![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet
Fog computing is rapidly expanding in its applications and capabilities through various parts of society. Utilizing different types of virtualization technologies can push this branch of computing to even greater heights. Fog Computing: Breakthroughs in Research and Practice contains a compendium of the latest academic material on the evolving theory and practice related to fog computing. Including innovative studies on distributed fog computing environments, programming models, and access control mechanisms, this publication is an ideal source for programmers, IT professionals, students, researchers, and engineers.
The Internet of Things has become a major influence on the development of new technologies and innovations. When combined with smart services, the end-user experience can be significantly enhanced. Novel Design and the Applications of Smart-M3 Platforms in the Internet of Things: Emerging Research and Opportunities provides an innovative outlook on the development of open source technology for the creation of smart spaces and services. Including a range of relevant topics such as interoperability, system architecture, and information processing, this book is an ideal reference source for academics, researchers, graduate students, and practitioners interested in the latest advancements in the Internet of things.
This book addresses several aspects of environmental sustainability awareness and priorization, explores ways to use resources and processes more responsibly, and describes the strategies, models and tools required to overcome various challenges. Sustainable and green IT are used to minimize the current ICT recycling problems which are harming our planet. The book discusses the new green information technologies as alternatives to conventional ICT, which have significantly harmed nature, and examines how to make recent technologies such as cloud computing; social networking; smart technology; blockchains, IoT (internet-of-things); and big data sustainable. Exploring sustainability awareness and importance among individuals and organizations in the developed and developing countries, most of the contributions conclude that sustainability should be considered a duty in order to change mindsets, attitudes and actions so as to preserve our planet. Furthermore, it examines the green information technology strategies and models.
Social media is arguably one of the most powerful technology-enabled innovations since the Internet itself. This single-volume book provides a broad and easily understandable discussion of the evolution of social media; related problems and controversies, especially for youth; key people and organizations; and useful social media data. Social media is an integral part of people's lives. More than half of the world's 2.4 billion Internet users sign in to a social network regularly-a figure that continues to grow. More than half of online adults now use two or more social media sites; 71 percent of Internet users are on Facebook. This book surveys the history of social media, addresses the power of social media for positive change, describes the problems and controversies social media have caused, and suggests potential solutions to these issues. Geared toward students and general readers, this accessibly written book covers such topics as the link between social media and body image, the psychological affects of social media use, online conversations about sexual assault, corporate use of social media data, political campaigning through social media, fan tweeting during television shows, and crisis communication through social media. Readers will also gain insights into the range of serious problems related to social media, including privacy concerns, social media addiction, social media hoaxes and scams, the pressure to project an ideal self, the curation of content presented on social media, cyberbullying, sexting, Facebook depression and envy, online shaming, and the impact of social media use on communication skills. Provides readers with a clearly written overview of the impacts of social media worldwide that highlights key people and companies in the development of social media Presents up-to-date information on the range of problems related to social media and presents potential solutions Offers a variety of voices from social media experts, supplying perspectives from creators to users
This book has a focus on the development and deployment of the Industrial Internet of Things (IIoT) paradigm, discussing frameworks, methodologies, benefits and limitations, as well as providing case studies of employing the IoT vision in the industrial domain. IIoT is becoming an attractive business reality for many organisations such as manufacturing, logistics, oil and gas, energy and other utilities, mining, aviation, and many more. The opportunities for this paradigm are huge, and according to one report, the IIoT market is predicted to reach $125 billion by 2021. The driving philosophy behind the IIoT is that smart machines are better than humans at accurately capturing, analysing and communicating real-time data. The underlying technologies include distributed computing, machine learning, artificial intelligence, and machine-to-machine communication, with a typical IIoT system consisting of intelligent systems (applications, controllers, sensors, and security mechanisms), data communication infrastructure (cloud computing, edge computing, etc.), data analytics (to support business intelligence and corporate decision making), and most importantly the human element. The promised benefits of the IIoT include enhanced safety, better reliability, smart metering, inventory management, equipment tracking, and facilities management. There are, however, numerous issues that are also becoming the focus of active research, such as concerns regarding service availability, data security, and device communication. Lack of ubiquitous interoperability between heterogeneous devices is also a major concern. This book intends to fill a gap in the IIoT literature by providing the scientific contributions and latest developments from researchers and practitioners of international repute, focusing on frameworks, methodologies, benefits, and inherent issues/barriers to connected environments, especially in industrial settings. The intended audience includes network specialists, hardware engineers, and security experts who wish to adopt newer approaches for device connectivity, IoT security, and sensor-based devices design. University level students, researchers and practitioners will also find the latest innovation in technology and newer approaches relevant to the IIoT from a distributed computing perspective.
The book proposes new technologies and discusses innovative solutions to various problems in the field of communication, circuits, and systems, as reflected in high-quality papers presented at International Conference on Communication, Circuits, and Systems (IC3S 2020) held at KIIT, Bhubaneswar, India from 16 - 18 October 2020. It brings together new works from academicians, scientists, industry professionals, scholars, and students together to exchange research outcomes and open up new horizons in the areas of signal processing, communications, and devices.
Tired of writing all your user IDs and passwords on sticky notes and pieces of scrap paper? This convenient address book stores them all in one place. This is not your typical address book There are also special sections for online banking info and one for storing e-mail addresses.
This book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two categories of false data injection attacks, false measurement data injections and false command data injections in smart grid cyber-physical systems. These techniques are easy to follow for either professionals or beginners. With this book, readers can quickly get an overview of this topic and get ideas of new solutions for false data injections in smart grid cyber-physical systems. Readers include researchers, academics, students, and professionals. Presents a comprehensive summary for the detection techniques of false data injection attacks in smart grid cyber-physical systems; Reviews false data injections for either measurement data or command data; Analyzes passive and proactive approaches to smart grid cyber-physical systems.
