![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > General
Internet of Things (IoT) is an ecosystem comprised of heterogeneous connected devices that communicate to deliver capabilities making our living, cities, transport, energy, and other areas more intelligent. This book delves into the different cyber-security domains and their challenges due to the massive amount and the heterogeneity of devices. This book introduces readers to the inherent concepts of IoT. It offers case studies showing how IoT counteracts the cyber-security concerns for domains. It provides suggestions on how to mitigate cyber threats by compiling a catalogue of threats that currently comprise the contemporary threat landscape. It then examines different security measures that can be applied to system installations or operational environment and discusses how these measures may alter the threat exploitability level and/or the level of the technical impact. Professionals, graduate students, researchers, academicians, and institutions that are interested in acquiring knowledge in the areas of IoT and cyber-security, will find this book of interest.
This title presents a comprehensive guide to the top book bloggers on the Internet, and asks: who are these people, what are they writing about and why?
Take your game to the next level with the new book from the world's biggest football YouTubers, the F2. We're the F2 and in our brand new book we're going to show you how to take your football skills to the next level. In these pages we turn the spotlight on the greatest players, the biggest teams, and most jaw-dropping moments from across the football world, and teach you the skills and the tekkers it takes to be the best! Want step-overs like Sanchez? Or a piledriver like Ibrahimovic? Or quick-feet like Messi? We show you how. Our book is filled with tips and hacks, as well as the inside track on your favourite stars: Pogba, Suarez, Aguero and the rest. There's even a free app that brings the book to life and shows you how to turbo-charge your tekkers! There's not a moment to lose - open, read, learn, download and get out on the pitch and practise. Love, peace and tekkers.
This new volume looks at the electrifying world of blockchain technology and how it has been revolutionizing the Internet of Things and cyber-physical systems. Aimed primarily at business users and developers who are considering blockchain-based projects, the volume provides a comprehensive introduction to the theoretical and practical aspects of blockchain technology. It presents a selection of chapters on topics that cover new information on blockchain and bitcoin security, IoT security threats and attacks, privacy issues, fault-tolerance mechanisms, and more. Some major software packages are discussed, and it also addresses the legal issues currently affecting the field. The information presented here is relevant to current and future problems relating to blockchain technology and will provide the tools to build efficient decentralized applications. Blockchain technology and the IoT can profoundly change how the world-and businesses-work, and this book provides a window into the current world of blockchain. No longer limited to just Bitcoin, blockchain technology has spread into many sectors and into a significant number of different technologies.
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups' online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment. With contributions from leading experts in the field-including practitioners and terrorism researchers-the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism. Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.
This book presents, in an integrated form, both the analysis and synthesis of three different types of hidden Markov models. Unlike other books on the subject, it is generic and does not focus on a specific theme, e.g. speech processing. Moreover, it presents the translation of hidden Markov models' concepts from the domain of formal mathematics into computer codes using MATLAB (R). The unique feature of this book is that the theoretical concepts are first presented using an intuition-based approach followed by the description of the fundamental algorithms behind hidden Markov models using MATLAB (R). This approach, by means of analysis followed by synthesis, is suitable for those who want to study the subject using a more empirical approach. Key Selling Points: Presents a broad range of concepts related to Hidden Markov Models (HMM), from simple problems to advanced theory Covers the analysis of both continuous and discrete Markov chains Discusses the translation of HMM concepts from the realm of formal mathematics into computer code Offers many examples to supplement mathematical notation when explaining new concepts
Social networking has increased drastically in recent years, resulting in an increased amount of data being created daily. Furthermore, diversity of issues and complexity of the social networks pose a challenge in social network mining. Traditional algorithm software cannot deal with such complex and vast amounts of data, necessitating the development of novel analytic approaches and tools. This reference work deals with social network aspects of big data analytics. It covers theory, practices and challenges in social networking. The book spans numerous disciplines like neural networking, deep learning, artificial intelligence, visualization, e-learning in higher education, e-healthcare, security and intrusion detection.
This book presents an exciting new theory of time for a world built on hyper-fast digital media networks. Computers have changed the human social experience enormously. We're becoming familiar with many of the macro changes, but we rarely consider the complex, underlying mechanics of how a technology interacts with our social, political and economic worlds. And we cannot explain how the mechanics of a technology are being translated into social influence unless we understand the role of time in that process. Offering an original reconsideration of temporality, Philip Pond explains how super-powerful computers and global webs of connection have remade time through speed. The book introduces key developments in network time theory and explains their importance, before presenting a new model of time which seeks to reconcile the traditionally separate subjective and objective approaches to time theory and measurement.
