![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
Next Generation Mobile Networks and Ubiquitous Computing provides a comprehensive and unified view of the latest and most innovative research findings for university professors, researchers, students, and industry professionals alike. Presenting chapters by experts from across the globe, this reference offers a single body of knowledge to show the many existing interactions between mobile networking, wireless communications, and ubiquitous computing.
"Network Convergence: Ethernet Applications and Next Generation Packet Transport Architectures" provides the guidance and solutions you'll need to understand Ethernet and emerging applications such as cloud computing and mobile apps, as well as large-scale retail and business deployments. This reference starts with an overview of the Ethernet and existing broadband architectures, including XDSL, WIMAX, and VLANs. It moves on to cover next-generation networks and mobile architectures, as well as cloud computing. The book also addresses the convergence of optical, Ethernet and IP/MPLS layers, considered to be the backbone of next-generation packet transport architecture. If you're a network designer or architect, a technical sales
professional, or if you're pursuing technical certifications, you
will benefit from "Network Convergence"'s fundamental information
on this rapidly evolving technology.
"Unified Communications Forensics: Anatomy of Common UC Attacks "is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures companion website http: //secvoip.comgiving readers access to
the most up-to-date information on UC attacks. Provides key information for hackers and pen testers on the most current Unified Communications implementations. The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment. Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics. "
This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner. This book includes three main sections. The first presents the idea of formally verifying the compliance of smart grid configurations with the security and resiliency guidelines. It provides a formal framework that verifies the compliance of the advanced metering infrastructure (AMI) configurations with the security and resiliency requirements, and generates remediation plans for potential security violations. The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids. The model identifies attack vectors that can compromise state estimation. This section also covers risk mitigation techniques that synthesize proactive security plans that make such attacks infeasible. The last part of the book discusses the dynamic security analysis for smart grids. It shows that AMI behavior can be modeled using event logs collected at smart collectors, which in turn can be verified using the specification invariants generated from the configurations of the AMI devices. Although the focus of this book is smart grid security and resiliency, the included formal analytics are generic enough to be extended to other cyber-physical systems, especially those related to industrial control systems (ICS). Therefore, industry professionals and academic researchers will find this book an exceptional resource to learn theoretical and practical aspects of applying formal methods for the protection of critical infrastructures.
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors' analysis forms the basis of a discussion on future technological directions and their potential impact on society. The book includes forewords by Professor Margaret Gardner AO, Vice-Chancellor and President of RMIT University, and by Professor Robyn Owens, Deputy Vice-Chancellor (Research) at the University of Western Australia. Security and the Networked Society provides a reference for professionals and industry analysts studying digital technologies. Advanced-level students in computer science and electrical engineering will also find this book useful as a thought-provoking resource.
This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. "FISMA Compliance Handbook Second Edition "explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment. Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. " FISMA Compliance Handbook Second Edition, "also includes all-new
coverage of federal cloud computing compliance from author Laura
Taylor, the federal government s technical lead for FedRAMP, the
government program used to assess and authorize cloud products and
services. Includes coverage for both corporate and government IT managers Learn how to prepare for, perform, and document FISMA compliance projects This book is used by various colleges and universities in information security and MBA curriculums. "
The primary" "goal of the" Information Protection Playbook" is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy. Using the guidelines provided in the "Information Protection Playbook," security and information technology (IT) managers will learn how to implement the five functions of an IP framework: governance, program planning, risk management, incident response management, and program administration. These functions are based on a model promoted by the Information Systems Audit and Control Association (ISACA) and validated by thousands of Certified Information Security Managers. The five functions are further broken down into a series of objectives or milestones to be achieved in order to implement an IP framework. The extensive appendices included at the end of the book make for an excellent resource for the security or IT manager building an IP program from the ground up. They include, for example, a board of directors presentation complete with sample slides; an IP policy document checklist; a risk prioritization procedure matrix, which illustrates how to classify a threat based on a scale of high, medium, and low; a facility management self-assessment questionnaire; and a list of representative job descriptions for roles in IP. The "Information Protection Playbook" is a part of Elsevier s
Security Executive Council Risk Management Portfolio, a collection
of real world solutions and "how-to" guidelines that equip
executives, practitioners, and educators with proven information
for successful security and risk management programs.
