![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
The massive volume of data that some medical and biological applications generate require special processing resources that guarantee privacy and security, creating a crucial need for cluster and grid computing. Biomedical Diagnostics and Clinical Technologies: Applying High-Performance Cluster and Grid Computing disseminates knowledge regarding high performance computing for medical applications and bioinformatics. Containing a defining body of research on the subject, this critical reference source includes a valuable collection of cutting-edge research chapters for those working in the broad field of medical informatics and bioinformatics.
Fog computing is rapidly expanding in its applications and capabilities through various parts of society. Utilizing different types of virtualization technologies can push this branch of computing to even greater heights. Fog Computing: Breakthroughs in Research and Practice contains a compendium of the latest academic material on the evolving theory and practice related to fog computing. Including innovative studies on distributed fog computing environments, programming models, and access control mechanisms, this publication is an ideal source for programmers, IT professionals, students, researchers, and engineers.
XML has become the lingua franca for representing business data,
for exchanging information between business partners and
applications, and for adding structure
Over one million people write political blogs, yet a select few wield enormous power within the political blogosphere and over politics in general. Known as the "political blogging A-list", these bloggers command the majority of blogging traffic; set the agenda for the rest of the political blogosphere; and have a strong influence on politics, whether it is directly through blogging, or indirectly through influencing mainstream news media. In Making it in the Political Blogosphere, Tanni Haas profiles and interviews twenty of the world's top political bloggers, who share the secrets of their success. Despite the partisan nature of blogging, in which Liberals, Conservatives and Libertarians share the same space, the twenty bloggers are in surprising agreement about what makes a successful blogger. In securing access to the political blogging A-list, Haas has provided us with an entertaining sequence of interviews, which are invaluable to any aspiring political blogger.
The Internet of Things has become a major influence on the development of new technologies and innovations. When combined with smart services, the end-user experience can be significantly enhanced. Novel Design and the Applications of Smart-M3 Platforms in the Internet of Things: Emerging Research and Opportunities provides an innovative outlook on the development of open source technology for the creation of smart spaces and services. Including a range of relevant topics such as interoperability, system architecture, and information processing, this book is an ideal reference source for academics, researchers, graduate students, and practitioners interested in the latest advancements in the Internet of things.
This book addresses several aspects of environmental sustainability awareness and priorization, explores ways to use resources and processes more responsibly, and describes the strategies, models and tools required to overcome various challenges. Sustainable and green IT are used to minimize the current ICT recycling problems which are harming our planet. The book discusses the new green information technologies as alternatives to conventional ICT, which have significantly harmed nature, and examines how to make recent technologies such as cloud computing; social networking; smart technology; blockchains, IoT (internet-of-things); and big data sustainable. Exploring sustainability awareness and importance among individuals and organizations in the developed and developing countries, most of the contributions conclude that sustainability should be considered a duty in order to change mindsets, attitudes and actions so as to preserve our planet. Furthermore, it examines the green information technology strategies and models.
This book has a focus on the development and deployment of the Industrial Internet of Things (IIoT) paradigm, discussing frameworks, methodologies, benefits and limitations, as well as providing case studies of employing the IoT vision in the industrial domain. IIoT is becoming an attractive business reality for many organisations such as manufacturing, logistics, oil and gas, energy and other utilities, mining, aviation, and many more. The opportunities for this paradigm are huge, and according to one report, the IIoT market is predicted to reach $125 billion by 2021. The driving philosophy behind the IIoT is that smart machines are better than humans at accurately capturing, analysing and communicating real-time data. The underlying technologies include distributed computing, machine learning, artificial intelligence, and machine-to-machine communication, with a typical IIoT system consisting of intelligent systems (applications, controllers, sensors, and security mechanisms), data communication infrastructure (cloud computing, edge computing, etc.), data analytics (to support business intelligence and corporate decision making), and most importantly the human element. The promised benefits of the IIoT include enhanced safety, better reliability, smart metering, inventory management, equipment tracking, and facilities management. There are, however, numerous issues that are also becoming the focus of active research, such as concerns regarding service availability, data security, and device communication. Lack of ubiquitous interoperability between heterogeneous devices is also a major concern. This book intends to fill a gap in the IIoT literature by providing the scientific contributions and latest developments from researchers and practitioners of international repute, focusing on frameworks, methodologies, benefits, and inherent issues/barriers to connected environments, especially in industrial settings. The intended audience includes network specialists, hardware engineers, and security experts who wish to adopt newer approaches for device connectivity, IoT security, and sensor-based devices design. University level students, researchers and practitioners will also find the latest innovation in technology and newer approaches relevant to the IIoT from a distributed computing perspective.
