0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (20)
  • R500+ (4,516)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Advances in Computer Science and Ubiquitous Computing - CSA & CUTE (Hardcover, 1st ed. 2015): Doo-Soon Park, Han-Chieh Chao,... Advances in Computer Science and Ubiquitous Computing - CSA & CUTE (Hardcover, 1st ed. 2015)
Doo-Soon Park, Han-Chieh Chao, Young-Sik Jeong, James J (Jong Hyuk) Park
R4,860 R4,552 Discovery Miles 45 520 Save R308 (6%) Ships in 12 - 17 working days

This book presents the combined proceedings of the 7th International Conference on Computer Science and its Applications (CSA-15) and the International Conference on Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of computer science covering topics including mobile computing, security and trust management, multimedia systems and devices, networks and communications, databases and data mining, and ubiquitous computing technologies such as ubiquitous communication and networking, ubiquitous software technology, ubiquitous systems and applications, security and privacy. These proceedings reflect the state-of-the-art in the development of computational methods, numerical simulations, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to computer science.

Computer Networking - The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture,... Computer Networking - The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA) (Hardcover)
Benjamin Walker
R635 R545 Discovery Miles 5 450 Save R90 (14%) Ships in 10 - 15 working days
Terrestrial-Satellite Communication Networks - Transceivers Design and Resource Allocation (Hardcover, 1st ed. 2018): Linling... Terrestrial-Satellite Communication Networks - Transceivers Design and Resource Allocation (Hardcover, 1st ed. 2018)
Linling Kuang, Chunxiao Jiang, Yi Qian, Jianhua Lu
R3,795 Discovery Miles 37 950 Ships in 12 - 17 working days

This book targets major issues in terrestrial-satellite communication networks and presents the solutions. While the terrestrial networks can achieve high-speed data service at low cost, satellite based access is one way to complement terrestrial based networks to ensure ubiquitous, 100% geographic coverage. The coexistence and cooperation between terrestrial and satellite networks are of great potential in future communication networks, and satellite radio access networks has already been considered in the fifth-generation (5G) networks to be supported for phase 2. Therefore, it is important to study the architectures of terrestrial-satellite networks, as well as the possible techniques and challenges. The authors introduce the technique of beamforming in satellite communication systems, which is an efficient transmitting method for multiple access, and they discuss the main challenges as well as prospective applications. The authors introduce possible methods for interference cancelation reception in terrestrial-satellite communication networks when reusing the frequency band between the two networks. Due to the limitation of spectrum resources, spectrum sharing will become one of the important issues in terrestrial-satellite communication networks. The problems of spectrum coexistence between GEO and Terrestrial Systems and between GEO and NEGO systems are also discussed. Finally, taking both the two system into consideration, the resource allocation problem will be more complex due to the coupling between resources and the interference. Based on this, the authors propose several resource allocation schemes in different scenarios of terrestrial-satellite communication networks, which can optimize the capacity performance of the system. The expected audience for this book includes (but not limited to) graduate students, professors, researchers, scientists, practitioners, engineers, industry managers, and government researchers working in the field of satellite communications and networks. The expected audience for this book includes (but not limited to) graduate students, professors, researchers, scientists, practitioners, engineers, industry managers, and government researchers working in the field of satellite communications and networks.

Millimeter-Wave Networks - Beamforming Design and Performance Analysis (Hardcover, 1st ed. 2021): Peng Yang, Wen Wu, Ning... Millimeter-Wave Networks - Beamforming Design and Performance Analysis (Hardcover, 1st ed. 2021)
Peng Yang, Wen Wu, Ning Zhang, Xuemin Shen
R4,128 Discovery Miles 41 280 Ships in 12 - 17 working days

This book provides a comprehensive review and in-depth study on efficient beamforming design and rigorous performance analysis in mmWave networks, covering beam alignment, beamforming training and beamforming-aided caching. Due to significant beam alignment latency between the transmitter and the receiver in existing mmWave systems, this book proposes a machine learning based beam alignment algorithm for mmWave networks to determine the optimal beam pair with a low latency. Then, to analyze and enhance the performance of beamforming training (BFT) protocol in 802.11ad mmWave networks, an analytical model is presented to evaluate the performance of BFT protocol and an enhancement scheme is proposed to improve its performance in high user density scenarios. Furthermore, it investigates the beamforming-aided caching problem in mmWave networks, and proposes a device-to-device assisted cooperative edge caching to alleviate backhaul congestion and reduce content retrieval delay. This book concludes with future research directions in the related fields of study. The presented beamforming designs and the corresponding research results covered in this book, provides valuable insights for practical mmWave network deployment and motivate new ideas for future mmWave networking. This book targets researchers working in the fields of mmWave networks, beamforming design, and resource management as well as graduate students studying the areas of electrical engineering, computing engineering and computer science. Professionals in industry who work in this field will find this book useful as a reference.

