Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking
Technology in the world today impacts every aspect of society and has infiltrated every industry, affecting communication, management, security, etc. With the emergence of such technologies as IoT, big data, cloud computing, AI, and virtual reality, organizations have had to adjust the way they conduct business to account for changing consumer behaviors and increasing data protection awareness. The Handbook of Research on Social and Organizational Dynamics in the Digital Era provides relevant theoretical frameworks and the latest empirical research findings on all aspects of social issues impacted by information technology in organizations and inter-organizational structures and presents the conceptualization of specific social issues and their associated constructs. Featuring coverage on a broad range of topics such as business management, knowledge management, and consumer behavior, this publication seeks to advance the practice and understanding of technology and the impacts of technology on social behaviors and norms in the workplace and society. It is intended for business professionals, executives, IT practitioners, policymakers, students, and researchers.
Move beyond the checklist and fully protect yourself from third-party cybersecurity risk Over the last decade, there have been hundreds of big-name organizations in every sector that have experienced a public breach due to a vendor. While the media tends to focus on high-profile breaches like those that hit Target in 2013 and Equifax in 2017, 2020 has ushered in a huge wave of cybersecurity attacks, a near 800% increase in cyberattack activity as millions of workers shifted to working remotely in the wake of a global pandemic. The 2020 SolarWinds supply-chain attack illustrates that lasting impact of this dramatic increase in cyberattacks. Using a technique known as Advanced Persistent Threat (APT), a sophisticated hacker leveraged APT to steal information from multiple organizations from Microsoft to the Department of Homeland Security not by attacking targets directly, but by attacking a trusted partner or vendor. In addition to exposing third-party risk vulnerabilities for other hackers to exploit, the damage from this one attack alone will continue for years, and there are no signs that cyber breaches are slowing. Cybersecurity and Third-Party Risk delivers proven, active, and predictive risk reduction strategies and tactics designed to keep you and your organization safe. Cybersecurity and IT expert and author Gregory Rasner shows you how to transform third-party risk from an exercise in checklist completion to a proactive and effective process of risk mitigation. Understand the basics of third-party risk management Conduct due diligence on third parties connected to your network Keep your data and sensitive information current and reliable Incorporate third-party data requirements for offshoring, fourth-party hosting, and data security arrangements into your vendor contracts Learn valuable lessons from devasting breaches suffered by other companies like Home Depot, GM, and Equifax The time to talk cybersecurity with your data partners is now. Cybersecurity and Third-Party Risk is a must-read resource for business leaders and security professionals looking for a practical roadmap to avoiding the massive reputational and financial losses that come with third-party security breaches.
This book deals with computer performance by addressing basic preconditions. Besides general considerations about performance, several new approaches are presented. One of them targets memory structures by introducing the possibility of overlapping non-interfering (virtual) address spaces. This approach is based on a newly developed jump transformation between different symbol spaces. Another approach deals with efficiency and accuracy in scientific calculations. Finally the concept of a Neural Relational Data Base Management System is introduced and the performance potential of quantum computers assessed.
The aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional Diffie-Hellman, learning with errors, and many more. In this work, based on the 2013 ACM Doctoral Dissertation Award-winning thesis, we put forth new plausible lattice-based constructions with properties that approximate the sought after multilinear maps. The multilinear analog of the decision Diffie-Hellman problem appears to be hard in our construction, and this allows for their use in cryptography. These constructions open doors to providing solutions to a number of important open problems.
Offers an understanding of the applications and supporting technologies associated with digital video communications. The text also shows how to provide reliable, flexible and robust video transmission over networks. It begins with a discussion of the new and emerging applications of digital video communications including tele-medicine, videoconferencing and distance learning, and introduces the key systems required to support digital video: the Internet, ATM networks and Broadband ISDN. It also explores near future developments to the Internet that will support real-time video traffic.
