0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 25 of 58 matches in All Departments

Biotextiles as Medical Implants (Hardcover, New): M.W. King, B.S. Gupta, Robert Guidoin Biotextiles as Medical Implants (Hardcover, New)
M.W. King, B.S. Gupta, Robert Guidoin
R6,194 Discovery Miles 61 940 Ships in 12 - 19 working days

Textiles play a vital role in the manufacture of various medical devices, including the replacement of diseased, injured or non-functioning organs within the body. Biotextiles as medical implants provides an invaluable single source of information on the main types of textile materials and products used for medical implants. The first part of the book focuses on polymers, fibers and textile technologies, and these chapters discuss the manufacture, sterilization, properties and types of biotextiles used for medical applications, including nanofibers, resorbable polymers and shaped biotextiles. The chapters in part two provide a comprehensive discussion of a range of different clinical applications of biotextiles, including surgical sutures, arterial prostheses, stent grafts, percutaneous heart valves and drug delivery systems.
This book provides a concise review of the technologies, properties and types of biotextiles used as medical devices. In addition, it addresses the biological dimension of how to design devices for different clinical applications, providing an invaluable reference for biomedical engineers of medical textiles, quality control and risk assessment specialists, as well as managers of regulatory affairs. The subject matter will also be of interest to professionals within the healthcare system including surgeons, nurses, therapists, sourcing and purchasing agents, researchers and students in different disciplines.
Provides an invaluable single source of information on the main types of textile materials and products used for medical implantsAddresses the technologies used and discusses the manufacture, properties and types of biotextilesExamines applications of biotextiles as medical implants, including drug delivery systems and stent grafts and percutaneous heart valves

Handbook of Research on AI and ML for Intelligent Machines and Systems: Brij B. Gupta, Francesco Colace Handbook of Research on AI and ML for Intelligent Machines and Systems
Brij B. Gupta, Francesco Colace
R10,136 Discovery Miles 101 360 Ships in 10 - 15 working days
Distributed Intelligent Circuits And Systems: Balwinder Baj, Brij B. Gupta, Shailendra Singh, Monirujjaman Khan Distributed Intelligent Circuits And Systems
Balwinder Baj, Brij B. Gupta, Shailendra Singh, Monirujjaman Khan
R4,042 Discovery Miles 40 420 Ships in 10 - 15 working days

The main objective of this book is to provide insights into recent advances in distributed intelligent circuits, systems and their applications. Distributed intelligence is the key enabler for innovations in machine-to-machine communications. The innovations are directed towards keeping existing algorithms as the base and developing new intelligent systems by employing smart technologies. Artificial intelligence (AI) and, more specifically, deep learning (DL) are receiving significant attention in assisting doctors in the detection of disease patterns without much human intervention. In agriculture, robots automate slow, repetitive and dull tasks, allowing farmers to focus more on improving overall production yields.The evolving trends point to the interface of artificial intelligence with machines being a factor in enhancing the decision-making capabilities of smart machines. This book provides relevant theoretical frameworks that include basic models, algorithms, circuit designs and the latest developments in experimental aspects in the field of distributed intelligence systems for industrial applications. The challenges encountered in the development of models for distributed intelligence systems for environmental monitoring are mitigated with artificial intelligence, machine learning and deep learning. This book identifies challenges and helps in applying solutions in the development of advanced intelligent systems for environmental monitoring.

Sdn And Nfv: A New Dimension To Virtualization (Hardcover): Brij B. Gupta, Amrita Dahiya, Elhadj Benkhelifa Sdn And Nfv: A New Dimension To Virtualization (Hardcover)
Brij B. Gupta, Amrita Dahiya, Elhadj Benkhelifa
R2,562 Discovery Miles 25 620 Ships in 10 - 15 working days