Physical-Layer Security for Cooperative Relay Networks (Hardcover, 1st ed. 2016): Yulong Zou, Jia Zhu Physical-Layer Security for Cooperative Relay Networks (Hardcover, 1st ed. 2016)
Yulong Zou, Jia Zhu
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination.Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource.

A Survey on Coordinated Power Management in Multi-Tenant Data Centers (Hardcover, 1st ed. 2018): Thant Zin Oo, Nguyen H. Tran,... A Survey on Coordinated Power Management in Multi-Tenant Data Centers (Hardcover, 1st ed. 2018)
Thant Zin Oo, Nguyen H. Tran, Shaolei Ren, Choong Seon Hong
R3,397 Discovery Miles 33 970 Ships in 12 - 17 working days

This book investigates the coordinated power management of multi-tenant data centers that account for a large portion of the data center industry. The authors include discussion of their quick growth and their electricity consumption, which has huge economic and environmental impacts. This book covers the various coordinated management solutions in the existing literature focusing on efficiency, sustainability, and demand response aspects. First, the authors provide a background on the multi-tenant data center covering the stake holders, components, power infrastructure, and energy usage. Then, each power management mechanism is described in terms of motivation, problem formulation, challenges and solution.

Wireless Sensors in Industrial Time-Critical Environments (Hardcover, 2014 ed.): Jose Cecilio, Pedro Furtado Wireless Sensors in Industrial Time-Critical Environments (Hardcover, 2014 ed.)
Jose Cecilio, Pedro Furtado
R3,361 Discovery Miles 33 610 Ships in 12 - 17 working days

This book introduces the fundamentals of DCS, and shows how to include wireless technology in their design while guaranteeing the desired operation characteristics. The text also presents insights and results gained from extensive practical experience in implementing and testing systems within a specific industrial setting. Features: examines the operations that the DCS implements, covering human-machine interfaces, diagnostics and maintenance interfaces, and controllers; discusses industrial control system and wireless network protocols; reviews scheduling in wireless sensor networks; describes a latency model for heterogeneous DCS with wired and wireless parts, that predicts monitoring, command, and closed loop latencies; explains how to plan operation timings systematically; introduces measures and metrics for performance monitoring and debugging, and describes how to add these to a system; presents experimental results to validate the planning approach, based on an application test-bed.

Wireless Sensor Networks - Security, Coverage, and Localization (Hardcover, 1st ed. 2016): Rastko R. Selmic, Vir V Phoha, Abdul... Wireless Sensor Networks - Security, Coverage, and Localization (Hardcover, 1st ed. 2016)
Rastko R. Selmic, Vir V Phoha, Abdul Serwadda
R2,606 Discovery Miles 26 060 Ships in 12 - 17 working days

This book presents a comprehensive overview of wireless sensor networks (WSNs) with an emphasis on security, coverage, and localization. It offers a structural treatment of WSN building blocks including hardware and protocol architectures and also provides a systems-level view of how WSNs operate. These building blocks will allow readers to program specialized applications and conduct research in advanced topics. A brief introductory chapter covers common applications and communication protocols for WSNs. Next, the authors review basic mathematical models such as Voroni diagrams and Delaunay triangulations. Sensor principles, hardware structure, and medium access protocols are examined. Security challenges ranging from defense strategies to network robustness are explored, along with quality of service measures. Finally, this book discusses recent developments and future directions in WSN platforms. Each chapter concludes with classroom-tested exercises that reinforce key concepts. This book is suitable for researchers and for practitioners in industry. Advanced-level students in electrical engineering and computer science will also find the content helpful as a textbook or reference.