This book combines the three dimensions of technology, society and economy to explore the advent of today's cloud ecosystems as successors to older service ecosystems based on networks. Further, it describes the shifting of services to the cloud as a long-term trend that is still progressing rapidly.The book adopts a comprehensive perspective on the key success factors for the technology - compelling business models and ecosystems including private, public and national organizations. The authors explore the evolution of service ecosystems, describe the similarities and differences, and analyze the way they have created and changed industries. Lastly, based on the current status of cloud computing and related technologies like virtualization, the internet of things, fog computing, big data and analytics, cognitive computing and blockchain, the authors provide a revealing outlook on the possibilities of future technologies, the future of the internet, and the potential impacts on business and society.
DAPSY (Austrian-Hungarian Workshop on Distributed and Parallel Systems) is an international conference series with biannual events dedicated to all aspects of distributed and parallel computing. DAPSY started under a different name in 1992 (Sopron, Hungary) as regional meeting of Austrian and Hungarian researchers focusing on transputer-related parallel computing; a hot research topic of that time. A second workshop followed in 1994 (Budapest, Hungary). As transputers became history, the scope of the workshop widened to include parallel and distributed systems in general and the 1st DAPSYS in 1996 (Miskolc, Hungary) reflected the results of these changes. Distributed and Parallel Systems: Cluster and Grid Computing is an edited volume based on DAPSYS, 2004, the 5th Austrian-Hungarian Workshop on Distributed and Parallel Systems. The workshop was held in conjunction with EuroPVM/MPI-2004, Budapest, Hungary September 19-22, 2004.
Despite solid advances, numerous challenges have yet to be resolved by Web services-enabled service-oriented architecture systems. Web Services Security Development and Architecture: Theoretical and Practical Issues explores a global approach to methodical development in constructing safety architectures for online systems. Addressing security concerns during the full development lifecycle of Web services-based systems, this critical mass of the most sought after knowledge bridges the gap between practical and theoretical approaches in the field.
Information technology (IT) use has generally been regarded as a positive phenomenon which always generates desirable outcomes. Recent years, however, have witnessed increasing negative consequences resulted from IT use. Emerging issues include individual users have experienced technostress from personal social media usage as well as IT use in the workplace; and organisations have experienced a loss in productivity and assets due to employees' non-compliance with information security policies.Themes explored throughout the book include: AI and its Implications for Organisations Augmented Reality Cognitive Absorption of Technology Information Technology in Organisations and Societies: Multidisciplinary Perspectives from AI to Technostress represents a collective effort that not only consolidates studies on key issues and phenomena concerning the positive and negative aspects of IT use but also prescribes future research avenues in related research domains. It is particularly relevant to academics and researchers working on IT use research and can be used as a handy reference guide by those working in the field.
"Mastering Cloud Computing" is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won t live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the requirements of building apps for these virtual systems, including concurrent programming, high-performance computing, and data-intensive systems. The book introduces the principles of distributed and parallel
computing underlying cloud architectures and specifically focuses
on virtualization, thread programming, task programming, and
map-reduce programming. There are examples demonstrating all of
these and more, with exercises and labs throughout.
This book develops, evaluates and refines a cloud service relationship theory that explains how cloud users' uncertainties arise in these relationships and how they can be mitigated. To that end, the book employs principal-agent theory and the concepts of bounded rationality and social embeddedness. Beyond advancing IS research, the findings presented can greatly benefit governments, IT departments and IT providers, helping them to better understand cloud service relationships and to adjust their cloud service strategies accordingly.
