|
Books > Computing & IT > Social & legal aspects of computing
SECURITY AND PRIVACY IN THE INTERNET OF THINGS Provides the
authoritative and up-to-date information required for securing IoT
architecture and applications The vast amount of data generated by
the Internet of Things (IoT) has made information and cyber
security vital for not only personal privacy, but also for the
sustainability of the IoT itself. Security and Privacy in the
Internet of Things brings together high-quality research on IoT
security models, architectures, techniques, and application
domains. This concise yet comprehensive volume explores
state-of-the-art mitigations in IoT security while addressing
important security and privacy challenges across different IoT
layers. The book provides timely coverage of IoT architecture,
security technologies and mechanisms, and applications. The authors
outline emerging trends in IoT security and privacy with a focus on
areas such as smart environments and e-health. Topics include
authentication and access control, attack detection and prevention,
securing IoT through traffic modeling, human aspects in IoT
security, and IoT hardware security. Presenting the current body of
knowledge in a single volume, Security and Privacy in the Internet
of Things: Discusses a broad range of IoT attacks and defense
mechanisms Examines IoT security and privacy protocols and
approaches Covers both the logical and physical security of IoT
devices Addresses IoT security through network traffic modeling
Describes privacy preserving techniques in smart cities Explores
current threat and vulnerability analyses Security and Privacy in
the Internet of Things: Architectures, Techniques, and Applications
is essential reading for researchers, industry practitioners, and
students involved in IoT security development and IoT systems
deployment.
In Online Predators, An Internet Insurgency: A Field Manual for
Teaching and Parenting in the Digital Arena Jeffrey A. Lee brings
his ten plus years' experience in the fight against online child
exploitation to bear in an easy to follow guide for all with a
stake in the life of a child. This book equips parents, guardians,
extended family, and educational professionals with practical
strategies to help keep kids safe in a technology connected world.
Instead of focusing on ever changing technology, Lee proposes a key
fundamental change in the fight against online predation-to develop
an insatiable curiosity about their child's online life, then get
in the front lines and stay there.
Cell phone apps share location information; software companies
store user data in the cloud; biometric scanners read fingerprints;
employees of some businesses have microchips implanted in their
hands. In each of these instances we trade a share of privacy or an
aspect of identity for greater convenience or improved security.
What Robert M. Pallitto asks in Bargaining with the Machine is
whether we are truly making such bargains freely - whether, in
fact, such a transaction can be conducted freely or advisedly in
our ever more technologically sophisticated world. Pallitto uses
the social theory of bargaining to look at the daily compromises we
make with technology. Specifically, he explores whether resisting
these 'bargains' is still possible when the technologies in
question are backed by persuasive, even coercive, corporate and
state power. Who, he asks, is proposing the bargain? What is the
balance of bargaining power? What is surrendered and what is
gained? And are the perceived and the actual gains and losses the
same - that is, what is hidden? At the center of Pallitto's work is
the paradox of bargaining in a world of limited agency. Assurances
that we are in control are abundant whether we are consumers,
voters, or party to the social contract. But when purchasing goods
from a technological behemoth like Amazon, or when choosing a
candidate whose image is crafted and shaped by campaign strategists
and media outlets, how truly free, let alone informed, are our
choices? The tension between claims of agency and awareness of its
limits is the site where we experience our social lives - and
nowhere is this tension more pronounced than in the surveillance
society. This book offers a cogent analysis of how that complex,
contested, and even paradoxical experience arises as well as an
unusually clear and troubling view of the consequential compromises
we may be making.
Artificial intelligence has been utilized in a diverse range of
industries as more people and businesses discover its many uses and
applications. A current field of study that requires more
attention, as there is much opportunity for improvement, is the use
of artificial intelligence within literary works and social media
analysis. Artificial Intelligence Applications in Literary Works
and Social Media presents contemporary developments in the adoption
of artificial intelligence in textual analysis of literary works
and social media and introduces current approaches, techniques, and
practices in data science that are implemented to scrap and analyze
text data. This book initiates a new multidisciplinary field that
is the combination of artificial intelligence, data science, social
science, literature, and social media study. Covering key topics
such as opinion mining, sentiment analysis, and machine learning,
this reference work is ideal for computer scientists, industry
professionals, researchers, scholars, practitioners, academicians,
instructors, and students.
Cultural tourism, domestic and international, is comprised of
travel that takes people out of their usual environments and
focuses on activities that are related to the cultural aspects of
an area. Rapid progress in technology, especially the advancement
of mobile applications, has changed various aspects of travel,
especially in areas such as transportation. Cultural Tourism in the
Wake of Web Innovation: Emerging Research and Opportunities is an
essential scholarly book that examines revolutionary changes taking
place in the field of cultural tourism that are a result of the
applications of web-based and other information technologies
including Web 2.0 innovations, locational technologies, and digital
imaging. It features a wide range of topics such as economic
development, mobile applications, and green development, and is
intended for use by hotel management, travel agents, event
organizers and planners, airline managers, academicians,
researchers, students, and professionals in the tourism and
hospitality industry.
As technology continues to advance in today's global market,
practitioners are targeting systems with significant levels of
applicability and variance. Instrumentation is a multidisciplinary
subject that provides a wide range of usage in several professional
fields, specifically engineering. Instrumentation plays a key role
in numerous daily processes and has seen substantial advancement in
recent years. It is of utmost importance for engineering
professionals to understand the modern developments of instruments
and how they affect everyday life. Advancements in Instrumentation
and Control in Applied System Applications is a collection of
innovative research on the methods and implementations of
instrumentation in real-world practices including communication,
transportation, and biomedical systems. While highlighting topics
including smart sensor design, medical image processing, and atrial
fibrillation, this book is ideally designed for researchers,
software engineers, technologists, developers, scientists,
designers, IT professionals, academicians, and post-graduate
students seeking current research on recent developments within
instrumentation systems and their applicability in daily life.
Intelligent technologies have emerged as imperative tools in
computer science and information security. However, advanced
computing practices have preceded new methods of attacks on the
storage and transmission of data. Developing approaches such as
image processing and pattern recognition are susceptible to
breaches in security. Modern protection methods for these
innovative techniques require additional research. The Handbook of
Research on Intelligent Data Processing and Information Security
Systems provides emerging research exploring the theoretical and
practical aspects of cyber protection and applications within
computer science and telecommunications. Special attention is paid
to data encryption, steganography, image processing, and
recognition, and it targets professionals who want to improve their
knowledge in order to increase strategic capabilities and
organizational effectiveness. As such, this book is ideal for
analysts, programmers, computer engineers, software engineers,
mathematicians, data scientists, developers, IT specialists,
academicians, researchers, and students within fields of
information technology, information security, robotics, artificial
intelligence, image processing, computer science, and
telecommunications.
Society is continually transforming into a digitally powered
reality due to the increased dependence of computing technologies.
The landscape of cyber threats is constantly evolving because of
this, as hackers are finding improved methods of accessing
essential data. Analyzing the historical evolution of cyberattacks
can assist practitioners in predicting what future threats could be
on the horizon. Real-Time and Retrospective Analyses of Cyber
Security is a pivotal reference source that provides vital research
on studying the development of cybersecurity practices through
historical and sociological analyses. While highlighting topics
such as zero trust networks, geopolitical analysis, and cyber
warfare, this publication explores the evolution of cyber threats,
as well as improving security methods and their socio-technological
impact. This book is ideally designed for researchers,
policymakers, strategists, officials, developers, educators,
sociologists, and students seeking current research on the
evolution of cybersecurity methods through historical analysis and
future trends.
|
|