The GENI Book (Hardcover, 1st ed. 2016): Rick Mcgeer, Mark Berman, Chip Elliott, Robert Ricci The GENI Book (Hardcover, 1st ed. 2016)
Rick Mcgeer, Mark Berman, Chip Elliott, Robert Ricci
R3,074 Discovery Miles 30 740 Ships in 10 - 15 working days

This book, edited by four of the leaders of the National Science Foundation's Global Environment and Network Innovations (GENI) project, gives the reader a tour of the history, architecture, future, and applications of GENI. Built over the past decade by hundreds of leading computer scientists and engineers, GENI is a nationwide network used daily by thousands of computer scientists to explore the next Cloud and Internet and the applications and services they enable, which will transform our communities and our lives. Since by design it runs on existing computing and networking equipment and over the standard commodity Internet, it is poised for explosive growth and transformational impact over the next five years. Over 70 of the builders of GENI have contributed to present its development, architecture, and implementation, both as a standalone US project and as a federated peer with similar projects worldwide, forming the core of a worldwide network. Applications and services enabled by GENI, from smarter cities to intensive collaboration to immersive education, are discussed. The book also explores the concepts and technologies that transform the Internet from a shared transport network to a collection of "slices" -- private, on-the-fly application-specific nationwide networks with guarantees of privacy and responsiveness. The reader will learn the motivation for building GENI and the experience of its precursor infrastructures, the architecture and implementation of the GENI infrastructure, its deployment across the United States and worldwide, the new network applications and services enabled by and running on the GENI infrastructure, and its international collaborations and extensions. This book is useful for academics in the networking and distributed systems areas, Chief Information Officers in the academic, private, and government sectors, and network and information architects.

Network Coding at Different Layers in Wireless Networks (Hardcover, 1st ed. 2016): Yang Qin Network Coding at Different Layers in Wireless Networks (Hardcover, 1st ed. 2016)
Yang Qin
R3,983 R3,406 Discovery Miles 34 060 Save R577 (14%) Ships in 12 - 17 working days

This book focuses on how to apply network coding at different layers in wireless networks - including MAC, routing, and TCP - with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, redundant information ration) in order to be suitable for the varying wireless environments. The author explores how to deploy network coding in MAC to improve network performance and examine joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the author considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

Information Technology in Disaster Risk Reduction - 4th IFIP TC 5 DCITDRR International Conference, ITDRR 2019, Kyiv, Ukraine,... Information Technology in Disaster Risk Reduction - 4th IFIP TC 5 DCITDRR International Conference, ITDRR 2019, Kyiv, Ukraine, October 9-10, 2019, Revised Selected Papers (Hardcover, 1st ed. 2020)
Yuko Murayama, Dimiter Velev, Plamena Zlateva
R1,558 Discovery Miles 15 580 Ships in 10 - 15 working days

This volume constitutes the refereed and revised post-conference proceedings of the 4th IFIP TC 5 DCITDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2019, in Kyiv, Ukraine, in October 2019. The 17 full papers and 2 short papers presented were carefully reviewed and selected from 53 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, and disaster risk assessment and management.

Global Mobile Satellite Communications Applications - For Maritime, Land and Aeronautical Applications Volume 2 (Hardcover, 2nd... Global Mobile Satellite Communications Applications - For Maritime, Land and Aeronautical Applications Volume 2 (Hardcover, 2nd ed. 2018)
Stojce Dimov Ilcev
R6,200 Discovery Miles 62 000 Ships in 12 - 17 working days

This book discusses global mobile satellite communications (GMSC) for maritime, land (road and rail), and aeronautical applications. It covers how these enable connections between moving objects such as ships, road and rail vehicles and aircrafts on one hand, and ground telecommunications subscribers through the medium of communications satellites, ground earth stations, Terrestrial Telecommunication Networks (TTN), Internet Service Providers (ISP) and other wireless and landline telecommunications providers. The new edition covers new developments and initiatives that have resulted in land and aeronautical applications and the introduction of new satellite constellations in non-geostationary orbits and projects of new hybrid satellite constellations. The book presents current GMSC trends, mobile system concepts and network architecture using a simple mode of style with understandable technical information, characteristics, graphics, illustrations and mathematics equations. It represents telecommunications technique and technology, which can be useful for all technical staff on vessels at sea and rivers, on all types of land vehicles, on planes, on off shore constructions and for everyone possessing satellite communications handset phones. The first edition of Global Mobile Satellite Communications (Springer, 2005) was split into two books for the second edition - one on applications and one on theory. This book presents global mobile satellite communications applications.