With its cost efficiency, enabling of collaboration and sharing of resources, and its ability to improve access, cloud computing is likely to play a big role in the classrooms of tomorrow. Cloud Computing for Teaching and Learning: Strategies for Design and Implementation provides the latest information about cloud development and cloud applications in teaching and learning. The book alsos include empirical research findings in these areas for professionals and researchers working in the field of e-learning who want to implement teaching and learning with cloud computing, as well as provide insights and support to executives concerned with cloud development and cloud applications in e-learning communities and environments.
Advanced Topics in End User Computing is a series of books, which feature the latest research findings dealing with end user computing concepts, issues, and trends. Empirical and theoretical research concerned with all aspects of end user computing including development, utilization, and management are included. Advanced Topics in End User Computing, Volume 4 is a part of this series. Advanced Topics in End User Computing, Volume 4 is divided into three segments which cover such important topics as: organizational and end user computing issues, trends, and successes, collaborative technologies and implementation issues, and e-commerce processes and practices. This scholarly book is a collection which brings a wealth of end user computing information to one accessible location.
Designing for Networked Communications: Strategies and Development explains how to plan, use, and understand the products and the dynamic social processes and tasks some of the most vital innovations in the knowledge society depend upon social as well as technological. Focusing on various forms of design, implementation and integration of computer mediated communication, this book bridges the academic fields of computer science and communication studies. Designing for Networked Communications: Strategies and Development uses an interdisciplinary approach, and presents results from recent and important research in a variety of forms for networked communications. A constructive and critical view of the interplay between the new electronic and the more conventional modes of communication are utilized, while studies of organizational work practices demonstrate that the use of new technologies and media is best understood and integrated into work practices. In this process of merging, both are remodelled and rearranged while being adapted to the practices and activities for which they were designed.
The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25-27, 2016. The book is organized in to two volumes and primarily focuses on theory and applications in the broad areas of communication technology, computer science and information security. The book aims to bring together the latest scientific research works of academic scientists, professors, research scholars and students in the areas of signal, networks, computing and systems detailing the practical challenges encountered and the solutions adopted.
Information systems belong to the most complex artifacts built in today's society. Developing, maintaining, and using an information system raises a large number of difficult problems, ranging from purely technical to organizational and social. ""Information Systems Engineering"" presents the most current research on existing and emergent trends on conceptual modeling and information systems engineering, bridging the gap between research and practice by providing a much-needed reference point on the design of software systems that evolve seamlessly to adapt to rapidly changing business and organizational practices.
This book systematically summarizes the fundamentals and various technologies in both terrestrial radio wireless networks and underwater acoustic networks (UWANs). It addresses the basic issues frequently investigated in terrestrial radio wireless networks and the key technologies suitable for the newly developing research area of UWANs. Starting with a review of our current understanding of wireless networks, it then introduces the principles of the main technologies, including error control, medium access control (MAC) protocols, routing protocols, end-to-end transmission control and mobility issues as well as network security for terrestrial radio wireless networks, and offers detailed surveys of these technologies for UWANs. Providing readers with the basic knowledge of terrestrial radio wireless networking technologies and raising readers' awareness of the developing topic of UWANs in ocean , it is a valuable resource for researchers and practitioners in terrestrial radio wireless networks and UWANs.
