0
Your cart

Your cart is empty

Browse All departments
  • All departments
Price
  • R250 - R500 (1)
  • R1,000 - R2,500 (19)
  • R2,500 - R5,000 (8)
  • -
Status
Brand

Showing 1 - 25 of 28 matches in All departments

Analyzing and Securing Social Networks (Hardcover): Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu,... Analyzing and Securing Social Networks (Hardcover)
Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, …
R2,938 Discovery Miles 29 380 Ships in 10 - 15 working days

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.

Building Trustworthy Semantic Webs (Hardcover): Bhavani Thuraisingham Building Trustworthy Semantic Webs (Hardcover)
Bhavani Thuraisingham
R2,904 Discovery Miles 29 040 Ships in 10 - 15 working days

Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. They will allow Web agents to share and reuse data across applications, enterprises, and community boundaries. However, this improved accessibility poses a greater threat of unauthorized access, which could lead to the malicious corruption of information. Building Trustworthy Semantic Webs addresses the urgent demand for the development of effective mechanisms that will protect and secure semantic Webs.
Design Flexible Security Policies to Improve Efficiency
Securing semantic Webs involves the formation of policies that will dictate what type of access Web agents are allowed. This text provides the tools needed to engineer these policies and secure individual components of the semantic Web, such as XML, RDF, and OWL. It also examines how to control unauthorized inferences on the semantic Web. Since this technology is not fully realized, the book emphasizes the importance of integrating security features into semantic Webs at the onset of their development.
Through its expansive coverage, Building Trustworthy Semantic Webs describes how the creation of semantic security standards will ensure the dependability of semantic Webs. It provides Web developers with the tools they need to protect sensitive information and guarantee the success of semantic Web applications.

Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October... Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Bhavani Thuraisingham, Xiaofeng Wang, Vinod Yegneswaran
R2,380 Discovery Miles 23 800 Ships in 7 - 11 working days

This volume constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Security and Privacy in Communication Networks, SecureComm 2015, held in Dallas, TX, USA, in October 2015. The 29 regular and 10 poster papers presented were carefully reviewed and selected from 107 submissions. It also presents 9 papers accepted of the workshop on Applications and Techniques in Cyber Security, ATCS 2015. The papers are grouped in the following topics: mobile, system, and software security; cloud security; privacy and side channels; Web and network security; crypto, protocol, and model.

Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working... Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Steve Furnell; Edited by (ghost editors) Paul Dowland; Edited by Bhavani Thuraisingham, X.Sean Wang
R3,137 Discovery Miles 31 370 Ships in 7 - 11 working days

This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems. Indeed, as management at any level may be increasingly held answerable for the reliable and secure operation of the information systems and services in their respective organizations in the same manner as they are for financial aspects of the enterprise, there is an increasing need for ensuring proper standards of integrity and control in information systems in order to ensure that data, software and, ultimately, the business processes are complete, adequate and valid for intended functionality and expectations of the owner (i. e. the user organization). As organizers, we would like to thank the members of the international program committee for their review work during the paper selection process. We would also like to thank the authors of the invited papers, who added valuable contribution to this first joint working conference. Paul Dowland X. Sean Wang December 2005 Contents Preface vii Session 1 - Security Standards Information Security Standards: Adoption Drivers (Invited Paper) 1 JEAN-NOEL EZINGEARD AND DAVID BIRCHALL Data Quality Dimensions for Information Systems Security: A Theorectical Exposition (Invited Paper) 21 GURVIRENDER TEJAY, GURPREET DHILLON, AND AMITA GOYAL CHIN From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) 41 C. FARKAS, V. GowADiA, A. JAIN, AND D.

