, academicians, and practitioners with a useful overview as well as references to the latest advancements in the field.
This book examines the use of social network analysis (SNA) in operational environments from the perspective of those who actually apply it. A rapidly growing body of literature suggests that SNA can reveal significant insights into the overall structure of criminal networks as well as the position of critical actors within such groups. This book draws on the existing SNA and intelligence literature, as well as qualitative interviews with crime intelligence analysts from two Australian state law enforcement agencies to understand its use by law enforcement agencies and the extent to which it can be used in practice. It includes a discussion of the challenges that analysts face when attempting to apply various network analysis techniques to criminal networks. Overall, it advances SNA as an investigative tool, and provides a significant contribution to the field that will be of interest to both researchers and practitioners interested in social network analysis, intelligence analysis and law enforcement.
The book introduces the concept of cloud manufacturing and describes the cloud service technology system behind it. The authors discuss key technologies of manufacturing cloud service management, including service construction, evaluation and composition, and scheduling. With abundant case studies, the book is an essential reference for researchers and engineers in manufacturing and information management.
Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. ""Web and Information Security"" is valuable as a reference book for senior undergraduate or graduate courses in information security which have special focuses on Web security. It is also useful for technologists, researchers, managers and developers who want to know more about emerging security technologies.
This book presents the proceedings of the 3rd International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2020), sponsored by Ryerson University, Toronto, Canada, May 6-8, 2020. The WIDECOM conference solicits papers addressing issues related to new dependability paradigms, design, and performance of dependable network computing and mobile systems, as well as issues related to the security of these systems. The goal of the conference is to provide a forum for researchers, students, scientists and engineers working in academia and industry to share their experiences, new ideas and research results in the above-mentioned areas. Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2020), Ryerson University, Toronto, Canada, May 6-8, 2020; Includes an array of topics networking computing, mobile/ubiquitous systems, cloud systems, and IoT systems; Addresses issues related to protecting information security and establishing trust in the digital space.
Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.
This major work on knowledge representation is based on the writings of Charles S. Peirce, a logician, scientist, and philosopher of the first rank at the beginning of the 20th century. This book follows Peirce's practical guidelines and universal categories in a structured approach to knowledge representation that captures differences in events, entities, relations, attributes, types, and concepts. Besides the ability to capture meaning and context, the Peircean approach is also well-suited to machine learning and knowledge-based artificial intelligence. Peirce is a founder of pragmatism, the uniquely American philosophy. Knowledge representation is shorthand for how to represent human symbolic information and knowledge to computers to solve complex questions. KR applications range from semantic technologies and knowledge management and machine learning to information integration, data interoperability, and natural language understanding. Knowledge representation is an essential foundation for knowledge-based AI. This book is structured into five parts. The first and last parts are bookends that first set the context and background and conclude with practical applications. The three main parts that are the meat of the approach first address the terminologies and grammar of knowledge representation, then building blocks for KR systems, and then design, build, test, and best practices in putting a system together. Throughout, the book refers to and leverages the open source KBpedia knowledge graph and its public knowledge bases, including Wikipedia and Wikidata. KBpedia is a ready baseline for users to bridge from and expand for their own domain needs and applications. It is built from the ground up to reflect Peircean principles. This book is one of timeless, practical guidelines for how to think about KR and to design knowledge management (KM) systems. The book is grounded bedrock for enterprise information and knowledge managers who are contemplating a new knowledge initiative. This book is an essential addition to theory and practice for KR and semantic technology and AI researchers and practitioners, who will benefit from Peirce's profound understanding of meaning and context.
MPLS-enabled networks are enjoying tremendous growth, but practical
information on managing MPLS-enabled networks has remained hard to
find. Until now.
The second generation of cloud computing systems, known as domain-specific clouds, are emerging based on application-specific processors and serverless computing paradigm. As multimedia streaming services are increasingly growing in popularity and diversity, this book is authored to introduce "multimedia clouds" as a domain-specific cloud that operates in the intersection of cloud computing technologies and digital media streaming. The book concentrates on the architectural aspects of multimedia clouds and describes development of high-level abstractions that will mitigate the burden of programmers, cloud architects, and system administrators. Multimedia clouds not only democratize multimedia streaming and add flexibility to the streaming services, they also help stream providers to offer robust and reliable streaming services in a cost- and energy-efficient manner.
