0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (21)
  • R2,500 - R5,000 (22)
  • R5,000 - R10,000 (7)
  • -
Status
Brand

Showing 1 - 25 of 50 matches in All Departments

Machine Intelligence and Data Analytics for Sustainable Future Smart Cities (Hardcover, 1st ed. 2021): Uttam Ghosh, Yassine... Machine Intelligence and Data Analytics for Sustainable Future Smart Cities (Hardcover, 1st ed. 2021)
Uttam Ghosh, Yassine Maleh, Mamoun Alazab, Al-Sakib Khan Pathan
R4,718 Discovery Miles 47 180 Ships in 12 - 17 working days

This book presents the latest advances in computational intelligence and data analytics for sustainable future smart cities. It focuses on computational intelligence and data analytics to bring together the smart city and sustainable city endeavors. It also discusses new models, practical solutions and technological advances related to the development and the transformation of cities through machine intelligence and big data models and techniques. This book is helpful for students and researchers as well as practitioners.

Internet and Distributed Computing Advancements - Theoretical Frameworks and Practical Applications (Hardcover, New): Jemal H.... Internet and Distributed Computing Advancements - Theoretical Frameworks and Practical Applications (Hardcover, New)
Jemal H. Abawajy, Mukaddim Pathan, Mustafizur Rahman, Al-Sakib Khan Pathan, Mustafa Mat Deris
R5,216 Discovery Miles 52 160 Ships in 10 - 15 working days

As software and computer hardware grows in complexity, networks have grown to match. The increasing scale, complexity, heterogeneity, and dynamism of communication networks, resources, and applications has made distributed computing systems brittle, unmanageable, and insecure. Internet and Distributed Computing Advancements: Theoretical Frameworks and Practical Applications is a vital compendium of chapters on the latest research within the field of distributed computing, capturing trends in the design and development of Internet and distributed computing systems that leverage autonomic principles and techniques. The chapters provided within this collection offer a holistic approach for the development of systems that can adapt themselves to meet requirements of performance, fault tolerance, reliability, security, and Quality of Service (QoS) without manual intervention.

Wireless Networks and Security - Issues, Challenges and Research Trends (Hardcover, 2013 ed.): Shafiullah Khan, Al-Sakib Khan... Wireless Networks and Security - Issues, Challenges and Research Trends (Hardcover, 2013 ed.)
Shafiullah Khan, Al-Sakib Khan Pathan
R6,319 R5,013 Discovery Miles 50 130 Save R1,306 (21%) Ships in 12 - 17 working days

"Wireless Networks and Security" provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications. The contributions identify various vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and focus on ways of strengthening security mechanisms and services throughout the layers. This carefully edited monograph is targeting for researchers, post-graduate students in universities, academics, and industry practitioners or professionals.

Emerging ICT Technologies and Cybersecurity - From AI and ML to Other Futuristic Technologies (1st ed. 2023): Kutub Thakur,... Emerging ICT Technologies and Cybersecurity - From AI and ML to Other Futuristic Technologies (1st ed. 2023)
Kutub Thakur, Al-Sakib Khan Pathan, Sadia Ismat
R2,302 R2,136 Discovery Miles 21 360 Save R166 (7%) Ships in 9 - 15 working days

This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity. In a digitally connected world, cybersecurity is one of the most important issues today. We have witnessed tremendous advancements over the last two decades in various fields of networking, connectivity, electronics, and the technologies that make use of those platforms and devices. Many emerging technologies are also showing promise for future use in the cybersecurity area. Hence, it is important to understand some basics of the technologies and concepts that are making their impacts today and those which may show stronger influence in the near future. The book begins with an introduction to ICT and its advancements, then talks about Artificial Intelligence (AI), Machine Learning (ML), and Blockchain Technologies. It then goes on to cover wireless technology, Internet of Things (IoT), Distributed Cloud Computing, Quantum Computing, Virtual Reality, and other futuristic technologies that would be directly related to Cyberspace and Cybersecurity. This textbook is written in a step-by-step manner, with easily accessible information for both general readers and experts in the field. It is suitable to be used as a textbook for undergraduate and graduate courses like Computer Networks and Security, Information Security, etc.