This is the first book to explore how Semantic Web technologies (SWTs) can be used to create intelligent engineering applications (IEAs). Technology-specific chapters reflect the state of the art in relevant SWTs and offer guidelines on how they can be applied in multi-disciplinary engineering settings characteristic of engineering production systems. In addition, a selection of case studies from various engineering domains demonstrate how SWTs can be used to create IEAs that enable, for example, defect detection or constraint checking. Part I "Background and Requirements of Industrie 4.0 for Semantic Web Solutions" provides the background information needed to understand the book and addresses questions concerning the semantic challenges and requirements of Industrie 4.0, and which key SWT capabilities may be suitable for implementing engineering applications. In turn, Part II "Semantic Web-Enabled Data Integration in Multi-Disciplinary Engineering" focuses on how SWTs can be used for data integration in heterogeneous, multi-disciplinary engineering settings typically encountered in the creation of flexible production systems. Part III "Creating Intelligent Applications for Multi-Disciplinary Engineering" demonstrates how the integrated engineering data can be used to support the creation of IEAs, while Part IV "Related and Emerging Trends in the Use of Semantic Web in Engineering" presents an overview of the broader spectrum of approaches that make use of SWTs to support engineering settings. A final chapter then rounds out the book with an assessment of the strengths, weaknesses and compatibilities of SWTs and an outlook on future opportunities for applying SWTs to create IEAs in flexible industrial production systems. This book seeks to build a bridge between two communities: industrial production on one hand and Semantic Web on the other. Accordingly, stakeholders from both communities should find this book useful in their work. Semantic Web researchers will gain a better understanding of the challenges and requirements of the industrial production domain, offering them guidance in the development of new technologies and solutions for this important application area. In turn, engineers and managers from engineering domains will arrive at a firmer grasp of the benefits and limitations of using SWTs, helping them to select and adopt appropriate SWTs more effectively. In addition, researchers and students interested in industrial production-related issues will gain valuable insights into how and to what extent SWTs can help to address those issues.
The set of papers in this handbook reflect the varied theory and wide range of applications of network models. Two of the most vibrant applications areas of network models are telecommunications and transportation. Several chapters explicitly model issues arising in these problem domains. Research on network models has been closely aligned with the field of computer science both in developing data structures for efficiently implementing network algorithms and in analyzing the complexity of network problems and algorithms. The basic structure underlying all network problems is a graph. Thus, historically, there have been strong ties between network models and graph theory. A companion volume in the "Handbook" series, entitled "Network Routing", examines problems related to the movement of commodities over a network. The problems treated arise in several application areas including logistics, telecommunications, facility location, VLSI design, and economics.
This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications' algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.
This book introduces higher-degree research students and early career academics to scientific research as occurring in the field of information systems and adjacent fields, such as computer science, management science, organization science, and software engineering. Instead of focusing primarily on research methods as many other textbooks do, it covers the entire research process, from start to finish, placing particular emphasis on understanding the cognitive and behavioural aspects of research, such as motivation, modes of inquiry, theorising, planning for research, planning for publication, and ethical challenges in research. Comprehensive but also succinct and compact, the book guides beginning researchers in their quest to do scholarly work and to assist them in developing their own answers and strategies over the course of their work. Jan Recker explains in this book the fundamental concepts that govern scientific research and then moves on to introduce the basic steps every researcher undertakes: choosing research questions, developing theory, building a research design, employing research methods, and finally writing academic papers. He also covers essentials of ethical conduct of scientific research. This second edition contains major updates on all these elements plus significant expansions on relevant research methods such as design research and computational methods, a rewritten and extended chapter on theory development, and expansions to the chapters on research methods, scientific publishing, and research ethics. A companion website provides pedagogical materials and instructions for using this book in teaching.
This book discusses harnessing the real power of cloud computing in optimization problems, presenting state-of-the-art computing paradigms, advances in applications, and challenges concerning both the theories and applications of cloud computing in optimization with a focus on diverse fields like the Internet of Things, fog-assisted cloud computing, and big data. In real life, many problems - ranging from social science to engineering sciences - can be identified as complex optimization problems. Very often these are intractable, and as a result researchers from industry as well as the academic community are concentrating their efforts on developing methods of addressing them. Further, the cloud computing paradigm plays a vital role in many areas of interest, like resource allocation, scheduling, energy management, virtualization, and security, and these areas are intertwined with many optimization problems. Using illustrations and figures, this book offers students and researchers a clear overview of the concepts and practices of cloud computing and its use in numerous complex optimization problems.
