|
Showing 1 - 25 of
30 matches in All Departments
Reinforces basic principles of digital forensic science with
examples of current trends and future prospects Broadens the
readers understanding of digital forensic investigations and
information security techniques using crime science Shares many
tips and insights into unexplored areas of digital forensics and
information security from scholars, practitioners and policy
makers. Provides a level of language that suits all audiences
across the globe Supplies opportunities to practice techniques
which demonstrate how crime science can be used to enrich digital
forensics and information security
This book aims to provide the latest research developments and
results in the domain of AI techniques for smart cyber ecosystems.
It presents a holistic insight into AI-enabled theoretic approaches
and methodology in IoT networking, security analytics using AI
tools and network automation, which ultimately enable intelligent
cyber space. This book will be a valuable resource for students,
researchers, engineers and policy makers working in various areas
related to cybersecurity and privacy for Smart Cities. This book
includes chapters titled "An Overview of the Artificial
Intelligence Evolution and Its Fundamental Concepts, and Their
Relationship with IoT Security", "Smart City: Evolution and
Fundamental Concepts", "Advances in AI-Based Security for Internet
of Things in Wireless Virtualization Environment", "A Conceptual
Model for Optimal Resource Sharing of Networked Microgrids Focusing
Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel
Framework for a Cyber Secure Smart City", "Contemplating Security
Challenges and Threats for Smart Cities", "Self-Monitoring
Obfuscated IoT Network", "Introduction to Side Channel Attacks and
Investigation of Power Analysis and Fault Injection Attack
Techniques", "Collaborative Digital Forensic Investigations Model
for Law Enforcement: Oman as a Case Study", "Understanding Security
Requirements and Challenges in the Industrial Internet of Things: A
Review", "5G Security and the Internet of Things", "The Problem of
Deepfake Videos and How to Counteract Them in Smart Cities", "The
Rise of Ransomware Aided by Vulnerable IoT Devices", "Security
Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware
Crowd Associated Network-Based Approach for Optimal Waste
Management in Smart Cities". This book provides state-of-the-art
research results and discusses current issues, challenges,
solutions and recent trends related to security and organization
within IoT and Smart Cities. We expect this book to be of
significant importance not only to researchers and practitioners in
academia, government agencies and industries, but also for policy
makers and system managers. We anticipate this book to be a
valuable resource for all those working in this new and exciting
area, and a "must have" for all university libraries.
A straightforward overview with minimum technical descriptions of
the underlying networking principles, standards, applications and
uses of the Internet. Understanding the Internet explains the
underlying networking concepts, the protocols and standards which
comprise the Internet, Internet trends and applications, the mobile
Internet, security and the hidden Web. The Internet and World Wide
Web are dramatically changing the world we live in and this book
provides a holistic view of the Internet so that practitioners and
users can more fully understand the concepts involved.
Written by a highly knowledgeable and well-respected practitioner
in the fieldDraws on the author s wide-ranging practical experience
of developing web and mobile web applications and indeed teaching
Internet technologies at a university for many yearsProvides
insight into how the Internet is put together and the novel
applications which are currently residing on it "
Reinforces basic principles of digital forensic science with
examples of current trends and future prospects Broadens the
readers understanding of digital forensic investigations and
information security techniques using crime science Shares many
tips and insights into unexplored areas of digital forensics and
information security from scholars, practitioners and policy
makers. Provides a level of language that suits all audiences
across the globe Supplies opportunities to practice techniques
which demonstrate how crime science can be used to enrich digital
forensics and information security
This book aims to provide the latest research developments and
results in the domain of AI techniques for smart cyber ecosystems.
It presents a holistic insight into AI-enabled theoretic approaches
and methodology in IoT networking, security analytics using AI
tools and network automation, which ultimately enable intelligent
cyber space. This book will be a valuable resource for students,
researchers, engineers and policy makers working in various areas
related to cybersecurity and privacy for Smart Cities. This book
includes chapters titled "An Overview of the Artificial
Intelligence Evolution and Its Fundamental Concepts, and Their
Relationship with IoT Security", "Smart City: Evolution and
Fundamental Concepts", "Advances in AI-Based Security for Internet
of Things in Wireless Virtualization Environment", "A Conceptual
Model for Optimal Resource Sharing of Networked Microgrids Focusing
Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel
Framework for a Cyber Secure Smart City", "Contemplating Security
Challenges and Threats for Smart Cities", "Self-Monitoring
Obfuscated IoT Network", "Introduction to Side Channel Attacks and
Investigation of Power Analysis and Fault Injection Attack
Techniques", "Collaborative Digital Forensic Investigations Model
for Law Enforcement: Oman as a Case Study", "Understanding Security
Requirements and Challenges in the Industrial Internet of Things: A
Review", "5G Security and the Internet of Things", "The Problem of
Deepfake Videos and How to Counteract Them in Smart Cities", "The
Rise of Ransomware Aided by Vulnerable IoT Devices", "Security
Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware
Crowd Associated Network-Based Approach for Optimal Waste
Management in Smart Cities". This book provides state-of-the-art
research results and discusses current issues, challenges,
solutions and recent trends related to security and organization
within IoT and Smart Cities. We expect this book to be of
significant importance not only to researchers and practitioners in
academia, government agencies and industries, but also for policy
makers and system managers. We anticipate this book to be a
valuable resource for all those working in this new and exciting
area, and a "must have" for all university libraries.