The book proposes new technologies and discusses innovative solutions to various problems in the field of communication, circuits, and systems, as reflected in high-quality papers presented at International Conference on Communication, Circuits, and Systems (IC3S 2020) held at KIIT, Bhubaneswar, India from 16 - 18 October 2020. It brings together new works from academicians, scientists, industry professionals, scholars, and students together to exchange research outcomes and open up new horizons in the areas of signal processing, communications, and devices.
Social media is arguably one of the most powerful technology-enabled innovations since the Internet itself. This single-volume book provides a broad and easily understandable discussion of the evolution of social media; related problems and controversies, especially for youth; key people and organizations; and useful social media data. Social media is an integral part of people's lives. More than half of the world's 2.4 billion Internet users sign in to a social network regularly-a figure that continues to grow. More than half of online adults now use two or more social media sites; 71 percent of Internet users are on Facebook. This book surveys the history of social media, addresses the power of social media for positive change, describes the problems and controversies social media have caused, and suggests potential solutions to these issues. Geared toward students and general readers, this accessibly written book covers such topics as the link between social media and body image, the psychological affects of social media use, online conversations about sexual assault, corporate use of social media data, political campaigning through social media, fan tweeting during television shows, and crisis communication through social media. Readers will also gain insights into the range of serious problems related to social media, including privacy concerns, social media addiction, social media hoaxes and scams, the pressure to project an ideal self, the curation of content presented on social media, cyberbullying, sexting, Facebook depression and envy, online shaming, and the impact of social media use on communication skills. Provides readers with a clearly written overview of the impacts of social media worldwide that highlights key people and companies in the development of social media Presents up-to-date information on the range of problems related to social media and presents potential solutions Offers a variety of voices from social media experts, supplying perspectives from creators to users
This book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two categories of false data injection attacks, false measurement data injections and false command data injections in smart grid cyber-physical systems. These techniques are easy to follow for either professionals or beginners. With this book, readers can quickly get an overview of this topic and get ideas of new solutions for false data injections in smart grid cyber-physical systems. Readers include researchers, academics, students, and professionals. Presents a comprehensive summary for the detection techniques of false data injection attacks in smart grid cyber-physical systems; Reviews false data injections for either measurement data or command data; Analyzes passive and proactive approaches to smart grid cyber-physical systems.
Smart Homes (SH) offer a promising approach to assisted living for the ageing population. Yet the main obstacle to the rapid development and deployment of Smart Home (SH) solutions essentially arises from the nature of the SH field, which is multidisciplinary and involves diverse applications and various stakeholders. Accordingly, an alternative to a one-size-fits-all approach is needed in order to advance the state of the art towards an open SH infrastructure. This book makes a valuable and critical contribution to smart assisted living research through the development of new effective, integrated, and interoperable SH solutions. It focuses on four underlying aspects: (1) Sensing and Monitoring Technologies; (2) Context Interference and Behaviour Analysis; (3) Personalisation and Adaptive Interaction, and (4) Open Smart Home and Service Infrastructures, demonstrating how fundamental theories, models and algorithms can be exploited to solve real-world problems. This comprehensive and timely book offers a unique and essential reference guide for policymakers, funding bodies, researchers, technology developers and managers, end users, carers, clinicians, healthcare service providers, educators and students, helping them adopt and implement smart assisted living systems.
Tired of writing all your user IDs and passwords on sticky notes and pieces of scrap paper? This convenient address book stores them all in one place. This is not your typical address book There are also special sections for online banking info and one for storing e-mail addresses.
This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to: Blockchain-based authentication, authorization and accounting mechanisms Applications of blockchain technologies in digital forensic and threat hunting Blockchain-based threat intelligence and threat analytics techniques Formal specification of smart contracts Automated tools for outsmarting smart contracts Security and privacy aspects of blockchain technologies Vulnerabilities of smart contracts Blockchain for securing cyber infrastructure and internet of things networks Blockchain-based cybersecurity education systems This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.