The book presents a coherent description of distributed manufacturing, providing a solid base for further research on the subject as well as smart implementations in companies. It provides a guide for those researching and working in a range of fields, such as smart manufacturing, cloud computing, RFID tracking, distributed automation, cyber physical production and global design anywhere, manufacture anywhere solutions. Foundations & Principles of Distributed Manufacturing anticipates future advances in the fields of embedded systems, the Internet of Things and cyber physical systems, outlining how adopting these innovations could rapidly bring about improvements in key performance indicators, which could in turn generate competition pressure by rendering successful business models obsolete. In laying the groundwork for powerful theoretical models, high standards for the homogeneity and soundness of the suggested setups are applied. The book especially elaborates on the upcoming competition in online manufacturing operations and respective control procedures. By outlining encapsulation and evolving decision-making principles, Foundations & Principles of Distributed Manufacturing fully conceptualizes the view of manufacturing networks as sets of loosely coupled interacting smart factory objects. Moreover, the book provides concrete approaches to a number of future fields, where distributed manufacturing might be applied. Both researchers and professionals will profit from the authors' broad experience in Distributed Manufacturing and Fractal Enterprise implementations, where they initiated and completed a number of successful research projects: within the global Intelligent Manufacturing Systems (IMS) scheme, within the European Research Area frameworks as well as national contexts, and both in industry and at leading research institutions. This background ensures well-founded theory on one hand and valuable practical results on the other in a fascinating area that is still under intensive research. Readers will acquire essential insights as well as useful guidance for categorizing and specifying extended distributed manufacturing solutions and their professional implementations.
This book presents a comprehensive overview of wireless sensor networks (WSNs) with an emphasis on security, coverage, and localization. It offers a structural treatment of WSN building blocks including hardware and protocol architectures and also provides a systems-level view of how WSNs operate. These building blocks will allow readers to program specialized applications and conduct research in advanced topics. A brief introductory chapter covers common applications and communication protocols for WSNs. Next, the authors review basic mathematical models such as Voroni diagrams and Delaunay triangulations. Sensor principles, hardware structure, and medium access protocols are examined. Security challenges ranging from defense strategies to network robustness are explored, along with quality of service measures. Finally, this book discusses recent developments and future directions in WSN platforms. Each chapter concludes with classroom-tested exercises that reinforce key concepts. This book is suitable for researchers and for practitioners in industry. Advanced-level students in electrical engineering and computer science will also find the content helpful as a textbook or reference.
The Tactile Internet will change the landscape of communication by introducing a new paradigm that enables the remote delivery of haptic data. This book answers the many questions surrounding the Tactile Internet, including its reference architecture and adapted compression methods for conveying haptic information. It also describes the key enablers for deploying the applications of the Tactile Internet. As an antecedent technology, the IoT is tackled, explaining the differences and similarities between the Tactile Internet, the Internet of Things and the Internet of Everything. The essentials of teleoperation systems are summarized and the challenges that face this paradigm in its implementation and deployment are also discussed. Finally, a teleoperation case study demonstrating an application of the Tactile Internet is investigated to demonstrate its functionalities, architecture and performance.
This book addresses the fundamental theory and key technologies of narrowband and broadband mobile communication systems specifically for railways. It describes novel relaying schemes that meet the different design criteria for railways and discusses the applications of signal classification techniques as well as offline resource scheduling as a way of advancing rail practice. Further, it introduces Novel Long Term Evolution for Railway (LTE-R) network architecture, the Quality of Service (QoS) requirement of LTE-R and its performance evaluation and discusses in detail security technologies for rail-dedicated mobile communication systems. The advanced research findings presented in the book are all based on high-speed railway measurement data, which offer insights into the propagation mechanisms and corresponding modeling theory and approaches in unique railway scenarios.It is a valuable resource for researchers, engineers and graduate students in the fields of rail traffic systems, telecommunication and information systems.
