|
|
Books > Computing & IT > Internet > General
Tired of writing all your user IDs and passwords on sticky notes
and pieces of scrap paper? This convenient address book stores them
all in one place. This is not your typical address book There are
also special sections for online banking info and one for storing
e-mail addresses.
Smart homes, smart cities, and wearable technologies are the
growing applications of the internet of things (IoT). Ranging from
healthcare tracking applications to smart watches and smart bands
for personal safety, the IoT has turned out to be one of the most
indispensable parts of our lives even as it is becoming more
interconnected to better serve people. With the exponential growth
of the IoT and its applications, building the next-generation smart
world becomes much more feasible. The IoT and the Net Revolutions
Automating the World covers a spectrum of intelligent applications
of the IoT in parking, traffic management, waste management,
lighting, air pollution controlling, healthcare, weather tracking,
retail, and other areas calling for automation. Highlighting a wide
range of topics such as e-commerce, security management, and web
infrastructure, this book is ideal for academicians, students,
researchers, industry professionals, IT consultants, engineers, and
scientists.
Medical internet of things (IoT)-based applications are being
utilized in several industries and have been shown to provide
significant advantages to users in critical health applications.
Artificial intelligence (AI) plays a key role in the growth and
success of medical IoT applications and IoT devices in the medical
sector. To enhance revenue, improve competitive advantage, and
increase consumer engagement, the use of AI with medical IoT should
be encouraged in the healthcare and medical arena. Revolutionizing
Healthcare Through Artificial Intelligence and Internet of Things
Applications provides greater knowledge of how AI affects
healthcare and medical efficacy in order to improve outputs. It
focuses on a thorough and comprehensive introduction to machine
learning. Covering topics such as patient treatment, cyber-physical
systems, and telemedicine, this premier reference source is a
dynamic resource for hospital administrators, medical
professionals, government officials, students and faculty of higher
education, librarians, researchers, and academicians.
Fog computing is rapidly expanding in its applications and
capabilities through various parts of society. Utilizing different
types of virtualization technologies can push this branch of
computing to even greater heights. Fog Computing: Breakthroughs in
Research and Practice contains a compendium of the latest academic
material on the evolving theory and practice related to fog
computing. Including innovative studies on distributed fog
computing environments, programming models, and access control
mechanisms, this publication is an ideal source for programmers, IT
professionals, students, researchers, and engineers.
This title focuses on electronic learning communities created
through the development and use of the Internet for instruction and
training. Chapters focus on philosophies, background, reviews,
technologies, systems, tools, services, strategies, development,
implementation and research.
Geared towards technical professionals, marketing managers,
finance/business strategists, law/policy makers, and educators
whose work involves e-commerce, this unique book provides a clear
overview of the legal and public policy issues associated with
computer networks and electronic transaction and security. It
identifies various forms of potential legal and commercial
liability, and advises what legal claims may be raised, by whom,
and the potential impact of these claims. Methods to reduce or
eliminate liability are discussed, offering practical, operational
guidance to professionals. The book also describes the legal rights
of computer system and electronic commerce operators that can be
applied to help preserve security and to recover in the event that
security is breached.
Popular among online shoppers, comparison-shopping provides a new
sales channel for small to medium enterprises to contend with brand
name vendors. ""Comparison-Shopping Services and Agent Designs""
provides a collection of comprehensive research articles on the
latest technologies involved with online consumer services. This
""Premier Reference Source"" provides e-commerce and agent
technology researchers, academicians, and practitioners with a
useful overview as well as references to the latest advancements in
the field.
A firewall is as good as its policies and the security of its VPN
connections. The latest generation of firewalls offers a dizzying
array of powerful options; they key to success is to write concise
policies that provide the appropriate level of access while
maximizing security.
This book covers the leading firewall products: Cisco PIX, Check
Point NGX, Microsoft ISA Server, Juniper s NetScreen Firewall, and
SonicWall. It describes in plain English what features can be
controlled by a policy, and walks the reader through the steps for
writing the policy to fit the objective. Because of their
vulnerability and their complexity, VPN policies are covered in
more depth with numerous tips for troubleshooting remote
connections.
. The only book that focuses on creating policies that apply to
multiple products.
. Included is a bonus chapter on using Ethereal, the most popular
protocol analyzer, to monitor and analyze network traffic.
