![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > General
SECURITY AND PRIVACY VISION IN 6G Prepare for the future of mobile communication with this comprehensive study 6G is the next frontier in mobile communication, with development of 6G standards slated to begin as early as 2026. As telecommunications networks become faster and more intelligent, security and privacy concerns are critical. In an increasingly connected world, there is an urgent need for user data to be safeguarded and system security enhanced against a new generation of threats. Security and Privacy Vision in 6G provides a comprehensive survey of these threats and the emerging techniques for safeguarding against them. It includes mechanisms for prediction, detection, mitigation, and prevention, such that threats to privacy and security can be forestalled at any stage. Fully engaged with proposed 6G architectures, it is an essential resource for mobile communications professionals looking for a head start on the technology of the future. Security and Privacy Vision in 6G readers will also find: Detailed coverage of topics including edge intelligence and cloudification, industrial automation, collaborative robots, and more Treatment balancing the practical and the theoretical An editorial team with decades of international network technology experience in both industry and academia Security and Privacy Vision in 6G is a vital reference for network security professionals and for postgraduate and advanced undergraduate students in mobile communications and network security-related fields.
Advances in Delay-Tolerant Networks: Architecture and Enhanced Performance, Second Edition provides an important overview of delay-tolerant networks (DTNs) for researchers in electronics, computer engineering, telecommunications and networking for those in academia and R&D in industrial sectors. Part I reviews the technology involved and the prospects for improving performance, including different types of DTN and their applications, such as satellite and deep-space communications and vehicular communications. Part II focuses on how the technology can be further improved, addressing topics, such as data bundling, opportunistic routing, reliable data streaming, and the potential for rapid selection and dissemination of urgent messages. Opportunistic, delay-tolerant networks address the problem of intermittent connectivity in a network where there are long delays between sending and receiving messages, or there are periods of disconnection.
Tactile Internet with Human-in-the-Loop describes the change from the current Internet, which focuses on the democratization of information independent of location or time, to the Tactile Internet, which democratizes skills to promote equity that is independent of age, gender, sociocultural background or physical limitations. The book promotes the concept of the Tactile Internet for remote closed-loop human-machine interaction and describes the main challenges and key technologies. Current standardization activities in the field for IEEE and IETF are also described, making this book an ideal resource for researchers, graduate students, and industry R&D engineers in communications engineering, electronic engineering, and computer engineering.
Digital Health: Mobile and Wearable Devices for Participatory Health Applications is a key reference for engineering and clinical professionals considering the development or implementation of mobile and wearable solutions in the healthcare domain. The book presents a comprehensive overview of devices and appropriateness for the respective applications. It also explores the ethical, privacy, and cybersecurity aspects inherent in networked and mobile technologies. It offers expert perspectives on various approaches to the implementation and integration of these devices and applications across all areas of healthcare. The book is designed with a multidisciplinary audience in mind; from software developers and biomedical engineers who are designing these devices to clinical professionals working with patients and engineers on device testing, human factors design, and user engagement/compliance.
5G NR: The Next Generation Wireless Access Technology, Second Edition, follows the authors' highly celebrated books on 3G and 4G and provides a new level of insight into 5G NR. After background discussion of 5G, including requirements, spectrum aspects, and the standardization timeline, all technology features of the first phase of NR are described in detail. The book covers the NR physical-layer structure and higher-layer protocols, RF and spectrum aspects, and co-existence and interworking with LTE. The book provides a good foundation in NR and different NR technology components, giving insight into why a certain solution has been selected. This second edition is updated to reflect the latest developments in Release 16 and includes brand new chapters on: NR in unlicensed spectrum; NR-U in Rel-16; IAB; V2X and sidelink in Rel-16; industrial IoT; IIoT and referring to the URLLC enhancements for PDCCH; RIM/CL; and positioning. Also included are the key radio-related requirements of NR; design principles; technical features of basic NR transmission structure-showing where it was inherited from LTE, where it deviates from it, and the reasons why- NR multi-antenna transmission functionality; detailed description of the signals and functionality of the initial NR access, including signals for synchronization and system information; random access and paging; LTE/NR co-existence in the same spectrum and the benefits of their interworking as one system; and different aspects of mobility in NR. RF requirements for NR are described for BS and UE, the legacy bands, and for the new mm-wave bands.