Cloud Data Center Network Architectures and Technologies has been written with the support of Huawei's vast technical knowledge and experience in the data center network (DCN) field, as well as its understanding of customer service requirements. This book describes in detail the architecture design, technical implementation, planning and design, and deployment suggestions for cloud DCNs based on the service challenges DCNs encounter. It starts by describing the overall architecture and technical evolution of DCNs, with the aim of helping readers understand the development of DCNs. It then proceeds to explain the design and implementation of cloud DCNs, including the service model of a single data center (DC), construction of physical and logical networks of DCs, construction of multiple DCNs, and security solutions of DCs. Next, this book dives deep into practices of cloud DCN deployment based on real-world cases to help readers better understand how to build cloud DCNs. Finally, this book introduces DCN openness and some of the hottest forward-looking technologies. In summary, you can use this book as a reference to help you to build secure, reliable, efficient, and open cloud DCNs. It is intended for technical professionals of enterprises, research institutes, information departments, and DCs, as well as teachers and students of computer network-related majors in colleges and universities. Authors Lei Zhang Mr. Zhang is the Chief Architect of Huawei's DCN solution. He has more than 20 years' experience in network product and solution design, as well as a wealth of expertise in product design and development, network planning and design, and network engineering project implementation. He has led the design and deployment of more than 10 large-scale DCNs for Fortune Global 500 companies worldwide. Le Chen Mr. Chen is a Huawei DCN Solution Documentation Engineer with eight years' experience in developing documents related to DCN products and solutions. He has participated in the design and delivery of multiple large-scale enterprise DCNs. Mr. Chen has written many popular technical document series, such as DCN Handbook and BGP Topic.
As we interact online we are creating new kinds of knowledge and community. How are these communities formed? How do we know whether to trust them as sources of information? In other words, Should we believe Wikipedia? This book explores what community is, what knowledge is, how the internet facilitates new kinds of community, and how knowledge is shaped through online collaboration and conversation. Along the way the author tackles issues such as how we represent ourselves online and how this shapes how we interact, why there is so much bad behavior online and what we can do about it. And the most important question of all: What can we as internet users and designers do to help the internet to bring out the best in us all?
Take your hobby to the next level and turn your blog into real income Anyone who blogs knows that it is a fun, creative way for sharing thoughts and opinions. Now imagine making money from that hobby This practical, how-to guide shows you how you can get serious about using your blog and implement advertising, sponsorship, partnerships, and affiliate marketing options to turn your hobby into extra income, or even a full-time career. Helpful examples and featured articles with topic experts and bloggers who have built successful business demonstrate how to promote your business or build a blog-based business.Discusses finding your niche, adhering to legal considerations, establishing your disclosure and privacy policies, and dealing responsibly with review requestsIntroduces ideas for advertising and other monetization options and recommends promotional avenues to exploreSuggests creative ways to keep your blog fresh, unique, and interestingProvides tips for monitoring and measuring your success "Professional Blogging For Dummies" opens the door to a world of money-making blogging possibilities
The creative citizen unbound introduces the concept of 'creative citizenship' to explore the potential of civically-minded creative individuals in the era of social media and in the context of an expanding creative economy. Contributors examine the value and nature of creative citizenship, not only in terms of its contribution to civic life and to social capital but also to various and more contested definitions of value, both economic and cultural.
The creative citizen unbound introduces the concept of `creative citizenship' to explore the potential of civically-minded creative individuals in the era of social media and in the context of an expanding creative economy. Contributors examine the value and nature of creative citizenship, not only in terms of its contribution to civic life and to social capital but also to various and more contested definitions of value, both economic and cultural.
Sell on Amazon and Make Them Do the Heavy Lifting Selling on Amazon has become one of the most popular ways to earn income online. In fact, there are over 2 million people selling on Amazon worldwide. Amazon allows any business, no matter how small, to get their products in front of millions of customers and take advantage of the largest fulfillment network in the world. It also allows businesses to leverage their first-class customer service and storage capabilities. Selling on Amazon For Dummies walks owners through the process of building a business on Amazon--a business that can be built almost anywhere in the world, as long as you have access to a computer and the internet. The basics of selling on Amazon Using FBA Getting started Deciding what to sell Conducting product research Finding your way around Seller Central Product sourcing, shipping and returns, Amazon subscription, fees, sales tax, and more How to earn ROIs (Returns on Your Investments) Selling on Amazon For Dummies provides the strategies, tools, and education you need, including turnkey solutions focused on sales, marketing, branding, and marketplace development to analyze and maximize opportunities.
