![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it's a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.
As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour. Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025. The book's primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.
The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning. This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques. Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers.
This book is a study guide for Huawei (HCNA) certification. It has been written to help readers understand the principles of network technologies. It covers topics including network fundamentals, Ethernet, various protocols such as those used in routing, and Huawei's own VRP operating system-all essential aspects of HCNA certification. Presenting routing and switching basics in depth, it is a valuable resource for information and communications technology (ICT) practitioners, university students and network technology fans.
Comprehensive and timely, Cloud Computing: Concepts and Technologies offers a thorough and detailed description of cloud computing concepts, architectures, and technologies, along with guidance on the best ways to understand and implement them. It covers the multi-core architectures, distributed and parallel computing models, virtualization, cloud developments, workload and Service-Level-Agreements (SLA) in cloud, workload management. Further, resource management issues in cloud with regard to resource provisioning, resource allocation, resource mapping and resource adaptation, ethical, non-ethical and security issues in cloud are followed by discussion of open challenges and future directions. This book gives students a comprehensive overview of the latest technologies and guidance on cloud computing, and is ideal for those studying the subject in specific modules or advanced courses. It is designed in twelve chapters followed by laboratory setups and experiments. Each chapter has multiple choice questions with answers, as well as review questions and critical thinking questions. The chapters are practically-focused, meaning that the information will also be relevant and useful for professionals wanting an overview of the topic.
Transformation and Your New EHR offers a robust communication and change leadership approach to support electronic health record (EHR) implementations and transformation journeys. This book highlights the approach and philosophy of communication, change leadership, and systems and process design, giving readers a practical view into the successes and failures that can be experienced throughout the evolution of an EHR implementation.
Issues surrounding business complexity plague organizations throughout the world. This situation is particularly true of the numerous complex projects and programs upon which organizations embark on a regular basis. Current project management processes and standards are based on Newtonian/Cartesian principles, such as linearity, reductionism, and single source problem causation. However, complex projects exhibit both Newtonian/Cartesian characteristics and complex systems characteristics, such as emergence, self-organization, non-linearity, non-reductionism, and multi-source problem causation. To conduct successful projects, complementary ways of approaching projects are required, and new competencies for those who manage projects and for those on project teams are required as well. There are a number of books available to help project managers and teams address the issue of systems behavior. However, there are none that approach complex projects from a neuroscience-based approach to human behavior and ambiguity. This book does exactly that in order to reduce project complexity and thereby increase the probability of project success. Cognitive Readiness in Project Teams looks to the concept of cognitive readiness (CR), first developed by the United States Department of Defense to better prepare and manage teams of individuals in complex battlefield situations. Its intent is to make project managers and teams more focused, responsive, resilient and adaptive through self-mastery and the mastering of interpersonal relationships. It introduces a CR framework for project managers and teams. This framework has neuroscience fundamentals and theorems as the foundation for the three pillars of CR: mindfulness, emotional intelligence, and social intelligence. The book is a compendium of chapters written by renowned authors in the fields of project management, neuroscience, mindfulness, and emotional and social intelligence.
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle. Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis: When should the security architect begin the analysis? At what points can a security architect add the most value? What are the activities the architect must execute? How are these activities delivered? What is the set of knowledge domains applied to the analysis? What are the outputs? What are the tips and tricks that make security architecture risk assessment easier? To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after you've seen a sufficient diversity of architectures, you'll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions.