A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Paperback): Kutub Thakur,... A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Paperback)
Kutub Thakur, Abu Kamruzzaman, Al-Sakib Khan Pathan
R1,362 Discovery Miles 13 620 Ships in 12 - 17 working days

This book, divided into three parts, describes the detailed concepts of Digital Communication, Security, and Privacy protocols. In Part One, the first chapter provides a deeper perspective on communications, while Chapters 2 and 3 focus on analog and digital communication networks. Part Two then delves into various Digital Communication protocols. Beginning first in Chapter 4 with the major Telephony protocols, Chapter 5 then focuses on important Data Communication protocols, leading onto the discussion of Wireless and Cellular Communication protocols in Chapter 6 and Fiber Optic Data Transmission protocols in Chapter 7. Part Three covers Digital Security and Privacy protocols including Network Security protocols (Chapter 8), Wireless Security protocols (Chapter 9), and Server Level Security systems (Chapter 10), while the final chapter covers various aspects of privacy related to communication protocols and associated issues. This book will offer great benefits to graduate and undergraduate students, researchers, and practitioners. It could be used as a textbook as well as reference material for these topics. All the authors are well-qualified in this domain. The authors have an approved textbook that is used in some US, Saudi, and Bangladeshi universities since Fall 2020 semester - although used in online lectures/classes due to COVID-19 pandemic.

Combatting Cyberbullying in Digital Media with Artificial Intelligence: Mohamed Lahby, Al-Sakib Khan Pathan, Yassine Maleh Combatting Cyberbullying in Digital Media with Artificial Intelligence
Mohamed Lahby, Al-Sakib Khan Pathan, Yassine Maleh
R2,199 Discovery Miles 21 990 Ships in 12 - 17 working days

Rapid advancements in mobile computing and communication technology and recent technological progress have opened up a plethora of opportunities. These advancements have expanded knowledge, facilitated global business, enhanced collaboration, and connected people through various digital media platforms. While these virtual platforms have provided new avenues for communication and self-expression, they also pose significant threats to our privacy. As a result, we must remain vigilant against the propagation of electronic violence through social networks. Cyberbullying has emerged as a particularly concerning form of online harassment and bullying, with instances of racism, terrorism, and various types of trolling becoming increasingly prevalent worldwide. Addressing the issue of Cyberbullying to find effective solutions is a challenge for the web mining community, particularly within the realm of social media. In this context, artificial intelligence (AI) can serve as a valuable tool in combating the diverse manifestations of Cyberbullying on the internet and social networks. This book presents the latest cutting-edge research, theoretical methods, and novel applications in artificial intelligence techniques to combat cyberbullying. Discussing new models, practical solutions, and technological advances related to detecting and analyzing Cyberbullying is based on artificial intelligence models and other related techniques. Furthermore, the book helps readers understand artificial intelligence techniques to combat cyberbullying systematically and forthrightly, as well as future insights and the societal and technical aspects of NLP-based cyberbullying research efforts. Key Features: Proposes new models, practical solutions and technological advances related to machine intelligence techniques for detecting cyberbullying across multiple social media platforms Combines both theory and practice so that readers (beginners or experts) of this book can find both a description of the concepts and context related to the machine intelligence Includes many case studies and applications of machine intelligence for combating cyberbullying

Combating Fake News with Computational Intelligence Techniques (Hardcover, 1st ed. 2022): Mohamed Lahby, Al-Sakib Khan Pathan,... Combating Fake News with Computational Intelligence Techniques (Hardcover, 1st ed. 2022)
Mohamed Lahby, Al-Sakib Khan Pathan, Yassine Maleh, Wael Mohamed Shaher Yafooz
R5,024 Discovery Miles 50 240 Ships in 10 - 15 working days

This book presents the latest cutting-edge research, theoretical methods, and novel applications in the field of computational intelligence techniques and methods for combating fake news. Fake news is everywhere. Despite the efforts of major social network players such as Facebook and Twitter to fight disinformation, miracle cures and conspiracy theories continue to rain down on the net. Artificial intelligence can be a bulwark against the diversity of fake news on the Internet and social networks. This book discusses new models, practical solutions, and technological advances related to detecting and analyzing fake news based on computational intelligence models and techniques, to help decision-makers, managers, professionals, and researchers design new paradigms considering the unique opportunities associated with computational intelligence techniques. Further, the book helps readers understand computational intelligence techniques combating fake news in a systematic and straightforward way.