Smart Homes (SH) offer a promising approach to assisted living for the ageing population. Yet the main obstacle to the rapid development and deployment of Smart Home (SH) solutions essentially arises from the nature of the SH field, which is multidisciplinary and involves diverse applications and various stakeholders. Accordingly, an alternative to a one-size-fits-all approach is needed in order to advance the state of the art towards an open SH infrastructure. This book makes a valuable and critical contribution to smart assisted living research through the development of new effective, integrated, and interoperable SH solutions. It focuses on four underlying aspects: (1) Sensing and Monitoring Technologies; (2) Context Interference and Behaviour Analysis; (3) Personalisation and Adaptive Interaction, and (4) Open Smart Home and Service Infrastructures, demonstrating how fundamental theories, models and algorithms can be exploited to solve real-world problems. This comprehensive and timely book offers a unique and essential reference guide for policymakers, funding bodies, researchers, technology developers and managers, end users, carers, clinicians, healthcare service providers, educators and students, helping them adopt and implement smart assisted living systems.
Named one of the greatest minds of the 20th century by Time, Tim Berners-Lee is responsible for one of that century's most important advancements: the world wide web. Now, this low-profile genius-who never personally profitted from his invention -offers a compelling protrait of his invention. He reveals the Web's origins and the creation of the now ubiquitous http and www acronyms and shares his views on such critical issues as censorship, privacy, the increasing power of softeware companies , and the need to find the ideal balance between commercial and social forces. He offers insights into the true nature of the Web, showing readers how to use it to its fullest advantage. And he presents his own plan for the Web's future, calling for the active support and participation of programmers, computer manufacturers, and social organizations to manage and maintain this valuable resource so that it can remain a powerful force for social change and an outlet for individual creativity.
This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to: Blockchain-based authentication, authorization and accounting mechanisms Applications of blockchain technologies in digital forensic and threat hunting Blockchain-based threat intelligence and threat analytics techniques Formal specification of smart contracts Automated tools for outsmarting smart contracts Security and privacy aspects of blockchain technologies Vulnerabilities of smart contracts Blockchain for securing cyber infrastructure and internet of things networks Blockchain-based cybersecurity education systems This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.
This book features research presented and discussed during the Research & Innovation Forum (Rii Forum) 2020. As such, this book offers a unique insight into emerging topics, issues and developments pertinent to the fields of technology, innovation and education and their social impact. Papers included in this book apply inter- and multi-disciplinary approaches to query such issues as technology-enhanced teaching and learning, smart cities, information systems, cognitive computing and social networking. What brings these threads of the discussion together is the question of how advances in computer science - which are otherwise largely incomprehensible to researchers from other fields - can be effectively translated and capitalized on so as to make them beneficial for society as a whole. In this context, Rii Forum and Rii Forum proceedings offer an essential venue where diverse stakeholders, including academics, the think tank sector and decision-makers, can engage in a meaningful dialogue with a view to improving the applicability of advances in computer science.
This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal multiple access (NOMA). The authors have provided these under various practical scenarios, and developed theoretical aspects to validate their proposed applications. Presents physical layer security (PLS) under correlated fading environments, 5G wireless networks, and NOMA networks; Provides end-to-end analyses, combination of channel correlation and outdated CSI and their effects on PL; Includes contributions of PLS research written by global experts in academia and industry.
At a time when there are still a number of voices calling for the Internet to remain a law-free zone, a whole bundle of conflicts have already emerged, many of which have found their way to lawyers and the courts in a substantial number of different jurisdictions. It surely now cannot be doubted that the Internet, like any other place in the world where people come together and follow their own interests, needs rules to be developed for the handling of such conflicts. Lawyers have already reacted and have created a new area of law, commonly called "law of the Internet" or "cyberlaw". This area, however, is far from being strictly defined. It touches on many existing areas of law, but at the same time it deals with a wholly new medium - cyberspace - which itself is subject to constant change and development. Under these circumstances, it is not surprising that in a number of cases the predictions as to how this law will look at some selected moment in the future are vague and uncertain. This is particularly true for the commercial side of the Internet, for which the term "e-commerce" has been coined. So rapid have been the developments of e-commerce, that it is now frequently said that this is the future of any commerce and that it carries the potential for enormous growth - at least for the business to business ("B2B") sector. This text covers some important legal issues arising in e-commerce.
Social media and new social facilities have made it necessary to develop new media design processes with different communication strategies in order to promote sustainable communication. Visual communication emphasizes messages that are transmitted through visual materials in order to effectively communicate emotions, thoughts, and concepts using symbols instead of words. Social networks present an ideal environment for utilizing this communication technique. New Media and Visual Communication in Social Networks is a pivotal scholarly publication that examines communication strategies in the context of social media and new digital media platforms and explores the effects of visual communication on social networks, visual identity, television, magazines, newspapers, and more. Highlighting a range of topics such as consumer behavior, visual identity, and digital pollution, this book is essential for researchers, practitioners, entrepreneurs, policymakers, and educators. |
![]() ![]() You may like...
Relativity - The Special and The General…
Albert Einstein
Hardcover
An Introduction to XML and Web…
Anders Moller, Michael Schwartzbach
Paperback
R2,648
Discovery Miles 26 480
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel
Paperback
Strengthening SME Performance Through…
Sikandar Ali Qalati, Dragana Ostic, …
Hardcover
R7,080
Discovery Miles 70 800
|