The development of computer software for nonlinear control systems has provided many benefits for teaching, research, and the development of control systems design. MATLAB is considered the dominant software platforms for linear and nonlinear control systems analysis. This book provides an easy way to learn nonlinear control systems such as feedback linearization technique and Sliding mode control (Structure variable control) which are one of the most used techniques in nonlinear control dynamical systems; therefore teachers-students and researchers are all in need to handle such techniques; and since they are too difficult for them to handle such nonlinear controllers especially for a more complicated systems such as induction motor, satellite, and vehicles dynamical models. Thus, this document it is an excellent resource for learning the principle of feedback linearization and sliding mode techniques in an easy and simple way: Provides a briefs description of the feedback linearization and sliding mode control strategies Includes a simple method on how to determine the right and appropriate controller (P-PI-PID) for feedback linearization control strategy. A Symbolic MATLAB Based function for finding the feedback linearization and sliding mode controllers are developed and tested using several examples. A simple method for finding the approximate sliding mode controller parameters is introduced Where the program used to construct the nonlinear controller uses symbolic computations; such that the user should provide the program with the necessary functions f(x), g(x) and h(x) using the symbolic library.
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems Cyber-attacks on SCADA systems the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory management can lead to costly financial consequences or even result in loss of life. Minimizing potential risks and responding to malicious actions requires innovative approaches for monitoring SCADA systems and protecting them from targeted attacks. SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is designed to help security and networking professionals develop and deploy accurate and effective Intrusion Detection Systems (IDS) for SCADA systems that leverage autonomous machine learning. Providing expert insights, practical advice, and up-to-date coverage of developments in SCADA security, this authoritative guide presents a new approach for efficient unsupervised IDS driven by SCADA-specific data. Organized into eight in-depth chapters, the text first discusses how traditional IT attacks can also be possible against SCADA, and describes essential SCADA concepts, systems, architectures, and main components. Following chapters introduce various SCADA security frameworks and approaches, including evaluating security with virtualization-based SCADAVT, using SDAD to extract proximity-based detection, finding a global and efficient anomaly threshold with GATUD, and more. This important book: Provides diverse perspectives on establishing an efficient IDS approach that can be implemented in SCADA systems Describes the relationship between main components and three generations of SCADA systems Explains the classification of a SCADA IDS based on its architecture and implementation Surveys the current literature in the field and suggests possible directions for future research SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is a must-read for all SCADA security and networking researchers, engineers, system architects, developers, managers, lecturers, and other SCADA security industry practitioners.
Blockchain is a technology that has attracted the attention of all types of businesses. Cryptocurrency such as Bitcoin has gained the most attention, but now companies are applying Blockchain technology to develop solutions improving traditional applications and securing all types of transactions. Robust and innovative, this technology is being combined with other well-known technologies including Cloud Computing, Big Data, and IoT to revolutionize outcomes in all verticals. Unlike books focused on financial applications, Essential Enterprise Blockchain Concepts and Applications is for researchers and practitioners who are looking for secure, viable, low-cost, and workable applications to solve a broad range of business problems. The book presents research that rethinks how to incorporate Blockchain with existing technology. Chapters cover various applications based on Blockchain technology including: Digital voting Smart contracts Supply chain management Internet security Logistics management Identity management Securing medical devices Asset management Blockchain plays a significant role in providing security for data operations. It defines how trusted transactions can be carried out and addresses Internet vulnerability problems. Blockchain solves the security fault line between AI and IoT in smart systems as well as in other systems using devices connected to each other through public networks. Linear and permanent indexed records are maintained by Blockchain to face the vulnerability issues in a wide variety applications. In addition to applications, the book also covers consensus algorithms and protocols and performance of Blockchain algorithms.
DataOps is a new way of delivering data and analytics that is proven to get results. It enables IT and users to collaborate in the delivery of solutions that help organisations to embrace a data-driven culture. The DataOps Revolution: Delivering the Data-Driven Enterprise is a narrative about real world issues involved in using DataOps to make data-driven decisions in modern organisations. The book is built around real delivery examples based on the author's own experience and lays out principles and a methodology for business success using DataOps. Presenting practical design patterns and DataOps approaches, the book shows how DataOps projects are run and presents the benefits of using DataOps to implement data solutions. Best practices are introduced in this book through the telling of a story, which relates how a lead manager must find a way through complexity to turn an organisation around. This narrative vividly illustrates DataOps in action, enabling readers to incorporate best practices into everyday projects. The book tells the story of an embattled CIO who turns to a new and untested project manager charged with a wide remit to roll out DataOps techniques to an entire organisation. It illustrates a different approach to addressing the challenges in bridging the gap between IT and the business. The approach presented in this story lines up to the six IMPACT pillars of the DataOps model that Kinaesis (www.kinaesis.com) has been using through its consultants to deliver successful projects and turn around failing deliveries. The pillars help to organise thinking and structure an approach to project delivery. The pillars are broken down and translated into steps that can be applied to real-world projects that can deliver satisfaction and fulfillment to customers and project team members.