Wireless Sensors in Heterogeneous Networked Systems - Configuration and Operation Middleware (Hardcover, 2014 ed.): Jose... Wireless Sensors in Heterogeneous Networked Systems - Configuration and Operation Middleware (Hardcover, 2014 ed.)
Jose Cecilio, Pedro Furtado
R3,466 R1,880 Discovery Miles 18 800 Save R1,586 (46%) Ships in 12 - 17 working days

This book presents an examination of the middleware that can be used to configure and operate heterogeneous node platforms and sensor networks. The middleware requirements for a range of application scenarios are compared and analysed. The text then defines middleware architecture that has been integrated in an approach demonstrated live in a refinery. Features: presents a thorough introduction to the major concepts behind wireless sensor networks (WSNs); reviews the various application scenarios and existing middleware solutions for WSNs; discusses the middleware mechanisms necessary for heterogeneous WSNs; provides a detailed examination of platform-agnostic middleware architecture, including important implementation details; investigates the programming paradigms for WSNs, and for heterogeneous sensor networks in general; describes the results of extensive experimentation and testing, demonstrating that the generic architecture is viable for implementation on multiple platforms.

Potential Game Theory - Applications in Radio Resource Allocation (Hardcover, 1st ed. 2016): Quang Duy La, Yong Huat Chew,... Potential Game Theory - Applications in Radio Resource Allocation (Hardcover, 1st ed. 2016)
Quang Duy La, Yong Huat Chew, Boon-Hee Soong
R3,679 R3,384 Discovery Miles 33 840 Save R295 (8%) Ships in 12 - 17 working days

This book offers a thorough examination of potential game theory and its applications in radio resource management for wireless communications systems and networking. The book addresses two major research goals: how to identify a given game as a potential game, and how to design the utility functions and the potential functions with certain special properties in order to formulate a potential game. After proposing a unifying mathematical framework for the identification of potential games, the text surveys existing applications of this technique within wireless communications and networking problems found in OFDMA 3G/4G/WiFi networks, as well as next-generation systems such as cognitive radios and dynamic spectrum access networks. Professionals interested in understanding the theoretical aspect of this specialized field will find Potential Game Theory a valuable resource, as will advanced-level engineering students. It paves the way for extensive and rigorous research exploration on a topic whose capacity for practical applications is vast but not yet fully exploited.

Advances in Computer Science and Ubiquitous Computing - CSA-CUTE 2018 (Hardcover, 1st ed. 2020): James J. Park, Doo-Soon Park,... Advances in Computer Science and Ubiquitous Computing - CSA-CUTE 2018 (Hardcover, 1st ed. 2020)
James J. Park, Doo-Soon Park, Young-Sik Jeong, Yi Pan
R5,844 Discovery Miles 58 440 Ships in 10 - 15 working days

This book presents the combined proceedings of the 10th International Conference on Computer Science and its Applications (CSA 2018) and the 13th KIPS International Conference on Ubiquitous Information Technologies and Applications (CUTE 2018), both held in Kuala Lumpur, Malaysia, Dec 17 - 19, 2018. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies. These proceedings reflect the state of the art in the development of computational methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to ubiquitous computing.

Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2019 (Hardcover, 1st ed. 2020): James J. Park, Laurence T.... Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2019 (Hardcover, 1st ed. 2020)
James J. Park, Laurence T. Yang, Young-Sik Jeong, Fei Hao
R6,532 Discovery Miles 65 320 Ships in 10 - 15 working days

This book presents the combined proceedings of the 13th International Conference on Multimedia and Ubiquitous Engineering (MUE 2019) and the 14th International Conference on Future Information Technology (Future Tech 2019), both held in Xi'an, China, April 24 - 26, 2019. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies. These proceedings reflect the state of the art in the development of computational methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to ubiquitous computing.