Advancements in Distributed Computing and Internet Technologies - Trends and Issues (Hardcover, New): Al-Sakib Khan Pathan,... Advancements in Distributed Computing and Internet Technologies - Trends and Issues (Hardcover, New)
Al-Sakib Khan Pathan, Mukaddim Pathan, Hae Young Lee
R5,248 Discovery Miles 52 480 Ships in 10 - 15 working days

The benefits of distributed computing are evidenced by the increased functionality, retrieval capability, and reliability it provides for a number of networked applications. The growth of the Internet into a critical part of daily life has encouraged further study on how data can better be transferred, managed, and evaluated in an ever-changing online environment. Advancements in Distributed Computing and Internet Technologies: Trends and Issues compiles recent research trends and practical issues in the fields of distributed computing and Internet technologies. The book provides advancements on emerging technologies that aim to support the effective design and implementation of service-oriented networks, future Internet environments, and building management frameworks. Research on Internet-based systems design, wireless sensor networks and their application, and next generation distributed systems will inform graduate students, researchers, academics, and industry practitioners of new trends and vital research in this evolving discipline.

Data Analytics - Concepts, Techniques, and Applications (Paperback): Mohiuddin Ahmed, Al-Sakib Khan Pathan Data Analytics - Concepts, Techniques, and Applications (Paperback)
Mohiuddin Ahmed, Al-Sakib Khan Pathan
R1,496 Discovery Miles 14 960 Ships in 12 - 17 working days

Large data sets arriving at every increasing speeds require a new set of efficient data analysis techniques. Data analytics are becoming an essential component for every organization and technologies such as health care, financial trading, Internet of Things, Smart Cities or Cyber Physical Systems. However, these diverse application domains give rise to new research challenges. In this context, the book provides a broad picture on the concepts, techniques, applications, and open research directions in this area. In addition, it serves as a single source of reference for acquiring the knowledge on emerging Big Data Analytics technologies.

Explainable Artificial Intelligence for Cyber Security - Next Generation Artificial Intelligence (Hardcover, 1st ed. 2022):... Explainable Artificial Intelligence for Cyber Security - Next Generation Artificial Intelligence (Hardcover, 1st ed. 2022)
Mohiuddin Ahmed, Sheikh Rabiul Islam, Adnan Anwar, Nour Moustafa, Al-Sakib Khan Pathan
R3,150 R2,241 Discovery Miles 22 410 Save R909 (29%) Ships in 12 - 17 working days

This book presents that explainable artificial intelligence (XAI) is going to replace the traditional artificial, machine learning, deep learning algorithms which work as a black box as of today. To understand the algorithms better and interpret the complex networks of these algorithms, XAI plays a vital role. In last few decades, we have embraced AI in our daily life to solve a plethora of problems, one of the notable problems is cyber security. In coming years, the traditional AI algorithms are not able to address the zero-day cyber attacks, and hence, to capitalize on the AI algorithms, it is absolutely important to focus more on XAI. Hence, this book serves as an excellent reference for those who are working in cyber security and artificial intelligence.

Security Analytics for the Internet of Everything (Paperback): Mohuiddin Ahmed, Abu S.S.M Barkat Ullah, Al-Sakib Khan Pathan Security Analytics for the Internet of Everything (Paperback)
Mohuiddin Ahmed, Abu S.S.M Barkat Ullah, Al-Sakib Khan Pathan
R1,367 Discovery Miles 13 670 Ships in 12 - 17 working days

Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field. It includes chapters covering emerging security trends, cyber governance, artificial intelligence in cybersecurity, and cyber challenges. Contributions from leading international experts are included. The target audience for the book is graduate students, professionals, and researchers working in the fields of cybersecurity, computer networks, communications, and the Internet of Everything (IoE). The book also includes some chapters written in a tutorial style so that general readers can easily grasp some of the ideas.

