|
|
Books > Computing & IT > Computer communications & networking > General
Cloud computing is rapidly expanding in its applications and
capabilities through various parts of society. Utilizing different
types of virtualization technologies can push this branch of
computing to even greater heights. Design and Use of Virtualization
Technology in Cloud Computing is a crucial resource that provides
in-depth discussions on the background of virtualization, and the
ways it can help shape the future of cloud computing technologies.
Highlighting relevant topics including grid computing, mobile
computing, open source virtualization, and virtualization in
education, this scholarly reference source is ideal for computer
engineers, academicians, students, and researchers that are
interested in learning more about how to infuse current cloud
computing technologies with virtualization advancements.
Advances in Computers carries on a tradition of excellence,
presenting detailed coverage of innovations in computer hardware,
software, theory, design, and applications. The book provides
contributors with a medium in which they can explore their subjects
in greater depth and breadth than journal articles typically allow.
The articles included in this book will become standard references,
with lasting value in this rapidly expanding field.
Between adolescence and adulthood, individuals begin to explore
themselves mentally and emotionally in an attempt to figure out who
they are and where they fit in society. Social technologies in the
modern age have ushered in an era where these evolving adolescents
must circumvent the negative pressures of online influences while
also still trying to learn how to be utterly independent. Recent
Advances in Digital Media Impacts on Identity, Sexuality, and
Relationships is a collection of critical reference materials that
provides imperative research on identity exploration in emerging
adults and examines how digital media is used to help explore and
develop one's identity. While highlighting topics such as mobile
addiction, online intimacy, and cyber aggression, this publication
explores a crucial developmental period in the human lifespan and
how digital media hinders (or helps) maturing adults navigate life.
This book is ideally designed for therapists, psychologists,
sociologists, psychiatrists, researchers, educators, academicians,
and professionals.
Vehicular traffic congestion and accidents remain universal issues
in today's world. Due to the continued growth in the use of
vehicles, optimizing traffic management operations is an immense
challenge. To reduce the number of traffic accidents, improve the
performance of transportation systems, enhance road safety, and
protect the environment, vehicular ad-hoc networks have been
introduced. Current developments in wireless communication,
computing paradigms, big data, and cloud computing enable the
enhancement of these networks, equipped with wireless communication
capabilities and high-performance processing tools. Cloud-Based Big
Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference
source that provides vital research on cloud and data analytic
applications in intelligent transportation systems. While
highlighting topics such as location routing, accident detection,
and data warehousing, this publication addresses future challenges
in vehicular ad-hoc networks and presents viable solutions. This
book is ideally designed for researchers, computer scientists,
engineers, automobile industry professionals, IT practitioners,
academicians, and students seeking current research on cloud
computing models in vehicular networks.
Topics in Parallel and Distributed Computing provides resources and
guidance for those learning PDC as well as those teaching students
new to the discipline. The pervasiveness of computing devices
containing multicore CPUs and GPUs, including home and office PCs,
laptops, and mobile devices, is making even common users dependent
on parallel processing. Certainly, it is no longer sufficient for
even basic programmers to acquire only the traditional sequential
programming skills. The preceding trends point to the need for
imparting a broad-based skill set in PDC technology. However, the
rapid changes in computing hardware platforms and devices,
languages, supporting programming environments, and research
advances, poses a challenge both for newcomers and seasoned
computer scientists. This edited collection has been developed over
the past several years in conjunction with the IEEE technical
committee on parallel processing (TCPP), which held several
workshops and discussions on learning parallel computing and
integrating parallel concepts into courses throughout computer
science curricula.
Internet Congestion Control provides a description of some of the
most important topics in the area of congestion control in computer
networks, with special emphasis on the analytical modeling of
congestion control algorithms. The field of congestion control has
seen many notable advances in recent years and the purpose of this
book, which is targeted towards the advanced and intermediate
reader, is to inform about the most important developments in this
area. The book should enable the reader to gain a good
understanding of the application of congestion control theory to a
number of application domains such as Data Center Networks, Video
Streaming, High Speed Links and Broadband Wireless Networks. When
seen through the lens of analytical modeling, there are a number of
common threads that run through the design and analysis of
congestion control protocols in all these different areas, which
are emphasized in this book. The book also cuts a path through the
profusion of algorithms in the literature, and puts the topic on a
systematic and logical footing. Internet Congestion Control
provides practicing network engineers and researchers with a
comprehensive and accessible coverage of analytical models of
congestion control algorithms, and gives readers everything needed
to understand the latest developments and research in this area.
Meeting People via WiFi and Bluetooth will contain an overview of
how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi)
and Bluetooth 802.15 Radio Frequencies. The content contained here
came from research and materials originally presented at Defcon
Wireless CTF Village in August 2015 entitled "Meeting People Via
Wi-Fi". The book will go over the hardware and software needed in
order to do this tracking, how to use these particular tools in
order to do attribution, and tips for protecting yourself from
being attributed via those signals.