. Shows what features can be controlled by a policy, and walks you
through the steps for writing the policy to fit the objective at
hand"
Social media is arguably one of the most powerful
technology-enabled innovations since the Internet itself. This
single-volume book provides a broad and easily understandable
discussion of the evolution of social media; related problems and
controversies, especially for youth; key people and organizations;
and useful social media data. Social media is an integral part of
people's lives. More than half of the world's 2.4 billion Internet
users sign in to a social network regularly-a figure that continues
to grow. More than half of online adults now use two or more social
media sites; 71 percent of Internet users are on Facebook. This
book surveys the history of social media, addresses the power of
social media for positive change, describes the problems and
controversies social media have caused, and suggests potential
solutions to these issues. Geared toward students and general
readers, this accessibly written book covers such topics as the
link between social media and body image, the psychological affects
of social media use, online conversations about sexual assault,
corporate use of social media data, political campaigning through
social media, fan tweeting during television shows, and crisis
communication through social media. Readers will also gain insights
into the range of serious problems related to social media,
including privacy concerns, social media addiction, social media
hoaxes and scams, the pressure to project an ideal self, the
curation of content presented on social media, cyberbullying,
sexting, Facebook depression and envy, online shaming, and the
impact of social media use on communication skills. Provides
readers with a clearly written overview of the impacts of social
media worldwide that highlights key people and companies in the
development of social media Presents up-to-date information on the
range of problems related to social media and presents potential
solutions Offers a variety of voices from social media experts,
supplying perspectives from creators to users
Architecture of Reliable Web Applications Software presents new
concepts regarding the reliability, availability, manageability,
performance, scalability, and secured-ability of applications,
particularly the ones that run over the Web. ""Architecture of
Reliable Web Applications Software"" examines the causes of failure
in a Web-based information system development project, and
indicates that to exploit the unprecedented opportunities offered
by e-service applications, businesses and users alike need a highly
available, reliable, and efficient telecommunication
infrastructure. ""Architecture of Reliable Web Application
Software"" proposes a scalable QoS-aware architecture for the
management of QoS-aware Web services to provide QoS management
support for both Web services' providers and consumers. It also
introduces Hyper-services as a unified application model for
semantic Web frameworks and proposes Conceptual Model Driven
Software Development as a means of easy adoption to them.
The latest advances in technology development have been
particularly useful to actor-network theory as a structure for much
of its research. With a socio-technical approach to the
understanding of information systems and applications, the
actor-network theory aims to bring support for social influence on
technological innovations. Social and Professional Applications of
Actor-Network Theory for Technology Development presents a platform
for the approaches and implementations on the actor-network theory
and its relationship with technology development. This book
provides researchers and practitioners with a better understanding
of the usefulness of the social and technical connection.
Web and Information Security consists of a collection of papers
written by leading experts in the field that describe
state-of-the-art topics pertaining to Web and information systems
security. In particular, security for the semantic Web, privacy,
security policy management and emerging topics such as secure
semantic grids and secure multimedia systems are also discussed. As
well as covering basic concepts of Web and information system
security, this book provides new insights into the semantic Web
field and its related security challenges. ""Web and Information
Security"" is valuable as a reference book for senior undergraduate
or graduate courses in information security which have special
focuses on Web security. It is also useful for technologists,
researchers, managers and developers who want to know more about
emerging security technologies.
There is a large increase in the amount of information available on
World Wide Web and also in number of online databases. This
information abundance increases the complexity of locating relevant
information. Such a complexity drives the need for improved and
intelligent systems for search and information retrieval.
Intelligent Agents are currently used to improve the search and
retrieval information on World Wide Web. The use of existing search
and retrieval engines with the addition of intelligent agents
allows a more comprehensive search with a performance that can be
measured. Intelligent Agents for Mining and Information Retrieval
discusses the foundation as well as the pratical side of
intelligent agents and their theory and applications for web data
mining and information retrieval. The book can used for researchers
at the undergraduate and post-graduate levels as well as a
reference of the state-of-art for cutting edge researchers.
This book focuses on novel and state-of-the-art scientific work in
the area of detection and prediction techniques using information
found generally in graphs and particularly in social networks.
Community detection techniques are presented in diverse contexts
and for different applications while prediction methods for
structured and unstructured data are applied to a variety of fields
such as financial systems, security forums, and social networks.
The rest of the book focuses on graph-based techniques for data
analysis such as graph clustering and edge sampling. The research
presented in this volume was selected based on solid reviews from
the IEEE/ACM International Conference on Advances in Social
Networks, Analysis, and Mining (ASONAM '17). Chapters were then
improved and extended substantially, and the final versions were
rigorously reviewed and revised to meet the series standards. This
book will appeal to practitioners, researchers and students in the
field.
|
You may like...
Pruning Success
Andrew Mikolajski
Hardcover
R126
R118
Discovery Miles 1 180
|