Computing in Communication Networks: From Theory to Practice provides comprehensive details and practical implementation tactics on the novel concepts and enabling technologies at the core of the paradigm shift from store and forward (dumb) to compute and forward (intelligent) in future communication networks and systems. The book explains how to create virtualized large scale testbeds using well-established open source software, such as Mininet and Docker. It shows how and where to place disruptive techniques, such as machine learning, compressed sensing, or network coding in a newly built testbed. In addition, it presents a comprehensive overview of current standardization activities. Specific chapters explore upcoming communication networks that support verticals in transportation, industry, construction, agriculture, health care and energy grids, underlying concepts, such as network slicing and mobile edge cloud, enabling technologies, such as SDN/NFV/ ICN, disruptive innovations, such as network coding, compressed sensing and machine learning, how to build a virtualized network infrastructure testbed on one's own computer, and more.
The internet of things (IoT) has drawn great attention from both academia and industry, since it offers a challenging notion of creating a world where all things around us are connected to the internet and communicate with each other with minimal human intervention. Another component for helping IoT to succeed is cloud computing. The combination of cloud computing and IoT will enable new monitoring services and powerful processing of sensory data streams. These applications, alongside implementation details and challenges, should also be explored for successful mainstream adoption. IoT is also fueled by the advancement of digital technologies, and the next generation era will be cloud-based IoT systems. Integration and Implementation of the Internet of Things Through Cloud Computing studies, analyzes, and presents cloud-based IoT-related technologies, protocols, and standards along with recent research and development in cloud-based IoT. It also presents recent emerging trends and technological advances of cloud-based IoT, innovative applications, and the challenges and implications for society. The chapters included take a strong look at the societal and social aspects of this technology along with its implementations and technological analyses. This book is intended for IT specialists, technologists, practitioners, researchers, academicians, and students who are interested in the next era of IoT through cloud computing.
Wireless sensor networks have a range of applications, including military uses and in environmental monitoring. When an area of interest is inaccessible by conventional means, such a network can be deployed in ways resulting in a random distribution of the sensors. Randomly Deployed Wireless Sensor Networks offers a probabilistic method to model and analyze these networks. The book considers the network design, coverage, target detection, localization and tracking of sensors in randomly deployed wireless networks, and proposes a stochastic model. It quantifies the relationship between parameters of the network and its performance, and puts forward a communication protocol. The title provides analyses and formulas, giving engineering insight into randomly deployed wireless sensor networks. Five chapters consider the analysis of coverage performance; working modes and scheduling mechanisms; the relationship between sensor behavior and network performance properties; probabilistic forwarding routing protocols; localization methods for multiple targets and target number estimation; and experiments on target localization and tracking with a Mica sensor system.
As a result of its widespread implementation in economic and social structures, the network concept appears to be a paradigm of the contemporary world. The need for various services - transport, energy, consumption of manufacturing goods, provision of care, information and communication, etc. - draws users into interwoven networks which are meshes of material and immaterial flows. In this context, the user is a consumer of goods and services from industries and administrations, or they themselves are part of the organization (digital social networks). This book examines the invariants that unify networks in their diversity, as well as the specificities that differentiate them. It provides a reading grid that distinguishes a generic level where these systems find a common interpretation, and a specific level where appropriate analytical methods are used. Three case studies from different fields are presented to illustrate the purpose of the book in detail.
Cellular Internet of Things: From Massive Deployments to Critical 5G Applications, Second Edition, gives insights into the recent and rapid work performed by the 3rd Generation Partnership Project (3GPP) and the Multefire Alliance (MFA) to develop systems for the Cellular IoT. Beyond the technologies, readers will learn what the mMTC and cMTC market segments look like, deployment options and expected performance in terms of system capacity, expected battery lifetime, data throughput, access delay time and device cost, regulations for operation in unlicensed frequency bands, and how they impact system design and performance. This new edition contains updated content on the latest EC-GSM IoT, LTE-M and NB-IoT features in 3GPP Release 15, critical communication, i.e. URLLC, specified in 3GPP Release 15 for both LTE and NR, LTE-M and NB-IoT for unlicensed frequency bands specified in the Multefire Alliance (MFA), and an updated outlook of what the future holds in Industrial IoT and drone communications, amongst other topics.
