![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
With the popularity of the Wireless Local Area Network (WLAN) standard 802.11 WiFi and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN) standard 802.16 WiMax, the need for effective solutions to the inherent security weaknesses of these networking technologies has become of critical importance. Thoroughly explaining the risks associated with deploying WLAN and WMAN networks, this groundbreaking book offers professionals practical insight into identifying and overcoming these security issues. Including detailed descriptions of possible solutions to a number of specific security problems, the book gives practitioners the hands-on techniques that they need to secure wireless networks in the enterprise and the home.
This book is a collection of best selected research papers presented at the 6th International Conference on Opto-Electronics and Applied Optics (OPTRONIX 2020) organized by the University of Engineering & Management, Kolkata, India, in June 2020. The primary focus is to address issues and developments in optoelectronics with particular emphasis on communication technology, IoT and intelligent systems, information processing and its different kinds. The theme of the book is in alignment with the theme of the conference "Advances in Smart Communication Technology and Information Processing." The purpose of this book is to inform the scientists and researchers of this field in India and abroad about the latest developments in the relevant field and to raise awareness among the academic fraternity to get them involved in different activities in the years ahead - an effort to realize knowledge-based society.
Networked control systems are increasingly ubiquitous today, with applications ranging from vehicle communication and adaptive power grids to space exploration and economics. The optimal design of such systems presents major challenges, requiring tools from various disciplines within applied mathematics such as decentralized control, stochastic control, information theory, and quantization. A thorough, self-contained book, "Stochastic Networked Control Systems: Stabilization and Optimization under Information Constraints" aims to connect these diverse disciplines with precision and rigor, while conveying design guidelines to controller architects. Unique in the literature, it lays a comprehensive theoretical foundation for the study of networked control systems, and introduces an array of concrete tools for work in the field. Salient features included: . Characterization, comparison and optimal design of information structures in static and dynamic teams. Operational, structural and topological properties of information structures in optimal decision making, with a systematic program for generating optimal encoding and control policies. The notion of signaling, and its utilization in stabilization and optimization of decentralized control systems. . Presentation of mathematical methods for stochastic stability of networked control systems using random-time, state-dependent drift conditions and martingale methods. . Characterization and study of information channels leading to various forms of stochastic stability such as stationarity, ergodicity, and quadratic stability; and connections with information and quantization theories. Analysis of various classes of centralized and decentralized control systems. . Jointly optimal design of encoding and control policies over various information channels and under general optimization criteria, including a detailed coverage of linear-quadratic-Gaussian models. . Decentralized agreement and dynamic optimization under information constraints. This monograph is geared toward a broad audience of academic and industrial researchers interested in control theory, information theory, optimization, economics, and applied mathematics. It could likewise serve as a supplemental graduate text. The reader is expected to have some familiarity with linear systems, stochastic processes, and Markov chains, but the necessary background can also be acquired in part through the four appendices included at the end. . Characterization, comparison and optimal design of information structures in static and dynamic teams. Operational, structural and topological properties of information structures in optimal decision making, with a systematic program for generating optimal encoding and control policies. The notion of signaling, and its utilization in stabilization and optimization of decentralized control systems. . Presentation of mathematical methods for stochastic stability of networked control systems using random-time, state-dependent drift conditions and martingale methods. . Characterization and study of information channels leading to various forms of stochastic stability such as stationarity, ergodicity, and quadratic stability; and connections with information and quantization theories. Analysis of various classes of centralized and decentralized control systems. . Jointly optimal design of encoding and control policies over various information channels and under general optimization criteria, including a detailed coverage of linear-quadratic-Gaussian models. . Decentralized agreement and dynamic optimization under information constraints. This monograph is geared toward a broad audience of academic and industrial researchers interested in control theory, information theory, optimization, economics, and applied mathematics. It could likewise serve as a supplemental graduate text. The reader is expected to have some familiarity with linear systems, stochastic processes, and Markov chains, but the necessary background can also be acquired in part through the four appendices included at the end.
Globalization has pushed the use of technology in business with advancing information and communication technology becoming a key factor in the future development of the retailing industry. Technology applications have significantly contributed to the exponential growth and profits of retailing institutions worldwide. ""Information Communication Technologies and Globalization of Retailing Applications"" critically examines the synergy of technology use and conventional wisdom in retailing and explores contemporary changes determining higher customer value. Discussions in this book encompass strategy implications for managers to optimize their advantage in retailing through the application of ICT, bridging the customer-technology gap.
