0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (20)
  • R2,500 - R5,000 (21)
  • R5,000 - R10,000 (11)
  • -
Status
Brand

Showing 1 - 25 of 52 matches in All Departments

Combatting Cyberbullying in Digital Media with Artificial Intelligence: Mohamed Lahby, Al-Sakib Khan Pathan, Yassine Maleh Combatting Cyberbullying in Digital Media with Artificial Intelligence
Mohamed Lahby, Al-Sakib Khan Pathan, Yassine Maleh
R2,342 Discovery Miles 23 420 Ships in 12 - 17 working days

Rapid advancements in mobile computing and communication technology and recent technological progress have opened up a plethora of opportunities. These advancements have expanded knowledge, facilitated global business, enhanced collaboration, and connected people through various digital media platforms. While these virtual platforms have provided new avenues for communication and self-expression, they also pose significant threats to our privacy. As a result, we must remain vigilant against the propagation of electronic violence through social networks. Cyberbullying has emerged as a particularly concerning form of online harassment and bullying, with instances of racism, terrorism, and various types of trolling becoming increasingly prevalent worldwide. Addressing the issue of Cyberbullying to find effective solutions is a challenge for the web mining community, particularly within the realm of social media. In this context, artificial intelligence (AI) can serve as a valuable tool in combating the diverse manifestations of Cyberbullying on the internet and social networks. This book presents the latest cutting-edge research, theoretical methods, and novel applications in artificial intelligence techniques to combat cyberbullying. Discussing new models, practical solutions, and technological advances related to detecting and analyzing Cyberbullying is based on artificial intelligence models and other related techniques. Furthermore, the book helps readers understand artificial intelligence techniques to combat cyberbullying systematically and forthrightly, as well as future insights and the societal and technical aspects of NLP-based cyberbullying research efforts. Key Features: Proposes new models, practical solutions and technological advances related to machine intelligence techniques for detecting cyberbullying across multiple social media platforms Combines both theory and practice so that readers (beginners or experts) of this book can find both a description of the concepts and context related to the machine intelligence Includes many case studies and applications of machine intelligence for combating cyberbullying

Security Analytics for the Internet of Everything (Paperback): Mohuiddin Ahmed, Abu S.S.M Barkat Ullah, Al-Sakib Khan Pathan Security Analytics for the Internet of Everything (Paperback)
Mohuiddin Ahmed, Abu S.S.M Barkat Ullah, Al-Sakib Khan Pathan
R1,454 Discovery Miles 14 540 Ships in 12 - 17 working days

Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field. It includes chapters covering emerging security trends, cyber governance, artificial intelligence in cybersecurity, and cyber challenges. Contributions from leading international experts are included. The target audience for the book is graduate students, professionals, and researchers working in the fields of cybersecurity, computer networks, communications, and the Internet of Everything (IoE). The book also includes some chapters written in a tutorial style so that general readers can easily grasp some of the ideas.

A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Paperback): Kutub Thakur,... A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Paperback)
Kutub Thakur, Abu Kamruzzaman, Al-Sakib Khan Pathan
R1,449 Discovery Miles 14 490 Ships in 12 - 17 working days

This book, divided into three parts, describes the detailed concepts of Digital Communication, Security, and Privacy protocols. In Part One, the first chapter provides a deeper perspective on communications, while Chapters 2 and 3 focus on analog and digital communication networks. Part Two then delves into various Digital Communication protocols. Beginning first in Chapter 4 with the major Telephony protocols, Chapter 5 then focuses on important Data Communication protocols, leading onto the discussion of Wireless and Cellular Communication protocols in Chapter 6 and Fiber Optic Data Transmission protocols in Chapter 7. Part Three covers Digital Security and Privacy protocols including Network Security protocols (Chapter 8), Wireless Security protocols (Chapter 9), and Server Level Security systems (Chapter 10), while the final chapter covers various aspects of privacy related to communication protocols and associated issues. This book will offer great benefits to graduate and undergraduate students, researchers, and practitioners. It could be used as a textbook as well as reference material for these topics. All the authors are well-qualified in this domain. The authors have an approved textbook that is used in some US, Saudi, and Bangladeshi universities since Fall 2020 semester - although used in online lectures/classes due to COVID-19 pandemic.