Air Route Networks through Complex Networks Theory connects theory research with network connectivity analysis, providing practitioners with the tools they need to develop more efficient, resilient and profitable air route networks. The book helps airline route planners and executives create more robust route networks that are less vulnerable to disruptions, such as node isolation. The book further explores errors and attacks in complex networks, strategies for detecting critical nodes and cascading failure models to assess and maximize robustness. The book explains how to measure air route network connectivity with complex network representations. Air transport is among the most dynamic and toughest competition industries in today's global economy. The quality of air route network design is a key strategic factor in an airline's viability. These robust networks provide for more stable and secure carrier operations vs. those based simply on existing supply and demand volumes. Node-specific and network-specific representations are covered, along with in-depth coverage of connectivity in special and temporal networks. These collective tools serve as a guide for practitioners seeking to apply complex network theory to the airline industry.
Digital technologies are currently dramatically changing healthcare. Cloud healthcare is an increasingly trending topic in the field, converging skills from computer and health science. This new strategy fosters the management of health data at a large scale and makes it easier for healthcare organizations to improve patient experience and health team productivity while helping the support, security, compliance, and interoperability of health data. Exploring the Convergence of Computer and Medical Science Through Cloud Healthcare is a reference in the ongoing digital transformation of the healthcare sector. It presents a comprehensive state-of-the-art approach to cloud internet of things health technologies and practices. It provides insights over strategies, methodologies, techniques, tools, and services based on emerging cloud digital health solutions to overcome digital health challenges. Covering topics such as auxiliary systems, the internet of medical things, and natural language processing, this premier reference source is an essential resource for medical professionals, hospital administrators, medical students, medical professors, libraries, researchers, and academicians.
As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored. Architecture and Security Issues in Fog Computing Applications is a pivotal reference source that provides vital research on the architectural complications of fog processing and focuses on security and privacy issues in intelligent fog applications. While highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning. This book is ideally designed for IT specialists, software developers, security analysts, software engineers, academicians, students, and researchers seeking current research on network security and wireless systems.
Many professional fields have been affected by the rapid growth of technology and information. Included in this are the business and management markets as the implementation of e-commerce and cloud computing have caused enterprises to make considerable changes to their practices. With the swift advancement of this technology, professionals need proper research that provides solutions to the various issues that come with data integration and shifting to a technology-driven environment. Cloud Computing Applications and Techniques for E-Commerce is an essential reference source that discusses the implementation of data and cloud technology within the fields of business and information management. Featuring research on topics such as content delivery networks, virtualization, and software resources, this book is ideally designed for managers, educators, administrators, researchers, computer scientists, business practitioners, economists, information analysists, sociologists, and students seeking coverage on the recent advancements of e-commerce using cloud computing techniques.
Businesses have had to face many challenges due to the COVID-19 pandemic; to survive in the changing landscape, they had to adapt quickly and implement new tactics and best practices to stay competitive. Networking is one of the many areas that looks vastly different in a post-pandemic world and companies must understand this change or risk falling behind. Further study is required to uncover the various difficulties and potential future directions of networking and innovation within the business landscape. The Handbook of Research on Digital Innovation and Networking in Post-COVID-19 Organizations provides a thorough overview of the ways in which organizations have had to change and adapt to the new business environments and considers how networking looks different in a post-COVID-19 world. Covering key topics such as organizational structures, consumer behavior, teleworking, and collaborations, this major reference work is ideal for managers, business owners, industry professionals, policymakers, researchers, scholars, academicians, practitioners, instructors, and students.
Securing Delay-Tolerant Networks with BPSec One-stop reference on how to secure a Delay-Tolerant Network (DTN), written by experienced industry insiders Securing Delay-Tolerant Networks with BPSec answers the question, "How can delay-tolerant networks be secured when operating in environments that would otherwise break many of the common security approaches used on the terrestrial Internet today?" The text is composed of three sections: (1) security considerations for delay-tolerant networks, (2) the design, implementation, and customization of the BPSec protocol, and (3) how this protocol can be applied, combined with other security protocols, and deployed in emerging network environments. The text includes pragmatic considerations for deploying BPSec in both regular and delay-tolerant networks. It also features a tutorial on how to achieve several important security outcomes with a combination of security protocols, BPSec included. Overall, it covers best practices for common security functions, clearly showing designers how to prevent network architecture from being over-constrained by traditional security approaches. Written by the lead author and originator of the BPSec protocol specification, Securing Delay-Tolerant Networks (DTNs) with BPSec includes information on: The gap between cryptography and network security, how security requirements constrain network architectures, and why we need something different DTN stressing conditions, covering intermittent connectivity, congested paths, partitioned topologies, limited link state, and multiple administrative controls Securing the terrestrial internet, involving a layered approach to security, the impact of protocol design on security services, and securing the internetworking and transport layers A delay-tolerant security architecture, including desirable properties of a DTN secure protocol, fine-grained security services, and protocol augmentation Securing Delay-Tolerant Networks (DTNs) with BPSec is a one-stop reference on the subject for any professional operationally deploying BP who must use BPSec for its security, including software technical leads, software developers, space flight mission leaders, network operators, and technology and product development leaders in general.