This book covers techniques that can be used to analyze data from IoT sensors and addresses questions regarding the performance of an IoT system. It strikes a balance between practice and theory so one can learn how to apply these tools in practice with a good understanding of their inner workings. This is an introductory book for readers who have no familiarity with these techniques. The techniques presented in An Introduction to IoT Analytics come from the areas of machine learning, statistics, and operations research. Machine learning techniques are described that can be used to analyze IoT data generated from sensors for clustering, classification, and regression. The statistical techniques described can be used to carry out regression and forecasting of IoT sensor data and dimensionality reduction of data sets. Operations research is concerned with the performance of an IoT system by constructing a model of the system under study and then carrying out a what-if analysis. The book also describes simulation techniques. Key Features IoT analytics is not just machine learning but also involves other tools, such as forecasting and simulation techniques. Many diagrams and examples are given throughout the book to fully explain the material presented. Each chapter concludes with a project designed to help readers better understand the techniques described. The material in this book has been class tested over several semesters. Practice exercises are included with solutions provided online at www.routledge.com/9780367686314 Harry G. Perros is a Professor of Computer Science at North Carolina State University, an Alumni Distinguished Graduate Professor, and an IEEE Fellow. He has published extensively in the area of performance modeling of computer and communication systems.
This book covers techniques that can be used to analyze data from IoT sensors and addresses questions regarding the performance of an IoT system. It strikes a balance between practice and theory so one can learn how to apply these tools in practice with a good understanding of their inner workings. This is an introductory book for readers who have no familiarity with these techniques. The techniques presented in An Introduction to IoT Analytics come from the areas of machine learning, statistics, and operations research. Machine learning techniques are described that can be used to analyze IoT data generated from sensors for clustering, classification, and regression. The statistical techniques described can be used to carry out regression and forecasting of IoT sensor data and dimensionality reduction of data sets. Operations research is concerned with the performance of an IoT system by constructing a model of the system under study and then carrying out a what-if analysis. The book also describes simulation techniques. Key Features IoT analytics is not just machine learning but also involves other tools, such as forecasting and simulation techniques. Many diagrams and examples are given throughout the book to fully explain the material presented. Each chapter concludes with a project designed to help readers better understand the techniques described. The material in this book has been class tested over several semesters. Practice exercises are included with solutions provided online at www.routledge.com/9780367686314 Harry G. Perros is a Professor of Computer Science at North Carolina State University, an Alumni Distinguished Graduate Professor, and an IEEE Fellow. He has published extensively in the area of performance modeling of computer and communication systems.
This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.
Two of the most prolific and challenging authorities on the topic of competitive intelligence (CI) reflect on and respond to the changes in the field over the last decade. The authors point out that CI users have to change what they are doing, show why they are doing it, and provide ways of doing it. Their book reviews the problems in the development of CI since the 1980s, discusses the impact of the Internet and the rise in use of other secondary sources, and draws from and provides access to the growing body of CI information, knowledge, and literature. Combining a scholarly approach with hands-on advice, McGonagle and Vella have written the first work to guide CI professionals through the emerging literature of their field. Among the important changes in the field the authors cover are: the radical changes in on line database searching and ways in which the Internet has fundamentally modified how we think of accessing data. Their book explores and reports the major body of work from the Society of Competitive Intelligence Professionals, now that more businesses worldwide are using competitive intelligence and either writing about their experiences with it, or joining in new benchmarking studies. The result is newer information on what really works, what doesn't work, and who is doing what with it. The book is thus a starting point for people new to the field of CI as well as a resource to help experienced professionals do their jobs better.
Digital art practitioners work under the constant threat of a medium - the digital - that objectifies the self and depersonalises artistic identities. If digital technology is a pharmakon in that it can be either cure or poison, with regard to digital art practices the digital may have in fact worked as a placebo that has allowed us to push back the date in which the crisis between digital and art will be given serious thought. This book is hence concerned with an analysis of such a relationship and proposes their rethinking in terms of an ethico-phenomenological practice informed by an in-depth understanding of the digital medium. Giuseppe Torre engages with underground cultures such as Free and Libre Open Source Software (FLOSS) and its ties with art discourse. The discussion is informed by various philosophical discourses and media theories, with a focus on how such ideas connect back to the existing literature in performance studies. Replete with examples of artwork and practices, this book will be of great interest to students and scholars of theatre and performance studies, art and technology.
Urban Sensographies views the human body as a highly nuanced sensor to explore how various performance-based methods can be implemented to gather usable 'felt data' about the environment of the city as the basis for creating embodied mappings. The contributors to this fascinating volume seek to draw conclusions about the constitution, character and morphology of urban space as public, habitable and sustainable by monitoring the reactions of the human body as a form of urban sensor. This co-authored book is centrally concerned, as a symptom of the degree to which cities are evolving in the 21st century, to examine the effects of this change on the practices and behaviours of urban dwellers. This takes into account such factors as: defensible, retail and consumer space; legacies of modernist design in the built environment; the effects of surveillance technologies, motorised traffic and smart phone use; the integration of 'wild' as well as 'domesticated' nature in urban planning and living; and the effects of urban pollution on the earth's climate. Drawing on three years of funded practical research carried out by a multi-medial team of researchers and artists, this book analyses the presence and movement of the human body in urban space, which is essential reading for academics and practitioners in the fields of dance, film, visual art, sound technology, digital media and performance studies.