Security for Object-Oriented Systems - Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented... Security for Object-Oriented Systems - Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington DC, USA, 26 September 1993 (Paperback, Edition. ed.)
Bhavani Thuraisingham, Ravi Sandhu, T.C. Ting
R2,321 Discovery Miles 23 210 Ships in 7 - 11 working days

This volume contains papers from the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, held in Washington DC, USA, on 26 September 1993. The workshop addressed the issue of how to introduce an acceptable level of security into object-oriented systems, as the use of such systems becomes increasingly widespread. The topic is approached from two different, but complementary, viewpoints: the incorporation of security into object-oriented systems, and the use of object-oriented design and modelling techniques for designing secure applications. The papers cover a variety of issues, relating to both mandatory and discretionary security, including security facilities of PCTE, information flow control, the design of multilevel secure data models, and secure database interoperation via role translation. The resulting volume provides a comprehensive overview of current work in this important area of research.

Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working... Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference (Hardcover, 2006 ed.)
Steve Furnell; Edited by (ghost editors) Paul Dowland; Edited by Bhavani Thuraisingham, X.Sean Wang
R3,372 Discovery Miles 33 720 Ships in 7 - 11 working days

This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems. Indeed, as management at any level may be increasingly held answerable for the reliable and secure operation of the information systems and services in their respective organizations in the same manner as they are for financial aspects of the enterprise, there is an increasing need for ensuring proper standards of integrity and control in information systems in order to ensure that data, software and, ultimately, the business processes are complete, adequate and valid for intended functionality and expectations of the owner (i. e. the user organization). As organizers, we would like to thank the members of the international program committee for their review work during the paper selection process. We would also like to thank the authors of the invited papers, who added valuable contribution to this first joint working conference. Paul Dowland X. Sean Wang December 2005 Contents Preface vii Session 1 - Security Standards Information Security Standards: Adoption Drivers (Invited Paper) 1 JEAN-NOEL EZINGEARD AND DAVID BIRCHALL Data Quality Dimensions for Information Systems Security: A Theorectical Exposition (Invited Paper) 21 GURVIRENDER TEJAY, GURPREET DHILLON, AND AMITA GOYAL CHIN From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) 41 C. FARKAS, V. GowADiA, A. JAIN, AND D.

XML Databases and the Semantic Web (Hardcover): Bhavani Thuraisingham XML Databases and the Semantic Web (Hardcover)
Bhavani Thuraisingham
R2,779 Discovery Miles 27 790 Ships in 10 - 15 working days

Efficient access to data, sharing data, extracting information from data, and making use of the information have become urgent needs for today's corporations. With so much data on the Web, managing it with conventional tools is becoming almost impossible. New tools and techniques are necessary to provide interoperability as well as warehousing between multiple data sources and systems, and to extract information from the databases. XML Databases and the Semantic Web focuses on critical and new Web technologies needed for organizations to carry out transactions on the Web, to understand how to use the Web effectively, and to exchange complex documents on the Web.

This reference for database administrators, database designers, and Web designers working in tandem with database technologists covers three emerging technologies of significant impact for electronic business: Extensible Markup Language (XML), semi-structured databases, and the semantic Web. The first two parts of the book explore these emerging technologies. The third part highlights the implications of these technologies for e-business. Overall, the book presents a comprehensive view of critical technologies for the Web in general and XML in particular.

The semantic Web, XML, and semi-structured databases are still relatively new technologies that integrate many other technologies. As these technologies and integration of these advances mature, we can expect to see progress in the semantic web. The information contained in XML Databases and the Semantic Web is essential to the future success of effective e-business on the Web.

Web Data Management and Electronic Commerce (Hardcover): Bhavani Thuraisingham Web Data Management and Electronic Commerce (Hardcover)
Bhavani Thuraisingham
R3,553 Discovery Miles 35 530 Out of stock

Effective electronic commerce requires integrating resources and extracting the critical information from across Web sites. From the recent efforts to develop tools for interoperability and warehousing between scattered information on the web emerged the new discipline of web data management, and this book, Web Data Management and Electronic Commerce.
The first of its kind, it combines data management and mining, object technology, electronic commerce, Java, and the Internet into a complete overview of the concepts and developments in this new field. It details technologies in security, multimedia data management techniques, and real-time processing and discusses the emerging standards of Java Database Connectivity, XML, metadata, and middleware.

