![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
Technology has advanced in such a manner that the world can now communicate in means previously never thought possible. These new technologies have not been overlooked by transnational organised crime groups and networks of corruption, and have been exploited for criminal success. This text explores the use of communication interception technology (CIT), such as phone taps or email interception, and its potential to cause serious disruption to these criminal enterprises.Exploring the placement of communication interception technology within differing policing frameworks, and how they integrate in a practical manner, the authors demonstrate that CIT is best placed within a proactive, intelligence-led policing framework. They also indicate that if law enforcement agencies in Western countries are serious about fighting transnational organised crime and combating corruption, there is a need to re-evaluate the constraints of interception technology, and the sceptical culture that surrounds intelligence in policing.Policing Transnational Organised Crime and Corruption will appeal to scholars of Law, Criminal Justice and Police Science as well as intelligence analysts and police and security intelligence professionals.
Networking technologies and concepts are often difficult to explain, even through careful description and well thought out examples. One method for making this information "stick" is to create an environment where networking professionals and students can visualize how networks work by utilizing a software tool that simulates the functions within a network. The tool provides a virtual environment for an assortment of desirable features such as modeling a network based on specified criteria and predicting its performance. "The Network Simulation Experiments Manual" takes this
instructional tool a step further and provides detailed experiments
on core networking topologies for use in this simulation
environment. Various scenarios are presented within each topology:
Review questions, suggested readings, a lab report, and exercises
accompanying each assignment. The manual also comes with directions
for downloading the free and easy-to-install OPNET IT Guru Academic
Edition software. This software provides a virtual environment for
modeling, analyzing, and predicting the performance of IT
infrastructures, including applications, servers, and networking
technologies. Prepared by Professor Emad Aboelela of the Taibah
University, Saudi Arabia, the experiments in the manual are closely
tied to the organization of "Computer Networks: A Systems Approach,
Fifth Edition" and, when used together, serve as a complete tool
for understanding how and why computer networks function as they
do.
This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.
This book focuses on information literacy for the younger generation of learners and library readers. It is divided into four sections: 1. Information Literacy for Life; 2. Searching Strategies, Disciplines and Special Topics; 3. Information Literacy Tools for Evaluating and Utilizing Resources; 4. Assessment of Learning Outcomes. Written by librarians with wide experience in research and services, and a strong academic background in disciplines such as the humanities, social sciences, information technology, and library science, this valuable reference resource combines both theory and practice. In today's ever-changing era of information, it offers students of library and information studies insights into information literacy as well as learning tips they can use for life.
This book provides a collection of concepts, algorithms, and techniques that effectively harness the power of Spatial Network Big Data. Reading this book is a first step towards understanding the immense challenges and novel applications of SNBD database systems. This book explores these challenges via investigating scalable graph-based query processing strategies and I/O efficient storage and access methods. This book will be of benefit to academics, researchers, engineers with a particular interest in network database models, network query processing, and physical storage models.
This is the second volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in the field. It explores how IT convergence and security issues are core to most current research, industrial and commercial activities and consists of contributions covering topics including machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics. ICITCS 2017 is the latest in a series of highly successful Inter national Conferences on IT Convergence and Security, previously held in Prague, Czech Republic (2016), Kuala Lumpur, Malaysia (2015), Beijing, China (2014), Macau, China (2013), Pyeong Chang, Korea (2012), and Suwon, Korea (2011).
Modern organizations are critically dependent on data communications and network systems utilized in managing information and communications, vital to continuity and success of operations. ""Breakthrough Perspectives in Network and Data Communications Security, Design and Applications"" addresses key issues and offers expert viewpoints into the field of network and data communications, providing the academic, information technology, and managerial communities with the understanding necessary to implement robust, secure, and effective solutions. This much-needed addition to library and professional collections offers a matchless set of high quality research articles and premier technologies to address the most salient issues in network and data communications.
