![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.
As new technology continues to emerge, the training and education of learning new skills and strategies become important for professional development. Therefore, technology leadership plays a vital role for the use of technology in organizations by providing guidance in the many aspects of using technologies. Technology Integration and Foundations for Effective Leadership provides detailed information on the aspects of effective technology leadership, highlighting instructions on creating a technology plan as well as the successful integration of technology into the educational environment. This reference source aims to offer a sense of structure and basic information on designing, developing, and evaluating technology projects to ensure maximum success.
This is the only book that will teach system administrators how to
configure, deploy, and troubleshoot Symantec Enterprise Edition in
an enterprise network. The book will reflect Symantec's philosophy
of "Centralized Antivirus Management." For the same reasons that
Symantec bundled together these previously separate products, the
book will provide system administrators with a holistic approach to
defending their networks from malicious viruses. This book will
also serve as a Study Guide for those pursuing Symantec Product
Specialist Certifications.
This third volume of the Wireless Public Safety Networks series explores new tendencies in the Public Safety Networks (PSNs) field, highlighting real-use cases and applications that can be used by practitioners to help victims in the case of danger. Wireless Public Safety Networks 3: Applications and Uses explores, from the communication point of view, how teams can interact with and use new technologies and tools. These technologies can have a huge impact in the field of disaster management and greatly improve the efficiency of teams handling emergency situations. This volume of the series covers themes as varied as emergency alert systems, the organization of aerial platforms and the use of smartphones to detect earthquakes and to help in the resolution of kidnappings.
This volume is focused on the emerging concept of Collaborative Innovation Networks (COINs). COINs are at the core of collaborative knowledge networks, distributed communities taking advantage of the wide connectivity and the support of communication technologies, spanning beyond the organizational perimeter of companies on a global scale. It includes the refereed conference papers from the 6th International Conference on COINs, June 8-11, 2016, in Rome, Italy. It includes papers for both application areas of COINs, (1) optimizing organizational creativity and performance, and (2) discovering and predicting new trends by identifying COINs on the Web through online social media analysis. Papers at COINs16 combine a wide range of interdisciplinary fields such as social network analysis, group dynamics, design and visualization, information systems and the psychology and sociality of collaboration, and intercultural analysis through the lens of online social media. They will cover most recent advances in areas from leadership and collaboration, trend prediction and data mining, to social competence and Internet communication.
This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits.
This book is aimed squarely at the Independent Software Vendor (ISV) who is considering Force.com as a route to market their software offerings. Alternatively you could be part of a corporate IT department looking to deliver solutions more quickly for your business users. You have many of the same issues as the ISV, but from a slightly different perspective. This book is intended to be a catalyst for action aimed at a range of people inside and outside your organization
Advanced Topics in End User Computing is a series of books, which feature the latest research findings dealing with end user computing concepts, issues, and trends. Empirical and theoretical research concerned with all aspects of end user computing including development, utilization, and management are included. Advanced Topics in End User Computing, Volume 4 is a part of this series. Advanced Topics in End User Computing, Volume 4 is divided into three segments which cover such important topics as: organizational and end user computing issues, trends, and successes, collaborative technologies and implementation issues, and e-commerce processes and practices. This scholarly book is a collection which brings a wealth of end user computing information to one accessible location.
Telecommunications Present Status & Future
The tools of crime constantly evolve, and law enforcement and forensic investigators must understand advanced forensic techniques to ensure that the most complete evidence is brought to trial. Paramount also the need for investigators to ensure that evidence adheres to the boundaries of the legal system, a place where policy often lags behind new innovations. Crime Prevention Technologies and Applications for Advancing Criminal Investigation addresses the use of electronic devices and software for crime prevention, investigation, and the application of a broad spectrum of sciences to answer questions of interest to the legal system. This book fosters a forum for advancing research and development of the theory and practice of digital crime prevention and forensics.
Offers an understanding of the applications and supporting technologies associated with digital video communications. The text also shows how to provide reliable, flexible and robust video transmission over networks. It begins with a discussion of the new and emerging applications of digital video communications including tele-medicine, videoconferencing and distance learning, and introduces the key systems required to support digital video: the Internet, ATM networks and Broadband ISDN. It also explores near future developments to the Internet that will support real-time video traffic.
Energy Management in Wireless Sensor Networks discusses this unavoidable issue in the application of Wireless Sensor Networks (WSN). To guarantee efficiency and durability in a network, the science must go beyond hardware solutions and seek alternative software solutions that allow for better data control from the source to delivery. Data transfer must obey different routing protocols, depending on the application type and network architecture. The correct protocol should allow for fluid information flow, as well as optimizing power consumption and resources - a challenge faced by dense networks. The topics covered in this book provide answers to these needs by introducing and exploring computer-based tools and protocol strategies for low power consumption and the implementation of routing mechanisms which include several levels of intervention, ranging from deployment to network operation.