Cyberspace is everywhere in today s world and has significant implications not only for global economic activity, but also for international politics and transnational social relations. This compilation addresses for the first time the cyberization of international relations - the growing dependence of actors in IR on the infrastructure and instruments of the internet, and the penetration of cyberspace into all fields of their activities. The volume approaches this topical issue in a comprehensive and interdisciplinary fashion, bringing together scholars from disciplines such as IR, security studies, ICT studies and philosophy as well as experts from everyday cyber-practice. In the first part, concepts and theories are presented to shed light on the relationship between cyberspace and international relations, discussing implications for the discipline and presenting fresh and innovative theoretical approaches. Contributions in the second part focus on specific empirical fields of activity (security, economy, diplomacy, cultural activity, transnational communication, critical infrastructure, cyber espionage, social media, and more) and address emerging challenges and prospects for international politics and relations."
This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing a range of diverse topics. The first book of its kind designed specifically to cater to courses on privacy, this authoritative volume provides technical, legal, and ethical perspectives on privacy issues from a global selection of renowned experts. Features: examines privacy issues relating to databases, P2P networks, big data technologies, social networks, and digital information networks; describes the challenges of addressing privacy concerns in various areas; reviews topics of privacy in electronic health systems, smart grid technology, vehicular ad-hoc networks, mobile devices, location-based systems, and crowdsourcing platforms; investigates approaches for protecting privacy in cloud applications; discusses the regulation of personal information disclosure and the privacy of individuals; presents the tools and the evidence to better understand consumers' privacy behaviors.
Private cloud computing enables you to consolidate diverse
enterprise systems into one that is cloud-based and can be accessed
by end-users seamlessly, regardless of their location or changes in
overall demand. Expert authors Steve Smoot and Nam K. Tan distill
their years of networking experience to describe how to build
enterprise networks to create a private cloud. With their
techniques you'll create cost-saving designs and increase the
flexibility of your enterprise, while maintaining the security and
control of an internal network. "Private Cloud Computing "offers a
complete cloud architecture for enterprise networking by
synthesizing WAN optimization, next-generation data centers, and
virtualization in a network-friendly way, tying them together into
a complete solution that can be progressively migrated to as time
and resources permit.
This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic challenges for legal access to data in a cloud computing environment; discusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problems; reviews conceptual issues, basic requirements and practical suggestions for provisioning dynamically configured access control services in the cloud; proposes scoped invariants as a primitive for analyzing a cloud server for its integrity properties; investigates the applicability of existing controls for mitigating information security risks to cloud computing environments; describes risk management for cloud computing from an enterprise perspective.
This book provides extensive insight into the possibilities and challenges of XML in building new information management solutions in networked organizations. After a brief introduction to Web communication features and XML fundamentals, the book examines the benefits of adopting XML and illustrates various types of XML use: XML in document management; XML for data-centric and multimedia components; XML as a format for metadata, including metadata for the Semantic Web; and XML in support of data interchange between software applications and among organizations. The challenges of adopting XML in large-scale information management are also discussed. In addition, applications across a broad spectrum are examined and numerous case studies pertaining to the adoption of XML are presented. The book is particularly suitable for courses offered in Information Studies, Information Systems, or Information Technology. It also serves as an excellent practical guide for professionals in information management and provides important support material for courses in Computer Science and in Business.
The ubiquity of modern technologies has allowed for increased connectivity between people and devices across the globe. This connected infrastructure of networks creates numerous opportunities for applications and uses. The Internet of Things: Breakthroughs in Research and Practice is an authoritative reference source for the latest academic material on the interconnectivity of networks and devices in the digital era and examines best practices for integrating this advanced connectivity across multiple fields. Featuring extensive coverage on innovative perspectives, such as secure computing, regulatory standards, and trust management, this book is ideally designed for engineers, researchers, professionals, graduate students, and practitioners seeking scholarly insights on the Internet of Things.
This book introduces readers to cybersecurity and its impact on the realization of the Industry 4.0 vision. It covers the technological foundations of cybersecurity within the scope of the Industry 4.0 landscape and details the existing cybersecurity threats faced by Industry 4.0, as well as state-of-the-art solutions with regard to both academic research and practical implementations. Industry 4.0 and its associated technologies, such as the Industrial Internet of Things and cloud-based design and manufacturing systems are examined, along with their disruptive innovations. Further, the book analyzes how these phenomena capitalize on the economies of scale provided by the Internet. The book offers a valuable resource for practicing engineers and decision makers in industry, as well as researchers in the design and manufacturing communities and all those interested in Industry 4.0 and cybersecurity.
