![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
This book presents the state of the art technologies and solutions to tackle the critical challenges faced by the building and development of the WSN and ecological monitoring system but also potential impact on society at social, medical and technological level. This book is dedicated to Sensing systems for Sensors, Wireless Sensor Networks and Ecological Monitoring. The book aims at Master and PhD degree students, researchers, practitioners, especially WSN engineers involved with ecological monitoring. The book will provide an opportunity of a dedicated and a deep approach in order to improve their knowledge in this specific field.
This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality of Service, Security and Mobility (Net-Con'2004), celebrated in Palma de Mallorca (Illes Balears, Spain) during November 2-5, 2004. This IFIP TC6 Conference was organized by the Universitat de les Illes Balears and sponsored by the following Working Groups: WG6.2 (Network and Internetwork Architectures), WG6.6 (Management of Networks and Distributed Systems), WG6.7 (Smart Networks) and WG6.8 (Mobile and Wireless Communications). The rapid evolution of the networking industry introduces new exciting challenges that need to be explored by the research community. The adoption of Internet as the global network infrastructure places the issue of quality of service among one of the hot topics nowadays: a huge diversity of applications with quite different service requirements must be supported over a basic core of protocols. Also, the open and uncontrolled nature of Internet enforces the need to guarantee secure transactions among users, thus placing security as another hot topic. Finally, the explosion of mobility and its integration as part of the global infrastructure are probably now the most challenging issues in the networking field.
This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners.
The development of net-centric approaches for intelligence and national security applications has become a major concern in many areas such as defense, intelligence and national and international law enforcement agencies. In this volume we consider the web architectures and recent developments that make n- centric approaches for intelligence and national security possible. These include developments in information integration and recent advances in web services including the concept of the semantic web. Discovery, analysis and management of web-available data pose a number of interesting challenges for research in w- based management systems. Intelligent agents and data mining are some of the techniques that can be employed. A number of specific systems that are net-centric based in various areas of military applications, intelligence and law enforcement are presented that utilize one or more of such techniques The opening chapter overviews the concepts related to ontologies which now form much of the basis of the possibility of sharing of information in the Semantic Web. In the next chapter an overview of Web Services and examples of the use of Web Services for net-centric operations as applied to meteorological and oceanographic (MetOc) data is presented and issues related to the Navy's use of MetOc Web Services are discussed. The third chapter focuses on metadata as conceived to support the concepts of a service-oriented architecture and, in particular, as it relates to the DoD Net-Centric Data Strategy and the NCES core services.
This book presents new concepts as well as practical applications and experiences in the field of information technology for environmental engineering. The book has three main focus areas: firstly, it shows how information technologies can be employed to support natural resource management and conservation, environmental engineering, scientific simulation and integrated assessment studies. Secondly, it demonstrates the application of computing in the everyday practices of environmental engineers, natural scientists, economists and social scientists. And thirdly, it demonstrates how the complexity of natural phenomena can be approached using interdisciplinary methods, where computer science offers the infrastructure needed for environmental data collection and management, scientific simulations, decision support documentation and reporting.The book collects selected papers presented at the 7th International Symposium on Environmental Engineering, held in Port Elizabeth, South Africa in July 2015. It discusses recent success stories in eco-informatics, promising ideas and new challenges from the interdisciplinary viewpoints of computer scientists, environmental engineers, economists and social scientists, demonstrating new paradigms for problem-solving and decision-making.
The recent advances in display technologies and mobile devices is having an important effect on the way users interact with all kinds of devices (computers, mobile devices, laptops, tablets, and so on). These are opening up new possibilities for interaction, including the distribution of the UI (User Interface) amongst different devices, and implies that the UI can be split and composed, moved, copied or cloned among devices running the same or different operating systems. These new ways of manipulating the UI are considered under the emerging topic of Distributed User Interfaces (DUIs). DUIs are concerned with the repartition of one of many elements from one or many user interfaces in order to support one or many users to carry out one or many tasks on one or many domains in one or many contexts of use - each context of use consisting of users, platforms, and environments. The 20 chapters in the book cover between them the state-of-the-art, the foundations, and original applications of DUIs. Case studies are also included, and the book culminates with a review of interesting and novel applications that implement DUIs in different scenarios.
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the readera (TM)s knowledge - answers are also provided. Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.
This book provides a thorough treatment of privacy and security issues for researchers in the fields of smart grids, engineering, and computer science. It presents comprehensive insight to understanding the big picture of privacy and security challenges in both physical and information aspects of smart grids. The authors utilize an advanced interdisciplinary approach to address the existing security and privacy issues and propose legitimate countermeasures for each of them in the standpoint of both computing and electrical engineering. The proposed methods are theoretically proofed by mathematical tools and illustrated by real-world examples.
