![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
Next Generation Mobile Networks and Ubiquitous Computing provides a comprehensive and unified view of the latest and most innovative research findings for university professors, researchers, students, and industry professionals alike. Presenting chapters by experts from across the globe, this reference offers a single body of knowledge to show the many existing interactions between mobile networking, wireless communications, and ubiquitous computing.
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors' analysis forms the basis of a discussion on future technological directions and their potential impact on society. The book includes forewords by Professor Margaret Gardner AO, Vice-Chancellor and President of RMIT University, and by Professor Robyn Owens, Deputy Vice-Chancellor (Research) at the University of Western Australia. Security and the Networked Society provides a reference for professionals and industry analysts studying digital technologies. Advanced-level students in computer science and electrical engineering will also find this book useful as a thought-provoking resource.
This book is supposed to serve as a comprehensive and instructive guide through the new world of digital communication. On the physical layer optical and electrical cabling technology are described as well as wireless communication technologies. On the data link layer local area networks (LANs) are introduced together with the most popular LAN technologies such as Ethernet, Token Ring, FDDI, and ATM as well as wireless LAN technologies including IEEE 802.x, Bluetooth, or ZigBee. A wide range of WAN technologies are covered including contemporary high speed technologies like PDH and SDH up to high speed wireless WANs (WiMAX) and 4th generation wireless telephone networks LTE. Routing technologies conclude the treatment of the data link layer. Next, there is the Internet layer with the Internet protocol IP that establishes a virtual uniform network out of the net of heterogeneous networks. In detail, both versions, IPv4 as well as the successor IPv6 are covered in detail as well as ICMP, NDP, and Mobile IP. In the subsequent transport layer protocol functions are provided to offer a connection-oriented and reliable transport service on the basis of the simple and unreliable IP. The basic protocols TCP and UDP are introduced as well as NAT, the network address translation. Beside transport layer security protocols like SSL and TLS are presented. On the upmost application layer popular Internet application protocols are described like DNS, SMTP, PGP, (S)FTP, NFS, SSH, DHCP, SNMP, RTP, RTCP, RTSP, and World Wide Web.
The main objectives of this book are to expose key aspects that have a relevance when dealing with open data viewed from different perspectives and to provide appealing examples of how open data is implemented worldwide. The concept of open data as we know it today is the result of many different initiatives, both of a legislative and non-legislative nature, and promoted by a wide range of actors. Numerous regulatory antecedents to foster the concept of open data and embed it in national and international policy agendas have been undertaken on both sides of the Atlantic, as well as at a supranational level. The book highlights a number of the efforts made to promote open data in Europe, Asia and the United States. In addition to new insights, practical guidance and multiple disciplinary perspectives on open data, the book also addresses the transformation of current developments towards open data, which may be referred to as the democratisation of data. This book will support open data practitioners as well as open data scholars in their endeavours to promote open data implementation and research. Bastiaan van Loenen is associate professor and director of the Knowledge Centre Open Data at the Faculty of Architecture and The Built Environment of Delft University of Technology in the Netherlands, as is Glenn Vancauwenberghe, who is a post-doctoral researcher, and Joep Crompvoets is a professor at the Public Governance Institute of the KU Leuven in Belgium.
This volume elaborates on both the qualitative and quantitative aspects of resilience. Reviewing the literature exploring the concept of resilience in engineering, it discusses resilience in terms of the various definitions used, the methodologies proposed to characterize resilience, and the metrics put forward to quantify the resilience of specific service infrastructure systems. The review also identifies the key factors that contribute to organizational resilience. The concept of resilience is compared to other system properties such as reliability, robustness, flexibility and agility, by taking into consideration what systems are prepared against (types of failure), the causes of failure in systems (uncertainty), and how systems react to overcome failure (level of adaptability). A review is also provided of several resilience-enabling schemes, which improve resilience by reducing vulnerability and increasing adaptive capacity. The book puts forward a new framework, the Networked Infrastructure Resilience Assessment (NIRA) framework, through which the resilience of systems can be measured by assessing the impact of disruptions on key performance measures. By applying the framework to various case studies, the book demonstrates the ability of the proposed framework to assess resilience across a wide variety of networked infrastructure systems. The case studies probe the resilience of the following critical infrastructure systems in the face of specific disruptive events: telecommunication, transportation, maritime transportation and organizational networks. This text is intended for all levels of academia from undergraduate through to research level as well as professionals and decision-makers involved in the development, analysis and evaluation of infrastructure systems.
This book focuseson protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and multicast security and strategies for constructing efficient digests of dynamic databases using binary hash trees."
Recent advances in internet architecture have led to the advent and subsequent explosion of cloud computing technologies, providing businesses with a powerful toolbox of collaborative digital resources. These technologies have fostered a more flexible, decentralized approach to IT infrastructure, enabling businesses to operate in a more agile fashion and on a globalized scale. Enterprise Management Strategies in the Era of Cloud Computing seeks to explore the possibilities of business in the cloud. Targeting an audience of research scholars, students, software developers, and business professionals, this premier reference source provides a cutting-edge look at the exciting and multifaceted relationships between cloud computing, software virtualization, collaborative technology, and business infrastructure in the 21st Century.
