0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (213)
  • R250 - R500 (636)
  • R500+ (5,155)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Advances in Intelligent Systems and Computing - Proceedings of the 7th Euro-China Conference on Intelligent Data Analysis and... Advances in Intelligent Systems and Computing - Proceedings of the 7th Euro-China Conference on Intelligent Data Analysis and Applications, May 29-31, 2021, Hangzhou, China (Hardcover, 1st ed. 2022)
Jie-Fang Zhang, Chien-Ming Chen, Shu-Chuan Chu, Roumen Kountchev
R5,882 Discovery Miles 58 820 Ships in 18 - 22 working days

The book is a collection of high-quality research papers presented at 7th Euro-China Conference on Intelligent Data Analysis and Applications, hosted by Communication University of Zhejiang, China and technically co-sponsored by Shandong University of Science and Technology, China; Zhejiang Lab, China; and Fujian University of Technology, China. The book covers areas like intelligent data analysis, computational intelligences, signal processing, and all associated applications of artificial intelligence.

Application Security in the ISO 27001 - 2013 Environment (Paperback, 2nd Two ed.): Vinod Vasudevan Application Security in the ISO 27001 - 2013 Environment (Paperback, 2nd Two ed.)
Vinod Vasudevan
R1,069 Discovery Miles 10 690 Ships in 10 - 15 working days
Cyber Influence and Cognitive Threats (Paperback): Vladlena Benson, John McAlaney Cyber Influence and Cognitive Threats (Paperback)
Vladlena Benson, John McAlaney
R3,011 Discovery Miles 30 110 Ships in 10 - 15 working days

In the wake of fresh allegations that personal data of Facebook users have been illegally used to influence the outcome of the US general election and the Brexit vote, the debate over manipulation of social Big Data continues to gain more momentum. Cyber Influence and Cognitive Threats addresses various emerging challenges in response to cybersecurity, examining cognitive applications in decision-making, behaviour and basic human interaction. The book examines the role of psychology in cybersecurity by addressing each factor involved in the process: hackers, targets, cybersecurity practitioners, and the wider social context in which these groups operate. Cyber Influence and Cognitive Threats covers a variety of topics including information systems, psychology, sociology, human resources, leadership, strategy, innovation, law, finance and others.

Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Hardcover): Alan Tang Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Hardcover)
Alan Tang
R2,978 Discovery Miles 29 780 Ships in 10 - 15 working days

1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.

Transforming Cybersecurity Solutions using Blockchain (Hardcover, 1st ed. 2021): Rashmi Agrawal, Neha Gupta Transforming Cybersecurity Solutions using Blockchain (Hardcover, 1st ed. 2021)
Rashmi Agrawal, Neha Gupta
R3,798 Discovery Miles 37 980 Ships in 18 - 22 working days

This book is targeted towards cybersecurity professionals (especially those dealing with cloud security) or any stakeholders dealing with cybersecurity who want to understand the next level of security infrastructure using blockchain. The book's security and privacy analysis help with an understanding of the basics of blockchain, and it explores the quantifying impact of the new attack surfaces introduced by blockchain technologies and platforms. In addition, the book contains relevant and current updates on the topic. It follows a practical approach to help understand how blockchain technology is used to transform cybersecurity solutions.

Recent Trends in Communication, Computing, and Electronics - Select Proceedings of IC3E 2018 (Hardcover, 1st ed. 2019): Ashish... Recent Trends in Communication, Computing, and Electronics - Select Proceedings of IC3E 2018 (Hardcover, 1st ed. 2019)
Ashish Khare, Uma Shankar Tiwary, Ishwar K. Sethi, Nar Singh
R5,260 Discovery Miles 52 600 Ships in 18 - 22 working days

This book presents select papers from the International Conference on Emerging Trends in Communication, Computing and Electronics (IC3E 2018). Covering the latest theories and methods in three related fields - electronics, communication and computing, it describes cutting-edge methods and applications in the areas of signal and image processing, cyber security, human-computer interaction, machine learning, electronic devices, nano-electronics, wireless sensor networks, antenna and wave propagation, and mobile communication. The contents of this book will be beneficial to students, researchers, and professionals working in the field of networks and communications.