Biografias Lotzy Beatriz Fonseca Chiu. Nacio en Guadalajara, Jalisco, estudio la Licenciatura en Informatica en la Universidad de Guadalajara, actualmente Profesor en el Centro Universitario de Ciencias Exactas e Ingenierias CUCEI, y asesor adjunto en el Sistema de Universidad Virtual de la Universidad de Guadalajara. Ganadora del 6to concurso de docentes innovadores organizado por Microsoft. Maria Elena Romero Gastelu. Nacio en Xalapa Enriquez, Veracruz, estudio la Licenciatura en Informatica en el Instituto Tecnologico de Tepic y la Maestria en Sistemas de Informacion en la Universidad de Guadalajara, ha sido Profesor en el Departamento de Ciencias Computacionales por 16 anos. Luis Antonio Medellin Serna. Nacio Mazatlan, Sinaloa, estudio la Licenciatura en Informatica y la Maestria en Sistemas de Informacion en la Universidad de Guadalajara, ha sido profesor en el Departamento de Ciencias Computacionales por 12 anos. Jorge Lorenzo Vasquez Padilla. Nacio Guadalajara, Jalisco, estudio la Licenciatura en Matematicas con la Orientacion en Computacion y la Maestria en Sistemas de Informacion en la Universidad de Guadalajara, estudio la Maestria en Redes y Comunicaciones en la Universidad Catolica de Avila (Zaragoza, Espana), ademas obtuvo la certificacion en el programa CCNA como instructor en Redes de Computadoras que otorga la Compania Cisco Systems, ha sido profesor en el Departamento de Ciencias Computacionales desde su creacion.
This book provides a comprehensive overview of modern networks design, from specifications and modeling to implementations and test procedures, including the design and implementation of modern networks on chip, in both wireless and mobile applications. Topical coverage includes algorithms and methodologies, telecommunications, hardware (including networks on chip), security and privacy, wireless and mobile networks and a variety of modern applications, such as VoLTE and the internet of things.
This book explores current and emerging trends in policy, strategy, and practice related to cyber operations conducted by states and non-state actors. The book examines in depth the nature and dynamics of conflicts in the cyberspace, the geopolitics of cyber conflicts, defence strategy and practice, cyber intelligence and information security.
Advances in social science research methodologies and data analytic methods are changing the way research in information systems is conducted. New developments in statistical software technologies for data mining (DM) such as regression splines or decision tree induction can be used to assist researchers in systematic post-positivist theory testing and development. Established management science techniques like data envelopment analysis (DEA), and value focused thinking (VFT) can be used in combination with traditional statistical analysis and data mining techniques to more effectively explore behavioral questions in information systems research. As adoption and use of these research methods expand, there is growing need for a resource book to assist doctoral students and advanced researchers in understanding their potential to contribute to a broad range of research problems. "Advances in Research Methods for Information Systems Research: Data Mining, Data Envelopment Analysis, Value Focused Thinking" focuses on bridging and unifying these three different methodologies in order to bring them together in a unified volume for the information systems community. This book serves as a resource that provides overviews on each method, as well as applications on how they can be employed to address IS research problems. Its goal is to help researchers in their continuous efforts to set the pace for having an appropriate interplay between behavioral research and design science.
Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response.
Introduction The International Federation for Information Processing (IFIP) is a non-profit umbrella organization for national societies working in the field of information processing. It was founded in 1960 under the auspices of UNESCO. It is organized into several technical c- mittees. This book represents the proceedings of the 2008 conference of technical committee 8 (TC8), which covers the field of infor- tion systems. TC8 aims to promote and encourage the advancement of research and practice of concepts, methods, techniques and issues related to information systems in organisations. TC8 has established eight working groups covering the following areas: design and evaluation of information systems; the interaction of information systems and the organization; decision support systems; e-business information systems: multi-disciplinary research and practice; inf- mation systems in public administration; smart cards, technology, applications and methods; and enterprise information systems. Further details of the technical committee and its working groups can be found on our website (ifiptc8. dsi. uminho. pt). This conference was part of IFIP's World Computer Congress in Milan, Italy which took place 7-10 September 2008. The occasion celebrated the 32nd anniversary of IFIP TC8. The call for papers invited researchers, educators, and practitioners to submit papers and panel proposals that advance concepts, methods, techniques, tools, issues, education, and practice of information systems in organi- tions. Thirty one submissions were received.
This volume contains the proceedings of the Fourth IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, NETCON 2005. The conference, organized by the International Federation for Information Processing, was held in Lannion, France from November 14-18, 2005. Coverage explores network security, network policy, quality of service, wireless networks, intelligent networks, and performance evaluation.