This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15). The combined proceedings present peer-reviewed contributions from academic and industrial researchers in fields including ubiquitous and context-aware computing, context-awareness reasoning and representation, location awareness services, and architectures, protocols and algorithms, energy, management and control of wireless sensor networks. The book includes the latest research results, practical developments and applications in parallel/distributed architectures, wireless networks and mobile computing, formal methods and programming languages, network routing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation.
The growth, scale, and prominence of video applications over the
years have placed emphasis on the most scalable and efficient way
to deliver multi-play content (voice, video and data) to the end
user. Multicast is the most effective and efficient carrier of
video applications from a network standpoint. Financial
organizations deploy large-scale multicast infrastructures to
enable trading and e-commerce. The introduction of 4G and beyond
makes this technology even more indispensible since mobile
operators need an efficient mechanism to deliver repetitive content
to many a handset, and multicast is the answer. Thisis the first
book to distill information on this topic from disparate sources.
It is written by one of the early implementers, andis the go-to
referencefor deploying the Next Generation model.Thisbook proves
areal benefit to networking professionals from service providers,
enterprises, the vendor community, and anyone elsewho wants to
understand this fast emerging and popular scheme of deployment from
a vendor-neutral standpoint. Provides the background necessary to understand current generation multi-play applications and their service requirements Includes practical tips on various migration options available for moving to the Next Generation framework from the legacy"
Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.
This book presents a collection of the latest research in the area of immersive technologies, presented at the International Augmented and Virtual Reality Conference 2018 in Manchester, UK, and showcases how augmented reality (AR) and virtual reality (VR) are transforming the business landscape. Innovations in this field are seen as providing opportunities for businesses to offer their customers unique services and experiences. The papers gathered here advance the state of the art in AR/VR technologies and their applications in various industries such as healthcare, tourism, hospitality, events, fashion, entertainment, retail, education and gaming. The volume collects contributions by prominent computer and social sciences experts from around the globe. Addressing the most significant topics in the field of augmented and virtual reality and sharing the latest findings, it will be of interest to academics and practitioners alike.
This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students.
The fourth edition is again an "all-in-one" combination of basic theory and practical exercises with software and data available from the Springer server. Potential readers / users are students of Photogrammetry, Geodesy, Geography and other sciences, but also all who are interested in this topic. No prior knowledge is necessary, except the handling of standard PCs. Theory is presented true to the motto "as little as possible, but as much as necessary". The main part of the book contains several tutorials. In increasing complexity, accompanied by texts explaining further theory, the reader can proceed step by step through the particular working parts. All intermediate as well as the final results are discussed with reference to accuracy and error handling, and included in the data sets to provide controls. Most of the standard work in Digital Photogrammetry is shown and trained, for example scanning, image orientation, stereo plotting, aerial triangulation measurement (manual and automatic), block adjustment, automatic creation of surface models via image matching, creation of ortho images and mosaics, and others. Examples of both aerial and close-range photogrammetry present the power of this kind of measurement techniques. 3-D images can be viewed with the accompanying 3-D glasses. During the time since the last edition, the software development went on, and therefore it was necessary to adopt the text to the actual program versions which were also tested to work properly under MS Windows 10. Few options which are obsolete nowadays were removed, some new options were added, the handling of the software was simplified in several places, and so on. For the use of own images taken with a custom digital camera, a new chapter offers an easy way of lens calibration and explains how to get good results with a minimum of work. The software is not limited to the example data included but may be used for personal projects. Part of the book comprises a complete description of the software.
In the last decade we have seen the emergence of a new inter-disciplinary field concentrating on the understanding large networks which are dynamic, large, open, and have a structure that borders order and randomness. The field of Complex Networks has helped us better understand many complex phenomena such as spread of decease, protein interaction, social relationships, to name but a few. The field of Complex Networks has received a major boost caused by the widespread availability of huge network data resources in the last years. One of the most surprising findings is that real networks behave very distinct from traditional assumptions of network theory. Traditionally, real networks were supposed to have a majority of nodes of about the same number of connections around an average. This is typically modeled by random graphs. But modern network research could show that the majority of nodes of real networks is very low connected, and, by contrast, there exists some nodes of very extreme connectivity (hubs). The current theories coupled with the availability of data makes the field of Complex Networks (sometimes called Network Sciences) one of the most promising interdisciplinary disciplines of today. This sample of works in this book gives as a taste of what is in the horizon such controlling the dynamics of a network and in the network, using social interactions to improve urban planning, ranking in music, and the understanding knowledge transfer in influence networks."