A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Hardcover): Kutub Thakur,... A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Hardcover)
Kutub Thakur, Abu Kamruzzaman, Al-Sakib Khan Pathan
R3,756 Discovery Miles 37 560 Ships in 12 - 17 working days

This book, divided into three parts, describes the detailed concepts of Digital Communication, Security, and Privacy protocols. In Part One, the first chapter provides a deeper perspective on communications, while Chapters 2 and 3 focus on analog and digital communication networks. Part Two then delves into various Digital Communication protocols. Beginning first in Chapter 4 with the major Telephony protocols, Chapter 5 then focuses on important Data Communication protocols, leading onto the discussion of Wireless and Cellular Communication protocols in Chapter 6 and Fiber Optic Data Transmission protocols in Chapter 7. Part Three covers Digital Security and Privacy protocols including Network Security protocols (Chapter 8), Wireless Security protocols (Chapter 9), and Server Level Security systems (Chapter 10), while the final chapter covers various aspects of privacy related to communication protocols and associated issues. This book will offer great benefits to graduate and undergraduate students, researchers, and practitioners. It could be used as a textbook as well as reference material for these topics. All the authors are well-qualified in this domain. The authors have an approved textbook that is used in some US, Saudi, and Bangladeshi universities since Fall 2020 semester - although used in online lectures/classes due to COVID-19 pandemic.

Cybersecurity Fundamentals - A Real-World Perspective (Hardcover): Kutub Thakur, Al-Sakib Khan Pathan Cybersecurity Fundamentals - A Real-World Perspective (Hardcover)
Kutub Thakur, Al-Sakib Khan Pathan
R5,438 Discovery Miles 54 380 Ships in 12 - 17 working days

Cybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. This book covers fundamental issues using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cybersecurity, and different types of cyberattacks that hackers choose to unleash on cyber environments. It then goes on to cover the types of major computer malware and cybersecurity attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on networks are fully described. It then covers high-tech cybersecurity programs, devices, and mechanisms that are extensively adopted in modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. This book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step-by-step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with this book's step-by-step approach, this will allow undergraduate students of cybersecurity, network security, and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of this book.

Internet of Things and Secure Smart Environments - Successes and Pitfalls (Paperback): Uttam Ghosh, Danda B. Rawat, Raja Datta,... Internet of Things and Secure Smart Environments - Successes and Pitfalls (Paperback)
Uttam Ghosh, Danda B. Rawat, Raja Datta, Al-Sakib Khan Pathan
R1,488 Discovery Miles 14 880 Ships in 12 - 17 working days

The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research. Features: Presents cutting edge topics and research in IoT Includes contributions from leading worldwide researchers Focuses on IoT architectures for smart environments Explores security, privacy, and trust Covers data handling and management (accumulation, abstraction, storage, processing, encryption, fast retrieval, security, and privacy) in IoT for smart environments This book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.

Securing Mobile Devices and Technology (Hardcover): Kutub Thakur, Al-Sakib Khan Pathan Securing Mobile Devices and Technology (Hardcover)
Kutub Thakur, Al-Sakib Khan Pathan
R3,742 Discovery Miles 37 420 Ships in 12 - 17 working days

This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks, while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobiles, IoT (Internet of Things) devices for shopping and password management, and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.

Securing Mobile Devices and Technology (Paperback): Kutub Thakur, Al-Sakib Khan Pathan Securing Mobile Devices and Technology (Paperback)
Kutub Thakur, Al-Sakib Khan Pathan
R1,464 Discovery Miles 14 640 Ships in 12 - 17 working days

This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks, while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobiles, IoT (Internet of Things) devices for shopping and password management, and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.