This book introduces novel solutions to the rendezvous problem in distributed systems, a fundamental problem that underpins the construction of many important functions in distributed systems and networks. The book covers rendezvous theories, distributed rendezvous algorithms, and rendezvous applications in practical systems, presents state-of-the-art rendezvous results and highlights the latest methods of rendezvous in distributed systems. It provides in particular an in-depth treatment of the blind rendezvous and oblivious blind rendezvous problems and their solutions. Further, it sheds new light on rendezvous applications in cognitive radio networks and rendezvous search in graphs. As such, it will also be of interest to readers from other research fields such as robotics, wireless sensor networks, and game theory.
The updated book presents Matlab illustrations on various digital signal processing (DSP) techniques such as random process, time varying wireless system model, and detection and estimation theory used in wireless communication. The book also covers recent wireless techniques like OFDM, massive MIMO techniques, non-orthogonal multiple access, millimeter wave MIMO, full duplex, cognitive radio, co-operating communication, unmanned aerial vehicles etc. This book is suitable for those who are doing basic and applied research in digital signal processing for wireless communication.
Throughout history, the permeation of new technologies have assisted communities in their aim to collectively work together in addressing shared problems for the attainment of specific goals and outcomes. Social Capital Modeling in Virtual Communities: Bayesian Belief Network Approaches broadly examines what constitutes social capital in geographical communities and offers an in-depth description of its potential in virtual communities. Providing the latest findings for advanced undergraduate and graduate students as well as researchers and academicians involved with virtual communities and social capital, this book draws upon insights from interdisciplinary fields such as artificial intelligence, human computer interaction, educational technology, and economics and sociology.
This book covers all the relevant dictionary learning algorithms, presenting them in full detail and showing their distinct characteristics while also revealing the similarities. It gives implementation tricks that are often ignored but that are crucial for a successful program. Besides MOD, K-SVD, and other standard algorithms, it provides the significant dictionary learning problem variations, such as regularization, incoherence enforcing, finding an economical size, or learning adapted to specific problems like classification. Several types of dictionary structures are treated, including shift invariant; orthogonal blocks or factored dictionaries; and separable dictionaries for multidimensional signals. Nonlinear extensions such as kernel dictionary learning can also be found in the book. The discussion of all these dictionary types and algorithms is enriched with a thorough numerical comparison on several classic problems, thus showing the strengths and weaknesses of each algorithm. A few selected applications, related to classification, denoising and compression, complete the view on the capabilities of the presented dictionary learning algorithms. The book is accompanied by code for all algorithms and for reproducing most tables and figures. Presents all relevant dictionary learning algorithms - for the standard problem and its main variations - in detail and ready for implementation; Covers all dictionary structures that are meaningful in applications; Examines the numerical properties of the algorithms and shows how to choose the appropriate dictionary learning algorithm.
The second edition of this highly successful text focuses on the
major changes that have taken place in this field in recent times.
Data Acquisition Techniques Using PCs, Second Edition, recognises
that data acquisition is the core of most engineering and many life
science systems in measurement and instrumentation. It will prove
invaluable to scientists, engineers, students and technicians
wishing to keep up with the latest technological developments.
This introductory textbook is designed for a one-semester course on the use of the matrix and analytical methods for the performance analysis of telecommunication systems. It provides an introduction to the modelling and analysis of telecommunication systems for a broad interdisciplinary audience of students in mathematics and applied disciplines such as computer science, electronics engineering, and operations research.
This book contains refereed papers from the 13th International Conference on GeoComputation held at the University of Texas, Dallas, May 20-23, 2015. Since 1996, the members of the GeoComputation (the art and science of solving complex spatial problems with computers) community have joined together to develop a series of conferences in the United Kingdom, New Zealand, Australia, Ireland and the United States of America. The conference encourages diverse topics related to novel methodologies and technologies to enrich the future development of GeoComputation research. |
You may like...
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, …
Hardcover
R1,276
Discovery Miles 12 760
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl
Hardcover
R9,808
Discovery Miles 98 080
CCNA 200-301 Network Simulator
Sean Wilkins
Digital product license key
R4,838
Discovery Miles 48 380
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R996
Discovery Miles 9 960
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl
Paperback
|