A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Hardcover): Kutub Thakur,... A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Hardcover)
Kutub Thakur, Abu Kamruzzaman, Al-Sakib Khan Pathan
R4,004 Discovery Miles 40 040 Ships in 12 - 17 working days

This book, divided into three parts, describes the detailed concepts of Digital Communication, Security, and Privacy protocols. In Part One, the first chapter provides a deeper perspective on communications, while Chapters 2 and 3 focus on analog and digital communication networks. Part Two then delves into various Digital Communication protocols. Beginning first in Chapter 4 with the major Telephony protocols, Chapter 5 then focuses on important Data Communication protocols, leading onto the discussion of Wireless and Cellular Communication protocols in Chapter 6 and Fiber Optic Data Transmission protocols in Chapter 7. Part Three covers Digital Security and Privacy protocols including Network Security protocols (Chapter 8), Wireless Security protocols (Chapter 9), and Server Level Security systems (Chapter 10), while the final chapter covers various aspects of privacy related to communication protocols and associated issues. This book will offer great benefits to graduate and undergraduate students, researchers, and practitioners. It could be used as a textbook as well as reference material for these topics. All the authors are well-qualified in this domain. The authors have an approved textbook that is used in some US, Saudi, and Bangladeshi universities since Fall 2020 semester - although used in online lectures/classes due to COVID-19 pandemic.

Internet of Things and Secure Smart Environments - Successes and Pitfalls (Paperback): Uttam Ghosh, Danda B. Rawat, Raja Datta,... Internet of Things and Secure Smart Environments - Successes and Pitfalls (Paperback)
Uttam Ghosh, Danda B. Rawat, Raja Datta, Al-Sakib Khan Pathan
R1,583 Discovery Miles 15 830 Ships in 12 - 17 working days

The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research. Features: Presents cutting edge topics and research in IoT Includes contributions from leading worldwide researchers Focuses on IoT architectures for smart environments Explores security, privacy, and trust Covers data handling and management (accumulation, abstraction, storage, processing, encryption, fast retrieval, security, and privacy) in IoT for smart environments This book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.

Securing Mobile Devices and Technology (Paperback): Kutub Thakur, Al-Sakib Khan Pathan Securing Mobile Devices and Technology (Paperback)
Kutub Thakur, Al-Sakib Khan Pathan
R1,558 Discovery Miles 15 580 Ships in 12 - 17 working days

This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks, while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobiles, IoT (Internet of Things) devices for shopping and password management, and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.

Securing Mobile Devices and Technology (Hardcover): Kutub Thakur, Al-Sakib Khan Pathan Securing Mobile Devices and Technology (Hardcover)
Kutub Thakur, Al-Sakib Khan Pathan
R3,990 Discovery Miles 39 900 Ships in 12 - 17 working days

This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks, while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobiles, IoT (Internet of Things) devices for shopping and password management, and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.

Deep Learning for Internet of Things Infrastructure (Hardcover): Uttam Ghosh, Mamoun Alazab, Al-Sakib Khan Pathan, Ali Kashif... Deep Learning for Internet of Things Infrastructure (Hardcover)
Uttam Ghosh, Mamoun Alazab, Al-Sakib Khan Pathan, Ali Kashif Bashir
R3,280 Discovery Miles 32 800 Ships in 12 - 17 working days

This book promotes and facilitates exchanges of research knowledge and findings across different disciplines on the design and investigation of deep learning (DL)-based data analytics of IoT (Internet of Things) infrastructures. Deep Learning for Internet of Things Infrastructure addresses emerging trends and issues on IoT systems and services across various application domains. The book investigates the challenges posed by the implementation of deep learning on IoT networking models and services. It provides fundamental theory, model, and methodology in interpreting, aggregating, processing, and analyzing data for intelligent DL-enabled IoT. The book also explores new functions and technologies to provide adaptive services and intelligent applications for different end users. FEATURES Promotes and facilitates exchanges of research knowledge and findings across different disciplines on the design and investigation of DL-based data analytics of IoT infrastructures Addresses emerging trends and issues on IoT systems and services across various application domains Investigates the challenges posed by the implementation of deep learning on IoT networking models and services Provides fundamental theory, model, and methodology in interpreting, aggregating, processing, and analyzing data for intelligent DL-enabled IoT Explores new functions and technologies to provide adaptive services and intelligent applications for different end users Uttam Ghosh is an Assistant Professor in the Department of Electrical Engineering and Computer Science, Vanderbilt University, Nashville, Tennessee, USA. Mamoun Alazab is an Associate Professor in the College of Engineering, IT and Environment at Charles Darwin University, Australia. Ali Kashif Bashir is a Senior Lecturer/Associate Professor and Program Leader of BSc (H) Computer Forensics and Security at the Department of Computing and Mathematics, Manchester Metropolitan University, United Kingdom. Al-Sakib Khan Pathan is an Adjunct Professor of Computer Science and Engineering at the Independent University, Bangladesh.

