|
Books > Computing & IT
Modern day and technology-rich environments require a
reconceptualization of how the nature of technology influences
urban areas. Rethinking the way we apply these technologies will
not only alter the way people communicate and interact, but it will
also alter how individuals learn and explore the world around them.
Ambient Urbanities as the Intersection Between the IoT and the IoP
in Smart Cities offers insights about the ambient in 21st century
smart cities, learning cities, responsive cities, and future
cities, and highlights the importance of people as critical to the
urban fabric of smart cities that are increasingly embedded with
pervasive and often invisible technologies. The book, based on an
urban research study, explores urbanity from multiple perspectives
ranging from the cultural to the geographic. While highlighting
topics including digital literacies, smarter governance, and
information architectures, this book is ideally designed for
students, educators, researchers, the business community, city
government staff and officials, urban practitioners, and those
concerned with contemporary and emerging complex urban challenges
and opportunities.
Wireless sensor networks have gained significant attention
industrially and academically due to their wide range of uses in
various fields. Because of their vast amount of applications,
wireless sensor networks are vulnerable to a variety of security
attacks. The protection of wireless sensor networks remains a
challenge due to their resource-constrained nature, which is why
researchers have begun applying several branches of artificial
intelligence to advance the security of these networks. Research is
needed on the development of security practices in wireless sensor
networks by using smart technologies. Deep Learning Strategies for
Security Enhancement in Wireless Sensor Networks provides emerging
research exploring the theoretical and practical advancements of
security protocols in wireless sensor networks using artificial
intelligence-based techniques. Featuring coverage on a broad range
of topics such as clustering protocols, intrusion detection, and
energy harvesting, this book is ideally designed for researchers,
developers, IT professionals, educators, policymakers,
practitioners, scientists, theorists, engineers, academicians, and
students seeking current research on integrating intelligent
techniques into sensor networks for more reliable security
practices.
Emerging technologies continue to affect a variety of industries,
making processes more effective and efficient. However, they also
impact society by promoting opportunities to encourage social
change and socioeconomic advancement. Blockchain is one that is
already influencing third world countries and disrupting the globe.
Blockchain Technology for Global Social Change is an essential
research publication that provides insight into advancements being
made in blockchain and some potential applications of the
technology that can improve the lives of individuals in emerging
markets. This publication covers a range of topics such as digital
government, health systems, and urbanization and is ideal for
policymakers, academicians, researchers, sociologists, government
officials, economists, and financial experts seeking current and
relevant research on evolving blockchain technologies.
In the digital era, novel applications and techniques in the realm
of computer science are increasing constantly. These innovations
have led to new techniques and developments in the field of
cybernetics. The Handbook of Research on Applied Cybernetics and
Systems Science is an authoritative reference publication for the
latest scholarly information on complex concepts of more adaptive
and self-regulating systems. Featuring exhaustive coverage on a
variety of topics such as infectious disease modeling, clinical
imaging, and computational modeling, this publication is an ideal
source for researchers and students in the field of computer
science seeking emerging trends in computer science and
computational mathematics.
Computer science has emerged as a key driver of innovation in the
21st century. Yet preparing teachers to teach computer science or
integrate computer science content into K-12 curricula remains an
enormous challenge. Recent policy reports have suggested the need
to prepare future teachers to teach computer science through
pre-service teacher education programs. In order to prepare a
generation of teachers who are capable of delivering computer
science to students, however, the field must identify
research-based examples, pedagogical strategies, and policies that
can facilitate changes in teacher knowledge and practices. The
purpose of this book is to provide examples that could help guide
the design and delivery of effective teacher preparation on the
teaching of computer science. This book identifies promising
pathways, pedagogical strategies, and policies that will help
teacher education faculty and preservice teachers infuse computer
science content into their curricula as well as teach stand-alone
computing courses. Specifically, the book focuses on pedagogical
practices for developing and assessing pre-service teacher
knowledge of computer science, course design models for pre-service
teachers, and discussion of policies that can support the teaching
of computer science. The primary audience of the book is students
and faculty in educational technology, educational or cognitive
psychology, learning theory, teacher education, curriculum and
instruction, computer science, instructional systems, and learning
sciences.
Secret sharing schemes form one of the most important topic in
Cryptography. These protocols are used in many areas, applied
mathematics, computer science, electrical engineering. A secret is
divided into several pieces called shares. Each share is given to a
user of the system. Each user has no information about the secret,
but the secret can be retrieved by certain authorized coalition of
users.This book is devoted to such schemes inspired by Coding
Theory. The classical schemes of Shamir, Blakley, Massey are
recalled. Survey is made of research in Combinatorial Coding Theory
they triggered, mostly self-dual codes, and minimal codes.
Applications to engineering like image processing, and key
management of MANETs are highlighted.