The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.
This book is a compilation of selected papers from the fifth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in November 2020 in Beijing, China. The purpose of this symposium is to discuss Inspection, test, certification and research for the software and hardware of Instrument and Control (I&C) systems in nuclear power plants (NPP), such as sensors, actuators and control system. It aims to provide a platform of technical exchange and experience sharing for those broad masses of experts and scholars and nuclear power practitioners, and for the combination of production, teaching and research in universities and enterprises to promote the safe development of nuclear power plant. Readers will find a wealth of valuable insights into achieving safer and more efficient instrumentation and control systems.
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.
This book constructs a multidisciplinary approach to human security questions related to digitalisation in the European High North i.e. the northernmost areas of Scandinavia, Finland and North-Western Russia. It challenges the mainstream conceptualisation of cybersecurity and reconstructs it with the human being as the referent object of security.
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.
Fourth generation wireless networks are expected to provide comprehensive and secure IP-based solutions, facilitating existing and emerging services such as voice, data, streamed multimedia, sensory, e-health, and social networking. It is expected that 4G will be provided to users on an "Anytime, Anywhere" basis and at much higher data rates compared to the current and previous mobile generations. Fourth-Generation Wireless Networks: Applications and Innovations presents a vision for the coming years in terms of emerging fourth generation (4G) wireless technology trends and best practices. It explores the resulting challenges and technical opportunities that will arise in creating and delivering 4G networks for the emerging applications and services. This book also examines the fundamentals of advanced physical layer and radio resource management as the basis for cross layer and cross network optimization that will emerge for increased mobility and services in video, cloud computing virtualization, entertainment, education, health, and security. This book have been organized especially for researchers, students, network engineers and designers and leaders of emerging companies, decision makers in standards, consumers, and product developers.
This book is targeted towards cybersecurity professionals (especially those dealing with cloud security) or any stakeholders dealing with cybersecurity who want to understand the next level of security infrastructure using blockchain. The book's security and privacy analysis help with an understanding of the basics of blockchain, and it explores the quantifying impact of the new attack surfaces introduced by blockchain technologies and platforms. In addition, the book contains relevant and current updates on the topic. It follows a practical approach to help understand how blockchain technology is used to transform cybersecurity solutions.
Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.
This book presents the outcomes of the 17th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2018), which was held in Singapore on June 6-8, 2018. The aim of the conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science and to share their experiences, and to exchange new ideas and information in a meaningful way. The book includes findings on all aspects (theory, applications and tools) of computer and information science and discusses related practical challenges and the solutions adopted to solve them. The conference organizers selected the best papers from those accepted for presentation. The papers were chosen based on review scores submitted by members of the program committee and underwent a further rigorous round of review. From this second round, 13 of the conference's most promising papers were then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will make to the field of computer and information science.
This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.
This is the first book describing cable networks, services, and their management in greater detail by thirteen experts in various fields covering network architectures and services, operations, administration, maintenance, provisioning, troubleshooting (OAMPT) for residential services; network architectures, services, and OAMPT for business services; Software Defined Networks (SDN) and Virtualization concepts Comprehensive reference book useful for people working for a multiple systems operator Includes chapter introductions Written by 13 experts in various fields such as network services and soft defined networks
As cloud technology continues to advance and be utilized, many service providers have begun to employ multiple networks, or cloud federations; however, as the popularity of these federations increases, so does potential utilization challenges. Developing Interoperable and Federated Cloud Architecture provides valuable insight into current and emergent research occurring within the field of cloud infrastructures. Featuring barriers, recent developments, and practical applications on the interoperability issues of federated cloud architectures, this book is a focused reference for administrators, developers, and cloud users interested in energy awareness, scheduling, and federation policies and usage. |
![]() ![]() You may like...
Learn C on the Mac - For OS X and iOS
David Mark, James Bucanek
Paperback
Agent Technologies and Web Engineering…
Ghazi Alkhatib, David C. Rine
Hardcover
R5,351
Discovery Miles 53 510
Querying XML - XQuery, XPath, and…
Jim Melton, Stephen Buxton
Paperback
R1,568
Discovery Miles 15 680
AppleScript - The Comprehensive Guide to…
Hanaan Rosenthal
Paperback
|