Life without the internet, a very new technology, seems almost unimaginable for most people in western nations. Today the internet is intrinsic to media and communications, entertainment, politics, defence, business, banking, education and administrative systems as well as to social interaction. "The Internet" disentangles this extraordinarily complex information and communication technology from its place in our daily lives, allowing it to be examined anew. Technology has historically been shaped by governmental, military and commercial requirements, but the development of the internet is increasingly driven by its users. YouTube, Facebook, Twitter, Flickr and many other emerging applications are shifting the way we express ourselves, communicate with our friends, and even engage with global politics. At the same time three-quarters of the world's population remain effectively excluded from the internet. Packed with case studies drawn from around the world, "The Internet" presents a clear and up-to-date introduction to the social, cultural, technological and political worlds this new media form is creating.
This book teaches beginners and aspiring game developers how to develop 2D games with Unity. Thousands of commercial games have been built with Unity. The reader will learn the complete process of 2D game development, step by step. The theory behind each step is fully explained. This book contains numerous color illustrations and access to all source code and companion videos. Key Features: Fully detailed game projects from scratch. Beginners can do the steps and create games right away. No coding experience is necessary. Numerous examples take a raw beginner toward professional coding proficiency in C# and Unity. Includes a thorough introduction to Unity 2020, including 2D game development, prefabs, cameras, animation, character controllers, lighting, and sound. Includes a step-by-step introduction to Unity 2019.3. Extensive coverage of GIMP, Audacity, and MuseScore for the creation of 2D graphics, sound effects, and music. All required software is free to use for any purpose including commercial applications and games. Franz Lanzinger is the owner and chief game developer of Lanzinger Studio, an independent game development and music studio in Sunnyvale, California. He started his career in game programming in 1982 at Atari Games, Inc., where he designed and programmed the classic arcade game Crystal Castles. In 1989, he joined Tengen, where he was a programmer and designer for Ms. Pac-Man and Toobin' on the NES. He co-founded Bitmasters, where he designed and coded games including Rampart and Championship Pool for the NES and SNES, and NCAA Final Four Basketball for the SNES and Sega Genesis. In 1996, he founded Actual Entertainment, publisher and developer of the Gubble video game series. He has a B.Sc. in mathematics from the University of Notre Dame and attended graduate school in mathematics at the University of California at Berkeley. He is a former world record holder on Centipede and Burgertime. He is a professional author, game developer, accompanist, and piano teacher. He is currently working on remaking the original Gubble game in Unity and Blender.
Provides the fundamentals of cloud computing; Focuses on new applications for cloud computing; Analyzes real-time problems
Social technology is quickly becoming a vital tool in our personal, educational, and professional lives. However, while social networking helps the world stay connected, its use must be further examined in order to determine any possible pitfalls associated with the use of this technology. Implications of Social Media Use in Personal and Professional Settings investigates the paradoxical nature of social networking in our personal lives and in the workplace. Highlighting emergent research and psychological impacts, this publication is an indispensable reference source for academics, researchers, and professionals interested in the application of social media, as well as the positive aspects and detrimental effects of the usage of these technologies.
This book discusses the use of the internet in China, the complicated power relations in online political communications, and the interactions and struggles between the government and the public over the use of the internet. It argues that there is a "semi-structured" online public sphere, in which there is a certain amount of equal and liberal political communication, but that the online political debates are also limited by government control and censorship, as well as by inequality and exclusions, and moreover that the government rarely engages in the political debates. Based on extensive original research, and considering specific debates around particular issues, the book analyses how Chinese net-users debate about political issues, how they problematize the government's actions and policies, what language they use, what online discourses are produced, and how the debates and online discourses are limited. Overall, the book provides a rich picture of the current state of online political communication in China. |
![]() ![]() You may like...
The Prince (Barnes & Noble Collectible…
Niccolo Machiavelli
Leather / fine binding
![]()
Applied Cryptography for Cyber Security…
Hamid R. Nemati, Yang Li
Hardcover
R4,993
Discovery Miles 49 930
Get Your Will Right - A Guide For…
Chris Sloane, Wendy Mangin
Paperback
Social Networks Science: Design…
Nilanjan Dey, Rosalina Babo, …
Hardcover
R3,119
Discovery Miles 31 190
Weaving Wellbeing into the Literacy…
Alison Waterhouse, Melanie Smith
Hardcover
R4,040
Discovery Miles 40 400
|