The purpose of this book is to provide tools for a better understanding of the fundamental tradeo's and interdependencies in wireless networks, with the goal of designing resource allocation strategies that exploit these int- dependencies to achieve signi?cant performance gains. Two facts prompted us to write it: First, future wireless applications will require a fundamental understanding of the design principles and control mechanisms in wireless networks. Second, the complexity of the network problems simply precludes the use of engineering common sense alone to identify good solutions, and so mathematics becomes the key avenue to cope with central technical problems in the design of wireless networks. In this book, two ?elds of mathematics play a central role: Perron-Frobenius theory for non-negative matrices and optimization theory. This book is a revised and expanded version of the research monograph "Resource Allocation in Wireless Networks" that was published as Lecture Notes in Computer Sciences (LNCS 4000) in 2006. Although the general structure has remained unchanged to a large extent, the book contains - merous additional results and more detailed discussion. For instance, there is a more extensive treatment of general nonnegative matrices and interf- ence functions that are described by an axiomatic model. Additional material on max-min fairness, proportional fairness, utility-based power control with QoS (quality of service) support and stochastic power control has been added.
It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.
This book presents up-to-date research developments and novel methodologies regarding recursive filtering for 2-D shift-varying systems with various communication constraints. It investigates recursive filter/estimator design and performance analysis by a combination of intensive stochastic analysis, recursive Riccati-like equations, variance-constrained approach, and mathematical induction. Each chapter considers dynamics of the system, subtle design of filter gains, and effects of the communication constraints on filtering performance. Effectiveness of the derived theories and applicability of the developed filtering strategies are illustrated via simulation examples and practical insight. Features:- Covers recent advances of recursive filtering for 2-D shift-varying systems subjected to communication constraints from the engineering perspective. Includes the recursive filter design, resilience operation and performance analysis for the considered 2-D shift-varying systems. Captures the essence of the design for 2-D recursive filters. Develops a series of latest results about the robust Kalman filtering and protocol-based filtering. Analyzes recursive filter design and filtering performance for the considered systems. This book aims at graduate students and researchers in mechanical engineering, industrial engineering, communications networks, applied mathematics, robotics and control systems.
Network coding is a field of information and coding theory and is a method of attaining maximum information flow in a network. This book is an ideal introduction for the communications and network engineer, working in research and development, who needs an intuitive introduction to network coding and to the increased performance and reliability it offers in many applications. This book is an ideal introduction for the research and development communications and network engineer who needs an intuitive introduction to the theory and wishes to understand the increased performance and reliability it offers over a number of applications.