Towards a Wireless Connected World: Achievements and New Technologies (Hardcover, 1st ed. 2022): Al-Sakib Khan Pathan Towards a Wireless Connected World: Achievements and New Technologies (Hardcover, 1st ed. 2022)
Al-Sakib Khan Pathan
R4,276 Discovery Miles 42 760 Ships in 10 - 15 working days

This book gathers key advances in various areas related to using wireless Internet and wireless connectivity to achieve a more connected world. The world is now highly dependent on Internet connectivity. Even though some parts of the globe remain isolated, the smoothly running world all around us relies on Internet services for countless businesses and activities. During the COVID-19 pandemic, we have seen that exclusively relying on wired Internet would leave out a large part of our tech-savvy world. Hence, wireless connectivity is essential to anywhere, anytime connectivity. Further, in the event of a new pandemic or other disaster of global scale, wireless Internet offers a reliable way to keep us all connected. The contributors to this book, hailing from academia, industrial and research laboratories, report on the latest solutions, trends and technologies with the potential to make wireless Internet more reliable and secure for the years to come.

Deep Learning for Internet of Things Infrastructure (Hardcover): Uttam Ghosh, Mamoun Alazab, Al-Sakib Khan Pathan, Ali Kashif... Deep Learning for Internet of Things Infrastructure (Hardcover)
Uttam Ghosh, Mamoun Alazab, Al-Sakib Khan Pathan, Ali Kashif Bashir
R3,078 Discovery Miles 30 780 Ships in 12 - 17 working days

This book promotes and facilitates exchanges of research knowledge and findings across different disciplines on the design and investigation of deep learning (DL)-based data analytics of IoT (Internet of Things) infrastructures. Deep Learning for Internet of Things Infrastructure addresses emerging trends and issues on IoT systems and services across various application domains. The book investigates the challenges posed by the implementation of deep learning on IoT networking models and services. It provides fundamental theory, model, and methodology in interpreting, aggregating, processing, and analyzing data for intelligent DL-enabled IoT. The book also explores new functions and technologies to provide adaptive services and intelligent applications for different end users. FEATURES Promotes and facilitates exchanges of research knowledge and findings across different disciplines on the design and investigation of DL-based data analytics of IoT infrastructures Addresses emerging trends and issues on IoT systems and services across various application domains Investigates the challenges posed by the implementation of deep learning on IoT networking models and services Provides fundamental theory, model, and methodology in interpreting, aggregating, processing, and analyzing data for intelligent DL-enabled IoT Explores new functions and technologies to provide adaptive services and intelligent applications for different end users Uttam Ghosh is an Assistant Professor in the Department of Electrical Engineering and Computer Science, Vanderbilt University, Nashville, Tennessee, USA. Mamoun Alazab is an Associate Professor in the College of Engineering, IT and Environment at Charles Darwin University, Australia. Ali Kashif Bashir is a Senior Lecturer/Associate Professor and Program Leader of BSc (H) Computer Forensics and Security at the Department of Computing and Mathematics, Manchester Metropolitan University, United Kingdom. Al-Sakib Khan Pathan is an Adjunct Professor of Computer Science and Engineering at the Independent University, Bangladesh.

Internet of Things and Secure Smart Environments - Successes and Pitfalls (Hardcover): Uttam Ghosh, Danda B. Rawat, Raja Datta,... Internet of Things and Secure Smart Environments - Successes and Pitfalls (Hardcover)
Uttam Ghosh, Danda B. Rawat, Raja Datta, Al-Sakib Khan Pathan
R3,323 Discovery Miles 33 230 Ships in 12 - 17 working days

The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research. Features: Presents cutting edge topics and research in IoT Includes contributions from leading worldwide researchers Focuses on IoT architectures for smart environments Explores security, privacy, and trust Covers data handling and management (accumulation, abstraction, storage, processing, encryption, fast retrieval, security, and privacy) in IoT for smart environments This book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.

Crowd Assisted Networking and Computing - Everything You Need to Know About Legal and Business Issues in the Game Industry... Crowd Assisted Networking and Computing - Everything You Need to Know About Legal and Business Issues in the Game Industry (Paperback)
Al-Sakib Khan Pathan
R1,365 Discovery Miles 13 650 Ships in 12 - 17 working days

Crowd computing, crowdsourcing, crowd-associated network (CrAN), crowd-assisted sensing are some examples of crowd-based concepts that harness the power of people on the web or connected via web-like infrastructure to do tasks that are often difficult for individual users or computers to do alone. This creates many challenging issues like assessing reliability and correctness of crowd generated information, delivery of data and information via crowd, middleware for supporting crowdsourcing and crowd computing tasks, crowd associated networking and its security, Quality of Information (QoI) issues, etc. This book compiles the latest advances in the relevant fields.