Internet of Things and Secure Smart Environments - Successes and Pitfalls (Hardcover): Uttam Ghosh, Danda B. Rawat, Raja Datta,... Internet of Things and Secure Smart Environments - Successes and Pitfalls (Hardcover)
Uttam Ghosh, Danda B. Rawat, Raja Datta, Al-Sakib Khan Pathan
R3,543 Discovery Miles 35 430 Ships in 12 - 17 working days

The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research. Features: Presents cutting edge topics and research in IoT Includes contributions from leading worldwide researchers Focuses on IoT architectures for smart environments Explores security, privacy, and trust Covers data handling and management (accumulation, abstraction, storage, processing, encryption, fast retrieval, security, and privacy) in IoT for smart environments This book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.

Emerging Communication Technologies Based on Wireless Sensor Networks - Current Research and Future Applications (Paperback):... Emerging Communication Technologies Based on Wireless Sensor Networks - Current Research and Future Applications (Paperback)
Mubashir Husain Rehmani, Al-Sakib Khan Pathan
R1,409 Discovery Miles 14 090 Ships in 12 - 17 working days

Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications fills a gap in the existing literature by combining a plethora of WSN-based emerging technologies into a single source so that researchers can form opinions regarding these technologies. It presents different types of emerging communication technologies based on WSNs and describes how wireless sensor networks can be integrated with other communication technologies. It covers many of the new techniques and demonstrates the application of WSNs. The book's 14 chapters are divided into four parts. The first part covers the basics of wireless sensor networks and their principal working methods. The authors then move on to discuss different types of WSNs, characteristics of different types of emerging technologies based on WSNs, renewable energy sources, battery replenishment strategies, and application-specific energy challenges of WSNs. The second part is dedicated to issues related to wireless body area networks (WBANs). It discusses wearable WSNs and their applications, standards, and research trends. The authors also discuss routing schemes devised for WBANs and thermal-aware routing protocols for WBANs. The third part focuses on different emerging communication technologies based on WSNs, including electromagnetic wireless nanosensor networks, WSNs in the IoT, management of WSNs through satellite networks, WSNs in smart homes, and cognitive radio technology in conjunction with WSNs. The last part of the book covers topics generally related to typical WSNs, including energy-efficient data collection in WSNs, key distribution mechanisms in WSNs, distributed data gathering algorithms for mobile WSNs, and finally, a novel mobility scheme for WSNs that supports IPv6.

Securing Cyber-Physical Systems (Paperback): Al-Sakib Khan Pathan Securing Cyber-Physical Systems (Paperback)
Al-Sakib Khan Pathan
R1,472 Discovery Miles 14 720 Ships in 12 - 17 working days

Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical-their availability and correct operation is essential. This book focuses on the security of such mission-critical systems. Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including: Securing modern electrical power systems Using moving target defense (MTD) techniques to secure CPS Securing wireless sensor networks (WSNs) used for critical infrastructures Mechanisms to improve cybersecurity and privacy in transportation CPS Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles Security issues, vulnerabilities, and challenges in the Internet of Things Machine-to-machine (M2M) communication security Security of industrial control systems Designing "trojan-resilient" integrated circuits While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.

Crowd Assisted Networking and Computing - Everything You Need to Know About Legal and Business Issues in the Game Industry... Crowd Assisted Networking and Computing - Everything You Need to Know About Legal and Business Issues in the Game Industry (Paperback)
Al-Sakib Khan Pathan
R1,453 Discovery Miles 14 530 Ships in 12 - 17 working days

Crowd computing, crowdsourcing, crowd-associated network (CrAN), crowd-assisted sensing are some examples of crowd-based concepts that harness the power of people on the web or connected via web-like infrastructure to do tasks that are often difficult for individual users or computers to do alone. This creates many challenging issues like assessing reliability and correctness of crowd generated information, delivery of data and information via crowd, middleware for supporting crowdsourcing and crowd computing tasks, crowd associated networking and its security, Quality of Information (QoI) issues, etc. This book compiles the latest advances in the relevant fields.