Marriage, Performance, and Politics at the Jacobean Court
constitutes the first full-length study of Jacobean nuptial
performance, a hitherto unexplored branch of early modern theater
consisting of masques and entertainments performed for high-profile
weddings. Scripted by such writers as Ben Jonson, Thomas Campion,
George Chapman, and Francis Beaumont, these entertainments were
mounted for some of the most significant political events of
James's English reign. Here Kevin Curran analyzes all six of the
elite weddings celebrated at the Jacobean court, reading the
masques and entertainments that headlined these events alongside
contemporaneously produced panegyrics, festival books, sermons,
parliamentary speeches, and other sources. The study shows how,
collectively, wedding entertainments turned the idea of union into
a politically versatile category of national representation and
offered new ways of imagining a specifically Jacobean form of
national identity by doing so.
Marriage, Performance, and Politics at the Jacobean Court
constitutes the first full-length study of Jacobean nuptial
performance, a hitherto unexplored branch of early modern theater
consisting of masques and entertainments performed for high-profile
weddings. Scripted by such writers as Ben Jonson, Thomas Campion,
George Chapman, and Francis Beaumont, these entertainments were
mounted for some of the most significant political events of
James's English reign. Here Kevin Curran analyzes all six of the
elite weddings celebrated at the Jacobean court, reading the
masques and entertainments that headlined these events alongside
contemporaneously produced panegyrics, festival books, sermons,
parliamentary speeches, and other sources. The study shows how,
collectively, wedding entertainments turned the idea of union into
a politically versatile category of national representation and
offered new ways of imagining a specifically Jacobean form of
national identity by doing so.
Computational Intelligence for Medical Internet of Things (MIoT)
Applications: Machine Intelligence Applications for IoT in
Healthcare explores machine intelligence techniques necessary for
effective MIoT research and practice, taking a practical approach
for practitioners and students entering the field. This book
investigates advanced concepts and applications in the MIoT field,
guiding readers through emerging developments and future trends. A
wide range of international authors guide readers through advanced
concepts, including deep learning, neural network, and big data
analytic approaches for the classification, indexing, retrieval,
analysis, and inferencing of healthcare data.
Unfolding as a series of materially oriented studies ranging from
chairs, machines and doors to trees, animals and food, this book
retells the story of Renaissance personhood as one of material
relations and embodied experience, rather than of emergent notions
of individuality and freedom. The book assembles an international
team of leading scholars to formulate a new account of personhood
in the sixteenth and seventeenth centuries, one that starts with
the objects, environments and physical processes that made
personhood legible.
|
Youth (Paperback)
Kevin Curran
|
R480
Discovery Miles 4 800
|
Ships in 12 - 17 working days
|
Youth dives into the lives of four teenagers in Ireland's most
diverse town, Balbriggan. Angel is about to finish school and
discover if Drill music and YouTube fame can deliver on their
promises. Princess is battling to escape her claustrophobic
surroundings and go to university and Dean is ready to come out
from under his famous father's shadow, while Tanya, struggling with
the spotlight of internet infamy, is still posting her dream life
for all of her faithful followers. Isolated and disorientated by
the white noise and seemingly insurmountable expectations of
adolescence, our protagonists are desperate to find anything that
helps them belong. Oblivious to one another's presence, potential
and struggles, they pass each other on the street as strangers. But
when their paths cross, the connections they make will change the
course of their lives. Twenty-first century life -
hyper-sexualized, social media saturated, anxiety-plagued - is
here. Living inside its characters' heads, and negotiating their
interior landscape, this book is a love song to the possibilities
of youth. Using insights gained from the young people he works
with, Curran's evocative writing yields the authenticity this novel
demands. With instinctive affection and admiration for his
characters' strengths and complexities, Youth is a journey through
streets less travelled.
|
Cybersecurity in Emerging Digital Era - First International Conference, ICCEDE 2020, Greater Noida, India, October 9-10, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Rajeev Agrawal, Goutam Sanyal, Kevin Curran, Valentina Emilia Balas, Madhu Sharma Gaur
|
R1,521
Discovery Miles 15 210
|
Ships in 10 - 15 working days
|
This book constitutes selected and revised papers from the First
International Conference on Cybersecurity in Emerging Digital Era,
ICCEDE 2020, held in Greater Noida, India, in October 2020. Due to
the COVID-19 pandemic the conference was held online. The 9 full
papers and 2 short papers presented in this volume were thoroughly
reviewed and selected from 193 submissions. The papers are
organized in topical sections on cyber security issues and
challenges in emerging digital era; security resilience in
contemporary applications.