This book has been written with the support of Huawei's large accumulation of technical knowledge and experience in the WLAN field, as well as its understanding of customer service requirements. First, the book covers service challenges facing enterprise wireless networks, along with detailing the latest evolution of Wi-Fi standards, air interface performance, and methods for improving user experience in enterprise scenarios. Furthermore, it illustrates typical networking, planning, and scenario-specific design for enterprise WLANs, and provides readers with a comprehensive understanding of enterprise WLAN planning, design, and technical implementation, as well as suggestions for deployment. This is a practical and easy-to-understand guide to WLAN design, and is written for WLAN technical support and planning engineers, network administrators, and enthusiasts of network technology. Authors Rihai Wu is Chief Architect of Huawei's campus network WLAN solution with 16 years of experience in wireless communications product design and a wealth of expertise in network design and product development. He previously served as a designer and developer of products for Wideband Code Division Multiple Access (WCDMA), LTE indoor small cells, and WLAN. Xun Yang is a WLAN standard expert from Huawei. He has nine years of experience in formulating WLAN standards, and previously served as 802.11ac Secretary, 802.11ah PHY Ad-hoc Co-chair, and 802.11ax MU Ad Hoc Sub Group Co-chair. Mr. Yang oversees technical research, the promotion of standards, and industrialization in the WLAN field, and has filed more than 100 patents. Xia Zhou is a documentation engineer of Huawei's campus network WLAN solution. She has 10 years of experience in creating documents for campus network products. Ms. Zhou was previously in charge of writing manuals for Huawei data center switches, WLAN products, and campus network solutions. She is also the author of Campus Network Solution Deployment Guide and was a co-sponsor of technical sessions such as WLAN from Basics to Proficiency. Yibo Wang is a documentation engineer of Huawei's campus network WLAN solution. He has nine years of experience in creating documents for campus network products. Mr. Wang was previously in charge of writing manuals for Huawei switches, WLAN products, and routers. He was also a co-sponsor of technical sessions such as WLAN from Basics to Proficiency and HCIA-WLAN certification training courses.
This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and everyday examples. The book benefits and reflects the author's more than 22 years of designing and working with IP routing devices and protocols (and Telecoms systems, in general). Every aspect of the book is written to reflect current best practices using real-world examples. This book describes the various methods used by routers to learn routing information. The author includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. He explains the processing steps involved in forwarding IP packets through an IP router to their destination and discusses the various mechanisms IP routers use for controlling routing in networks. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers. It is geared toward readers who want to understand the concepts and theory of IP routing protocols, through real-world example systems and networks. Focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Describes the various methods used by routers to learn routing information. Includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. Provides detailed descriptions of the most common distance-vector routing protocols RIPv2 and EIGRP. Discusses the various mechanisms IP routers use for controlling routing in networks. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).
This book discusses link-state routing protocols (OSPF and IS-IS), and the path-vector routing protocol (BGP). It covers their most identifying characteristics, operations, and the databases they maintain. Material is presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. Every aspect of the book is written to reflect current best practices using real-world examples. The book begins with a detailed description of the OSPF area types and hierarchical routing, and the different types of routers used in an OSPF autonomous system. The author goes on to describe in detail the different OSPF packet types, and inbound and outbound processing of OSPF link-state advertisements (LSAs). Next, the book gives an overview of the main features of IS-IS. The author then discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. He then describes in detail IS-IS network address formats, IS-IS routing metrics, IS-IS packet types, IS-IS network types and adjacency formation, IS-IS LSDB and synchronization, and IS-IS authentication. The book then reviews the main concepts of path-vector routing protocols, and describes BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP Autonomous System Numbers (ASNs). Focuses solely on link-state routing protocols (OSPF and IS-IS), and the only path-vector routing protocol in use today (BGP). Reviews the basic concepts underlying the design of IS-IS and provides a detailed description of IS-IS area types and hierarchical routing, and the different types of routers used by IS-IS. Discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. Describes in detail BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP ASNs, includes a high-level view of the typical BGP router and its components, and inbound and outbound message processing. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).