Data Analytics - Concepts, Techniques, and Applications (Paperback): Mohiuddin Ahmed, Al-Sakib Khan Pathan Data Analytics - Concepts, Techniques, and Applications (Paperback)
Mohiuddin Ahmed, Al-Sakib Khan Pathan
R1,592 Discovery Miles 15 920 Ships in 12 - 17 working days

Large data sets arriving at every increasing speeds require a new set of efficient data analysis techniques. Data analytics are becoming an essential component for every organization and technologies such as health care, financial trading, Internet of Things, Smart Cities or Cyber Physical Systems. However, these diverse application domains give rise to new research challenges. In this context, the book provides a broad picture on the concepts, techniques, applications, and open research directions in this area. In addition, it serves as a single source of reference for acquiring the knowledge on emerging Big Data Analytics technologies.

Cybersecurity Fundamentals - A Real-World Perspective (Hardcover): Kutub Thakur, Al-Sakib Khan Pathan Cybersecurity Fundamentals - A Real-World Perspective (Hardcover)
Kutub Thakur, Al-Sakib Khan Pathan
R5,800 Discovery Miles 58 000 Ships in 12 - 17 working days

Cybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. This book covers fundamental issues using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cybersecurity, and different types of cyberattacks that hackers choose to unleash on cyber environments. It then goes on to cover the types of major computer malware and cybersecurity attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on networks are fully described. It then covers high-tech cybersecurity programs, devices, and mechanisms that are extensively adopted in modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. This book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step-by-step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with this book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security, and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of this book.

Securing Social Networks in Cyberspace (Hardcover): Al-Sakib Khan Pathan Securing Social Networks in Cyberspace (Hardcover)
Al-Sakib Khan Pathan
R2,811 Discovery Miles 28 110 Ships in 12 - 17 working days

This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book. This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles.

Wireless Sensor Networks - Current Status and Future Trends (Paperback): Shafiullah Khan, Al-Sakib Khan Pathan, Nabil Ali... Wireless Sensor Networks - Current Status and Future Trends (Paperback)
Shafiullah Khan, Al-Sakib Khan Pathan, Nabil Ali Alrajeh
R1,606 Discovery Miles 16 060 Ships in 12 - 17 working days

Wireless sensor networks (WSNs) utilize fast, cheap, and effective applications to imitate the human intelligence capability of sensing on a wider distributed scale. But acquiring data from the deployment area of a WSN is not always easy and multiple issues arise, including the limited resources of sensor devices run with one-time batteries. Additional WSN concerns include the external environment, routing, data aggregation, and ensuring quality of service (QoS) and security. Solutions have been developed for various types of application scenarios, but many problems still remain as open research challenges. Wireless Sensor Networks: Current Status and Future Trends covers the various issues associated with WSNs, including their structure, activities, and applications. Bringing together the contributions of researchers and experts in the field, this book explores: Applications of WSNs, data-centric storage, environmental forest monitoring, and the fundamentals of wireless body area networks Mobile medium access control (MAC) protocols, cooperative diversity sensor systems, and WSNs operating in IEEE 802.11 networks Location and position estimation in WSNs, techniques used in localization algorithms, and localization schemes Energy-centric simulation and design space exploration The fundamentals of MAC protocols and specific requirements and problems Protocols and data gathering Privacy and security issues in WSNs, solutions based on watermarking, and proposed work on intrusion detection systems (IDS) in WSNs Reviewing current trends in research and development as well as future expectations in the relevant areas, this book is a valuable reference for students, graduates, academics, researchers of computer science, and engineers, whether working in professional organizations or research institutions.

Securing Cyber-Physical Systems (Hardcover): Al-Sakib Khan Pathan Securing Cyber-Physical Systems (Hardcover)
Al-Sakib Khan Pathan
R4,026 Discovery Miles 40 260 Ships in 12 - 17 working days

Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical-their availability and correct operation is essential. This book focuses on the security of such mission-critical systems. Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including: Securing modern electrical power systems Using moving target defense (MTD) techniques to secure CPS Securing wireless sensor networks (WSNs) used for critical infrastructures Mechanisms to improve cybersecurity and privacy in transportation CPS Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles Security issues, vulnerabilities, and challenges in the Internet of Things Machine-to-machine (M2M) communication security Security of industrial control systems Designing "trojan-resilient" integrated circuits While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.