No nation - especially the United States - has a coherent
technical and architectural strategy for preventing cyber attack
from crippling essential critical infrastructure services. This
book initiates an intelligent national (and international) dialogue
amongst the general technical community around proper methods for
reducing national risk. This includes controversial themes such as
the deliberate use of deception to trap intruders. It also serves
as an attractive framework for a new national strategy for cyber
security, something that several Presidential administrations have
failed in attempting to create. In addition, nations other than the
US might choose to adopt the framework as well Amoroso offers a
technical, architectural, and management solution to the problem of
protecting national infrastructure. This includes practical and
empirically-based guidance for security engineers, network
operators, software designers, technology managers, application
developers, and even those who simply use computing technology in
their work or home. Each principle is presented as a separate
security strategy, along with pages of compelling examples that
demonstrate use of the principle. A specific set of criteria
requirements allows any organization, such as a government agency,
to integrate the principles into their local environment. This book
takes the national debate on protecting critical infrastructure in
an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T.
This book covers the topics on cyber security in IoT systems used in different verticals such as agriculture, health, homes, transportation within the context of smart cities. The authors provide an analysis of the importance of developing smart cities by incorporating technologies such as IoT to achieve the sustainable development goals (SDGs) within the agenda 2030. Furthermore, it includes an analysis of the cyber security challenges generated by IoT systems due to factors such as heterogeneity, lack of security in design and few hardware resources in these systems, and how they should be addressed from a risk analysis approach, evaluating the risk analysis methodologies widely used in traditional IT systems.
The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources of end users, the P2P approach enables high performance of data distribution which is hard to achieve with traditional client-server architectures. The P2P computing community is also being actively utilized for software updates to the Internet, P2PSIP VoIP, video-on-demand, and distributed backups. The recent introduction of the identifier-locator split proposal for future Internet architectures poses another important application for DHTs, namely mapping between host permanent identity and changing IP address. The growing complexity and scale of modern P2P systems requires the introduction of hierarchy and intelligence in routing of requests. "Structured Peer-to-Peer Systems" covers fundamental issues in organization, optimization, and tradeoffs of present large-scale structured P2P systems, as well as, provides principles, analytical models, and simulation methods applicable in designing future systems. Part I presents the state-of-the-art of structured P2P systems, popular DHT topologies and protocols, and the design challenges for efficient P2P network topology organization, routing, scalability, and security. Part II shows that local strategies with limited knowledge per peer provide the highest scalability level subject to reasonable performance and security constraints. Although the strategies are local, their efficiency is due to elements of hierarchical organization, which appear in many DHT designs that traditionally are considered as flat ones. Part III describes methods to gradually enhance the local view limit when a peer is capable to operate with larger knowledge, still partial, about the entire system. These methods were formed in the evolution of hierarchical organization from flat DHT networks to hierarchical DHT architectures, look-ahead routing, and topology-aware ranking. Part IV highlights some known P2P-based experimental systems and commercial applications in the modern Internet. The discussion clarifies the importance of P2P technology for building present and future Internet systems."
Contributions in this volume focus on computationally efficient algorithms and rigorous mathematical theories for analyzing large-scale networks. Researchers and students in mathematics, economics, statistics, computer science and engineering will find this collection a valuable resource filled with the latest research in network analysis. Computational aspects and applications of large-scale networks in market models, neural networks, social networks, power transmission grids, maximum clique problem, telecommunication networks, and complexity graphs are included with new tools for efficient network analysis of large-scale networks. This proceeding is a result of the 7th International Conference in Network Analysis, held at the Higher School of Economics, Nizhny Novgorod in June 2017. The conference brought together scientists, engineers, and researchers from academia, industry, and government.
This book strives to take stock of current achievements and existing challenges in nuclear verification, identify the available information and gaps that can act as drivers for exploring new approaches to verification strategies and technologies. With the practical application of the systems concept to nuclear disarmament scenarios and other, non-nuclear verification fields, it investigates, where greater transparency and confidence could be achieved in pursuit of new national or international nonproliferation and arms reduction efforts. A final discussion looks at how, in the absence of formal government-to-government negotiations, experts can take practical steps to advance the technical development of these concepts.