Software-defined network (SDN) and network function virtualization (NFV) are two technology trends that have revolutionized network management, particularly in highly distributed networks that are used in public, private, or hybrid cloud services. SDN and NFV technologies, when combined, simplify the deployment of network resources, lower capital and operating expenses, and offer greater network flexibility. The increasing usage of NFV is one of the primary factors that make SDN adoption attractive. The integration of these two technologies; SDN and NFV, offer a complementary service, with NFV delivering many of the real services controlled in an SDN. While SDN is focused on the control plane, NFV optimizes the actual network services that manage the data flows. Devices such as routers, firewalls, and VPN terminators are replaced with virtual devices that run on commodity hardware in NFV physical networking. This resembles the 'as-a-service' typical model of cloud services in many aspects. These virtual devices can be accessed on-demand by communication, network, or data center providers.This book illustrates the fundamentals and evolution of SDN and NFV and highlights how these two technologies can be integrated to solve traditional networking problems. In addition, it will focus on the utilization of SDN and NFV to enhance network security, which will open ways to integrate them with current technologies such as IoT, edge computing and blockchain, SDN-based network programmability, and current network orchestration technologies. The basics of SDN and NFV and associated issues, challenges, technological advancements along with advantages and risks of shifting networking paradigm towards SDN are also discussed. Detailed exercises within the book and corresponding solutions are available online as accompanying supplementary material.

Artificial Intelligence for Biometrics and Cybersecurity - Technology and applications: Ahmed A. Abd El-Latif, Mohamed Hammad,... Artificial Intelligence for Biometrics and Cybersecurity - Technology and applications
Ahmed A. Abd El-Latif, Mohamed Hammad, Yassine Maleh, Brij B. Gupta, Wojciech Mazurczyk
R3,260 R2,944 Discovery Miles 29 440 Save R316 (10%) Ships in 10 - 15 working days

The integration of new technologies is resulting in an increased demand for security and authentication in all types of data communications. Cybersecurity is the protection of networks and systems from theft. Biometric technologies use unique traits of particular parts of the body such facial recognition, iris, fingerprints and voice to identify individuals' physical and behavioural characteristics. Although there are many challenges associated with extracting, storing and processing such data, biometric and cybersecurity technologies along with artificial intelligence (AI) are offering new approaches to verification procedures and mitigating security risks. This book presents cutting-edge research on the use of AI for biometrics and cybersecurity including machine and deep learning architectures, emerging applications and ethical and legal concerns. Topics include federated learning for enhanced cybersecurity; artificial intelligence-based biometric authentication using ECG signal; deep learning for email phishing detection methods; biometrics for secured IoT systems; intelligent authentication using graphical one-time-passwords; and AI in social cybersecurity. Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications is aimed at artificial intelligence, biometrics and cybersecurity experts, industry and academic researchers, network security engineers, cybersecurity professionals, and advanced students and newcomers to the field interested in the newest advancements in artificial intelligence for cybersecurity and biometrics.

Advances in Malware and Data-Driven Network Security (Hardcover): Brij B. Gupta Advances in Malware and Data-Driven Network Security (Hardcover)
Brij B. Gupta
R5,784 Discovery Miles 57 840 Ships in 10 - 15 working days

Every day approximately three-hundred thousand to four-hundred thousand new malware are registered, many of them being adware and variants of previously known malware. Anti-virus companies and researchers cannot deal with such a deluge of malware - to analyze and build patches. The only way to scale the efforts is to build algorithms to enable machines to analyze malware and classify and cluster them to such a level of granularity that it will enable humans (or machines) to gain critical insights about them and build solutions that are specific enough to detect and thwart existing malware and generic-enough to thwart future variants. Advances in Malware and Data-Driven Network Security comprehensively covers data-driven malware security with an emphasis on using statistical, machine learning, and AI as well as the current trends in ML/statistical approaches to detecting, clustering, and classification of cyber-threats. Providing information on advances in malware and data-driven network security as well as future research directions, it is ideal for graduate students, academicians, faculty members, scientists, software developers, security analysts, computer engineers, programmers, IT specialists, and researchers who are seeking to learn and carry out research in the area of malware and data-driven network security.