Information Fusion in Distributed Sensor Networks with Byzantines (Hardcover, 1st ed. 2021): Andrea Abrardo, Mauro Barni,... Information Fusion in Distributed Sensor Networks with Byzantines (Hardcover, 1st ed. 2021)
Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi
R3,332 Discovery Miles 33 320 Ships in 18 - 22 working days

This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and the corresponding payoffs are derived, shedding new light on the achievable performance level and the impact that the presence of the Byzantines has on the accuracy of decisions made by the Fusion Center. Accordingly, the book offers a simple yet effective introduction to the emerging field of adversarial information fusion, providing a wealth of intuitive take-home lessons for practitioners interested in applying the most basic notions to the design of practical systems, while at the same time introducing researchers and other readers to the mathematical details behind the theory.

Internet of Things Security and Data Protection (Hardcover, 1st ed. 2019): Sebastien Ziegler Internet of Things Security and Data Protection (Hardcover, 1st ed. 2019)
Sebastien Ziegler
R4,634 Discovery Miles 46 340 Ships in 10 - 15 working days

This book provides an overview of the most recent developments in Internet of Things (IoT) security and data protection. It presents the results of several international research projects addressing this topic from complementary angles. It starts by analyzing the main privacy and security threats on IoT, as well as the evolution of data protection norms, such as the European General Data Protection Regulation (GDPR), and their impact on IoT. Through a comprehensive and systematic approach, the contributors present new perspectives on IoT & Cloud Computing security requirements. They discuss the most recent approach to support trusted IoT, including new models of privacy risk assessment, labeling and certification, and contractual tools (such as Privacy PACT). Practical implementations, such as in the European Large Scale Pilots on IoT for Smart Cities (Synchronicity), are presented, explaining how they address security, privacy and data protection. Finally, innovative models to secure IoT systems are presented for the network and end-nodes security, including network threats analysis.

Women in Security - Changing the Face of Technology and Innovation (Hardcover, 1st ed. 2018): Debra A. Christofferson Women in Security - Changing the Face of Technology and Innovation (Hardcover, 1st ed. 2018)
Debra A. Christofferson
R3,569 Discovery Miles 35 690 Ships in 10 - 15 working days

This volume examines core areas of development in security, emphasizing the pivotal contributions of women to the field's evolution. The author first covers a broad spectrum of key topics, including how security is created, where innovation occurs, what the underpinnings are, and who supports it and how. After an overview of the field, female security professionals share their own stories of technology and innovation in security today; the foundation, where research is headed, and the emerging trends. Women currently make up a very small pocket of cyber security staffing - this book aims to increase the visibility of women in the field and their contributions and encourage other females to join the field. The contributors hold various roles from executive leadership, to engineers, analysts, and researchers.

Secure Data Management for Online Learning Applications (Hardcover): L. Jegatha Deborah, P Vijayakumar, Brij B. Gupta, Danilo... Secure Data Management for Online Learning Applications (Hardcover)
L. Jegatha Deborah, P Vijayakumar, Brij B. Gupta, Danilo Pelusi
R3,221 Discovery Miles 32 210 Ships in 10 - 15 working days

Simplicity and Uniqueness Structure of the book content Simple English and Ease of Undersatanding Exhaustive research in the content of the book

Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide (Hardcover): Omar Santos Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide (Hardcover)
Omar Santos
R1,144 R1,048 Discovery Miles 10 480 Save R96 (8%) Ships in 9 - 17 working days

Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide presents you with an organised test-preparation routine using proven series elements and techniques. Do I Know This Already? quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Master Cisco CyberOps Associate CBROPS 200-201 exam topics Assess your knowledge with chapter-opening quizzes Review key concepts with exam preparation tasks Practice with realistic exam questions in the practice test software Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Leading Cisco technology expert Omar Santos shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep Practice Test software, with two full exams comprised of well-reviewed, exam-realistic questions, customization options, and detailed performance reports A video mentoring lesson from the authors Complete Video Course A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organise and optimise your study time

Earth at Risk in the 21st Century: Rethinking Peace, Environment, Gender, and Human, Water, Health, Food, Energy Security, and... Earth at Risk in the 21st Century: Rethinking Peace, Environment, Gender, and Human, Water, Health, Food, Energy Security, and Migration - With a Foreword by Lourdes Arizpe Schlosser and a Preface by Hans Gunter Brauch (Hardcover, 1st ed. 2020)
Ursula Oswald Spring
R3,919 Discovery Miles 39 190 Ships in 18 - 22 working days

Earth at Risk in the 21st Century offers critical interdisciplinary reflections on peace, security, gender relations, migration and the environment, all of which are threatened by climate change, with women and children affected most. Deep-rooted gender discrimination is also a result of the destructive exploitation of natural resources and the pollution of soils, water, biota and air. In the Anthropocene, the management of human society and global resources has become unsustainable and has created multiple conflicts by increasing survival threats primarily for poor people in the Global South. Alternative approaches to peace and security, focusing from bottom-up on an engendered peace with sustainability, may help society and the environment to be managed in the highly fragile natural conditions of a 'hothouse Earth'. Thus, the book explores systemic alternatives based on indigenous wisdom, gift economy and the economy of solidarity, in which an alternative cosmovision fosters mutual care between humankind and nature. * Special analysis of risks to the survival of humankind in the 21st century. * Interdisciplinary studies on peace, security, gender and environment related to global environmental and climate change. * Critical reflections on gender relations, peace, security, migration and the environment * Systematic analysis of food, water, health, energy security and its nexus. * Alternative proposals from the Global South with indigenous wisdom for saving Mother Earth.

Algorithms and Applications - ALAP 2018 (Hardcover, 1st ed. 2018): Sajal K. Das, Nabendu Chaki Algorithms and Applications - ALAP 2018 (Hardcover, 1st ed. 2018)
Sajal K. Das, Nabendu Chaki
R4,691 Discovery Miles 46 910 Ships in 18 - 22 working days

This book presents the proceedings of the Conference on Algorithms and Applications (ALAP 2018), which focuses on various areas of computing, like distributed systems and security, big data and analytics and very-large-scale integration (VLSI) design. The book provides solutions to a broad class of problems in diverse areas of algorithms in our daily lives in a world designed for, and increasingly controlled by algorithms. Written by eminent personalities from academia and industry, the papers included offer insights from a number of perspectives, providing an overview of the state of the art in the field. The book consists of invited talks by respected speakers, papers presented in technical sessions, and tutorials to offer ideas, results, work-in-progress and experiences of various algorithmic aspects of computational science and engineering.

Emerging Cyber Threats and Cognitive Vulnerabilities (Paperback): Vladlena Benson, John McAlaney Emerging Cyber Threats and Cognitive Vulnerabilities (Paperback)
Vladlena Benson, John McAlaney
R2,054 Discovery Miles 20 540 Ships in 10 - 15 working days

Emerging Cyber Threats and Cognitive Vulnerabilities identifies the critical role human behavior plays in cybersecurity and provides insights into how human decision-making can help address rising volumes of cyberthreats. The book examines the role of psychology in cybersecurity by addressing each actor involved in the process: hackers, targets, cybersecurity practitioners and the wider social context in which these groups operate. It applies psychological factors such as motivations, group processes and decision-making heuristics that may lead individuals to underestimate risk. The goal of this understanding is to more quickly identify threat and create early education and prevention strategies. This book covers a variety of topics and addresses different challenges in response to changes in the ways in to study various areas of decision-making, behavior, artificial intelligence, and human interaction in relation to cybersecurity.