Due to the proliferation of distributed mobile technologies and heavy usage of social media, identity and access management has become a very challenging area. Businesses are facing new demands in implementing solutions, however, there is a lack of information and direction. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities is a critical scholarly resource that explores management of an organization's identities, credentials, and attributes which assures the identity of a user in an extensible manner set for identity and access administration. Featuring coverage on a broad range of topics, such as biometric application programming interfaces, telecommunication security, and role-based access control, this book is geared towards academicians, practitioners, and researchers seeking current research on identity and access management.
The last decade has witnessed a rapid surge of interest in new sensing and monitoring devices for wellbeing and healthcare. One key development in this area is wireless, wearable and implantable "in vivo" monitoring and intervention. A myriad of platforms are now available from both academic institutions and commercial organisations. They permit the management of patients with both acute and chronic symptoms, including diabetes, cardiovascular diseases, treatment of epilepsy and other debilitating neurological disorders. Despite extensive developments in sensing technologies, there are significant research issues related to system integration, sensor miniaturisation, low-power sensor interface, wireless telemetry and signal processing. In the 2nd edition of this popular and authoritative reference on Body Sensor Networks (BSN), major topics related to the latest technological developments and potential clinical applications are discussed, with contents covering. Biosensor Design, Interfacing and Nanotechnology Wireless Communication and Network Topologies Communication Protocols and Standards Energy Harvesting and Power Delivery Ultra-low Power Bio-inspired Processing Multi-sensor Fusion and Context Aware Sensing Autonomic Sensing Wearable, Ingestible Sensor Integration and Exemplar Applications System Integration and Wireless Sensor Microsystems The book also provides a comprehensive review of the current wireless sensor development platforms and a step-by-step guide to developing your own BSN applications through the use of BSN development kit.
Individual users and business organizations are shifting their data storage and utilizing cloud computing because of its easy availability and reduced costs. Although, this technology is creating an easy way to store, share, and access data, serious security concerns have been generated. Critical Research on Scalability and Security Issues in Virtual Cloud Environments is a critical scholarly resource that examines the concept of cloud computing and explores the various shortcomings of using the cloud. Featuring coverage on a broad range of topics such as cloud architecture for scalability, data vulnerability, and server virtualization management, this book is geared towards academicians, practitioners, and researchers seeking current research on developing effective security measures for cloud paradigm.
With a variety of media types, multimedia data engineering has emerged as a new opportunity to create techniques and tools that empower the development of the next generation of multimedia databases and information systems. Multimedia Data Engineering Applications and Processing presents different aspects of multimedia data engineering and management research. This collection of recent theories, technologies and algorithms brings together a detailed understanding of multimedia engineering and its applications. This reference source will be of essential use for researchers, scientists, professionals and software engineers in the field of multimedia.
This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author also reveals a high-level service-oriented firewall configuration language (called FLIP) and a methodology and framework for designing optimal distributed firewall architecture. The chapters illustrate the concepts, algorithms, implementations and case studies for each technique. Automated Firewall Analytics: Design, Configuration and Optimization is appropriate for researchers and professionals working with firewalls. Advanced-level students in computer science will find this material suitable as a secondary textbook or reference.
"Advanced Technologies in Ad Hoc and Sensor Networks "collects selected papers from the 7th China Conference on Wireless Sensor Networks (CWSN2013) held in Qingdao, October 17-19, 2013. The book features state-of-the-art studies on Sensor Networks in China with the theme of Advances in wireless sensor networks of China . The selected works can help promote development of sensor network technology towards interconnectivity, resource sharing, flexibility and high efficiency. Researchers and engineers in the field of sensor networks can benefit from the book. Xue Wang is a professor at Tsinghua University; Li Cui is a professor at Institute of Computing Technology, Chinese Academy of Sciences; Zhongwen Guo is a professor at Ocean University of China."
