|
Books > Computing & IT > Computer communications & networking
While information technology continues to play a vital role in
every aspect of our lives, there is a greater need for the security
and protection of this information. Ensuring the trustworthiness
and integrity is important in order for data to be used
appropriately. Privacy Solutions and Security Frameworks in
Information Protection explores the areas of concern in
guaranteeing the security and privacy of data and related
technologies. This reference source includes a range of topics in
information security and privacy provided for a diverse readership
ranging from academic and professional researchers to industry
practitioners.
A smart building is the state-of-art in building with features that
facilitates informed decision making based on the available data
through smart metering and IoT sensors. This set provides useful
information for developing smart buildings including significant
improvement of energy efficiency, implementation of operational
improvements and targeting sustainable environment to create an
effective customer experience. It includes case studies from
industrial results which provide cost effective solutions and
integrates the digital SCADE solution. Describes complete
implication of smart buildings via industrial, commercial and
community platforms Systematically defines energy-efficient
buildings, employing power consumption optimization techniques with
inclusion of renewable energy sources Covers data centre and cyber
security with excellent data storage features for smart buildings
Includes systematic and detailed strategies for building air
conditioning and lighting Details smart building security
propulsion. This set is aimed at graduate students, researchers and
professionals in building systems, architectural, and electrical
engineering.
This introductory textbook is designed for a one-semester course on
the use of the matrix and analytical methods for the performance
analysis of telecommunication systems. It provides an introduction
to the modelling and analysis of telecommunication systems for a
broad interdisciplinary audience of students in mathematics and
applied disciplines such as computer science, electronics
engineering, and operations research.
An in-depth analysis of how the Fortune 1000 companies have dealt
with the strategic use of computers and communications, what
applications have been successful and which have faltered, and how
upcoming technologies will provide the foundation for a new
generation of strategic applications.
This book focuses on a wide range of innovations related to
Cybersecurity Education which include: curriculum development,
faculty and professional development, laboratory enhancements,
community outreach, and student learning. The book includes topics
such as: Network Security, Biometric Security, Data Security,
Operating Systems Security, Security Countermeasures, Database
Security, Cloud Computing Security, Industrial Control and Embedded
Systems Security, Cryptography, and Hardware and Supply Chain
Security. The book introduces the concepts, techniques, methods,
approaches and trends needed by cybersecurity specialists and
educators for keeping current their security knowledge. Further, it
provides a glimpse of future directions where cybersecurity
techniques, policies, applications, and theories are headed. The
book is a rich collection of carefully selected and reviewed
manuscripts written by diverse cybersecurity experts in the listed
fields and edited by prominent cybersecurity researchers and
specialists.
This book discusses automated string-analysis techniques, focusing
particularly on automata-based static string analysis. It covers
the following topics: automata-bases string analysis, computing pre
and post-conditions of basic string operations using automata,
symbolic representation of automata, forward and backward string
analysis using symbolic automata representation, constraint-based
string analysis, string constraint solvers, relational string
analysis, vulnerability detection using string analysis, string
abstractions, differential string analysis, and automated
sanitization synthesis using string analysis. String manipulation
is a crucial part of modern software systems; for example, it is
used extensively in input validation and sanitization and in
dynamic code and query generation. The goal of string-analysis
techniques and this book is to determine the set of values that
string expressions can take during program execution. String
analysis can be used to solve many problems in modern software
systems that relate to string manipulation, such as: (1)
Identifying security vulnerabilities by checking if a security
sensitive function can receive an input string that contains an
exploit; (2) Identifying possible behaviors of a program by
identifying possible values for dynamically generated code; (3)
Identifying html generation errors by computing the html code
generated by web applications; (4) Identifying the set of queries
that are sent to back-end database by analyzing the code that
generates the SQL queries; (5) Patching input validation and
sanitization functions by automatically synthesizing repairs
illustrated in this book. Like many other program-analysis
problems, it is not possible to solve the string analysis problem
precisely (i.e., it is not possible to precisely determine the set
of string values that can reach a program point). However, one can
compute over- or under-approximations of possible string values. If
the approximations are precise enough, they can enable developers
to demonstrate existence or absence of bugs in string manipulating
code. String analysis has been an active research area in the last
decade, resulting in a wide variety of string-analysis techniques.