Security of Self-Organizing Networks - MANET, WSN, WMN, VANET (Hardcover): Al-Sakib Khan Pathan Security of Self-Organizing Networks - MANET, WSN, WMN, VANET (Hardcover)
Al-Sakib Khan Pathan
R3,756 Discovery Miles 37 560 Ships in 12 - 17 working days

Reflecting cutting-edge advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical security issues in a range of wireless networks, the book proposes specific solutions to security threats. Ideal for those with a basic understanding of network security, the text provides a clear examination of the key aspects of security in self-organizing networks and other networks that use wireless technology for communications. The book is organized into four sections for ease of reference: 1. General Topics -- Security of Wireless and Self-Organizing Networks 2. Mobile Ad-Hoc Network and Vehicular Ad-Hoc Network Security 3. Wireless Sensor Network Security 4. Wireless Mesh Network Security Highlighting potential threats to network security, most chapters are written in a tutorial manner. However, some of the chapters include mathematical equations and detailed analysis for advanced readers. Guiding you through the latest trends, issues, and advances in network security, the text includes questions and sample answers in each chapter to reinforce understanding.

Crowd Assisted Networking and Computing - Everything You Need to Know About Legal and Business Issues in the Game Industry... Crowd Assisted Networking and Computing - Everything You Need to Know About Legal and Business Issues in the Game Industry (Hardcover)
Al-Sakib Khan Pathan
R4,296 Discovery Miles 42 960 Ships in 12 - 17 working days

Crowd computing, crowdsourcing, crowd-associated network (CrAN), crowd-assisted sensing are some examples of crowd-based concepts that harness the power of people on the web or connected via web-like infrastructure to do tasks that are often difficult for individual users or computers to do alone. This creates many challenging issues like assessing reliability and correctness of crowd generated information, delivery of data and information via crowd, middleware for supporting crowdsourcing and crowd computing tasks, crowd associated networking and its security, Quality of Information (QoI) issues, etc. This book compiles the latest advances in the relevant fields.

Simulation Technologies in Networking and Communications - Selecting the Best Tool for the Test (Paperback): Al-Sakib Khan... Simulation Technologies in Networking and Communications - Selecting the Best Tool for the Test (Paperback)
Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Shafiullah Khan
R1,561 Discovery Miles 15 610 Ships in 12 - 17 working days

Simulation is a widely used mechanism for validating the theoretical models of networking and communication systems. Although the claims made based on simulations are considered to be reliable, how reliable they really are is best determined with real-world implementation trials. Simulation Technologies in Networking and Communications: Selecting the Best Tool for the Test addresses the spectrum of issues regarding the different mechanisms related to simulation technologies in networking and communications fields. Focusing on the practice of simulation testing instead of the theory, it presents the work of more than 50 experts from around the world. Considers superefficient Monte Carlo simulations Describes how to simulate and evaluate multicast routing algorithms Covers simulation tools for cloud computing and broadband passive optical networks Reports on recent developments in simulation tools for WSNs Examines modeling and simulation of vehicular networks The book compiles expert perspectives about the simulation of various networking and communications technologies. These experts review and evaluate popular simulation modeling tools and recommend the best tools for your specific tests. They also explain how to determine when theoretical modeling would be preferred over simulation. This book does not provide a verdict on the best suitable tool for simulation. Instead, it supplies authoritative analyses of the different kinds of networks and systems. Presenting best practices and insights from global experts, the book provides you with an understanding of what to simulate, where to simulate, whether to simulate or not, when to simulate, and how to simulate for a wide range of issues.

Building Next-Generation Converged Networks - Theory and Practice (Paperback): Al-Sakib Khan Pathan, Muhammad Mostafa Monowar,... Building Next-Generation Converged Networks - Theory and Practice (Paperback)
Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Zubair Md. Fadlullah
R1,614 Discovery Miles 16 140 Ships in 12 - 17 working days

Supplying a comprehensive introduction to next-generation networks, Building Next-Generation Converged Networks: Theory and Practice strikes a balance between how and why things work and how to make them work. It compiles recent advancements along with basic issues from the wide range of fields related to next generation networks. Containing the contributions of 56 industry experts and researchers from 16 different countries, the book presents relevant theoretical frameworks and the latest research. It investigates new technologies such as IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) architectures, standards, mobility, and security. Presenting the material in a manner that entry-level readers can easily grasp the fundamentals, the book is organized into five parts: Multimedia Streaming-deals with multimedia streaming in networks of the future-from basics to more in-depth information for the experts Safety and Security in Networks-addresses the issues related to security, including fundamental Internet and cyber-security concepts that will be relevant in any future network Network Management and Traffic Engineering-includes coverage of mathematical modeling-based works Information Infrastructure and Cloud Computing-integrates information about past achievements, present conditions, and future expectations in information infrastructure-related areas Wireless Networking-touches on the various aspects of wireless networks and technologies The text includes coverage of Internet architectures and protocols, embedded systems and sensor networks, web services, Cloud technologies, and next-generation wireless networking. Reporting on the latest advancements in the field, it provides you with the understanding required to contribute towards the materialization of future networks. This book is suitable for graduate students, researchers, academics, industry practitioners working in the area of wired or wireless networking, and basically anyone who wants to improve his or her understanding of the topics related to next-generation networks.