This book focuses on sustainability issues post COVID-19 outbreak, discusses ways to restrict global spread of the pandemic, and also how to survive holistically in the environment. It also discusses the economic impacts on the world due to the coronavirus outbreak. There is a strong need for monitoring and analysis of pandemics for sustainability like epidemic risk analysis by using pattern recognition or the mental health challenges during an outbreak. This book presents ways to find solutions and gives insights to explore innovative methods and predictive modeling techniques, such that masses are prevented from pandemics.
This book presents a comprehensive overview of enterprise architecture management with a specific focus on the business aspects. While recent approaches to enterprise architecture management have dealt mainly with aspects of information technology, this book covers all areas of business architecture from business motivation and models to business execution. The book provides examples of how architectural thinking can be applied in these areas, thus combining different perspectives into a consistent whole. In-depth experiences from end-user organizations help readers to understand the abstract concepts of business architecture management and to form blueprints for their own professional approach. Business architecture professionals, researchers, and others working in the field of strategic business management will benefit from this comprehensive volume and its hands-on examples of successful business architecture management practices.
This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.
This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters address security issues of the cloud infrastructure. In Chapter 3, Szefer and Lee describe a hardware-enhanced security architecture that protects the confidentiality and integrity of a virtual machine's memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software-Defined Networking (SDN) is deployed within and across clouds. Chapters 5-9 focus on the protection of data stored in the cloud. In Chapter 5, Wang et al. present two storage isolation schemes that enable cloud users with high security requirements to verify that their disk storage is isolated from some or all other users, without any cooperation from cloud service providers. In Chapter 6, De Capitani di Vimercati, Foresti, and Samarati describe emerging approaches for protecting data stored externally and for enforcing fine-grained and selective accesses on them, and illustrate how the combination of these approaches can introduce new privacy risks. In Chapter 7, Le, Kant, and Jajodia explore data access challenges in collaborative enterprise computing environments where multiple parties formulate their own authorization rules, and discuss the problems of rule consistency, enforcement, and dynamic updates. In Chapter 8, Smith et al. address key challenges to the practical realization of a system that supports query execution over remote encrypted data without exposing decryption keys or plaintext at the server. In Chapter 9, Sun et al. provide an overview of secure search techniques over encrypted data, and then elaborate on a scheme that can achieve privacy-preserving multi-keyword text search. The next three chapters focus on the secure deployment of computations to the cloud. In Chapter 10, Oktay el al. present a risk-based approach for workload partitioning in hybrid clouds that selectively outsources data and computation based on their level of sensitivity. The chapter also describes a vulnerability assessment framework for cloud computing environments. In Chapter 11, Albanese et al. present a solution for deploying a mission in the cloud while minimizing the mission's exposure to known vulnerabilities, and a cost-effective approach to harden the computational resources selected to support the mission. In Chapter 12, Kontaxis et al. describe a system that generates computational decoys to introduce uncertainty and deceive adversaries as to which data and computation is legitimate. The last section of the book addresses issues related to security monitoring and system resilience. In Chapter 13, Zhou presents a secure, provenance-based capability that captures dependencies between system states, tracks state changes over time, and that answers attribution questions about the existence, or change, of a system's state at a given time. In Chapter 14, Wu et al. present a monitoring capability for multicore architectures that runs monitoring threads concurrently with user or kernel code to constantly check for security violations. Finally, in Chapter 15, Hasan Cam describes how to manage the risk and resilience of cyber-physical systems by employing controllability and observability techniques for linear and non-linear systems.
|
![]() ![]() You may like...
Practices and Perspectives in…
Madhumi Mitra, Abhijit Nagchaudhuri
Hardcover
R1,552
Discovery Miles 15 520
Energy, Transport, & the Environment…
Oliver Inderwildi, Sir David King
Hardcover
R5,737
Discovery Miles 57 370
Applied Soft Computing and Embedded…
Mangey Ram, Rupendra Kumar Pachauri, …
Hardcover
R4,483
Discovery Miles 44 830
Computational Modeling and Problem…
Hemant K. Bhargava, Nong Ye
Hardcover
R4,542
Discovery Miles 45 420
The Electric Power Engineering Handbook…
Leonard L. Grigsby
Hardcover
R11,423
Discovery Miles 114 230
Modern Computational Techniques for…
Krishan Arora, Vikram Kumar, …
Hardcover
R3,879
Discovery Miles 38 790
|