Starting with problems and challenges faced by enterprise WANs, Software-Defined Wide Area Network Architectures and Technologies provides a detailed description of SD-WAN's background and basic features, as well as the system architecture, operating mechanism, and application scenarios of the SD-WAN solution based on the implementation of Huawei SD-WAN Solution. It also explains key SD-WAN technologies and analyzes real SD-WAN deployment cases, affording readers with design methods and deployment suggestions for the SD-WAN solution. The information presented in this book is easy to understand and very practical. It enables you to become adept in the SD-WAN solution's implementation and design principles. The book is intended for ICT practitioners, such as network technical support engineers, network administrators, and network planning engineers, to use in studying theory. Furthermore, it serves as reference material for network technology enthusiasts. Authors Cheng Sheng is the Chief Architect of Huawei's SD-WAN Solution. He has nearly 20 years of experience in network product and solution design, as well as extensive expertise in product design and development, network planning and design, and network engineering project implementation. Jie Bai is an Architect of Huawei's SD-WAN Solution. He is well versed in Huawei security products and SD-WAN Solution and has written books such as Huawei Firewall Technology Talk as well as Huawei Anti-DDoS Technology Talk. Qi Sun is a Senior Information Architect of Huawei, and he is knowledgeable in Huawei SD-WAN Solution, CloudVPN Solution, and Cloud Management Solution. He also participated in the information architecture design and delivery of multiple solutions.
This book contains extended and revised versions of the best papers presented at the 29th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2021, held in Singapore, in October 2021*. The 12 full papers included in this volume were carefully reviewed and selected from the 44 papers (out of 75 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like low-power design of RF, analog and mixed-signal circuits, EDA tools for the synthesis and verification of heterogenous SoCs, accelerators for cryptography and deep learning and on-chip Interconnection system, reliability and testing, and integration of 3D-ICs. *The conference was held virtually.
How can we recruit out of your program? We have a project - how do we reach out to your students? If we do research together who owns it? We have employees who need to "upskill" in analytics - can you help me with that? How much does all of this cost? Managers and executives are increasingly asking university professors such questions as they deal with a critical shortage of skilled data analysts. At the same time, academics are asking such questions as: How can I bring a "real" analytical project in the classroom? How can I get "real" data to help my students develop the skills necessary to be a "data scientist? Is what I am teaching in the classroom aligned with the demands of the market for analytical talent? After spending several years answering almost daily e-mails and telephone calls from business managers asking for staffing help and aiding fellow academics with their analytics teaching needs, Dr. Jennifer Priestley of Kennesaw State University and Dr. Robert McGrath of the University of New Hampshire wrote Closing the Analytics Talent Gap: An Executive's Guide to Working with Universities. The book builds a bridge between university analytics programs and business organizations. It promotes a dialog that enables executives to learn how universities can help them find strategically important personnel and universities to learn how they can develop and educate this personnel. Organizations are facing previously unforeseen challenges related to the translation of massive amounts of data - structured and unstructured, static and in-motion, voice, text, and image - into information to solve current challenges and anticipate new ones. The advent of analytics and data science also presents universities with unforeseen challenges of providing learning through application. This book helps both organizations with finding "data natives" and universities with educating students to develop the facility to work in a multi-faceted and complex data environment. .
As digital technologies occupy a more central role in working and everyday human life, individual and social realities are increasingly constructed and communicated through digital objects, which are progressively replacing and representing physical objects. They are even shaping new forms of virtual reality. This growing digital transformation coupled with technological evolution and the development of computer computation is shaping a cyber society whose working mechanisms are grounded upon the production, deployment, and exploitation of big data. In the arts and humanities, however, the notion of big data is still in its embryonic stage, and only in the last few years, have arts and cultural organizations and institutions, artists, and humanists started to investigate, explore, and experiment with the deployment and exploitation of big data as well as understand the possible forms of collaborations based on it. Big Data in the Arts and Humanities: Theory and Practice explores the meaning, properties, and applications of big data. This book examines therelevance of big data to the arts and humanities, digital humanities, and management of big data with and for the arts and humanities. It explores the reasons and opportunities for the arts and humanities to embrace the big data revolution. The book also delineates managerial implications to successfully shape a mutually beneficial partnership between the arts and humanities and the big data- and computational digital-based sciences. Big data and arts and humanities can be likened to the rational and emotional aspects of the human mind. This book attempts to integrate these two aspects of human thought to advance decision-making and to enhance the expression of the best of human life.