Practical Cryptography - Algorithms and Implementations Using C++ (Hardcover): Saiful Azad, Al-Sakib Khan Pathan Practical Cryptography - Algorithms and Implementations Using C++ (Hardcover)
Saiful Azad, Al-Sakib Khan Pathan
R3,716 Discovery Miles 37 160 Ships in 12 - 17 working days

Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and implement cryptographic algorithms using C++ programming language. Written for programmers and engineers, Practical Cryptography explains how you can use cryptography to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this book shows you how to build security into your computer applications, networks, and storage. Suitable for undergraduate and postgraduate students in cryptography, network security, and other security-related courses, this book will also help anyone involved in computer and network security who wants to learn the nuts and bolts of practical cryptography.

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Hardcover): Mohssen Mohammed, Al-Sakib Khan... Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Hardcover)
Mohssen Mohammed, Al-Sakib Khan Pathan
R2,654 Discovery Miles 26 540 Ships in 12 - 17 working days

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems. If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks, and identifies open-source tools you can use to create your own honeypot. There's also a chapter with references to helpful reading resources on automated signature generation systems. The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures.

Machine Intelligence and Data Analytics for Sustainable Future Smart Cities (Paperback, 1st ed. 2021): Uttam Ghosh, Yassine... Machine Intelligence and Data Analytics for Sustainable Future Smart Cities (Paperback, 1st ed. 2021)
Uttam Ghosh, Yassine Maleh, Mamoun Alazab, Al-Sakib Khan Pathan
R5,289 Discovery Miles 52 890 Ships in 10 - 15 working days

This book presents the latest advances in computational intelligence and data analytics for sustainable future smart cities. It focuses on computational intelligence and data analytics to bring together the smart city and sustainable city endeavors. It also discusses new models, practical solutions and technological advances related to the development and the transformation of cities through machine intelligence and big data models and techniques. This book is helpful for students and researchers as well as practitioners.

Machine Intelligence and Data Analytics for Sustainable Future Smart Cities (Hardcover, 1st ed. 2021): Uttam Ghosh, Yassine... Machine Intelligence and Data Analytics for Sustainable Future Smart Cities (Hardcover, 1st ed. 2021)
Uttam Ghosh, Yassine Maleh, Mamoun Alazab, Al-Sakib Khan Pathan
R5,321 Discovery Miles 53 210 Ships in 10 - 15 working days

This book presents the latest advances in computational intelligence and data analytics for sustainable future smart cities. It focuses on computational intelligence and data analytics to bring together the smart city and sustainable city endeavors. It also discusses new models, practical solutions and technological advances related to the development and the transformation of cities through machine intelligence and big data models and techniques. This book is helpful for students and researchers as well as practitioners.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
How To Fix (Unf*ck) A Country - 6 Things…
Roy Havemann Paperback R310 R210 Discovery Miles 2 100
Mountain Backgammon - The Classic Game…
Lily Dyu R575 R460 Discovery Miles 4 600
Cable Guys Controller and Smartphone…
R399 R349 Discovery Miles 3 490
Shield Anti-Freeze Summer Coolant 50…
 (4)
R57 Discovery Miles 570
Bosch GBM 320 Professional Drill…
R725 R609 Discovery Miles 6 090
Cadac 47cm Paella Pan
R1,158 Discovery Miles 11 580
Slippers
R57 Discovery Miles 570
Fatima Sydow Cooks
Fatima Sydow Paperback  (3)
R420 R361 Discovery Miles 3 610
Sizzlers - The Hate Crime That Tore Sea…
Nicole Engelbrecht Paperback R320 R235 Discovery Miles 2 350
Pink Fresh Couture by Moschino EDT 100ml…
R1,458 Discovery Miles 14 580

 

Partners