The internet has grown to become one of the largest communication hubs in history. With its ability to share content and create community bonds, it has seen many fandoms and online social communities develop within the past decades. While there are some detriments to these communities, there are also many benefits and potential uses for the betterment of society. The Research Anthology on Fandoms, Online Social Communities, and Pop Culture explores the ways in which the internet has presented itself as a platform for communities to gather. This essential reference source discusses the engagement of these communities, social media use, and the uses of these communities for education. Covering topics such as digital communities, transmedia language learning, and digital humanities, this book is a vital tool for educators of K-12 and higher education, digital folklorists, sociologists, communications researchers, online administrators, community leaders, and academicians.
This book examines the architectures, technologies, and design methods that make it possible to achieve a survivable fiber network, both practically and economically. Combining theory and actual results, it explores alternative methods and presents analytical and computational optimization approaches.
Topology control is fundamental to solving scalability and capacity problems in large-scale wireless ad hoc and sensor networks. Forthcoming wireless multi-hop networks such as ad hoc and sensor networks will allow network nodes to control the communication topology by choosing their transmitting ranges. Briefly, "topology control" (TC) is the art of co-ordinating nodes' decisions regarding their transmitting ranges, to generate a network with the desired features. Building an optimized network topology helps surpass the prevalent scalability and capacity problems. "Topology Control in Wireless Ad Hoc and Sensor Networks" makes the case for topology control and provides an exhaustive coverage of TC techniques in wireless ad hoc and sensor networks, considering both stationary networks, to which most of the existing solutions are tailored, and mobile networks. The author introduces a new taxonomy of topology control and gives a full explication of the applications and challenges of this important topic. "Topology Control in Wireless Ad Hoc and Sensor Networks: " Defines topology control and explains its necessity, considering both stationary and mobile networks. Describes the most representative TC protocols and their performance. Covers the critical transmitting range for stationary and mobile networks, topology optimization problems such as energy efficiency, and distributed topology control. Discusses implementation and 'open issues', including realistic models and the effect of multi-hop data traffic. Presents a case study on routing protocol design, to demonstrate how TC can ease the design of cooperative routing protocols. This invaluable text will provide graduatestudents in Computer Science, Electrical and Computer Engineering, Applied Mathematics and Physics, researchers in the field of ad hoc networking, and professionals in wireless telecoms as well as networking system developers with a single reference resource on topology control.
The major subjects of the book cover modeling, analysis and efficient management of information in Internet of Everything (IoE) applications and architectures. As the first book of its kind, it addresses the major new technological developments in the field and will reflect current research trends, as well as industry needs. It comprises of a good balance between theoretical and practical issues, covering case studies, experience and evaluation reports and best practices in utilizing IoE applications. It also provides technical/scientific information about various aspects of IoE technologies, ranging from basic concepts to research grade material, including future directions.
VLSI 2010 Annual Symposium will present extended versions of the best papers presented in ISVLSI 2010 conference. The areas covered by the papers will include among others: Emerging Trends in VLSI, Nanoelectronics, Molecular, Biological and Quantum Computing. MEMS, VLSI Circuits and Systems, Field-programmable and Reconfigurable Systems, System Level Design, System-on-a-Chip Design, Application-Specific Low Power, VLSI System Design, System Issues in Complexity, Low Power, Heat Dissipation, Power Awareness in VLSI Design, Test and Verification, Mixed-Signal Design and Analysis, Electrical/Packaging Co-Design, Physical Design, Intellectual property creating and sharing.
The 4th FTRA International Conference on Information Technology
Convergence and Services (ITCS-12) will be held in Gwangju, Korea
on September 6 - 8, 2012. |
![]() ![]() You may like...
Community Engagement in the Online Space
Michelle Dennis, James H Albert
Hardcover
R5,908
Discovery Miles 59 080
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders
Paperback
R1,508
Discovery Miles 15 080
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, …
Paperback
R1,491
Discovery Miles 14 910
The Host in the Machine - Examining the…
Angela Thomas-Jones
Paperback
R1,351
Discovery Miles 13 510
|