Now that there's software in everything, how can you make anything
secure? Understand how to engineer dependable systems with this
newly updated classic In Security Engineering: A Guide to Building
Dependable Distributed Systems, Third Edition Cambridge University
professor Ross Anderson updates his classic textbook and teaches
readers how to design, implement, and test systems to withstand
both error and attack. This book became a best-seller in 2001 and
helped establish the discipline of security engineering. By the
second edition in 2008, underground dark markets had let the bad
guys specialize and scale up; attacks were increasingly on users
rather than on technology. The book repeated its success by showing
how security engineers can focus on usability. Now the third
edition brings it up to date for 2020. As people now go online from
phones more than laptops, most servers are in the cloud, online
advertising drives the Internet and social networks have taken over
much human interaction, many patterns of crime and abuse are the
same, but the methods have evolved. Ross Anderson explores what
security engineering means in 2020, including: How the basic
elements of cryptography, protocols, and access control translate
to the new world of phones, cloud services, social media and the
Internet of Things Who the attackers are - from nation states and
business competitors through criminal gangs to stalkers and
playground bullies What they do - from phishing and carding through
SIM swapping and software exploits to DDoS and fake news Security
psychology, from privacy through ease-of-use to deception The
economics of security and dependability - why companies build
vulnerable systems and governments look the other way How dozens of
industries went online - well or badly How to manage security and
safety engineering in a world of agile development - from
reliability engineering to DevSecOps The third edition of Security
Engineering ends with a grand challenge: sustainable security. As
we build ever more software and connectivity into safety-critical
durable goods like cars and medical devices, how do we design
systems we can maintain and defend for decades? Or will everything
in the world need monthly software upgrades, and become unsafe once
they stop?
The representation of abstract data and ideas can be a difficult
and tedious task to handle when learning new concepts; however, the
advances in emerging technology have allowed for new methods of
representing such conceptual data. Information Visualization
Techniques in the Social Sciences and Humanities is a critical
scholarly resource that examines the application of information
visualization in the social sciences and humanities. Featuring
coverage on a broad range of topics such as social network
analysis, complex systems, and visualization aesthetics, this book
is geared towards professionals, students, and researchers seeking
current research on information visualization.
Artificial intelligence has become an invaluable tool in modern
society and can be utilized across fields such as healthcare,
travel, education, and construction. There are numerous benefits
for companies, industries, and governments when adopting this
technology into their daily operations as it continues to evolve to
support the needs of society. Further study on the challenges and
strategies of implementation is required in order to ensure the
technology is employed to its full potential. Artificial
Intelligence for Societal Development and Global Well-Being
considers the various uses, best practices, and success factors of
artificial intelligence across fields and industries and discusses
critical ways in which the technology must be developed further for
the good of society. Covering a range of topics such as smart
devices, artificial neural networks, and natural intelligence, this
reference work is crucial for scientists, librarians, business
owners, government officials, entrepreneurs, scholars, researchers,
practitioners, instructors, and students.
Modern society has become dependent on technology, allowing
personal information to be input and used across a variety of
personal and professional systems. From banking to medical records
to e-commerce, sensitive data has never before been at such a high
risk of misuse. As such, organizations now have a greater
responsibility than ever to ensure that their stakeholder data is
secured, leading to the increased need for cybersecurity
specialists and the development of more secure software and
systems. To avoid issues such as hacking and create a safer online
space, cybersecurity education is vital and not only for those
seeking to make a career out of cybersecurity, but also for the
general public who must become more aware of the information they
are sharing and how they are using it. It is crucial people learn
about cybersecurity in a comprehensive and accessible way in order
to use the skills to better protect all data. The Research
Anthology on Advancements in Cybersecurity Education discusses
innovative concepts, theories, and developments for not only
teaching cybersecurity, but also for driving awareness of efforts
that can be achieved to further secure sensitive data. Providing
information on a range of topics from cybersecurity education
requirements, cyberspace security talents training systems, and
insider threats, it is ideal for educators, IT developers,
education professionals, education administrators, researchers,
security analysts, systems engineers, software security engineers,
security professionals, policymakers, and students.
Egal welches Android-Smartphone Sie Ihr eigen nennen - ob von
Samsung, LG, Sony oder HTC, um nur einige Hersteller zu nennen -
und egal mit welcher Android-Version das Smartphone lAuft, in
diesem Buch erfahren Sie, wie Sie alles aus Ihrem GerAt herausholen
kAnnen. Richten Sie Ihr Smartphone gemAA Ihren BedA1/4rfnissen ein,
surfen Sie im Internet, lesen Sie Ihre Mails, nutzen Sie soziale
Netzwerke wie Facebook, Instagram und Twitter, laden Sie Apps und
Musik auf Ihr Smartphone, finden Sie alle wichtigen Funktionen und
noch ein paar mehr. Dieses Buch fA1/4hrt Sie in die verborgenen
Tiefen Ihres Smartphones. Es geht auf die Funktionen ein, A1/4ber
die jedes Android-Smartphone verfA1/4gt, auf Besonderheiten
einzelner GerAte und auf die Funktionen neuer Versionen. Wenn Sie
mehr Smartphone-Tricks beherrschen wollen, aber nicht so viel Zeit
investieren kAnnen, dann ist dieses Buch genau das richtige fA1/4r
Sie.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,183
Discovery Miles 11 830
MIS
Hossein Bidgoli
Paperback
R1,163
R1,047
Discovery Miles 10 470
|