Modern Principles, Practices, and Algorithms for Cloud Security (Hardcover): Brij B. Gupta Modern Principles, Practices, and Algorithms for Cloud Security (Hardcover)
Brij B. Gupta
R5,773 Discovery Miles 57 730 Ships in 10 - 15 working days

In today's modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a tool that has proven to be a versatile piece of software within IT. Unfortunately, the high usage of Cloud has raised many concerns related to privacy, security, and data protection that have prevented cloud computing solutions from becoming the prevalent alternative for mission critical systems. Up-to-date research and current techniques are needed to help solve these vulnerabilities in cloud computing. Modern Principles, Practices, and Algorithms for Cloud Security is a pivotal reference source that provides vital research on the application of privacy and security in cloud computing. While highlighting topics such as chaos theory, soft computing, and cloud forensics, this publication explores present techniques and methodologies, as well as current trends in cloud protection. This book is ideally designed for IT specialists, scientists, software developers, security analysts, computer engineers, academicians, researchers, and students seeking current research on the defense of cloud services.

Handbook of Research on Intrusion Detection Systems (Hardcover): Brij B. Gupta, Srivathsan Srinivasagopalan Handbook of Research on Intrusion Detection Systems (Hardcover)
Brij B. Gupta, Srivathsan Srinivasagopalan
R7,930 Discovery Miles 79 300 Ships in 10 - 15 working days

Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.

Security, Privacy, and Forensics Issues in Big Data (Hardcover): Ramesh C. Joshi, Brij B. Gupta Security, Privacy, and Forensics Issues in Big Data (Hardcover)
Ramesh C. Joshi, Brij B. Gupta
R7,042 Discovery Miles 70 420 Ships in 10 - 15 working days

With the proliferation of devices connected to the internet and connected to each other, the volume of data collected, stored, and processed is increasing every day, which brings new challenges in terms of information security. As big data expands with the help of public clouds, traditional security solutions tailored to private computing infrastructures and confined to a well-defined security perimeter, such as firewalls and demilitarized zones (DMZs), are no longer effective. New security functions are required to work over the heterogenous composition of diverse hardware, operating systems, and network domains. Security, Privacy, and Forensics Issues in Big Data is an essential research book that examines recent advancements in big data and the impact that these advancements have on information security and privacy measures needed for these networks. Highlighting a range of topics including cryptography, data analytics, and threat detection, this is an excellent reference source for students, software developers and engineers, security analysts, IT consultants, academicians, researchers, and professionals.

Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020): Brij B. Gupta, Gregorio... Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020)
Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
R7,755 Discovery Miles 77 550 Ships in 12 - 19 working days

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.

Data Mining Approaches for Big Data and Sentiment Analysis in Social Media (Hardcover): Brij B. Gupta, Dragan Perakovic, Ahmed... Data Mining Approaches for Big Data and Sentiment Analysis in Social Media (Hardcover)
Brij B. Gupta, Dragan Perakovic, Ahmed A. Abd El-Latif, Deepak Gupta
R6,692 Discovery Miles 66 920 Ships in 10 - 15 working days

Social media sites are constantly evolving with huge amounts of scattered data or big data, which makes it difficult for researchers to trace the information flow. It is a daunting task to extract a useful piece of information from the vast unstructured big data; the disorganized structure of social media contains data in various forms such as text and videos as well as huge real-time data on which traditional analytical methods like statistical approaches fail miserably. Due to this, there is a need for efficient data mining techniques that can overcome the shortcomings of the traditional approaches. Data Mining Approaches for Big Data and Sentiment Analysis in Social Media encourages researchers to explore the key concepts of data mining, such as how they can be utilized on online social media platforms, and provides advances on data mining for big data and sentiment analysis in online social media, as well as future research directions. Covering a range of concepts from machine learning methods to data mining for big data analytics, this book is ideal for graduate students, academicians, faculty members, scientists, researchers, data analysts, social media analysts, managers, and software developers who are seeking to learn and carry out research in the area of data mining for big data and sentiment.

