Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Internet
This book features research presented and discussed during the Research and Innovation Forum (Rii Forum) 2021. The Covid-19 pandemic and its social, political, and economic implications had confirmed that a more thorough debate on these issues and topics was needed. For this reason, the Rii Forum 2021 was devoted to the broadly defined question of the short- and long-term impact of the pandemic on our societies. This volume serves as an essential resource to understand the diverse ways in which Covid-19 impacted our societies, including the capacity to innovate, advances in technology, the evolution of the healthcare systems, business model innovation, the prospects of growth, the stability of political systems, and the future of education.
Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science.
With the prevalence of social media, businesses and other organizations have a growing need to utilize various online media platforms and sites to engage and interact with their potential consumer base. Virtual communities and social networking can provide an effective escape route from the limits imposed by traditional media. Using optimal strategies can lead to more successful outcomes when using these platforms. Modern Perspectives on Virtual Communications and Social Networking provides innovative insights into connection and conversation through internet media that foster trust, commitment, and transparency in business. The content within this publication represents the potential to create virtual bonds with consumers through the observation of buying behavior, social media best practices, and digital marketing strategies. It is designed for business professionals, academicians, consultants, managers, marketers, and researchers and covers topics centered on the use of online media as a method of reaching a wider population.
This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue University in Indiana, USA, IFIPTM 2010 focused on trust, privacy and security from multidisciplinary persp- tives. The conference is an arena for discussion on relevant problems from both research and practice in the areas of academia, business, and government. IFIPTM 2010 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2010 received 61 submissions from 25 di?erent countries: Japan (10), UK (6), USA (6), Canada (5), Germany (5), China (3), Denmark (2), India (2), Italy (2), Luxembourg (2), The Netherlands (2), Switzerland (2), Taiwan (2), Austria, Estonia, Finland, France, Ireland, Israel, Korea, Malaysia, Norway, Singapore, Spain, Turkey. The Program Committee selected 18 full papers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include two invited papers by academic experts in the ?elds of trust management, privacy and security, namely, Toshio Yamagishi and Pamela Briggs
As most organizations have expanded traditional business space into web-based environments, a more complete and thorough understanding of Web engineering is becoming vital for organizations. However, the definition of Web engineering is growing more and more blurred. Although based primarily on MIS and computer science areas, Web engineering covers a wide range of disciplines, thus making it difficult to gain an understanding of the field. Web Engineering: Principles and Techniques provides clarity to this often muddied issue. Covering a wide range of topics such as: basic perspectives on Web engineering, development methodologies for Web applications, Web metrics and quality models, Web resource management techniques and standards, maintenance and evolution methods for Web applications, and Web intelligence techniques and models this book provides the necessary tools vital for organizations to utilize the full potential of Web engineering. Essential for both researchers and practitioners, Web Engineering: Principles and Techniques covers a wide range of topics vital to strengthening professional insights and capabilities within the field of Web engineering.
In many countries shopping has been transformed from High Street stores to large out-of-town Retail Parks and Shopping Centres. Technology now provides the opportunity for many products and services to be promoted and purchased electronically, particularly via the Internet. This will progress differently for different products, regions, consumer groups, etc. This book presents future scenarios for the retail industry in the light of Internet shopping. Through its unique perspective, it examines developments so far, and through the insight of the author who is one of the leading professionals in shopping centre developments, takes an inspired look at the future of retailing in the next century.
E-Business has become a fact for almost all companies. But what are the key technologies for economically successful e-commerce? In this book readers will find all concepts that will coin tomorrow's e-business: virtual sales assistants (shopbots), personalized web pages, electronic market places, vendor managed inventory, virtual organizations, supply chain management. Both technical and economic issues of these concepts are discussed in detail. Leading-edge real world applications are presented that will shape e-business mid-term. This book is a must-read for managers or technical consultants as well as researchers needing in-depth information for strategic business decisions.
Cloud computing has provided multiple advantages as well as challenges to software and infrastructure services. In order to be fully beneficial, these challenges facing cloud specific communication protocols must be addressed. Communication Infrastructures for Cloud Computing presents the issues and research directions for a broad range of cloud computing aspects of software, computing, and storage systems. This book will highlight a broad range of topics in communication infrastructures for cloud computing that will benefit researchers, academics, and practitioners in the active fields of engineering, computer science, and software.
Covering key areas of evaluation and methodology, client-side applications, specialist and novel technologies, along with initial appraisals of disabilities, this important book provides comprehensive coverage of web accessibility. Written by leading experts in the field, it provides an overview of existing research and also looks at future developments, providing a much deeper insight than can be obtained through existing research libraries, aggregations, or search engines.
Turbo coding principles have found widespread applications in information theory and, in part, have entered into mainstream telecommunication theory and practice. These principles are used in error control, detection, interference suppression, equalization, and other communications-related areas. Turbo Codes: Principles and Applications is intended for use by advanced level students and professional engineers involved in coding and telecommunication research. The material is organized into a coherent framework, starting with basic concepts of block and convolutional coding, and gradually increasing in a logical and progressive manner to more advanced material, including applications. All algorithms are fully described and supported by examples, and evaluations of their performance are carried out both analytically and by simulations. The book includes new and original material on a bidirectional SOVA decoding algorithm, design of turbo codes based on the distance spectrum, design of code-matched interleavers, performance on fading channels, and a turbo trellis code modulation scheme. Trellis-based and iterative decoding algorithms, along with a comparison of algorithms based on their performance and complexity, are discussed. Various practical aspects of turbo coding, such as interleaver design, turbo codes on fading channels, and turbo trellis-coded modulation, are presented. Turbo Codes: Principles and Applications will be especially useful to practicing communications engineers, researchers, and advanced level students who are designing turbo coding systems, including encoder/decoder and interleavers, and carrying out performance analysis and sensitivity studies.