This book will primarily target researchers and professionals
working in computer security, software verification, formal
methods, software engineering and program analysis. Advanced level
students or instructors teaching or studying courses in computer
security, software verification or program analysis will find this
book useful as a secondary text.
Modern military coalition operations rely on the ability of
multiple independently developed networks to function cohesively,
allowing information collected by different sources to be
transmitted, analyzed, processed, and provided to troops involved
in tactical operations. Network Science for Military Coalition
Operations: Information Exchange and Interaction presents an
advanced view of this delicate and vital operation. However, an
understanding of the science behind coalition operations can
benefit not just military operations, but any context in the modern
world where two independent organizations need to collaborate
together for a shared goal. In this age of globalization, the
research in this book becomes of unprecedented importance, not only
for the military, where most stable and advance techniques are
required, but also for society at large, which also demands
constant improvement in network science.
This book introduces the latest research findings in cloud, edge,
fog, and mist computing and their applications in various fields
using geospatial data. It solves a number of problems of cloud
computing and big data, such as scheduling, security issues using
different techniques, which researchers from industry and academia
have been attempting to solve in virtual environments. Some of
these problems are of an intractable nature and so efficient
technologies like fog, edge and mist computing play an important
role in addressing these issues. By exploring emerging advances in
cloud computing and big data analytics and their engineering
applications, the book enables researchers to understand the
mechanisms needed to implement cloud, edge, fog, and mist computing
in their own endeavours, and motivates them to examine their own
research findings and developments.
This book proposes that usage-based charging schemes are essential
to generate the incentives necessary for efficient operation of
multiservice networks. The rapid development of network technology
is enabling sophisticated new services and applications which
demand new charging models. The same technology provides the means
to operate the right charging schemes.Some of the work done in the
European collaborative project CA$hMAN (Charging and
Accounting Schemes in Multiservice ATM Networks). This project
combined performance and economic models of network resource usage
and cutomer utility to construct simple but effective charging
schemes which were implemented and trialled in an advanced
management platform.
Your ultimate guide to pentesting with Kali Linux Kali is a popular
and powerful Linux distribution used by cybersecurity professionals
around the world. Penetration testers must master Kali's varied
library of tools to be effective at their work. The Kali Linux
Penetration Testing Bible is the hands-on and methodology guide for
pentesting with Kali. You'll discover everything you need to know
about the tools and techniques hackers use to gain access to
systems like yours so you can erect reliable defenses for your
virtual assets. Whether you're new to the field or an established
pentester, you'll find what you need in this comprehensive guide.
Build a modern dockerized environment Discover the fundamentals of
the bash language in Linux Use a variety of effective techniques to
find vulnerabilities (OSINT, Network Scan, and more) Analyze your
findings and identify false positives and uncover advanced
subjects, like buffer overflow, lateral movement, and privilege
escalation Apply practical and efficient pentesting workflows Learn
about Modern Web Application Security Secure SDLC Automate your
penetration testing with Python
This book aimed at bringing an insight to the ICN network,
particularly various architectures, issues and challenges in the
new networking paradigm. The book starts with an introduction to
the new promising concept of ICN and its origin along with the
reason behind this interesting innovation. Different architectures
proposed so far in support of implementing the ICN is also
discussed in details. Few of the challenges of ICN implementation
are enlisted as caching, naming, routing, and security. Each of
these challenges with recent development is covered in individual
chapters. Moreover, integration of current trends in communication
and computing like software defined networking and machine learning
approach are another area that this book is focusing. All these
chapters highlight the recent developments reported in the area and
also discusses the future trends. The book provides an overview of
the recent developments in future internet technologies, bringing
together the advancements that have been made in ICN. The book
includes three unique chapters in the field of ICN research. The
first, is the SDN framework for implementing ICN by decoupling data
and control plan. The machine learning models for predicting future
trends in network traffic and other management activities is
another important chapter. This chapter includes the possibilities
of using machine learning models for trend prediction to help
network administrators and service providers to take care of
unexpected sudden change traffic pattern and user behaviour. The
third most vital chapter is the security issues in ICN. This
chapter includes various facts that influences the security of ICN.