This book contains selected papers from the 9th International Conference on Information Science and Applications (ICISA 2018) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readership includes researchers in academia, industry and other research institutes focusing on information science and technology.
"The Basics of IT Audit: Purposes, Processes, and Practical Information" provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA. IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements. This guide provides you with all the necessary information if
you're preparing for an IT audit, participating in an IT audit or
responding to an IT audit.
"Network Convergence: Ethernet Applications and Next Generation Packet Transport Architectures" provides the guidance and solutions you'll need to understand Ethernet and emerging applications such as cloud computing and mobile apps, as well as large-scale retail and business deployments. This reference starts with an overview of the Ethernet and existing broadband architectures, including XDSL, WIMAX, and VLANs. It moves on to cover next-generation networks and mobile architectures, as well as cloud computing. The book also addresses the convergence of optical, Ethernet and IP/MPLS layers, considered to be the backbone of next-generation packet transport architecture. If you're a network designer or architect, a technical sales
professional, or if you're pursuing technical certifications, you
will benefit from "Network Convergence"'s fundamental information
on this rapidly evolving technology.
"Unified Communications Forensics: Anatomy of Common UC Attacks "is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures companion website http: //secvoip.comgiving readers access to
the most up-to-date information on UC attacks. Provides key information for hackers and pen testers on the most current Unified Communications implementations. The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment. Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics. "
This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner. This book includes three main sections. The first presents the idea of formally verifying the compliance of smart grid configurations with the security and resiliency guidelines. It provides a formal framework that verifies the compliance of the advanced metering infrastructure (AMI) configurations with the security and resiliency requirements, and generates remediation plans for potential security violations. The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids. The model identifies attack vectors that can compromise state estimation. This section also covers risk mitigation techniques that synthesize proactive security plans that make such attacks infeasible. The last part of the book discusses the dynamic security analysis for smart grids. It shows that AMI behavior can be modeled using event logs collected at smart collectors, which in turn can be verified using the specification invariants generated from the configurations of the AMI devices. Although the focus of this book is smart grid security and resiliency, the included formal analytics are generic enough to be extended to other cyber-physical systems, especially those related to industrial control systems (ICS). Therefore, industry professionals and academic researchers will find this book an exceptional resource to learn theoretical and practical aspects of applying formal methods for the protection of critical infrastructures.
Cisco Security Specialist's Guide to PIX Firewall immerses the
reader in the highly complicated subject of firewall
implementation, deployment, configuration, and administration. This
guide will instruct the reader on the necessary information to pass
the CSPFA exam including protocols, hardware, software,
troubleshooting and more.
This book presents a comprehensive overview of wireless sensor networks (WSNs) with an emphasis on security, coverage, and localization. It offers a structural treatment of WSN building blocks including hardware and protocol architectures and also provides a systems-level view of how WSNs operate. These building blocks will allow readers to program specialized applications and conduct research in advanced topics. A brief introductory chapter covers common applications and communication protocols for WSNs. Next, the authors review basic mathematical models such as Voroni diagrams and Delaunay triangulations. Sensor principles, hardware structure, and medium access protocols are examined. Security challenges ranging from defense strategies to network robustness are explored, along with quality of service measures. Finally, this book discusses recent developments and future directions in WSN platforms. Each chapter concludes with classroom-tested exercises that reinforce key concepts. This book is suitable for researchers and for practitioners in industry. Advanced-level students in electrical engineering and computer science will also find the content helpful as a textbook or reference.
This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. "FISMA Compliance Handbook Second Edition "explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment. Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. " FISMA Compliance Handbook Second Edition, "also includes all-new
coverage of federal cloud computing compliance from author Laura
Taylor, the federal government s technical lead for FedRAMP, the
government program used to assess and authorize cloud products and
services. Includes coverage for both corporate and government IT managers Learn how to prepare for, perform, and document FISMA compliance projects This book is used by various colleges and universities in information security and MBA curriculums. "
The primary" "goal of the" Information Protection Playbook" is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy. Using the guidelines provided in the "Information Protection Playbook," security and information technology (IT) managers will learn how to implement the five functions of an IP framework: governance, program planning, risk management, incident response management, and program administration. These functions are based on a model promoted by the Information Systems Audit and Control Association (ISACA) and validated by thousands of Certified Information Security Managers. The five functions are further broken down into a series of objectives or milestones to be achieved in order to implement an IP framework. The extensive appendices included at the end of the book make for an excellent resource for the security or IT manager building an IP program from the ground up. They include, for example, a board of directors presentation complete with sample slides; an IP policy document checklist; a risk prioritization procedure matrix, which illustrates how to classify a threat based on a scale of high, medium, and low; a facility management self-assessment questionnaire; and a list of representative job descriptions for roles in IP. The "Information Protection Playbook" is a part of Elsevier s
Security Executive Council Risk Management Portfolio, a collection
of real world solutions and "how-to" guidelines that equip
executives, practitioners, and educators with proven information
for successful security and risk management programs.