This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. In this book, going beyond traditional communication system design that mainly focuses on accurate information transmission under benign environments, we aim to enhance the physical layer security of communication systems by integrating modern cryptographic techniques into transceiver design, so as to achieve secure high-speed transmission under hostile interference with high reliability and efficiency. We revisit existing jamming patterns, and introduce new jamming patterns. We analyze the weaknesses of existing anti-jamming techniques. We present innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping and OFDM schemes. We also provide benchmarks for system performance evaluation under various jamming scenarios through capacity analysis. This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.
This volume offers the proceedings of the 2nd UNet conference, held in Casablanca May 30 - June 1, 2016. It presents new trends and findings in hot topics related to ubiquitous computing/networking, covered in three tracks and three special sessions: Main Track 1: Context-Awareness and Autonomy Paradigms Track Main Track 2: Mobile Edge Networking and Virtualization Track Main Track 3: Enablers, Challenges and Applications Special Session 1: Smart Cities and Urban Informatics for Sustainable Development Special Session 2: Unmanned Aerial Vehicles From Theory to Applications Special Session 3: From Data to Knowledge: Big Data applications and solutions
"This book is by far the most comprehensive and orderly treatment
of the subject. It is the work of experts with a wealth of both
theoretical and practical experience with the subject and its
connecting disciplines. It is an integral work... concepts and
notation are at the same consistent level throughout the book.
Quality of Service (QoS) is an absolutely critical part of any
telecommunication services. This work fills a gap in the literature
of what possibilities there are for satellites in providing global
Internet services." Excerpted from the Foreword by Raymond L.
Pickholtz, The George Washington University
In order for information systems supporting two different organizations to interoperate, there must be an agreement as to what the words mean. There are many such agreements in place, supporting information systems interoperation in many different application areas. Most of these agreements have been created as part of diverse systems development processes, but since the advent of the Semantic Web in the late 1990s, they have been studied as a kind of software artifact in their own right, called an ontology, or description of a shared world. This book brings together developments from philosophy, artificial intelligence and information systems to formulate a collection of functional requirements for ontology development. Once the functional requirements are established, the book looks at several ontology representation languages: RDFS, OWL, Common Logic and Topic Maps, to show how these languages support the functional requirements, what deficiencies there are, and how the languages relate to each other. Besides a collection of running examples used throughout the book, the entire treatment is supported by an extended example of a hypothetical ontology for the Olympic Games presented first as a set of chapter-end exercises and then as a set of solutions which illustrate the various points made in the text in the context of a single coherent development.
Web caching and content delivery technologies provide the
infrastructure on which systems are built for the scalable
distribution of information. This proceedings of the eighth annual
workshop, captures a cross-section of the latest issues and
techniques of interest to network architects and researchers in
large-scale content delivery. Topics covered include the
distribution of streaming multimedia, edge caching and computation,
multicast, delivery of dynamic content, enterprise content
delivery, streaming proxies and servers, content transcoding,
replication and caching strategies, peer-to-peer content delivery,
and Web prefetching.
This book provides a comprehensive review of China's Internet development in the past 23 years since the country's first access to the Internet, especially since the 18th National Congress of the Communist Party of China. It offers a systematic account of China's experience in Internet development and governance, and establishes and presents China's Internet Development Index System, covering network infrastructure, information technology, digital economy, e-governance, cyber security, and international cyberspace governance.
"Security and Privacy in Social Networks" brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area- spanning from the theory of computational social sciences to conventional security and network engineering.
A welcome addition to Palgrave's Global Media Policy and Business series, Internet Governance and the Global South documents the role of the global south in Internet policymaking and challenges the globalization theories that declared the death of the state in global decision-making. Abu Bhuiyan argues that the global Internet politics is primarily a conflict between the states - the United States of America and the states of the global south - because the former controls Internet policymaking. The states of the global south have been both oppositional and acquiescing to the sponsored policies of the United States on Internet issues such as digital divide, multilingualism, intellectual property rights and cyber security. They do not oppose the neoliberal underpinnings of the policies promoted by the United States, but ask for an international framework to govern the Internet so that they can work as equal partners in setting norms for the global Internet.
This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021.The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology.
Universal navigation is accessible primarily through smart phones providing users with navigation information regardless of the environment (i.e., outdoor or indoor). Universal Navigation for Smart Phones provide the most up-to-date navigation technologies and systems for both outdoor and indoor navigation. It also provides a comparison of the similarities and differences between outdoor and indoor navigation systems from both a technological stand point and user 's perspective. All aspects of navigation systems including geo-positioning, wireless communication, databases, and functions will be introduced. The main thrust of this book presents new approaches and techniques for future navigation systems including social networking, as an emerging approach for navigation. |
You may like...
Intro to Python for Computer Science and…
Paul Deitel
Paperback
|