Handbook of Research on Digitalization Solutions for Social and Economic Needs (Hardcover): Richard Pettinger, Brij B. Gupta,... Handbook of Research on Digitalization Solutions for Social and Economic Needs (Hardcover)
Richard Pettinger, Brij B. Gupta, Alexandru Roja, Diana Cozmiuc
R10,136 Discovery Miles 101 360 Ships in 10 - 15 working days

Digital solutions are sufficiently versatile and agile to shape business processes and enterprise architecture, answer the COVID-19 crisis, solve climate change, temper political conflict, generate new employment operating models, and solve health issues. These solutions benefit businesses as an integral part of the economy and society and therefore must be studied further to ensure they are utilized appropriately. The Handbook of Research on Digitalization Solutions for Social and Economic Needs introduces the agile operating model that has triggered digital transformation and the plethora of ways it has become of practical use recently. The book also argues the business rationale of digitalization. Covering key topics such as innovation, sustainability, and business transformation, this major reference work is ideal for business owners, managers, computer scientists, industry professionals, researchers, scholars, academicians, librarians, policymakers, practitioners, educators, and students.

Radiation Effects on Polymers for Biological Use (Hardcover, 2003 ed.): N. Anjum Radiation Effects on Polymers for Biological Use (Hardcover, 2003 ed.)
N. Anjum; Edited by Henning Kausch; Contributions by Y. Chevolot, B. Gupta, D. Leonard, …
R5,685 Discovery Miles 56 850 Ships in 10 - 15 working days

Biomaterials repair, reinforce or replace damaged functional parts of the (human) body. All mechanical and biological interactions between an implant and the body occur across the interface, which has to correspond as nearly as possible to its particular function. Much of the progress in adapting polymer materials for use in a biological environment has been obtained through irradiation techniques. For this reason the most recent developments in four key areas are reviewed in this special volume: (1) the analysis of the topology and the elemental composition of a functional surface, (2) the chemical modification of the surface which results in highly pure, sterile and versatile surfaces, (3) the sterilisation of implantable devices via ionising radiation and its possible effects on the structural mechanical properties of polymers, and (4) the radiation effects on living cells and tissues which are of particular importance for radiation protection and radiotherapy.

AI for Big Data Based Engineering Applications from the Security Perspectives (Hardcover): Balwinder Raj, Brij B. Gupta, Shingo... AI for Big Data Based Engineering Applications from the Security Perspectives (Hardcover)
Balwinder Raj, Brij B. Gupta, Shingo Yamaguchi, Sandeep Singh Gill
R3,722 Discovery Miles 37 220 Ships in 12 - 19 working days

i. This book will contain AI, ML, DL, big data and security never before considered ii. Innovative artificial intelligence techniques and algorithms iii. Only emerging from recent research and development, e.g. AI for big data from security perspective, which are not covered in any existing texts iv. Artificial Intelligence for big data and security Applications with advanced features v. Key new finding of machine learning and deep learning for Security Applications

Cloud Security - Concepts, Applications and Perspectives: Brij B. Gupta Cloud Security - Concepts, Applications and Perspectives
Brij B. Gupta
R2,127 Discovery Miles 21 270 Ships in 12 - 19 working days

Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of cloud also raises concerns such as security, privacy, latency, and governance, that keep it from turning into the predominant option for critical frameworks. As such, there is an urgent need to identify these concerns and to address them. Cloud Security: Concepts, Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies, and provides a wide range of examples and illustrations to effectively show the concepts, applications, and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition, it covers future research directions in the domain. This book is suitable for professionals in the field, researchers, students who are want to carry out research in the field of computer and cloud security, faculty members across universities, and software developers engaged in software development in the field.