Management of Cyber Physical Objects in the Future Internet of Things - Methods, Architectures and Applications (Hardcover, 1st... Management of Cyber Physical Objects in the Future Internet of Things - Methods, Architectures and Applications (Hardcover, 1st ed. 2016)
Antonio Guerrieri, Valeria Loscri, Anna Rovella, Giancarlo Fortino
R3,969 R3,393 Discovery Miles 33 930 Save R576 (15%) Ships in 12 - 17 working days

This book focuses on new methods, architectures, and applications for the management of Cyber Physical Objects (CPOs) in the context of the Internet of Things (IoT). It covers a wide range of topics related to CPOs, such as resource management, hardware platforms, communication and control, and control and estimation over networks. It also discusses decentralized, distributed, and cooperative optimization as well as effective discovery, management, and querying of CPOs. Other chapters outline the applications of control, real-time aspects, and software for CPOs and introduce readers to agent-oriented CPOs, communication support for CPOs, real-world deployment of CPOs, and CPOs in Complex Systems. There is a focus on the importance of application of IoT technologies for Smart Cities.

Private Cloud Computing - Consolidation, Virtualization, and Service-Oriented Infrastructure (Paperback): Stephen R. Smoot, Nam... Private Cloud Computing - Consolidation, Virtualization, and Service-Oriented Infrastructure (Paperback)
Stephen R. Smoot, Nam K. Tan
R1,254 Discovery Miles 12 540 Ships in 12 - 17 working days

Private cloud computing enables you to consolidate diverse enterprise systems into one that is cloud-based and can be accessed by end-users seamlessly, regardless of their location or changes in overall demand. Expert authors Steve Smoot and Nam K. Tan distill their years of networking experience to describe how to build enterprise networks to create a private cloud. With their techniques you'll create cost-saving designs and increase the flexibility of your enterprise, while maintaining the security and control of an internal network. "Private Cloud Computing "offers a complete cloud architecture for enterprise networking by synthesizing WAN optimization, next-generation data centers, and virtualization in a network-friendly way, tying them together into a complete solution that can be progressively migrated to as time and resources permit.
Describes next-generation data center architectures such as the virtual access-layer, the unified data center fabric and the "rack-and-roll" deployment modelProvides an overview of cloud security and cloud management from the server virtualization perspectivePresents real-world case studies, configuration and examples that allow you to easily apply practical know-how to your existing enterprise environmentOffers effective private cloud computing solutions to simplify the costly and problematic challenge of enterprise networking and branch server consolidation

Advances in Parallel and Distributed Computing and Ubiquitous Services - UCAWSN & PDCAT 2015 (Hardcover, 1st ed. 2016): James J... Advances in Parallel and Distributed Computing and Ubiquitous Services - UCAWSN & PDCAT 2015 (Hardcover, 1st ed. 2016)
James J (Jong Hyuk) Park, Gangman Yi, Young-Sik Jeong, Hong Shen
R3,768 R3,474 Discovery Miles 34 740 Save R294 (8%) Ships in 12 - 17 working days

This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15). The combined proceedings present peer-reviewed contributions from academic and industrial researchers in fields including ubiquitous and context-aware computing, context-awareness reasoning and representation, location awareness services, and architectures, protocols and algorithms, energy, management and control of wireless sensor networks. The book includes the latest research results, practical developments and applications in parallel/distributed architectures, wireless networks and mobile computing, formal methods and programming languages, network routing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation.

Hardware Based Packet Classification for High Speed Internet Routers (Hardcover, 2010 ed.): Chad R. Meiners, Alex X. Liu, Eric... Hardware Based Packet Classification for High Speed Internet Routers (Hardcover, 2010 ed.)
Chad R. Meiners, Alex X. Liu, Eric Torng
R3,003 Discovery Miles 30 030 Ships in 10 - 15 working days

Hardware Based Packet Classification for High Speed Internet Routers presents the most recent developments in hardware based packet classification algorithms and architectures. This book describes five methods which reduce the space that classifiers occupy within TCAMs; TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. These methods demonstrate that in most cases a substantial reduction of space is achieved. Case studies and examples are provided throughout this book. About this book: * Presents the only book in the market that exclusively covers hardware based packet classification algorithms and architectures. * Describes five methods which reduce the space that classifiers occupy within TCAMs: TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. * Provides case studies and examples throughout. Hardware Based Packet Classification for High Speed Internet Routers is designed for professionals and researchers who work within the related field of router design. Advanced-level students concentrating on computer science and electrical engineering will also find this book valuable as a text or reference book.