A simple Web site isn't good enough anymore

To remain competitive, you need Internet capabilities that allow you and your customers to buy, sell, and advertise. Even if you are unfamiliar with e-commerce, this self-contained volume provides the background you need to understand it through appendices that explain data management, Internet, security, and object technology. Approachable enough for the beginner and complete enough for the expert, Web Data Management and Electronic Commerce helps you to manage information effectively and efficiently.

Design and Implementation of Data Mining Tools (Hardcover): Bhavani Thuraisingham, Latifur Khan, Mamoun Awad, Lei Wang Design and Implementation of Data Mining Tools (Hardcover)
Bhavani Thuraisingham, Latifur Khan, Mamoun Awad, Lei Wang
R1,915 R1,679 Discovery Miles 16 790 Save R236 (12%) Out of stock

Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Mainly based on the authors' own research work, the book takes a practical approach to the subject. The first part of the book reviews data mining techniques, such as artificial neural networks and support vector machines, as well as data mining applications. The second section covers the design and implementation of data mining tools for intrusion detection. It examines various designs and performance results, along with the strengths and weaknesses of the approaches. The third part presents techniques to solve the WWW prediction problem. The final part describes models that the authors have developed for image classification. Showing step by step how data mining tools are developed, this hands-on guide discusses the performance results, limitations, and unique contributions of data mining systems. It provides essential information for technologists to decide on the tools to select for a particular application, for developers to focus on alternative designs if an approach is unsuitable, and for managers to choose whether to proceed with a data mining project.

Data Mining Tools for Malware Detection (Hardcover): Mehedy Masud, Latifur Khan, Bhavani Thuraisingham Data Mining Tools for Malware Detection (Hardcover)
Mehedy Masud, Latifur Khan, Bhavani Thuraisingham
R1,615 R1,421 Discovery Miles 14 210 Save R194 (12%) Out of stock

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets.

The authors describe the systems they have designed and developed: email worm detection using data mining, a scalable multi-level feature extraction technique to detect malicious executables, detecting remote exploits using data mining, and flow-based identification of botnet traffic by mining multiple log files. For each of these tools, they detail the system architecture, algorithms, performance results, and limitations.

  • Discusses data mining for emerging applications, including adaptable malware detection, insider threat detection, firewall policy analysis, and real-time data mining
  • Includes four appendices that provide a firm foundation in data management, secure systems, and the semantic web
  • Describes the authors tools for stream data mining

From algorithms to experimental results, this is one of the few books that will be equally valuable to those in industry, government, and academia. It will help technologists decide which tools to select for specific applications, managers will learn how to determine whether or not to proceed with a data mining project, and developers will find innovative alternative designs for a range of applications.

Big Data Analytics with Applications in Insider Threat Detection (Hardcover): Bhavani Thuraisingham, Pallabi Parveen, Mohammad... Big Data Analytics with Applications in Insider Threat Detection (Hardcover)
Bhavani Thuraisingham, Pallabi Parveen, Mohammad Mehedy Masud, Latifur Khan
R2,468 Discovery Miles 24 680 Ships in 10 - 15 working days

Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.

Web Data Mining and Applications in Business Intelligence and Counter-Terrorism (Hardcover, New): Bhavani Thuraisingham Web Data Mining and Applications in Business Intelligence and Counter-Terrorism (Hardcover, New)
Bhavani Thuraisingham
R2,315 R2,022 Discovery Miles 20 220 Save R293 (13%) Out of stock

The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data that may be of value to corporations and organizations. The emergence of data mining, and the larger field of Web mining, has businesses lost within a confusing maze of mechanisms and strategies for obtaining and managing crucial intelligence.