Emerging Communication Technologies Based on Wireless Sensor Networks - Current Research and Future Applications (Paperback):... Emerging Communication Technologies Based on Wireless Sensor Networks - Current Research and Future Applications (Paperback)
Mubashir Husain Rehmani, Al-Sakib Khan Pathan
R1,324 Discovery Miles 13 240 Ships in 12 - 17 working days

Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications fills a gap in the existing literature by combining a plethora of WSN-based emerging technologies into a single source so that researchers can form opinions regarding these technologies. It presents different types of emerging communication technologies based on WSNs and describes how wireless sensor networks can be integrated with other communication technologies. It covers many of the new techniques and demonstrates the application of WSNs. The book's 14 chapters are divided into four parts. The first part covers the basics of wireless sensor networks and their principal working methods. The authors then move on to discuss different types of WSNs, characteristics of different types of emerging technologies based on WSNs, renewable energy sources, battery replenishment strategies, and application-specific energy challenges of WSNs. The second part is dedicated to issues related to wireless body area networks (WBANs). It discusses wearable WSNs and their applications, standards, and research trends. The authors also discuss routing schemes devised for WBANs and thermal-aware routing protocols for WBANs. The third part focuses on different emerging communication technologies based on WSNs, including electromagnetic wireless nanosensor networks, WSNs in the IoT, management of WSNs through satellite networks, WSNs in smart homes, and cognitive radio technology in conjunction with WSNs. The last part of the book covers topics generally related to typical WSNs, including energy-efficient data collection in WSNs, key distribution mechanisms in WSNs, distributed data gathering algorithms for mobile WSNs, and finally, a novel mobility scheme for WSNs that supports IPv6.

Securing Cyber-Physical Systems (Paperback): Al-Sakib Khan Pathan Securing Cyber-Physical Systems (Paperback)
Al-Sakib Khan Pathan
R1,383 Discovery Miles 13 830 Ships in 12 - 17 working days

Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical-their availability and correct operation is essential. This book focuses on the security of such mission-critical systems. Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including: Securing modern electrical power systems Using moving target defense (MTD) techniques to secure CPS Securing wireless sensor networks (WSNs) used for critical infrastructures Mechanisms to improve cybersecurity and privacy in transportation CPS Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles Security issues, vulnerabilities, and challenges in the Internet of Things Machine-to-machine (M2M) communication security Security of industrial control systems Designing "trojan-resilient" integrated circuits While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.

Wireless Sensor Networks - Current Status and Future Trends (Paperback): Shafiullah Khan, Al-Sakib Khan Pathan, Nabil Ali... Wireless Sensor Networks - Current Status and Future Trends (Paperback)
Shafiullah Khan, Al-Sakib Khan Pathan, Nabil Ali Alrajeh
R1,510 Discovery Miles 15 100 Ships in 12 - 17 working days

Wireless sensor networks (WSNs) utilize fast, cheap, and effective applications to imitate the human intelligence capability of sensing on a wider distributed scale. But acquiring data from the deployment area of a WSN is not always easy and multiple issues arise, including the limited resources of sensor devices run with one-time batteries. Additional WSN concerns include the external environment, routing, data aggregation, and ensuring quality of service (QoS) and security. Solutions have been developed for various types of application scenarios, but many problems still remain as open research challenges. Wireless Sensor Networks: Current Status and Future Trends covers the various issues associated with WSNs, including their structure, activities, and applications. Bringing together the contributions of researchers and experts in the field, this book explores: Applications of WSNs, data-centric storage, environmental forest monitoring, and the fundamentals of wireless body area networks Mobile medium access control (MAC) protocols, cooperative diversity sensor systems, and WSNs operating in IEEE 802.11 networks Location and position estimation in WSNs, techniques used in localization algorithms, and localization schemes Energy-centric simulation and design space exploration The fundamentals of MAC protocols and specific requirements and problems Protocols and data gathering Privacy and security issues in WSNs, solutions based on watermarking, and proposed work on intrusion detection systems (IDS) in WSNs Reviewing current trends in research and development as well as future expectations in the relevant areas, this book is a valuable reference for students, graduates, academics, researchers of computer science, and engineers, whether working in professional organizations or research institutions.