Issues involved in naming, caching and routing are discussed
separately along with few recent works in these areas. Various
types of attacks in ICN are also part of the discussion. The stated
book would be useful for researchers in this area and will work as
a reference for future work. Moreover, the content of the book
would also be suitable as a supporting material for undergraduate
and graduate level courses in computer science and electrical
engineering.
This guide to all the major protocols of a TCP/IP-based network
includes an introduction to binary and hexadecimal arithmetic and
coverage of L2TP, LAN analysis screens and engineering-level detail
on IPv6 routing. The second edition also features: an enhanced
description of IP, including IPv6, plus examples of dynamic routing
such as RIPv2, OSPF, BGP, NAT and CIDR; enhanced descriptions of
ARP, RARP and BOOTP, with added descriptions of IARP, DHCP and
RADIUS; a revised description of FTP; and an added description of
HTTP.
How to Attack and Defend Your Website is a concise introduction to
web security that includes hands-on web hacking tutorials. The book
has three primary objectives: to help readers develop a deep
understanding of what is happening behind the scenes in a web
application, with a focus on the HTTP protocol and other underlying
web technologies; to teach readers how to use the industry standard
in free web application vulnerability discovery and exploitation
tools - most notably Burp Suite, a fully featured web application
testing tool; and finally, to gain knowledge of finding and
exploiting the most common web security vulnerabilities. This book
is for information security professionals and those looking to
learn general penetration testing methodology and how to use the
various phases of penetration testing to identify and exploit
common web protocols. How to Attack and Defend Your Website is be
the first book to combine the methodology behind using penetration
testing tools such as Burp Suite and Damn Vulnerable Web
Application (DVWA), with practical exercises that show readers how
to (and therefore, how to prevent) pwning with SQLMap and using
stored XSS to deface web pages.
This book presents two practical physical attacks. It shows how
attackers can reveal the secret key of symmetric as well as
asymmetric cryptographic algorithms based on these attacks, and
presents countermeasures on the software and the hardware level
that can help to prevent them in the future. Though their theory
has been known for several years now, since neither attack has yet
been successfully implemented in practice, they have generally not
been considered a serious threat. In short, their physical attack
complexity has been overestimated and the implied security threat
has been underestimated. First, the book introduces the photonic
side channel, which offers not only temporal resolution, but also
the highest possible spatial resolution. Due to the high cost of
its initial implementation, it has not been taken seriously. The
work shows both simple and differential photonic side channel
analyses. Then, it presents a fault attack against pairing-based
cryptography. Due to the need for at least two independent precise
faults in a single pairing computation, it has not been taken
seriously either. Based on these two attacks, the book demonstrates
that the assessment of physical attack complexity is error-prone,
and as such cryptography should not rely on it. Cryptographic
technologies have to be protected against all physical attacks,
whether they have already been successfully implemented or not. The
development of countermeasures does not require the successful
execution of an attack but can already be carried out as soon as
the principle of a side channel or a fault attack is sufficiently
understood.
The HCISPP certification is a globally-recognized, vendor-neutral
exam for healthcare information security and privacy professionals,
created and administered by ISC(2). The new HCISPP certification,
focused on health care information security and privacy, is similar
to the CISSP, but has only six domains and is narrowly targeted to
the special demands of health care information security. Tim Virtue
and Justin Rainey have created the HCISPP Study Guide to walk you
through all the material covered in the exam's Common Body of
Knowledge. The six domains are covered completely and as concisely
as possible with an eye to acing the exam. Each of the six domains
has its own chapter that includes material to aid the test-taker in
passing the exam, as well as a chapter devoted entirely to
test-taking skills, sample exam questions, and everything you need
to schedule a test and get certified. Put yourself on the forefront
of health care information privacy and security with the HCISPP
Study Guide and this valuable certification.