Web Data Mining and Applications in Business Intelligence and Counter-Terrorism responds by presenting a clear and comprehensive overview of Web mining, with emphasis on CRM and, for the first time, security and counter-terrorism applications. The tools and methods of Web mining are revealed in an easy-to-understand style, emphasizing the importance of practical, hands-on experience in the creation of successful e-business solutions.

The author, a program director for Data and Applications Security at the National Science Foundations, details how both opportunities and dangers on the Web can be identified and managed. Armed with the knowledge contained in this book, businesses can collect and analyze Web-based data to help develop customer relationships, increase sales, and identify existing and potential threats. Organizations can apply these same Web mining techniques to battle the real and present danger of terrorism, demonstrating Web mining's critical role in the intelligence arsenal.

Data Mining - Technologies, Techniques, Tools, and Trends (Hardcover): Bhavani Thuraisingham Data Mining - Technologies, Techniques, Tools, and Trends (Hardcover)
Bhavani Thuraisingham
R2,315 R2,022 Discovery Miles 20 220 Save R293 (13%) Out of stock

Focusing on a data-centric perspective, this book provides a complete overview of data mining: its uses, methods, current technologies, commercial products, and future challenges.

Three parts divide Data Mining:
o Part I describes technologies for data mining - database systems, warehousing, machine learning, visualization, decision support, statistics, parallel processing, and architectural support for data mining
o Part II presents tools and techniques - getting the data ready, carrying out the mining, pruning the results, evaluating outcomes, defining specific approaches, examining a specific technique based on logic programming, and citing literature and vendors for up-to-date information
o Part III examines emerging trends - mining distributed and heterogeneous data sources; multimedia data, such as text, images, video; mining data on the World Wide Web; metadata aspects of mining; and privacy issues.

This self-contained book also contains two appendices providing exceptional information on technologies, such as data management, and artificial intelligence.

Is there a need for mining? Do you have the right tools? Do you have the people to do the work? Do you have sufficient funds allocated to the project? All these answers must be answered before embarking on a project. Data Mining provides singular guidance on appropriate applications for specific techniques as well as thoroughly assesses valuable product information.

XML Databases and the Semantic Web (Paperback): Bhavani Thuraisingham XML Databases and the Semantic Web (Paperback)
Bhavani Thuraisingham
R1,380 R1,220 Discovery Miles 12 200 Save R160 (12%) Out of stock

Efficient access to data, sharing data, extracting information from data, and making use of the information have become urgent needs for today's corporations. With so much data on the Web, managing it with conventional tools is becoming almost impossible. New tools and techniques are necessary to provide interoperability as well as warehousing between multiple data sources and systems, and to extract information from the databases. XML Databases and the Semantic Web focuses on critical and new Web technologies needed for organizations to carry out transactions on the Web, to understand how to use the Web effectively, and to exchange complex documents on the Web. This reference for database administrators, database designers, and Web designers working in tandem with database technologists covers three emerging technologies of significant impact for electronic business: Extensible Markup Language (XML), semi-structured databases, and the semantic Web. The first two parts of the book explore these emerging technologies. The third part highlights the implications of these technologies for e-business. Overall, the book presents a comprehensive view of critical technologies for the Web in general and XML in particular. The semantic Web, XML, and semi-structured databases are still relatively new technologies that integrate many other technologies. As these technologies and integration of these advances mature, we can expect to see progress in the semantic web. The information contained in XML Databases and the Semantic Web is essential to the future success of effective e-business on the Web.

Secure Data Provenance and Inference Control with Semantic Web (Hardcover): Bhavani Thuraisingham, Tyrone Cadenhead, Murat... Secure Data Provenance and Inference Control with Semantic Web (Hardcover)
Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar
R1,585 R1,395 Discovery Miles 13 950 Save R190 (12%) Out of stock

With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment of derivations to update data, and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain, you can easily apply the methods presented in the book to a range of other domains. The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhance the scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques, the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes, products, tools, and standards for secure data management, secure Semantic Web, secure web services, and secure cloud computing.