Building Next-Generation Converged Networks - Theory and Practice (Paperback): Al-Sakib Khan Pathan, Muhammad Mostafa Monowar,... Building Next-Generation Converged Networks - Theory and Practice (Paperback)
Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Zubair Md. Fadlullah
R1,518 Discovery Miles 15 180 Ships in 12 - 17 working days

Supplying a comprehensive introduction to next-generation networks, Building Next-Generation Converged Networks: Theory and Practice strikes a balance between how and why things work and how to make them work. It compiles recent advancements along with basic issues from the wide range of fields related to next generation networks. Containing the contributions of 56 industry experts and researchers from 16 different countries, the book presents relevant theoretical frameworks and the latest research. It investigates new technologies such as IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) architectures, standards, mobility, and security. Presenting the material in a manner that entry-level readers can easily grasp the fundamentals, the book is organized into five parts: Multimedia Streaming-deals with multimedia streaming in networks of the future-from basics to more in-depth information for the experts Safety and Security in Networks-addresses the issues related to security, including fundamental Internet and cyber-security concepts that will be relevant in any future network Network Management and Traffic Engineering-includes coverage of mathematical modeling-based works Information Infrastructure and Cloud Computing-integrates information about past achievements, present conditions, and future expectations in information infrastructure-related areas Wireless Networking-touches on the various aspects of wireless networks and technologies The text includes coverage of Internet architectures and protocols, embedded systems and sensor networks, web services, Cloud technologies, and next-generation wireless networking. Reporting on the latest advancements in the field, it provides you with the understanding required to contribute towards the materialization of future networks. This book is suitable for graduate students, researchers, academics, industry practitioners working in the area of wired or wireless networking, and basically anyone who wants to improve his or her understanding of the topics related to next-generation networks.

Securing Cyber-Physical Systems (Hardcover): Al-Sakib Khan Pathan Securing Cyber-Physical Systems (Hardcover)
Al-Sakib Khan Pathan
R3,777 Discovery Miles 37 770 Ships in 12 - 17 working days

Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical-their availability and correct operation is essential. This book focuses on the security of such mission-critical systems. Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including: Securing modern electrical power systems Using moving target defense (MTD) techniques to secure CPS Securing wireless sensor networks (WSNs) used for critical infrastructures Mechanisms to improve cybersecurity and privacy in transportation CPS Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles Security issues, vulnerabilities, and challenges in the Internet of Things Machine-to-machine (M2M) communication security Security of industrial control systems Designing "trojan-resilient" integrated circuits While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Dolle's Candyland, Inc.
Anna Dolle Bushnell Paperback R587 R484 Discovery Miles 4 840
Forgotten Landmarks of Detroit
Dan Austin Paperback R680 R587 Discovery Miles 5 870
Haunted Franklin Castle
William G. Krejci, John W. Myers Paperback R557 R471 Discovery Miles 4 710
East Bay Hills - A Brief History
Amelia Sue Marshall Paperback R656 R561 Discovery Miles 5 610
On This Day in Chicago History
John R. Schmidt Paperback R408 R352 Discovery Miles 3 520
Humans Of New York
Brandon Stanton Hardcover  (3)
R850 R631 Discovery Miles 6 310
A Promised Land
Barack Obama Hardcover  (6)
R699 R546 Discovery Miles 5 460
Historic Tales of Michigan Up North
D. Laurence Rogers Paperback R564 R466 Discovery Miles 4 660
Iowa Supper Clubs
Megan Bannister Paperback R530 R441 Discovery Miles 4 410
Wicked Columbus, Indiana
Paul J Hoffman Paperback R544 R456 Discovery Miles 4 560

 

Partners