This book provides a comprehensive survey of state-of-the-art techniques for the security of critical infrastructures, addressing both logical and physical aspects from an engineering point of view. Recently developed methodologies and tools for CI analysis as well as strategies and technologies for CI protection are investigated in the following strongly interrelated and multidisciplinary main fields: - Vulnerability analysis and risk assessment - Threat prevention, detection and response - Emergency planning and management Each of the aforementioned topics is addressed considering both theoretical aspects and practical applications. Emphasis is given to model-based holistic evaluation approaches as well as to emerging protection technologies, including smart surveillance through networks of intelligent sensing devices. Critical Infrastructure Security can be used as a self-contained reference handbook for both practitioners and researchers or even as a textbook for master/doctoral degree students in engineering or related disciplines.More specifically, the topic coverage of the book includes: - Historical background on threats to critical infrastructures - Model-based risk evaluation and management approaches - Security surveys and game-theoretic vulnerability assessment - Federated simulation for interdependency analysis - Security operator training and emergency preparedness - Intelligent multimedia (audio-video) surveillance - Terahertz body scanners for weapon and explosive detection - Security system design (intrusion detection / access control) - Dependability and resilience of computer networks (SCADA / cyber-security) - Wireless smart-sensor networks and structural health monitoring - Information systems for crisis response and emergency management - Early warning, situation awareness and decision support software
The fields of Big Data and the Internet of Things (IoT) have seen tremendous advances, developments, and growth in recent years. The IoT is the inter-networking of connected smart devices, buildings, vehicles and other items which are embedded with electronics, software, sensors and actuators, and network connectivity that enable these objects to collect and exchange data. The IoT produces a lot of data. Big data describes very large and complex data sets that traditional data processing application software is inadequate to deal with, and the use of analytical methods to extract value from data. This edited book covers analytical techniques for handling the huge amount of data generated by the Internet of Things, from architectures and platforms to security and privacy issues, applications, and challenges as well as future directions.
Technology in the world today impacts every aspect of society and has infiltrated every industry, affecting communication, management, security, etc. With the emergence of such technologies as IoT, big data, cloud computing, AI, and virtual reality, organizations have had to adjust the way they conduct business to account for changing consumer behaviors and increasing data protection awareness. The Handbook of Research on Social and Organizational Dynamics in the Digital Era provides relevant theoretical frameworks and the latest empirical research findings on all aspects of social issues impacted by information technology in organizations and inter-organizational structures and presents the conceptualization of specific social issues and their associated constructs. Featuring coverage on a broad range of topics such as business management, knowledge management, and consumer behavior, this publication seeks to advance the practice and understanding of technology and the impacts of technology on social behaviors and norms in the workplace and society. It is intended for business professionals, executives, IT practitioners, policymakers, students, and researchers.
Includes a preface written by Professor Leonard Kleinrock, Distinguished Professor of Computer Science, "UCLA, USA" This book discusses and explores the concept of "mobile cloud," creating an inspiring research space for exploiting opportunistic resource sharing, and covering from theoretical research approaches to the development of commercially profitable ideas. A "mobile cloud "is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The book explores how distributed resources can be shared by mobile users in very different ways and for various purposes. The book provides many stimulating examples of resource-sharing applications. Enabling technologies for "mobile clouds "are also discussed, highlighting the key role of network coding. "Mobile clouds "have the potential to enhance communications performance, improve utilization of resources and create flexible platforms to share resources in very novel ways. Energy efficient aspects of "mobile clouds "are discussed in detail, showing how being cooperative can bring mobile users significant energy saving. The book presents and discusses multiple examples of "mobile" "clouds "applications, based on both existing commercial initiatives as well as proof-of-concept test-beds. Visions and prospects are also discussed, paving the way for further development. As mobile networks and social networks become more and more reliant on each other, the concept of resource sharing takes a wider and deeper meaning, creating the foundations for a global real-time multidimensional resource pool, the underlying infrastructure for shareconomy. Above all, this is an inspiring book for anyone who is concerned about the future of wireless and mobile communications networks and their relationship with Social networks. Key Features: Provides fundamental ideas and promising concepts for exploiting opportunistic cooperation and cognition in wireless and mobile networksGives clear definitions of "mobile clouds "from different perspectivesAssociates mobile and wireless networks with social networks, creating a vast fertile ground for novel developments in both research and practical applicationsConsiders research directions, emerging trends and visions This book is an excellent resource for wireless/networking researchers in industry and academia, students and mobile phone programmers. Managers interested in new technology developments, service providers, network operators, and those working in the gaming industry will also find the book insightful.
Prepare for the next generation of the internet with this in-depth,
developer's guide to the .Net framework that utilizes XML to
achieve greater flexibility of information and increased
interoperability.
This book focuses on database law (a branch of intellectual property law) and further explores the legal protection currently available for data and data-related products in India. It offers a comparative study of the position of copyright law in protecting databases in the US and EU, while also presenting responses from the Indian database industry and its aspirations regarding the role of copyright law in database protection. India is undoubtedly leading the way as a knowledge economy. Its strengths are its information technology capability and its knowledge society, as well as its booming database industry - aspects that also necessitate the study of the role of law, as well as the protection of data and databases, in India. This book examines the growing importance of copyright law for protecting databases as well as for ensuring access in information societies. The book concludes with a discussion of key principles to be kept in mind in the context of drafting legal regimes for databases in India that will both benefit the database industry and ensure accessibility.
Designing for Networked Communications: Strategies and Development explains how to plan, use, and understand the products and the dynamic social processes and tasks some of the most vital innovations in the knowledge society depend upon social as well as technological. Focusing on various forms of design, implementation and integration of computer mediated communication, this book bridges the academic fields of computer science and communication studies. Designing for Networked Communications: Strategies and Development uses an interdisciplinary approach, and presents results from recent and important research in a variety of forms for networked communications. A constructive and critical view of the interplay between the new electronic and the more conventional modes of communication are utilized, while studies of organizational work practices demonstrate that the use of new technologies and media is best understood and integrated into work practices. In this process of merging, both are remodelled and rearranged while being adapted to the practices and activities for which they were designed. |
You may like...
VLSI-Design of Non-Volatile Memories
Giovanni Campardo, Rino Micheloni, …
Hardcover
R6,151
Discovery Miles 61 510
Safety Management In The Workplace
Francois van Loggerenberg
Paperback
(1)
|