Distributed systems intertwine with our everyday lives. The benefits and current shortcomings of the underpinning technologies are experienced by a wide range of people and their smart devices. With the rise of large-scale IoT and similar distributed systems, cloud bursting technologies, and partial outsourcing solutions, private entities are encouraged to increase their efficiency and offer unparalleled availability and reliability to their users. Applying Integration Techniques and Methods in Distributed Systems is a critical scholarly publication that defines the current state of distributed systems, determines further goals, and presents architectures and service frameworks to achieve highly integrated distributed systems and presents solutions to integration and efficient management challenges faced by current and future distributed systems. Highlighting topics such as multimedia, programming languages, and smart environments, this book is ideal for system administrators, integrators, designers, developers, researchers, and academicians.
Technologies in today's society are rapidly developing at a pace that is challenging to stay up to date with. As an increasing number of global regions are implementing smart methods and strategies for sustainable development, they are continually searching for modern advancements within computer science, sensor networks, software engineering, and smart technologies. A compilation of research is needed that displays current applications of computing methodologies in the progression of global cities and how smart technologies are being utilized. Sensor Network Methodologies for Smart Applications is a collection of innovative research on the methods of intelligent systems and technologies and their various applications within sustainable development practices. While highlighting topics including machine learning, network security, and optimization algorithms, this book is ideally designed for researchers, scientists, developers, programmers, engineers, educators, policymakers, geographers, planners, and students seeking current research on smart technologies and sensor networks.
Deep Learning through Sparse Representation and Low-Rank Modeling bridges classical sparse and low rank models-those that emphasize problem-specific Interpretability-with recent deep network models that have enabled a larger learning capacity and better utilization of Big Data. It shows how the toolkit of deep learning is closely tied with the sparse/low rank methods and algorithms, providing a rich variety of theoretical and analytic tools to guide the design and interpretation of deep learning models. The development of the theory and models is supported by a wide variety of applications in computer vision, machine learning, signal processing, and data mining. This book will be highly useful for researchers, graduate students and practitioners working in the fields of computer vision, machine learning, signal processing, optimization and statistics.
Industrial internet of things (IIoT) is changing the face of industry by completely redefining the way stakeholders, enterprises, and machines connect and interact with each other in the industrial digital ecosystem. Smart and connected factories, in which all the machinery transmits real-time data, enable industrial data analytics for improving operational efficiency, productivity, and industrial processes, thus creating new business opportunities, asset utilization, and connected services. IIoT leads factories to step out of legacy environments and arcane processes towards open digital industrial ecosystems. Innovations in the Industrial Internet of Things (IIoT) and Smart Factory is a pivotal reference source that discusses the development of models and algorithms for predictive control of industrial operations and focuses on optimization of industrial operational efficiency, rationalization, automation, and maintenance. While highlighting topics such as artificial intelligence, cyber security, and data collection, this book is ideally designed for engineers, manufacturers, industrialists, managers, IT consultants, practitioners, students, researchers, and industrial industry professionals.
Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications covers timely topics, including the neural network (NN), particle swarm optimization (PSO), evolutionary algorithm (GA), fuzzy sets (FS) and rough sets (RS), etc. Furthermore, the book highlights recent research on representative techniques to elaborate how a data-centric system formed a powerful platform for the processing of cloud hosted multimedia big data and how it could be analyzed, processed and characterized by CI. The book also provides a view on how techniques in CI can offer solutions in modeling, relationship pattern recognition, clustering and other problems in bioengineering. It is written for domain experts and developers who want to understand and explore the application of computational intelligence aspects (opportunities and challenges) for design and development of a data-centric system in the context of multimedia cloud, big data era and its related applications, such as smarter healthcare, homeland security, traffic control trading analysis and telecom, etc. Researchers and PhD students exploring the significance of data centric systems in the next paradigm of computing will find this book extremely useful. |
You may like...
Rich & Dying - An Insider Calls Bullsh*t…
Jeb Dunkelberger
Hardcover
The Legal Protection of Foreign…
Thomas Nektarios Papanastasiou
Hardcover
R1,130
Discovery Miles 11 300
|