|
|
Books > Computing & IT
Continual advancements in web technology have highlighted the need
for formatted systems that computers can utilize to easily read and
sift through the hundreds of thousands of data points across the
internet. Therefore, having the most relevant data in the least
amount of time to optimize the productivity of users becomes a
priority. Semantic Web Science and Real-World Applications provides
emerging research exploring the theoretical and practical aspects
of semantic web science and real-world applications within the area
of big data. Featuring coverage on a broad range of topics such as
artificial intelligence, social media monitoring, and microblogging
recommendation systems, this book is ideally designed for IT
consultants, academics, professionals, and researchers of web
science seeking the current developments, requirements and
standards, and technology spaces presented across academia and
industries.
Cyber-attacks are rapidly becoming one of the most prevalent issues
globally, and as they continue to escalate, it is imperative to
explore new approaches and technologies that help ensure the
security of the online community. Beyond cyber-attacks, personal
information is now routinely and exclusively housed in cloud-based
systems. The rising use of information technologies requires
stronger information security and system procedures to reduce the
risk of information breaches. Advanced Methodologies and
Technologies in System Security, Information Privacy, and Forensics
presents emerging research and methods on preventing information
breaches and further securing system networks. While highlighting
the rising concerns in information privacy and system security,
this book explores the cutting-edge methods combatting digital
risks and cyber threats. This book is an important resource for
information technology professionals, cybercrime researchers,
network analysts, government agencies, business professionals,
academicians, and practitioners seeking the most up-to-date
information and methodologies on cybercrime, digital terrorism,
network security, and information technology ethics.
In a world of relentless change and accelerating uncertainty,
organizations must continuously adapt and evolve to compete in
environments they never anticipated. This requires upfront design
for adaptability, and closer business alignment of software systems
and team structures. To succeed, organizations must integrate
advanced techniques from business strategy, software architecture,
and team organization. Now, independent technology consultant
Susanne Kaiser introduces a powerful unified toolset you can use to
design, build, and evolve adaptive software systems and teams that
are optimized for ever-faster rates of change. Kaiser shows how to
combine Wardley Maps, Domain-Driven Design (DDD), and Team
Topologies to understand your problem domain more clearly, focus on
your crucial core subdomain, and reflect the dynamics of your
business landscape. Using these tools, you'll learn how to design
evolvable services within an adaptive system, which is in turn
owned by a team organization that optimizes for fast flow. Kaiser
goes beyond Domain Driven Design's popular patterns to reveal how
DDDenables strategic design for long-term business success. Her
accessible explanations and practical examples show how to combine
DDD with intuitive Wardley Maps and powerful Team Topologies to
improve success across the full lifecycle: strategy, design,
implementation, deployment, operation, and evolution. As she
demystifies and demonstrates these tools, Kaiser answers the most
important questions faced by project participants—from CxOs to
architects to software developers.
SECURITY AND PRIVACY VISION IN 6G Prepare for the future of mobile
communication with this comprehensive study 6G is the next frontier
in mobile communication, with development of 6G standards slated to
begin as early as 2026. As telecommunications networks become
faster and more intelligent, security and privacy concerns are
critical. In an increasingly connected world, there is an urgent
need for user data to be safeguarded and system security enhanced
against a new generation of threats. Security and Privacy Vision in
6G provides a comprehensive survey of these threats and the
emerging techniques for safeguarding against them. It includes
mechanisms for prediction, detection, mitigation, and prevention,
such that threats to privacy and security can be forestalled at any
stage. Fully engaged with proposed 6G architectures, it is an
essential resource for mobile communications professionals looking
for a head start on the technology of the future. Security and
Privacy Vision in 6G readers will also find: Detailed coverage of
topics including edge intelligence and cloudification, industrial
automation, collaborative robots, and more Treatment balancing the
practical and the theoretical An editorial team with decades of
international network technology experience in both industry and
academia Security and Privacy Vision in 6G is a vital reference for
network security professionals and for postgraduate and advanced
undergraduate students in mobile communications and network
security-related fields.
Before the modern age of medicine, the chance of surviving a
terminal disease such as cancer was minimal at best. After
embracing the age of computer-aided medical analysis technologies,
however, detecting and preventing individuals from contracting a
variety of life-threatening diseases has led to a greater survival
percentage and increased the development of algorithmic
technologies in healthcare. Deep Learning Applications in Medical
Imaging is a pivotal reference source that provides vital research
on the application of generating pictorial depictions of the
interior of a body for medical intervention and clinical analysis.
While highlighting topics such as artificial neural networks,
disease prediction, and healthcare analysis, this publication
explores image acquisition and pattern recognition as well as the
methods of treatment and care. This book is ideally designed for
diagnosticians, medical imaging specialists, healthcare
professionals, physicians, medical researchers, academicians, and
students.
This volume features an extensive account of both research and
expository papers in a wide area of engineering and mathematics and
its various applications.Topics treated within this book include
optimization of control points, game theory, equilibrium points,
algorithms, Cartan matrices, integral inequalities, Volterra
integro-differential equations, Caristi-Kirk theorems, Laplace type
integral operators, etc.This useful reference text benefits
graduate students, beginning research engineers and mathematicians
as well as established researchers in these domains.
Wireless sensor networks have gained significant attention
industrially and academically due to their wide range of uses in
various fields. Because of their vast amount of applications,
wireless sensor networks are vulnerable to a variety of security
attacks. The protection of wireless sensor networks remains a
challenge due to their resource-constrained nature, which is why
researchers have begun applying several branches of artificial
intelligence to advance the security of these networks. Research is
needed on the development of security practices in wireless sensor
networks by using smart technologies. Deep Learning Strategies for
Security Enhancement in Wireless Sensor Networks provides emerging
research exploring the theoretical and practical advancements of
security protocols in wireless sensor networks using artificial
intelligence-based techniques. Featuring coverage on a broad range
of topics such as clustering protocols, intrusion detection, and
energy harvesting, this book is ideally designed for researchers,
developers, IT professionals, educators, policymakers,
practitioners, scientists, theorists, engineers, academicians, and
students seeking current research on integrating intelligent
techniques into sensor networks for more reliable security
practices.
To provide the necessary security and quality assurance activities
into Internet of Things (IoT)-based software development,
innovative engineering practices are vital. They must be given an
even higher level of importance than most other events in the
field. Integrating the Internet of Things Into Software Engineering
Practices provides research on the integration of IoT into the
software development life cycle (SDLC) in terms of requirements
management, analysis, design, coding, and testing, and provides
security and quality assurance activities to IoT-based software
development. The content within this publication covers agile
software, language specification, and collaborative software and is
designed for analysts, security experts, IoT software programmers,
computer and software engineers, students, professionals, and
researchers.
Interest in developing smart cities has grown exponentially over
the years with many governments across the world hoping to initiate
these projects in their own countries. One of the key challenges
for the success of any smart city project is the assurance of smart
security and privacy of the citizens. Due to the use of a wide
range of interconnected cyber-physical systems, traditional
security solutions cannot be applied to smart city applications,
and new practices must be sought. Secure Cyber-Physical Systems for
Smart Cities is an essential reference publication that examines
information security and privacy in smart city settings including
discussions on new security frameworks, solutions, cybersecurity
laws and regulations, and risk management frameworks for smart city
environments. Covering a wide range of topics including wireless
networks, security, and cyber-physical systems, this book is
ideally designed for IT specialists and consultants, engineers,
government officials, policymakers, researchers, academicians, and
industry professionals.
|
|