Big Data Analytics in Fog-Enabled IoT Networks - Towards a Privacy and Security Perspective (Hardcover): Govind P. Gupta,... Big Data Analytics in Fog-Enabled IoT Networks - Towards a Privacy and Security Perspective (Hardcover)
Govind P. Gupta, Rakesh Tripathi, Brij B. Gupta, Kwok Tai Chui
R3,429 Discovery Miles 34 290 Ships in 12 - 19 working days

Focuses on the latest development in Big IoT Data Analytics Presents different issues of Security and Privacy Analytics for Fog-enabled IoT system Offers the latest Big Data Technologies for security analytics in Fog-enabled IoT Network Discusses the emerging role of Big Data Analytics and Technologies in detection of Cyberattacks in IoT networks Presents the prospects on Big IoT Data Analytics in Fog-enabled IoT system

Secure Data Management for Online Learning Applications (Hardcover): L. Jegatha Deborah, P Vijayakumar, Brij B. Gupta, Danilo... Secure Data Management for Online Learning Applications (Hardcover)
L. Jegatha Deborah, P Vijayakumar, Brij B. Gupta, Danilo Pelusi
R3,421 Discovery Miles 34 210 Ships in 12 - 19 working days

Simplicity and Uniqueness Structure of the book content Simple English and Ease of Undersatanding Exhaustive research in the content of the book

Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities (Hardcover, 1st ed. 2022): Nadia Nedjah, Ahmed A.... Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities (Hardcover, 1st ed. 2022)
Nadia Nedjah, Ahmed A. Abd El-Latif, Brij B. Gupta, Luiza M. Mourelle
R4,585 Discovery Miles 45 850 Ships in 12 - 19 working days

This book bridges principles and real-world applications, while also providing thorough theory and technology for the development of artificial intelligence and robots. A lack of cross-pollination between AI and robotics research has led to a lack of progress in both fields. Now that both technologies have made significant strides, there is increased interest in combining the two domains in order to create a new integrated AI and robotics trend. In order to achieve wiser urbanization and more sustainable development, AI in smart cities will play a significant part in equipping the cities with advanced features that will allow residents to safely move about, stroll, shop, and enjoy a more comfortable way of life. If you are a student, researcher, engineer, or professional working in this field, or if you are just curious in the newest advancements in robotics and artificial intelligence for cybersecurity, this book is for you!

Safety, Security, and Reliability of Robotic Systems - Algorithms, Applications, and Technologies (Paperback): Brij B. Gupta,... Safety, Security, and Reliability of Robotic Systems - Algorithms, Applications, and Technologies (Paperback)
Brij B. Gupta, Nadia Nedjah
R1,321 Discovery Miles 13 210 Ships in 12 - 19 working days

With the increasing demand of robots for industrial and domestic use, it becomes indispensable to ensure their safety, security, and reliability. Safety, Security and Reliability of Robotic Systems: Algorithms, Applications, and Technologies provides a broad and comprehensive coverage of the evolution of robotic systems, as well as industrial statistics and future forecasts. First, it analyzes the safety-related parameters of these systems. Then, it covers security attacks and related countermeasures, and how to establish reliability in these systems. The later sections of the book then discuss various applications of these systems in modern industrial and domestic settings. By the end of this book, you will be familiarized with the theoretical frameworks, algorithms, applications, technologies, and empirical research findings on the safety, security, and reliability of robotic systems, while the book's modular structure and comprehensive material will keep you interested and involved throughout. This book is an essential resource for students, professionals, and entrepreneurs who wish to understand the safe, secure, and reliable use of robotics in real-world applications. It is edited by two specialists in the field, with chapter contributions from an array of experts on robotics systems and applications.

Smart Card Security - Applications, Attacks, and Countermeasures (Paperback): Brij B. Gupta, Megha Quamara Smart Card Security - Applications, Attacks, and Countermeasures (Paperback)
Brij B. Gupta, Megha Quamara
R664 Discovery Miles 6 640 Ships in 12 - 19 working days

Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart card-based systems. The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart card-based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart card-based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks. The book continues with a focus on the security attacks against remote user authentication mechanisms in smart card-based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart card-based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart card-based systems and applications. The final chapter explains the role of blockchain technology for securing smart card-based transactions and quantum cryptography for designing secure smart card-based algorithms. Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications.