Database and Applications Security - Integrating Information Security and Data Management (Hardcover, New): Bhavani... Database and Applications Security - Integrating Information Security and Data Management (Hardcover, New)
Bhavani Thuraisingham
R1,915 R1,679 Discovery Miles 16 790 Save R236 (12%) Out of stock

This is the first book to provide an in-depth coverage of all the developments, issues, and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, each section focusing on some key concept of secure databases and applications. Database and Applications Security provides a comprehensive overview and focuses on all aspects of the technology including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging applications.

Developing and Securing the Cloud (Paperback): Bhavani Thuraisingham Developing and Securing the Cloud (Paperback)
Bhavani Thuraisingham
R1,280 R1,134 Discovery Miles 11 340 Save R146 (11%) Out of stock

Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds. Filling this void, Developing and Securing the Cloud provides a comprehensive overview of cloud computing technology. Supplying step-by-step instruction on how to develop and secure cloud computing platforms and web services, it includes an easy-to-understand, basic-level overview of cloud computing and its supporting technologies. Presenting a framework for secure cloud computing development, the book describes supporting technologies for the cloud such as web services and security. It details the various layers of the cloud computing framework, including the virtual machine monitor and hypervisor, cloud data storage, cloud data management, and virtual network monitor. It also provides several examples of cloud products and prototypes, including private, public, and U.S. government clouds. Reviewing recent developments in cloud computing, the book illustrates the essential concepts, issues, and challenges in developing and securing today's cloud computing platforms and applications. It also examines prototypes built on experimental cloud computing systems that the author and her team have developed at the University of Texas at Dallas. This diverse reference is suitable for those in industry, government, and academia. Technologists will develop the understanding required to select the appropriate tools for particular cloud applications. Developers will discover alternative designs for cloud development, and managers will understand if it's best to build their own clouds or contract them out.

Data Management Systems - Evolution and Interoperation (Hardcover, New): Bhavani Thuraisingham Data Management Systems - Evolution and Interoperation (Hardcover, New)
Bhavani Thuraisingham
R4,080 Discovery Miles 40 800 Out of stock

As the information contained in databases has become a critical resource in organizations, efficient access to that information and the ability to share it among different users and across different systems has become an urgent need. The interoperability of heterogeneous database systems-literally, the ability to access information between or among differing types of databases, is the topic of this timely book.
In the last two decades, tremendous improvements in tools and technologies have resulted in new products that provide distributed data processing capabilities. This book describes these tools and emerging technologies, explaining the essential concepts behind the topics but focusing on practical applications. Selected products are discussed to illustrate the characteristics of the different technologies. This is an ideal source for anyone who needs a broad perspective on heterogeneous database integration and related technologies.

Big Data Analytics with Applications in Insider Threat Detection (Paperback): Bhavani Thuraisingham, Pallabi Parveen, Mohammad... Big Data Analytics with Applications in Insider Threat Detection (Paperback)
Bhavani Thuraisingham, Pallabi Parveen, Mohammad Mehedy Masud, Latifur Khan
R1,160 Discovery Miles 11 600 Out of stock

Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.

Analyzing and Securing Social Networks (Paperback): Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu,... Analyzing and Securing Social Networks (Paperback)
Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, …
R1,163 Discovery Miles 11 630 Out of stock

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.

Secure Data Provenance and Inference Control with Semantic Web (Paperback): Bhavani Thuraisingham, Tyrone Cadenhead, Murat... Secure Data Provenance and Inference Control with Semantic Web (Paperback)
Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar
R1,454 Discovery Miles 14 540 Out of stock

With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment of derivations to update data, and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain, you can easily apply the methods presented in the book to a range of other domains. The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhance the scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques, the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes, products, tools, and standards for secure data management, secure Semantic Web, secure web services, and secure cloud computing.

