|
Books > Computing & IT > Computer communications & networking > General
Mobile Ad Hoc Networks (MANETs) are a popular form of network for
data transfer due to the fact that they are dynamic, require no
fixed infrastructure, and are scalable. However, MANETs are
particularly susceptible to several different types of widely
perpetrated cyberattack. One of the most common hacks aimed at
MANETs is the Black Hole attack, in which a particular node within
the network displays itself as having the shortest path for the
node whose packets it wants to intercept. Once the packets are
drawn to the Black Hole, they are then dropped instead of relayed,
and the communication of the MANET is thereby disrupted, without
knowledge of the other nodes in the network. Due to the
sophistication of the Black Hole attack, there has been a lot of
research conducted on how to detect it and prevent it. The authors
of this short format title provide their research results on
providing an effective solution to Black Hole attacks, including
introduction of new MANET routing protocols that can be implemented
in order to improve detection accuracy and network parameters such
as total dropped packets, end-to-end delay, packet delivery ratio,
and routing request overhead.
The development of software has expanded substantially in recent
years. As these technologies continue to advance, well-known
organizations have begun implementing these programs into the ways
they conduct business. These large companies play a vital role in
the economic environment, so understanding the software that they
utilize is pertinent in many aspects. Researching and analyzing the
tools that these corporations use will assist in the practice of
software engineering and give other organizations an outline of how
to successfully implement their own computational methods. Tools
and Techniques for Software Development in Large Organizations:
Emerging Research and Opportunities is an essential reference
source that discusses advanced software methods that prominent
companies have adopted to develop high quality products. This book
will examine the various devices that organizations such as Google,
Cisco, and Facebook have implemented into their production and
development processes. Featuring research on topics such as
database management, quality assurance, and machine learning, this
book is ideally designed for software engineers, data scientists,
developers, programmers, professors, researchers, and students
seeking coverage on the advancement of software devices in today's
major corporations.
Topics in Parallel and Distributed Computing provides resources and
guidance for those learning PDC as well as those teaching students
new to the discipline. The pervasiveness of computing devices
containing multicore CPUs and GPUs, including home and office PCs,
laptops, and mobile devices, is making even common users dependent
on parallel processing. Certainly, it is no longer sufficient for
even basic programmers to acquire only the traditional sequential
programming skills. The preceding trends point to the need for
imparting a broad-based skill set in PDC technology. However, the
rapid changes in computing hardware platforms and devices,
languages, supporting programming environments, and research
advances, poses a challenge both for newcomers and seasoned
computer scientists. This edited collection has been developed over
the past several years in conjunction with the IEEE technical
committee on parallel processing (TCPP), which held several
workshops and discussions on learning parallel computing and
integrating parallel concepts into courses throughout computer
science curricula.
Internet Congestion Control provides a description of some of the
most important topics in the area of congestion control in computer
networks, with special emphasis on the analytical modeling of
congestion control algorithms. The field of congestion control has
seen many notable advances in recent years and the purpose of this
book, which is targeted towards the advanced and intermediate
reader, is to inform about the most important developments in this
area. The book should enable the reader to gain a good
understanding of the application of congestion control theory to a
number of application domains such as Data Center Networks, Video
Streaming, High Speed Links and Broadband Wireless Networks. When
seen through the lens of analytical modeling, there are a number of
common threads that run through the design and analysis of
congestion control protocols in all these different areas, which
are emphasized in this book. The book also cuts a path through the
profusion of algorithms in the literature, and puts the topic on a
systematic and logical footing. Internet Congestion Control
provides practicing network engineers and researchers with a
comprehensive and accessible coverage of analytical models of
congestion control algorithms, and gives readers everything needed
to understand the latest developments and research in this area.
Between adolescence and adulthood, individuals begin to explore
themselves mentally and emotionally in an attempt to figure out who
they are and where they fit in society. Social technologies in the
modern age have ushered in an era where these evolving adolescents
must circumvent the negative pressures of online influences while
also still trying to learn how to be utterly independent. Recent
Advances in Digital Media Impacts on Identity, Sexuality, and
Relationships is a collection of critical reference materials that
provides imperative research on identity exploration in emerging
adults and examines how digital media is used to help explore and
develop one's identity. While highlighting topics such as mobile
addiction, online intimacy, and cyber aggression, this publication
explores a crucial developmental period in the human lifespan and
how digital media hinders (or helps) maturing adults navigate life.
This book is ideally designed for therapists, psychologists,
sociologists, psychiatrists, researchers, educators, academicians,
and professionals.
![Cyberspace (Hardcover): Evon Abu-Taieh, Abdelkrim El Mouatasim, Issam H. Al Hadid](//media.loot.co.za/images/x80/1299581839268179215.jpg) |
Cyberspace
(Hardcover)
Evon Abu-Taieh, Abdelkrim El Mouatasim, Issam H. Al Hadid
|
R3,402
Discovery Miles 34 020
|
Ships in 10 - 15 working days
|
|
This is a book that will create enormous debate within the
technical and the counter-terrorism communities. While there will
be the inevitable criticism that the material contained in the book
could be used maliciously, the fact is that this knowledge is
already in the hands of our enemies. This book is truly designed to
inform while entertaining (and scaring) the reader, and it will
instantly be in demand by readers of "Stealing the Network: How to
Own the Box"
* A meticulously detailed and technically accurate work of fiction
that exposes the very real possibilities of such an event
occurring
* An informative and scary insight into the boundries of hacking
and cyber-terrorism
* Written by a team of the most accomplished cyber-security
specialists in the world
The Western cultural trend of self-representation is transcending
borders as it permeates the online world. A prime example of this
trend is selfies, and how they have evolved into more than just
self-portraits. Selfies as a Mode of Social Media and Work Space
Research is a comprehensive reference source for the latest
research on explicit and implicit messaging of self-portraiture and
its indications about individuals, groups, and societies. Featuring
coverage on a broad range of topics including dating, job hunting,
and marketing, this publication is ideally designed for
academicians, researchers, and professionals interested in the
current phenomenon of selfies and their impact on society.
Marxist discourse around automation has recently become waylaid
with breathless techno-pessimist dystopias and fanciful
imaginations of automated luxury communism. This collection of
essays by both established veterans of the field and new voices is
a refreshingly sober materialist reflection on recent technological
developments within capitalist production. It covers a broad range
of digital aspects now proliferating across our work and lives,
including chapters on the digitalisation of agriculture, robotics
in the factory and the labour process on crowdworking platforms. It
looks to how 20th century Marxist predictions of the 'workerless
factory' are, or are not, coming true, and how 'Platform
Capitalism' should be understood and critiqued. Through rich
empirical, theoretical and historical material, this book is
necessary reading for those wanting a clear overview of our digital
world.
This book brings together papers presented at The 2nd International
Conference on Artificial Intelligence in China (ChinaAI) 2020,
which provides a venue to disseminate the latest developments and
to discuss the interactions and links between these
multidisciplinary fields. Spanning topics covering all topics in
artificial intelligence with new development in China, this book is
aimed at undergraduate and graduate students in Electrical
Engineering, Computer Science and Mathematics, researchers and
engineers from academia and industry as well as government
employees (such as NSF, DOD and DOE).
|
|