Advanced Circuits and Systems for Healthcare and Security Applications (Hardcover): Balwinder Raj, Brij B. Gupta, Jeetendra... Advanced Circuits and Systems for Healthcare and Security Applications (Hardcover)
Balwinder Raj, Brij B. Gupta, Jeetendra Singh
R3,121 Discovery Miles 31 210 Ships in 12 - 19 working days

Unique selling point: * Contains electronics device, Circuits, systems as well as applications of Integrated Circuits in healthcare and security never before considered Core audience: * Researchers and post graduates Place in the market: * Includes key new finding of electronic devices for Security Applications, and Integrated Circutis for healthcare and security Applications with advanced

Handbook of Research on Multimedia Cyber Security (Hardcover): Brij B. Gupta, Deepak Gupta Handbook of Research on Multimedia Cyber Security (Hardcover)
Brij B. Gupta, Deepak Gupta
R7,975 Discovery Miles 79 750 Ships in 10 - 15 working days

Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the modern era. In spite of the opportunities that multimedia creates for businesses and companies, information sharing remains vulnerable to cyber attacks and hacking due to the open channels in which this data is being transmitted. Protecting the authenticity and confidentiality of information is a top priority for all professional fields that currently use multimedia practices for distributing digital data. The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges. Featuring coverage on a broad range of topics such as cryptographic protocols, feature extraction, and chaotic systems, this book is ideally designed for scientists, researchers, developers, security analysts, network administrators, scholars, IT professionals, educators, and students seeking current research on developing strategies in multimedia security.

A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Paperback):... A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Paperback)
Aakanksha Tewari, Brij B. Gupta
R757 Discovery Miles 7 570 Ships in 12 - 19 working days

A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.

Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) (Paperback):... Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) (Paperback)
Kuan-Ching Li, Brij B. Gupta, Dharma P. Agrawal
R1,590 Discovery Miles 15 900 Ships in 12 - 19 working days

Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of appropriate mitigation techniques are essential research areas for these systems. Adoption of best practices and maintaining a balance between ease of use and security are, again, crucial for the effective performance of these systems. Recent Advances in Security, Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses and presents techniques and methodologies, as well as a wide range of examples and illustrations, to effectively show the principles, algorithms, challenges, and applications of security, privacy, and trust for IoT and CPS. Book features: Introduces new directions for research, development, and engineering security, privacy, and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles, algorithms, challenges, and applications Covers most of the important security aspects and current trends not present in other reference books This book will also serve as an excellent reference in security, privacy, and trust of IoT and CPS for professionals in this fast-evolving and critical field. The chapters present high-quality contributions from researchers, academics, and practitioners from various national and international organizations and universities.

Security and Privacy Preserving for IoT and 5G Networks - Techniques, Challenges, and New Directions (Hardcover, 1st ed. 2022):... Security and Privacy Preserving for IoT and 5G Networks - Techniques, Challenges, and New Directions (Hardcover, 1st ed. 2022)
Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Wojciech Mazurczyk, Brij B. Gupta
R4,588 Discovery Miles 45 880 Ships in 12 - 19 working days

This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Planting Design Essentials
Jill Anderson, Pamela Johnson Paperback R467 Discovery Miles 4 670
Advertising Promotion and Other Aspects…
J Craig Andrews, Terence Shimp Paperback R1,178 R1,110 Discovery Miles 11 100
The Fall Of The University Of Cape Town…
David Benatar Paperback R320 R295 Discovery Miles 2 950
Stellenbosch: Murder Town - Two Decades…
Julian Jansen Paperback R360 R337 Discovery Miles 3 370
Marketing Research
Paperback R432 Discovery Miles 4 320
How to be a Reflexive Researcher
Paul Hibbert Paperback R868 Discovery Miles 8 680
The Gardens of Luciano Giubbilei
Andrew Wilson Paperback R836 R749 Discovery Miles 7 490
Marketing Communication - An Integrated…
Ludi Koekemoer Paperback R551 Discovery Miles 5 510
A Hundred Bells - Understanding Patterns…
Jessica Viola Hardcover R1,489 Discovery Miles 14 890
Marketing Communication - An Integrated…
Paperback R600 R560 Discovery Miles 5 600

 

Partners