This book introduces fundamentals and trade-offs of data
de-duplication techniques. It describes novel emerging
de-duplication techniques that remove duplicate data both in
storage and network in an efficient and effective manner. It
explains places where duplicate data are originated, and provides
solutions that remove the duplicate data. It classifies existing
de-duplication techniques depending on size of unit data to be
compared, the place of de-duplication, and the time of
de-duplication. Chapter 3 considers redundancies in email servers
and a de-duplication technique to increase reduction performance
with low overhead by switching chunk-based de-duplication and
file-based de-duplication. Chapter 4 develops a de-duplication
technique applied for cloud-storage service where unit data to be
compared are not physical-format but logical structured-format,
reducing processing time efficiently. Chapter 5 displays a network
de-duplication where redundant data packets sent by clients are
encoded (shrunk to small-sized payload) and decoded (restored to
original size payload) in routers or switches on the way to remote
servers through network. Chapter 6 introduces a mobile
de-duplication technique with image (JPEG) or video (MPEG)
considering performance and overhead of encryption algorithm for
security on mobile device.
Effective use of technology in areas that include admissions,
record keeping, billing, compliance, athletic administration, and
more hold untold potential to transform higher education by
introducing significant efficiencies and dramatic cost reductions
in serving students. How the institution organizes itself will to a
large extent depend on how the IT systems are established and
maintained. The design, development, management, utilization, and
evaluation of these IT systems will be necessary for the university
to operate successfully. IT Issues in Higher Education: Emerging
Research and Opportunities is a pivotal reference source that
provides vital research on the integration and management of
information technology in higher education with a focus on issues
of security, data management, student access to information, and
staff competency. This publication explores present-day educational
environments as well as educators' methods of applying technology
to student success and highlights topics that include personal
devices and institutional culture. It is ideally designed for
academic professionals, lecturers, students, professors, IT
experts, instructional designers, curriculum developers,
administrators, higher education faculty, researchers, and
policymakers.
"China's e-Science Blue Book 2020" has been jointly compiled by the
Chinese Academy of Sciences, Cyberspace Administration of China,
Ministry of Education of the PRC, Ministry of Science and
Technology of the PRC, China Association for Science and
Technology, Chinese Academy of Social Sciences, National Natural
Science Foundation of China and the Chinese Academy of Agricultural
Sciences. It was focusing on the new situation, new progress and
new achievements of China's e-Scientific in the past two years.
During the "13th Five-Year Plan" period, Chinese scholars make full
use of advanced information technology to carry out scientific
research work, and have achieved a series of major scientific and
technological achievements. This book has collected 28 research
reports about China's e-Science application in the past two years
to introduce the application in the frontier research of science
and technology, the progress of e-Science in major projects and the
achievements of informatization in interdisciplinary. As such it
provides a valuable reference resource for researchers and students
in this area and promotes further e-Science research.
IT technology engineering changes everyday life, especially in
Computing and Communications. The goal of this book is to further
explore the theoretical and practical issues of Future Computing
and Communications. It also aims to foster new ideas and
collaboration between researchers and practitioners.
The purpose of this book is to review the recent advances in
E-health technologies and applications. In particular, the book
investigates the recent advancements in physical design of medical
devices, signal processing and emergent wireless technologies for
E-health. In a second part, novel security and privacy solutions
for IoT-based E-health applications are presented. The last part of
the book is focused on applications, data mining and data analytics
for E-health using artificial intelligence and cloud
infrastructure. E-health has been an evolving concept since its
inception, due to the numerous technologies that can be adapted to
offer new innovative and efficient E-health applications. Recently,
with the tremendous advancement of wireless technologies, sensors
and wearable devices and software technologies, new opportunities
have arisen and transformed the E-health field. Moreover, with the
expansion of the Internet of Things, and the huge amount of data
that connected E-health devices and applications are generating, it
is also mandatory to address new challenges related to the data
management, applications management and their security. Through
this book, readers will be introduced to all these concepts. This
book is intended for all practitioners (industrial and academic)
interested in widening their knowledge in wireless communications
and embedded technologies applied to E-health, cloud computing,
artificial intelligence and big data for E-health applications and
security issues in E-health.
Part one looks at delay-tolerant network architectures and
platforms including DTN for satellite communications and deep-space
communications, underwater networks, networks in developing
countries, vehicular networks and emergency communications. Part
two covers delay-tolerant network routing, including issues such as
congestion control, naming, addressing and interoperability. Part
three explores services and applications in delay-tolerant
networks, such as web browsing, social networking and data
streaming. Part four discusses enhancing the performance,
reliability, privacy and security of delay-tolerant networks.
Chapters cover resource sharing, simulation and modeling and
testbeds.
|
|