Call Admission Control (CAC) and Dynamic Channel Assignments (DCA) are important decision-making problems in mobile cellular communication systems. Current research in mobile communication considers them as two independent problems, although the former greatly depends on the resulting free channels obtained as the outcome of the latter. This book provides a solution to the CAC problem, considering DCA as an integral part of decision-making for call admission. Further, current technical resources ignore movement issues of mobile stations and fluctuation in network load (incoming calls) in the control strategy used for call admission. In addition, the present techniques on call admission offers solution globally for the entire network, instead of considering the cells independently. CAC here has been formulated by two alternative approaches. The first approach aimed at handling the uncertainty in the CAC problem by employing fuzzy comparators. The second approach is concerned with formulation of CAC as an optimization problem to minimize call drop, satisfying a set of constraints on feasibility and availability of channels, hotness of cells, and velocity and angular displacement of mobile stations. Evolutionary techniques, including Genetic Algorithm and Biogeography Based Optimization, have been employed to solve the optimization problems. The proposed approaches outperform traditional methods with respect to grade and quality of services.
The book presents a coherent description of distributed manufacturing, providing a solid base for further research on the subject as well as smart implementations in companies. It provides a guide for those researching and working in a range of fields, such as smart manufacturing, cloud computing, RFID tracking, distributed automation, cyber physical production and global design anywhere, manufacture anywhere solutions. Foundations & Principles of Distributed Manufacturing anticipates future advances in the fields of embedded systems, the Internet of Things and cyber physical systems, outlining how adopting these innovations could rapidly bring about improvements in key performance indicators, which could in turn generate competition pressure by rendering successful business models obsolete. In laying the groundwork for powerful theoretical models, high standards for the homogeneity and soundness of the suggested setups are applied. The book especially elaborates on the upcoming competition in online manufacturing operations and respective control procedures. By outlining encapsulation and evolving decision-making principles, Foundations & Principles of Distributed Manufacturing fully conceptualizes the view of manufacturing networks as sets of loosely coupled interacting smart factory objects. Moreover, the book provides concrete approaches to a number of future fields, where distributed manufacturing might be applied. Both researchers and professionals will profit from the authors' broad experience in Distributed Manufacturing and Fractal Enterprise implementations, where they initiated and completed a number of successful research projects: within the global Intelligent Manufacturing Systems (IMS) scheme, within the European Research Area frameworks as well as national contexts, and both in industry and at leading research institutions. This background ensures well-founded theory on one hand and valuable practical results on the other in a fascinating area that is still under intensive research. Readers will acquire essential insights as well as useful guidance for categorizing and specifying extended distributed manufacturing solutions and their professional implementations.
An expert guide to Ruby, a popular new Object-Oriented Programming
Language
Windows 2003 Server is unquestionably the dominant enterprise level
operating system in the industry, with 95% of all companies running
it. And for the last tow years, over 50% of all product upgrades
have been security related. Securing Windows Server, according to
bill gates, is the company's #1 priority.
This book combines the three dimensions of technology, society and economy to explore the advent of today's cloud ecosystems as successors to older service ecosystems based on networks. Further, it describes the shifting of services to the cloud as a long-term trend that is still progressing rapidly.The book adopts a comprehensive perspective on the key success factors for the technology - compelling business models and ecosystems including private, public and national organizations. The authors explore the evolution of service ecosystems, describe the similarities and differences, and analyze the way they have created and changed industries. Lastly, based on the current status of cloud computing and related technologies like virtualization, the internet of things, fog computing, big data and analytics, cognitive computing and blockchain, the authors provide a revealing outlook on the possibilities of future technologies, the future of the internet, and the potential impacts on business and society.
Information technology (IT) use has generally been regarded as a positive phenomenon which always generates desirable outcomes. Recent years, however, have witnessed increasing negative consequences resulted from IT use. Emerging issues include individual users have experienced technostress from personal social media usage as well as IT use in the workplace; and organisations have experienced a loss in productivity and assets due to employees' non-compliance with information security policies.Themes explored throughout the book include: AI and its Implications for Organisations Augmented Reality Cognitive Absorption of Technology Information Technology in Organisations and Societies: Multidisciplinary Perspectives from AI to Technostress represents a collective effort that not only consolidates studies on key issues and phenomena concerning the positive and negative aspects of IT use but also prescribes future research avenues in related research domains. It is particularly relevant to academics and researchers working on IT use research and can be used as a handy reference guide by those working in the field.
Despite solid advances, numerous challenges have yet to be resolved by Web services-enabled service-oriented architecture systems. Web Services Security Development and Architecture: Theoretical and Practical Issues explores a global approach to methodical development in constructing safety architectures for online systems. Addressing security concerns during the full development lifecycle of Web services-based systems, this critical mass of the most sought after knowledge bridges the gap between practical and theoretical approaches in the field.
|
You may like...
Database Systems - Design…
Carlos Coronel, Steven Morris
Paperback
Big Data and Smart Service Systems
Xiwei Liu, Rangachari Anand, …
Hardcover
Management of Cybersecurity
Michael E. Whitman, Herbert J Mattord
Paperback
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
(1)
|