One good track could change everything. Just one good track and Rob
Lynch can finally quit his suburban teaching job and get his band,
the Terrors, once Dublin's next big thing, the fame and recognition
they dream of. But it's not happening - they need a new sound. When
Rob discovers the unique gifts of one of his students, John 'Kembo'
Pereira, a troubled African teenager with a particular talent for
creating beats, he sees an opportunity that might just keep his
musical ambitions alive. As Rob and John's relationship develops,
however, a series of disturbing events unfold that will rock both
their lives to the core. And when the Terrors start to crumble, Rob
finds out just how far he is willing to go, and what he is willing
to lose, in order to keep his dream alive. Powerfully capturing the
energy, wit and pathos of a changed Dublin society, Beatsploitation
gives voice to a cynical, disillusioned generation, caught between
the tired values of the old and the uncertainty of the new. An
assured, arresting debut by a commanding new talent. It is an
innovative and original work of debut fiction and deals with
international themes such as racism, economic failure, love, loss,
and regret, while highlighting a different side of modern Ireland.
Ranging widely across law, aesthetics, religion, and philosophy,
this book offers the first account of the place of judgment in
Shakespearean drama Shakespeare and Judgment gathers together an
international group of scholars to address for the first time the
place of judgment in Shakespearean drama. Contributors approach the
topic from a variety of cultural and theoretical perspectives,
covering plays from across Shakespeare's career and from each of
the genres in which he wrote. Anchoring the volume are two critical
contentions: first, that attending to Shakespeare's treatment of
judgment leads to fresh insights about the imaginative relationship
between law, theater, and aesthetics in early modern England; and
second, that it offers new ways of putting the plays' historical
and philosophical contexts into conversation. Taken together, the
essays in Shakespeare and Judgment offer a genuinely new account of
the historical and intellectual coordinates of Shakespeare's plays.
Building on current work in legal studies, religious studies,
theater history, and critical theory, the volume will be of
interest to a wide range of scholars working on Shakespeare and
early modern drama. Key Features Provides the first account of the
place of judgment in Shakespearean drama Offers a fresh perspective
on the imaginative relationship between law, religion, and
aesthetics in Shakespeare's plays Models new ways of putting the
plays' historical and philosophical contexts into conversation.
Ranging widely across law, aesthetics, religion, and philosophy,
this book offers the first account of the place of judgment in
Shakespearean drama'Shakespeare and Judgment' gathers together an
international group of scholars to address for the first time the
place of judgment in Shakespearean drama. Contributors approach the
topic from a variety of cultural and theoretical perspectives,
covering plays from across Shakespeare's career and from each of
the genres in which he wrote. Anchoring the volume are two critical
contentions: first, that attending to Shakespeare's treatment of
judgment leads to fresh insights about the imaginative relationship
between law, theater, and aesthetics in early modern England; and
second, that it offers new ways of putting the plays' historical
and philosophical contexts into conversation. Taken together, the
essays in 'Shakespeare and Judgment' offer a genuinely new account
of the historical and intellectual coordinates of Shakespeare's
plays. Building on current work in legal studies, religious
studies, theater history, and critical theory, the volume will be
of interest to a wide range of scholars working on Shakespeare and
early modern drama. Key FeaturesProvides the first account of the
place of judgment in Shakespearean dramaOffers a fresh perspective
on the imaginative relationship between law, religion, and
aesthetics in Shakespeare's playsModels new ways of putting the
plays' historical and philosophical contexts into conversation
Explores the history and theory of personhood in the Renaissance
period Offers the first sustained study of the history and theory
of personhood in the Renaissance period Provides a study of
personhood from a materialist perspective Models new way of
entering posthumanist critique - animal studies, ecocriticism, and
food studies - into conversation with legal theory, cultural
history, and literary studies Unfolding as a series of materially
oriented studies ranging from chairs, machines and doors to trees,
animals and food, this book retells the story of Renaissance
personhood as one of material relations and embodied experience,
rather than of emergent notions of individuality and freedom. The
book assembles an international team of leading scholars to
formulate a new account of personhood in the sixteenth and
seventeenth centuries, one that starts with the objects,
environments and physical processes that made personhood legible.