Quantum Cryptography - From Key Distribution to Conference Key Agreement (Hardcover, 1st ed. 2021): Federico Grasselli Quantum Cryptography - From Key Distribution to Conference Key Agreement (Hardcover, 1st ed. 2021)
Federico Grasselli
R3,661 Discovery Miles 36 610 Ships in 10 - 15 working days

Rising concerns about the security of our data have made quantum cryptography a very active research field in recent years. Quantum cryptographic protocols promise everlasting security by exploiting distinctive quantum properties of nature. The most extensively implemented protocol is quantum key distribution (QKD), which enables secure communication between two users. The aim of this book is to introduce the reader to state-of-the-art QKD and illustrate its recent multi-user generalization: quantum conference key agreement. With its pedagogical approach that doesn't disdain going into details, the book enables the reader to join in cutting-edge research on quantum cryptography.

Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition): Rob Wilson Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition)
Rob Wilson
R1,359 R1,258 Discovery Miles 12 580 Save R101 (7%) Ships in 10 - 15 working days

Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, equips you with the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors explore the concept of ethical hacking and its practitioners -- explaining their importance in protecting corporate and government data -- and then deliver an in-depth guide to performing security testing. Thoroughly updated, the text covers new security resources, emerging vulnerabilities and innovative methods to protect networks, mobile security considerations, computer crime laws and penalties for illegal computer hacking. A final project brings concepts together in a penetration testing exercise and report, while virtual machine labs, auto-graded quizzes and interactive activities in the online learning platform help further prepare you for your role as a network security professional.

Smart Cards, Tokens, Security and Applications (Hardcover, 2nd ed. 2017): Keith Mayes, Konstantinos Markantonakis Smart Cards, Tokens, Security and Applications (Hardcover, 2nd ed. 2017)
Keith Mayes, Konstantinos Markantonakis
R2,852 Discovery Miles 28 520 Ships in 10 - 15 working days

This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.

PKI Implementation and Infrastructures (Hardcover): Julian Ashbourn PKI Implementation and Infrastructures (Hardcover)
Julian Ashbourn
R3,066 Discovery Miles 30 660 Ships in 10 - 15 working days

1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.

The CISO's Next Frontier - AI, Post-Quantum Cryptography and Advanced Security Paradigms (Hardcover, 1st ed. 2021): Raj... The CISO's Next Frontier - AI, Post-Quantum Cryptography and Advanced Security Paradigms (Hardcover, 1st ed. 2021)
Raj Badhwar
R1,913 Discovery Miles 19 130 Ships in 10 - 15 working days

This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threats and risks. Cyber security technologies discussed in this book are futuristic and current. Advanced security topics such as secure remote work, data security, network security, application and device security, cloud security, and cyber risk and privacy are presented in this book. At the end of every chapter, an evaluation of the topic from a CISO's perspective is provided. This book also addresses quantum computing, artificial intelligence and machine learning for cyber security The opening chapters describe the power and danger of quantum computing, proposing two solutions for protection from probable quantum computer attacks: the tactical enhancement of existing algorithms to make them quantum-resistant, and the strategic implementation of quantum-safe algorithms and cryptosystems. The following chapters make the case for using supervised and unsupervised AI/ML to develop predictive, prescriptive, cognitive and auto-reactive threat detection, mitigation, and remediation capabilities against advanced attacks perpetrated by sophisticated threat actors, APT and polymorphic/metamorphic malware. CISOs must be concerned about current on-going sophisticated cyber-attacks, and can address them with advanced security measures. The latter half of this book discusses some current sophisticated cyber-attacks and available protective measures enabled by the advancement of cybersecurity capabilities in various IT domains. Chapters 6-10 discuss secure remote work; chapters 11-17, advanced data security paradigms; chapters 18-28, Network Security; chapters 29-35, application and device security; chapters 36-39, Cloud security; and chapters 40-46 organizational cyber risk measurement and event probability. Security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs will want to purchase this book. Risk personnel, CROs, IT and Security Auditors as well as security researchers and journalists will also find this useful.