This book features research presented and discussed during the Research & Innovation Forum (Rii Forum) 2020. As such, this book offers a unique insight into emerging topics, issues and developments pertinent to the fields of technology, innovation and education and their social impact. Papers included in this book apply inter- and multi-disciplinary approaches to query such issues as technology-enhanced teaching and learning, smart cities, information systems, cognitive computing and social networking. What brings these threads of the discussion together is the question of how advances in computer science - which are otherwise largely incomprehensible to researchers from other fields - can be effectively translated and capitalized on so as to make them beneficial for society as a whole. In this context, Rii Forum and Rii Forum proceedings offer an essential venue where diverse stakeholders, including academics, the think tank sector and decision-makers, can engage in a meaningful dialogue with a view to improving the applicability of advances in computer science.
Sega Arcade: Pop-Up History presents six of the most iconic Sega Taiken 'body sensation' videogame cabinets - Hang-On, Space Harrier, Out Run, After Burner, Thunder Blade and Power Drift - in an innovative form: as dazzling pop-up paper sculptures. Sega Arcade: Pop-Up History is a unique book object, a delight for Sega fans and a love letter to the once-vibrant arcade game scene of the 1980s. Accompanying the 3D model showcase is a written history from Guardian games writer and best-selling novelist, Keith Stuart, punctuated by specially restored production artwork and beautifully reproduced in-game screens. The book features contributions from arcade game innovator Yu Suzuki, who offers first-hand insight into the development of these ground-breaking games and the birth of the Taiken cabinet phenomenon.
At a time when there are still a number of voices calling for the Internet to remain a law-free zone, a whole bundle of conflicts have already emerged, many of which have found their way to lawyers and the courts in a substantial number of different jurisdictions. It surely now cannot be doubted that the Internet, like any other place in the world where people come together and follow their own interests, needs rules to be developed for the handling of such conflicts. Lawyers have already reacted and have created a new area of law, commonly called "law of the Internet" or "cyberlaw". This area, however, is far from being strictly defined. It touches on many existing areas of law, but at the same time it deals with a wholly new medium - cyberspace - which itself is subject to constant change and development. Under these circumstances, it is not surprising that in a number of cases the predictions as to how this law will look at some selected moment in the future are vague and uncertain. This is particularly true for the commercial side of the Internet, for which the term "e-commerce" has been coined. So rapid have been the developments of e-commerce, that it is now frequently said that this is the future of any commerce and that it carries the potential for enormous growth - at least for the business to business ("B2B") sector. This text covers some important legal issues arising in e-commerce.
XML in Data Management is for IT managers and technical staff
involved in the creation, administration, or maintenance of a data
management infrastructure that includes XML. For most IT staff, XML
is either just a buzzword that is ignored or a silver bullet to be
used in every nook and cranny of their organization. The truth is
in between the two. This book provides the guidance necessary for
data managers to make measured decisions about XML within their
organizations. Readers will understand the uses of XML, its
component architecture, its strategic implications, and how these
apply to data management.
Social media and new social facilities have made it necessary to develop new media design processes with different communication strategies in order to promote sustainable communication. Visual communication emphasizes messages that are transmitted through visual materials in order to effectively communicate emotions, thoughts, and concepts using symbols instead of words. Social networks present an ideal environment for utilizing this communication technique. New Media and Visual Communication in Social Networks is a pivotal scholarly publication that examines communication strategies in the context of social media and new digital media platforms and explores the effects of visual communication on social networks, visual identity, television, magazines, newspapers, and more. Highlighting a range of topics such as consumer behavior, visual identity, and digital pollution, this book is essential for researchers, practitioners, entrepreneurs, policymakers, and educators.
This title focuses on electronic learning communities created through the development and use of the Internet for instruction and training. Chapters focus on philosophies, background, reviews, technologies, systems, tools, services, strategies, development, implementation and research. |
![]() ![]() You may like...
Promising Practices in 21st Century…
Michele Kaschub, Janice Smith
Hardcover
R4,083
Discovery Miles 40 830
Spatial Evolutionary Modeling
Roman M. Krzanowski, Jonathan Raper
Hardcover
R6,013
Discovery Miles 60 130
Suzuki Viola School Volume 8
Michael Isaac Strauss, R Kent Cook
Paperback
R507
Discovery Miles 5 070
Analyzing Emotion in Spontaneous Speech
Rupayan Chakraborty, Meghna Pandharipande, …
Hardcover
R1,521
Discovery Miles 15 210
|