Mobile Ad Hoc Networks (MANETs) are a popular form of network for
data transfer due to the fact that they are dynamic, require no
fixed infrastructure, and are scalable. However, MANETs are
particularly susceptible to several different types of widely
perpetrated cyberattack. One of the most common hacks aimed at
MANETs is the Black Hole attack, in which a particular node within
the network displays itself as having the shortest path for the
node whose packets it wants to intercept. Once the packets are
drawn to the Black Hole, they are then dropped instead of relayed,
and the communication of the MANET is thereby disrupted, without
knowledge of the other nodes in the network. Due to the
sophistication of the Black Hole attack, there has been a lot of
research conducted on how to detect it and prevent it. The authors
of this short format title provide their research results on
providing an effective solution to Black Hole attacks, including
introduction of new MANET routing protocols that can be implemented
in order to improve detection accuracy and network parameters such
as total dropped packets, end-to-end delay, packet delivery ratio,
and routing request overhead.
Shaping Future 6G Networks Discover the societal and technology
drivers contributing to build the next generation of wireless
telecommunication networks Shaping Future 6G Networks: Needs,
Impacts, and Technologies is a holistic snapshot on the evolution
of 5G technologies towards 6G. With contributions from
international key players in industry and academia, the book
presents the hype versus the realistic capabilities of 6G
technologies, and delivers cutting-edge business and technological
insights into the future wireless telecommunications landscape.
You'll learn about: Forthcoming demand for post 5G networks,
including new requirements coming from small and large businesses,
manufacturing, logistics, and automotive industry Societal
implications of 6G, including digital sustainability, strategies
for increasing energy efficiency, as well as future open networking
ecosystems Impacts of integrating non-terrestrial networks to build
the 6G architecture Opportunities for emerging THz radio access
technologies in future integrated communications, positioning, and
sensing capabilities in 6G Design of highly modular and distributed
6G core networks driven by the ongoing RAN-Core integration and the
benefits of AI/ML-based control and management Disruptive
architectural considerations influenced by the Post-Shannon Theory
The insights in Shaping Future 6G Networks will greatly benefit IT
engineers and managers focused on the future of networking, as well
as undergraduate and graduate engineering students focusing on the
design, implementation, and management of mobile networks and
applications.
The Western cultural trend of self-representation is transcending
borders as it permeates the online world. A prime example of this
trend is selfies, and how they have evolved into more than just
self-portraits. Selfies as a Mode of Social Media and Work Space
Research is a comprehensive reference source for the latest
research on explicit and implicit messaging of self-portraiture and
its indications about individuals, groups, and societies. Featuring
coverage on a broad range of topics including dating, job hunting,
and marketing, this publication is ideally designed for
academicians, researchers, and professionals interested in the
current phenomenon of selfies and their impact on society.
As computers continue to remain essential tools for the pursuit of
physics, medicine, economics, social sciences, and more,
supercomputers are proving that they can further extend and greatly
enhance as-of-yet undiscovered knowledge and solve the world's most
complex problems. As these instruments continue to lead to
groundbreaking discoveries and breakthroughs, it is imperative that
research remains up to date with the latest findings and uses. The
Handbook of Research on Methodologies and Applications of
Supercomputing is a comprehensive and critical reference book that
provides research on the latest advances of control flow and
dataflow supercomputing and highlights selected emerging big data
applications needing high acceleration and/or low power.
Consequently, this book advocates the need for hybrid computing,
where the control flow part represents the host architecture and
dataflow part represents the acceleration architecture. These
issues cover the initial eight chapters. The remaining eight
chapters cover selected modern applications that are best
implemented on a hybrid computer, in which the transactional parts
(serial code) are implemented on the control flow part and the
loops (parallel code) on the dataflow part. These final eight
chapters cover two major application domains: scientific computing
and computing for digital economy. This book offers applications in
marketing, medicine, energy systems, and library science, among
others, and is an essential source for scientists, programmers,
engineers, practitioners, researchers, academicians, and students
interested in the latest findings and advancements in
supercomputing.
CORPORATE CYBERSECURITY An insider's guide showing companies how to
spot and remedy vulnerabilities in their security programs A bug
bounty program is offered by organizations for people to receive
recognition and compensation for reporting bugs, especially those
pertaining to security exploits and vulnerabilities. Corporate
Cybersecurity gives cyber and application security engineers (who
may have little or no experience with a bounty program) a hands-on
guide for creating or managing an effective bug bounty program.
Written by a cyber security expert, the book is filled with the
information, guidelines, and tools that engineers can adopt to
sharpen their skills and become knowledgeable in researching,
configuring, and managing bug bounty programs. This book addresses
the technical aspect of tooling and managing a bug bounty program
and discusses common issues that engineers may run into on a daily
basis. The author includes information on the often-overlooked
communication and follow-through approaches of effective
management. Corporate Cybersecurity provides a much-needed resource
on how companies identify and solve weaknesses in their security
program. This important book: Contains a much-needed guide aimed at
cyber and application security engineers Presents a unique
defensive guide for understanding and resolving security
vulnerabilities Encourages research, configuring, and managing
programs from the corporate perspective Topics covered include bug
bounty overview; program set-up; vulnerability reports and
disclosure; development and application Security Collaboration;
understanding safe harbor and SLA Written for professionals working
in the application and cyber security arena, Corporate
Cybersecurity offers a comprehensive resource for building and
maintaining an effective bug bounty program.
|
|