Cyber Threat Intelligence (Hardcover, 1st ed. 2018): Ali Dehghantanha, Mauro Conti, Tooska Dargahi Cyber Threat Intelligence (Hardcover, 1st ed. 2018)
Ali Dehghantanha, Mauro Conti, Tooska Dargahi
R4,577 Discovery Miles 45 770 Ships in 12 - 17 working days

This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions - this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.

Security in Wireless Sensor Networks (Hardcover, 1st ed. 2015): George S. Oreku, Tamara Pazynyuk Security in Wireless Sensor Networks (Hardcover, 1st ed. 2015)
George S. Oreku, Tamara Pazynyuk
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students.

Technological Innovation for Cyber-Physical Systems - 7th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing,... Technological Innovation for Cyber-Physical Systems - 7th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2016, Costa de Caparica, Portugal, April 11-13, 2016, Proceedings (Hardcover, 1st ed. 2016)
Luis M. Camarinha-Matos, Antonio J Falcao, Nazanin Vafaei, Shirin Najdi
R3,044 Discovery Miles 30 440 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2016, held in Costa de Caparica, Portugal, in April 2016. The 53 revised full papers were carefully reviewed and selected from 112 submissions. The papers present selected results produced in engineering doctoral programs and focus on research, development, and application of cyber-physical systems. Research results and ongoing work are presented, illustrated and discussed in the following areas: enterprise collaborative networks; ontologies; Petri nets; manufacturing systems; biomedical applications; intelligent environments; control and fault tolerance; optimization and decision support; wireless technologies; energy: smart grids, renewables, management, and optimization; bio-energy; and electronics.

Cybersecurity Systems for Human Cognition Augmentation (Hardcover, 2014 ed.): Robinson E. Pino, Alexander Kott, Michael... Cybersecurity Systems for Human Cognition Augmentation (Hardcover, 2014 ed.)
Robinson E. Pino, Alexander Kott, Michael Shevenell
R4,042 R3,442 Discovery Miles 34 420 Save R600 (15%) Ships in 12 - 17 working days

This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.

Audio Watermark - A Comprehensive Foundation Using MATLAB (Hardcover, 2015 ed.): Yiqing Lin, Waleed H. Abdulla Audio Watermark - A Comprehensive Foundation Using MATLAB (Hardcover, 2015 ed.)
Yiqing Lin, Waleed H. Abdulla
R4,322 R3,464 Discovery Miles 34 640 Save R858 (20%) Ships in 12 - 17 working days

This book illustrates the commonly used and novel approaches of audio watermarking for copyrights protection. The author examines the theoretical and practical step by step guide to the topic of data hiding in audio signal such as music, speech, broadcast. The book covers new techniques developed by the authors are fully explained and MATLAB programs, for audio watermarking and audio quality assessments and also discusses methods for objectively predicting the perceptual quality of the watermarked audio signals.Explains the theoretical basics of the commonly used audio watermarking techniquesDiscusses the methods used to objectively and subjectively assess the quality of the audio signalsProvides a comprehensive well tested MATLAB programs that can be used efficiently to watermark any audio media

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Big Data in Emergency Management…
Rajendra Akerkar Hardcover R4,468 Discovery Miles 44 680
Computer Networking - An All-in-One…
Quinn Kiser Hardcover R741 R630 Discovery Miles 6 300
Advances in Wireless Communications and…
Roumen Kountchev, Aniket Mahanti, … Hardcover R4,463 Discovery Miles 44 630
5G and Beyond - Fundamentals and…
Xingqin Lin, Namyoon Lee Hardcover R4,843 Discovery Miles 48 430
Research and Innovation Forum 2020…
Anna Visvizi, Miltiadis D Lytras, … Hardcover R4,524 Discovery Miles 45 240
Intelligent Resource Management for…
Qiang Ye, Weihua Zhuang Hardcover R4,132 Discovery Miles 41 320
Sustainability Awareness and Green…
Tomayess Issa, Theodora Issa, … Hardcover R3,039 Discovery Miles 30 390
Federated Learning for Wireless Networks
Choong Seon Hong, Latif U. Khan, … Hardcover R4,475 Discovery Miles 44 750
Reconfigurable Intelligent…
Hongliang Zhang, Boya Di, … Hardcover R4,811 Discovery Miles 48 110
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, … Paperback R2,614 R2,446 Discovery Miles 24 460

 

Partners