These proceedings present the latest information on software reliability, industrial safety, cyber security, physical protection, testing and verification for nuclear power plants. The papers were selected from more than 80 submissions and presented at the First International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection for Nuclear Power Plants, held in Yinchuan, China on May 30 - June 1, 2016. The primary aim of this symposium was to provide a platform to facilitate the discussion for comprehension, application and management of digital instrumentation, control systems and technologies in nuclear power plants. The book reflects not only the state of the art and latest trends in nuclear instrumentation and control system technologies, but also China's increasing influence in this area. It is a valuable resource for both practitioners and academics working in the field of nuclear instrumentation, control systems and other safety-critical systems, as well as nuclear power plant managers, public officials and regulatory authorities.
The book compiles technologies for enhancing and provisioning
security, privacy and trust in cloud systems based on Quality of
Service requirements. It is a timely contribution to a field that
is gaining considerable research interest, momentum, and provides a
comprehensive coverage of technologies related to cloud security,
privacy and trust. In particular, the book includes
By the year 2000, a balance was sought between security requirements and a respect for privacy, as well as for individual and collective freedoms. As we progress further into the 21st century, however, security is taking precedence within an increasingly controlled society. This shift is due to advances in innovative technologies and the investments made by commercial companies to drive constant technological progress. Despite the implementation of the General Data Protection Regulation (GDPR) within the EU in 2018 or 2020's California Consumer Privacy Act (CCPA), regulatory bodies do not have the ability to fully manage the consequences presented by emerging technologies. Security and Its Challenges in the 21st Century provides students and researchers with an international legal and geopolitical analysis; it is also intended for those interested in societal development, artificial intelligence, smart cities and quantum cryptology.
With the popularity of the Wireless Local Area Network (WLAN) standard 802.11 WiFi and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN) standard 802.16 WiMax, the need for effective solutions to the inherent security weaknesses of these networking technologies has become of critical importance. Thoroughly explaining the risks associated with deploying WLAN and WMAN networks, this groundbreaking book offers professionals practical insight into identifying and overcoming these security issues. Including detailed descriptions of possible solutions to a number of specific security problems, the book gives practitioners the hands-on techniques that they need to secure wireless networks in the enterprise and the home.
Is meaningful communication possible between two intelligent parties who share no common language or background? In this work, a theoretical framework is proposed in which it is possible to address when and to what extent such semantic communication is possible: such problems can be rigorously addressed by explicitly focusing on the goals of the communication. Under this framework, it is possible to show that for many goals, communication without any common language or background is possible using universal protocols. This work should be accessible to anyone with an undergraduate-level knowledge of the theory of computation. The theoretical framework presented here is of interest to anyone wishing to design systems with flexible interfaces, either among computers or between computers and their users.
Synthetic Worlds, Virtual Worlds, and Alternate Realities are all terms used to describe the phenomenon of computer-based, simulated environments in which users inhabit and interact via avatars. The best-known commercial applications are in the form of electronic gaming, and particularly in massively-multiplayer online role-playing games like World of Warcraft or Second Life. Less known, but possibly more important, is the rapid adoption of platforms in education and business, where Serious Games are being used for training purposes, and even Second Life is being used in many situations that formerly required travel. The editors of this book captures the state of research in the field intended to reflect the rapidly growing yet relatively young market in education and business. The general focus is set on the scientific community but integrates the practical applications for businesses, with papers on information systems, business models, and economics. In six parts, international authors - all experts in their field - discuss the current state-of-the-art of virtual worlds/alternate realities and how the field will develop over the next years. Chapters discuss the influences and impacts in and around virtual worlds. Part four is about education, with a focus on learning environments and experiences, pedagogical models, and the effects on the different roles in the educational sector. The book looks at business models and how companies can participate in virtual worlds while receiving a return on investment, and includes cases and scenarios of integration, from design, implementation to application. |
You may like...
The Host in the Machine - Examining the…
Angela Thomas-Jones
Paperback
R1,318
Discovery Miles 13 180
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, …
Paperback
R1,452
Discovery Miles 14 520
|