An Advanced Research Workshop (ARW) "Data Fusion Technologies for Harbour Protection" was held in Tallinn, Estonia 27 June-1 July, 2005. This workshop was organized by request of the NATO Security Through Science Programme and the Defence Investment Division. An ARW is one of many types of funded group support mechanisms established by the NATO Science Committee to contribute to the critical assessment of existing knowledge on new important topics, to identify directions for future research, and to promote close working relationships between scientists from different countries and with different professional experiences. The NATO Science Committee was approved at a meeting of the Heads of Government of the Alliance in December 1957, subsequent to the 1956 recommendation of "Three Wise Men" - Foreign Ministers Lange (Norway), Martino (Italy) and Pearson (Canada) on Non-Military Cooperation in NATO. The NATO Science Committee established the NATO Science Programme in 1958 to encourage and support scientific collaboration between individual scientists and to foster scientific development in its member states. In 1999, following the end of the Cold War, the Science Programme was transformed so that support is now devoted to collaboration between Partner-country and NATO-country scientists or to contributing towards research support in Partner countries. Since 2004, the Science Programme was further modified to focus exclusively on NATO Priority Research Topics (i. e. Defence Against Terrorism or Countering Other Threats to Security) and also preferably on a Partner country priority area.
As ubiquitous multimedia applications benefit from the rapid development of intelligent multimedia technologies, there is an inherent need to present frameworks, techniques and tools that adopt these technologies to a range of networking applications. Intelligent Multimedia Technologies for Networking Applications: Techniques and Tools promotes the discussion of specific solutions for improving the quality of multimedia experience while investigating issues arising from the deployment of techniques for adaptive video streaming. This reference source provides relevant theoretical frameworks and leading empirical research findings and is suitable for practitioners and researchers in the area of multimedia technology.
RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware implementation of security algorithms. This section deals with the hardware implementations of cryptography algorithms and protocols dedicated to RFID platforms and chips.
Financial institutions need to increase revenues, decrease cost and
be compliant in these difficult times. To meet all these challenges
they need to consider disruptive innovations. Cloud computing is
one of them. It helps in introducing innovative services,
re-engineer processes, improve agility and optimize value. The book
analyses in depth the cloud computing model and its current and
potential use in financial services. Cloud Computing can change the
paradigm of the financial institutions. the word "Bank" comes from
the Italian word "Banco," since in the 1300s banking was one on a
desk in the streets. The new "banco," the new "desk," will be
cloud. Financial institutions must use the model of Cloud Computing
for their transformation to a new paradigm.
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers.
Broadband Satellite Communication Systems and the Challenges of Mobility is an essential reference for both academic and professional researchers in the field of telecommunications, computer networking and wireless networks. Recently the request of multimedia services has been rapidly increasing and satellite networks appear to be attractive for a fast service deployment and for extending the typical service area of terrestrial systems. In comparison with traditional wide area networks, a characteristic of satellite communication systems is their ability in broadcasting and multicasting multimedia information flows anywhere over the satellite coverage. The papers presented in this volume highlight key areas such as Satellite Network Architectures, Services and Applications; Mobile Satellite Systems and Services; and Hybrid Satellite and Terrestrial Networks. Mobility will inevitably be one of the main characteristics of future networks, terminals and applications and, thus, extending and integrating fixed network protocols and services to mobile systems represents one of the main issues of present networking. The secondary focus of this volume is on challenges of mobility, that is, on technologies, protocols and services for the support of seamless and nomadic user access to new classes of applications in person-to-person, device-to-device and device-to-person environments. The book comprises recent results of research and development in the following areas; Seamless mobility; Mobile ad hoc and sensor networks; Analysis, simulation and measurements of mobile and wireless systems; Integration and inter-working of wired and wireless networks; QoS in mobile and wireless networks; Future trends and issues concerning mobility. This state -of-the-art volume contains a collection of papers from two of the workshops of the 18th IFIP World Computer Congress, held August 22-27, 2004, in Toulouse, France: the Workshop on Broadband Satellite Communication Systems, and the Workshop on the Challenges of Mobility.
With the evolution of digitised data, our society has become dependent on services to extract valuable information and enhance decision making by individuals, businesses, and government in all aspects of life. Therefore, emerging cloud-based infrastructures for storage have been widely thought of as the next generation solution for the reliance on data increases. Data Intensive Storage Services for Cloud Environments provides an overview of the current and potential approaches towards data storage services and its relationship to cloud environments. This reference source brings together research on storage technologies in cloud environments and various disciplines useful for both professionals and researchers.
This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.
Recently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subject: mobile commerce, defined as the exchange or buying and selling of commodities, services, or information on the Internet through the use of mobile handheld devices. In just a few years, mobile commerce has emerged from nowhere to become the hottest new trend in business transactions. However, the prosperity and popularity of mobile commerce will be brought to a higher level only if information is securely and safely exchanged among end systems (mobile users and content providers). Advances in Security and Payment Methods for Mobile Commerce includes high-quality research papers and industrial and practice articles in the areas of mobile commerce security and payment from academics and industrialists. It covers research and development results of lasting significance in the theory, design, implementation, analysis, and application of mobile commerce security and payment. |
You may like...
The Walls of Santiago - Social…
Terri Gordon-Zolov, Eric Zolov
Hardcover
R3,594
Discovery Miles 35 940
|