Official (ISC)2 Guide to the CSSLP CBK (Hardcover, 2nd edition): Mano Paul Official (ISC)2 Guide to the CSSLP CBK (Hardcover, 2nd edition)
Mano Paul
R2,511 Discovery Miles 25 110 Ships in 9 - 17 working days

Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. For example, SQL injection and cross-site scripting (XSS) have appeared on the Open Web Application Security Project (OWASP) Top 10 list year after year over the past decade. This high volume of known application vulnerabilities suggests that many development teams do not have the security resources needed to address all potential security flaws and a clear shortage of qualified professionals with application security skills exists. Without action, this soft underbelly of business and governmental entities has and will continue to be exposed with serious consequences-data breaches, disrupted operations, lost business, brand damage, and regulatory fines. This is why it is essential for software professionals to stay current on the latest advances in software development and the new security threats they create. Recognized as one of the best application security tools available for professionals involved in software development, the Official (ISC)2 (R) Guide to the CSSLP (R) CBK (R), Second Edition, is both up-to-date and relevant, reflecting the latest developments in this ever-changing field and providing an intuitive approach to the CSSLP Common Body of Knowledge (CBK). It provides a robust and comprehensive study of the 8 domains of the CBK, covering everything from ensuring software security requirements are included in the software design phase to programming concepts that can effectively protect software from vulnerabilities to addressing issues pertaining to proper testing of software for security, and implementing industry standards and practices to provide a high level of assurance that the supply chain is secure-both up-stream. The book discusses the issues facing software professionals today, such as mobile app development, developing in the cloud, software supply chain risk management, and more. Numerous illustrated examples and practical exercises are included in this book to help the reader understand the concepts within the CBK and to enable them to apply these concepts in real-life situations. Endorsed by (ISC)2 and written and reviewed by CSSLPs and other (ISC)2 members, this book serves as an unrivaled study tool for the certification exam and an invaluable career reference. Earning your CSSLP is an esteemed achievement that validates your efforts in security leadership to help your organization build resilient software capable of combating the security threats of today and tomorrow.

Data Privacy and Trust in Cloud Computing - Building trust in the cloud through assurance and accountability (Hardcover, 1st... Data Privacy and Trust in Cloud Computing - Building trust in the cloud through assurance and accountability (Hardcover, 1st ed. 2021)
Theo Lynn, John G. Mooney, Lisa Van Der Werff, Grace Fox
R1,521 Discovery Miles 15 210 Ships in 18 - 22 working days

This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases over the last few years have demonstrated cloud computing's uneasy relationship with data security and trust. This volume explores the numerous technological, process and regulatory solutions presented in academic literature as mechanisms for building trust in the cloud, including GDPR in Europe. The massive acceleration of digital adoption resulting from the COVID-19 pandemic is introducing new and significant security and privacy threats and concerns. Against this backdrop, this book provides a timely reference and organising framework for considering how we will assure privacy and build trust in such a hyper-connected digitally dependent world. This book presents a framework for assurance and accountability in the cloud and reviews the literature on trust, data privacy and protection, and ethics in cloud computing.

Introductory Computer Forensics - A Hands-on Practical Approach (Hardcover, 1st ed. 2018): Xiaodong Lin Introductory Computer Forensics - A Hands-on Practical Approach (Hardcover, 1st ed. 2018)
Xiaodong Lin
R2,990 Discovery Miles 29 900 Ships in 18 - 22 working days

This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book's 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students' understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge. This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques. This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book.