Modern devices, from phones and cars to houses and the appliances
within them, are being designed with formidable computational power
and expanded functionality. To be truly effective, these smart
devices must effectively process data from their environment and
experiences and make decisions based on that information. Recent
Advances in Ambient Intelligence and Context-Aware Computing
investigates the functionality of ubiquitous computational systems
and how they may adapt to their environment to improve the quality
of interaction for the end-user. This reference book will be of
value to under- and post-graduate students, professionals, and
researchers networking, computer science, communications, and other
information technology disciplines.
Ambient intelligence began as a vision for the future of technology
and has now become a reality. The widespread use of modern
technology has quickly expanded into the use of our everyday lives.
On a daily basis, we are instantly connected to people, places,
ideas, and information which have led to the acceleration of
knowledge. As the continuing development of new technologies
becomes available, those technologies will play an integral role in
the future. Pervasive and Ubiquitous Technology Innovations for
Ambient Intelligence Environments is a collection of research on
the subject matter of human computer interaction, ubiquitous
computing, embedded systems, and other areas of study which
contribute to ambient intelligence. This comprehensive reference
aims to broaden the overall knowledge on ambient intelligence as it
relates to the aspects of modern life.
While ambient intelligence has long been relegated to the realm of
science fiction, creating smart technology that is increasingly
responsive to individuals and environments is, in many ways,
becoming reality, as the body of research and opportunity for
practical application in this field continues to grow. Innovative
Applications of Ambient Intelligence: Advances in Smart Systems
provides perspectives on the convergence of ubiquitous computing,
intelligent systems research, and context awareness with the aim of
encouraging the further development of ambient intelligence
frameworks and research. Focusing on interaction and communication
in smart environments, as well as the successful development and
design of ambient interfaces and platforms, this book aims to
further the continuously growing dialogue on the promise of ambient
computing.
Ambient Intelligence (AmI) is an emerging paradigm for knowledge
discovery, which originally emerged as a design language for
invisible computing and smart environments. Since its introduction
in the late 1990's, AmI has matured and evolved, having inspired
fields including computer science, interaction design, mobile
computing, and cognitive science. Ubiquitous Developments in
Ambient Computing and Intelligence: Human-Centered Applications
provides a comprehensive collection of knowledge in cutting-edge
research in fields as diverse as distributed computing, human
computer interaction, ubiquitous computing, embedded systems, and
other interdisciplinary areas which all contribute to AmI.
Predicting the technologies that will shape our ever changing world
is difficult however, in this book it is discussed that Ambient
Intelligent technology will develop considerably in the future.
This book details the design and implementation of Short Messaging
Service (SMS) and MMS applications. The main aim of this book is to
provide SMS/MMS developers with the tools necessary to develop
applications which can send SMS/MMS messages to groups of mobile
devices. 1.The first section of this book presents a Java SMS
application which allows the storage of contacts and groups of
contacts. Thus the user of the application can customise his/her
own list of contact 'Individuals' and 'Groups' of contacts (Such
as: 'Family', 'Friends', 'Work Colleagues' etc). Upon selection of
Individual(s) and/or Group(s) a single message such as "how r u
all" can be sent to all their respective Mobile Stations (MS) by
clicking on the 'Add' and then 'Send' button. The simplicity and
ease of use of this application allows a diverse range of users
from an individual home user to corporate wide user base. All code
is presented and a working version is freely available for
download. 2.The middle section of this book presents a similar
group bulk SMS application which is web enabled. The application is
written using Active Server Pages and is purely web based. Again,
it allows the sending of messages to individuals and groups. For
the purpose of sending SMS in each scenario, the Simplewire Active
X Software Development Kit is used. All code is presented and a
working version is freely available for download. 3.In order for
"rich media" MMS messages to be sent and received, they must first
be transcoded into the MMS format. Essentially what happens is that
the content is tailored before it arrives at the mobile. This
tailoring process is called transcoding. Transcoding systems can
adapt video, images, audio and text to the individual constraints
of different devices. They summarise, translate and convert the
content into the MMS format. This section of the book presents a
transcoding framework, which enables various rich media files
stored on PC to be sent to MMS capable handsets. Transcoding is the
area that this project will focus on. A java application is
developed that allows a user to select multimedia content stored on
the computer and send it to a mobile. The application performs the
transcoding of the message content into MMS format and deploys the
message to the mobile.
This book aims to introduce the area of wireless (Wi-Fi, 802.11)
security with particular emphasis on WEP. Weaknesses are
highlighted through the art of war-driving where unprotected access
points are discovered. War driving used ethically can be a powerful
tool in the hands of security professionals to test the security of
the networks they are charged with protecting.
|
|