Internet of Things (IoT)-enabled spaces have made revolutionary advances in the utility grid. Among these advances, intelligent and energy-efficient services are gaining considerable interest. The use of the smart grid is increasing day after day around us and is not only used in saving energy but also in our daily life for intelligent health, traffic, and even farming systems. The grid enabled with IoT features is also expected to communicate with cellular networks smoothly in the next-generation networks (6G and beyond). This will open the door for other interesting research areas. In this book, we consider the most significant and emergent research topics in this domain, addressing major issues and challenges in IoT-based solutions proposed for the smart grid. The chapters provide insight on comprehensive topics in IoT-based smart grids, combining technical aspects with the most up-to-date theory. It investigates the grid under varying and potential emerging paradigms such as edge/fog computing, in addition to big data aspects considerations in the IoT era. With comprehensive surveys and case studies, this book explores basic and high-level grid aspects in the emerging smart city paradigm, which makes it especially attractive to researchers, academics, and higher-level students. This authored book can be used by computer science undergraduate and postgraduate students, researchers and practitioners, city administrators, policymakers, and government regulators.
Campus Network Architectures and Technologies begins by describing the service challenges facing campus networks, and then details the intent-driven campus network architectures and technologies of Huawei Cloud Campus Solution. After reading this book, you will have a comprehensive understanding of next-generation campus network solutions, technical implementations, planning, design, and other know-how. Leveraging Huawei's years of technical expertise and practices in the campus network field, this book systematically describes the use of technical solutions such as virtualization, big data, AI, and SDN in campus networks. You will be able to reconstruct campus networks quickly and efficiently utilizing this informative description. Additionally, this book provides detailed suggestions for campus network design and deployment based on Huawei's extensive project implementation experience, assisting with the construction of automated and intelligent campus networks required to cope with challenges. This is a practical, informative, and easy-to-understand guide for learning about and designing campus networks. It is intended for network planning engineers, network technical support engineers, network administrators, and enthusiasts of campus network technologies. Authors Ningguo Shen is Chief Architect for Huawei's campus network solutions. He has approximately 20 years' experience in campus network product and solution design, as well as a wealth of expertise in network planning and design. Mr. Shen previously served as a system engineer for the campus switch, data center switch, and WLAN product lines, and led the design of Huawei's intent-driven campus network solution. Bin Yu is an Architect for Huawei's campus network solutions. He has 12 years' experience in campus network product and solution design, as well as extensive expertise in network planning and design and network engineering project implementation. Mr. Yu once led the design of multiple features across various campus network solutions. Mingxiang Huang is a Documentation Engineer for Huawei's campus network solutions. He has three years of technical service experience, and four years of expertise in developing campus network product documentation. Mr. Huang was previously in charge of writing manuals for Huawei router and switch products. He has authored many popular technical series, including Be an OSPF Expert, Insight into Routing Policies, and Story behind Default Routes. Hailin Xu is a Documentation Engineer for Huawei's campus network solutions. He has two years of marketing experience in smart campus solutions, and six years of expertise in developing network products and solution documentation. Extremely familiar with Huawei's campus network products and solutions, Mr. Xu was previously in charge of writing manuals for Huawei routers, switches, and campus network solutions. In addition, he has participated in smart campus marketing projects within such sectors as education, government, and real estate. |
You may like...
Forsthoffer's Best Practice Handbook for…
William E. Forsthoffer
Hardcover
R5,626
Discovery Miles 56 260
Computational Mechanics - New Frontiers…
Prof Valliappan, Prof N Khalili
Hardcover
R8,221
Discovery Miles 82 210
Discrete Contact Mechanics with…
Irina Goryacheva, Yulia Makhovskaya
Paperback
R3,925
Discovery Miles 39 250
Rubber-Pad Forming Processes…
Maziar Ramezani, Zaidi Mohd Ripin
Hardcover
R4,052
Discovery Miles 40 520
Mechanics Of Materials - SI Edition
Barry Goodno, James Gere
Paperback
|