Sustainable Logistics and Production in Industry 4.0 - New Opportunities and Challenges (Hardcover, 1st ed. 2020): Katarzyna... Sustainable Logistics and Production in Industry 4.0 - New Opportunities and Challenges (Hardcover, 1st ed. 2020)
Katarzyna Grzybowska, Anjali Awasthi, Rapinder Sawhney
R4,268 Discovery Miles 42 680 Ships in 18 - 22 working days

This book proposes essential methods, models, and case studies for Sustainable Logistics and Production in Industry 4.0. In addition to identifying and discussing various challenges and future prospects, it also features numerous case studies and quantitative research from different sectors. The authors (which include academics and managers) present insightful tips on the technical, organizational and social aspects of implementing Sustainable Logistics and Production in Industry 4.0. In today's world, changes are coming faster and more unpredictably. Production is becoming more automated, computerized and complex. In short, Industry 4.0 is creating many new opportunities, but at the same time several new challenges. This book offers a valuable resource for all academics and practitioners who want to deepen their knowledge of Sustainable Logistics and Production in Industry 4.0.

Digital Business Security Development - Management Technologies (Hardcover): Digital Business Security Development - Management Technologies (Hardcover)
R4,497 Discovery Miles 44 970 Ships in 18 - 22 working days

Digital Business Security Development: Management Technologies provides comprehensive coverage of issues associated with maintaining business protection in digital environments. Containing state-of-the-art research relevant to informing business practice, this Premier Reference Source provides base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and further study.

Connected Vehicles in the Internet of Things - Concepts, Technologies and Frameworks for the IoV (Hardcover, 1st ed. 2020):... Connected Vehicles in the Internet of Things - Concepts, Technologies and Frameworks for the IoV (Hardcover, 1st ed. 2020)
Zaigham Mahmood
R4,002 Discovery Miles 40 020 Ships in 10 - 15 working days

This book presents an overview of the latest smart transportation systems, IoV connectivity frameworks, issues of security and safety in VANETs, future developments in the IoV, technical solutions to address key challenges, and other related topics. A connected vehicle is a vehicle equipped with Internet access and wireless LAN, which allows the sharing of data through various devices, inside as well as outside the vehicle. The ad-hoc network of such vehicles, often referred to as VANET or the Internet of vehicles (IoV), is an application of IoT technology, and may be regarded as an integration of three types of networks: inter-vehicle, intra-vehicle, and vehicular mobile networks. VANET involves several varieties of vehicle connectivity mechanisms, including vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), vehicle-to-cloud (V2C), and vehicle-to-everything (V2X). According to one survey, it is expected that there will be approximately 380 million connected cars on the roads by 2020. IoV is an important aspect of the new vision for smart transportation. The book is divided into three parts: examining the evolution of IoV (basic concepts, principles, technologies, and architectures), connectivity of vehicles in the IoT (protocols, frameworks, and methodologies), connected vehicle environments and advanced topics in VANETs (security and safety issues, autonomous operations, machine learning, sensor technology, and AI). By providing scientific contributions and workable suggestions from researchers and practitioners in the areas of IoT, IoV, and security, this valuable reference aims to extend the body of existing knowledge.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Impact Players - How To Take The Lead…
Liz Wiseman Paperback R360 R321 Discovery Miles 3 210
Microcontroller Projects in C for the…
Dogan Ibrahim Paperback R1,455 Discovery Miles 14 550
Towards Engineering Free/Libre Open…
Brian Fitzgerald, Audris Mockus, … Hardcover R3,785 Discovery Miles 37 850
Designing Switch/Routers - Fundamental…
James Aweya Paperback R3,793 Discovery Miles 37 930
Designing Switch/Routers - Fundamental…
James Aweya Hardcover R9,306 Discovery Miles 93 060
The Business Builder's Toolkit - A…
Nic Haralambous Paperback R385 Discovery Miles 3 850
Strategic Management - Towards…
Lynette Louw, Peet Venter Paperback R592 Discovery Miles 5 920
The Law Of Business Structures
Paperback R1,218 R1,055 Discovery Miles 10 550
Dream Big, Start Small - 1000+ Business…
George Foley Paperback R604 Discovery Miles 6 040
Interactive Web-based Virtual Reality…
Chi Chung Ko, Chang Dong Cheng Hardcover R4,213 Discovery Miles 42 130

 

Partners