Design and Implementation of Data Mining Tools (Paperback): Bhavani Thuraisingham, Latifur Khan, Mamoun Awad, Lei Wang Design and Implementation of Data Mining Tools (Paperback)
Bhavani Thuraisingham, Latifur Khan, Mamoun Awad, Lei Wang
R1,470 Discovery Miles 14 700 Out of stock

Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Mainly based on the authors' own research work, the book takes a practical approach to the subject. The first part of the book reviews data mining techniques, such as artificial neural networks and support vector machines, as well as data mining applications. The second section covers the design and implementation of data mining tools for intrusion detection. It examines various designs and performance results, along with the strengths and weaknesses of the approaches. The third part presents techniques to solve the WWW prediction problem. The final part describes models that the authors have developed for image classification. Showing step by step how data mining tools are developed, this hands-on guide discusses the performance results, limitations, and unique contributions of data mining systems. It provides essential information for technologists to decide on the tools to select for a particular application, for developers to focus on alternative designs if an approach is unsuitable, and for managers to choose whether to proceed with a data mining project.

Building Trustworthy Semantic Webs (Paperback): Bhavani Thuraisingham Building Trustworthy Semantic Webs (Paperback)
Bhavani Thuraisingham
R1,806 Discovery Miles 18 060 Ships in 7 - 11 working days

Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. They will allow Web agents to share and reuse data across applications, enterprises, and community boundaries. However, this improved accessibility poses a greater threat of unauthorized access, which could lead to the malicious corruption of information. Building Trustworthy Semantic Webs addresses the urgent demand for the development of effective mechanisms that will protect and secure semantic Webs. Design Flexible Security Policies to Improve Efficiency Securing semantic Webs involves the formation of policies that will dictate what type of access Web agents are allowed. This text provides the tools needed to engineer these policies and secure individual components of the semantic Web, such as XML, RDF, and OWL. It also examines how to control unauthorized inferences on the semantic Web. Since this technology is not fully realized, the book emphasizes the importance of integrating security features into semantic Webs at the onset of their development. Through its expansive coverage, Building Trustworthy Semantic Webs describes how the creation of semantic security standards will ensure the dependability of semantic Webs. It provides Web developers with the tools they need to protect sensitive information and guarantee the success of semantic Web applications.

Data Mining - Technologies, Techniques, Tools, and Trends (Paperback): Bhavani Thuraisingham Data Mining - Technologies, Techniques, Tools, and Trends (Paperback)
Bhavani Thuraisingham
R1,422 Discovery Miles 14 220 Out of stock

Focusing on a data-centric perspective, this book provides a complete overview of data mining: its uses, methods, current technologies, commercial products, and future challenges. Three parts divide Data Mining: Part I describes technologies for data mining - database systems, warehousing, machine learning, visualization, decision support, statistics, parallel processing, and architectural support for data mining Part II presents tools and techniques - getting the data ready, carrying out the mining, pruning the results, evaluating outcomes, defining specific approaches, examining a specific technique based on logic programming, and citing literature and vendors for up-to-date information Part III examines emerging trends - mining distributed and heterogeneous data sources; multimedia data, such as text, images, video; mining data on the World Wide Web; metadata aspects of mining; and privacy issues. This self-contained book also contains two appendices providing exceptional information on technologies, such as data management, and artificial intelligence. Is there a need for mining? Do you have the right tools? Do you have the people to do the work? Do you have sufficient funds allocated to the project? All these answers must be answered before embarking on a project. Data Mining provides singular guidance on appropriate applications for specific techniques as well as thoroughly assesses valuable product information.

Knowledge Management - Classic and Contemporary Works (Paperback, Revised): Daryl Morey, Mark T Maybury, Bhavani Thuraisingham Knowledge Management - Classic and Contemporary Works (Paperback, Revised)
Daryl Morey, Mark T Maybury, Bhavani Thuraisingham
R279 Discovery Miles 2 790 Out of stock

This book provides an introduction to the field of knowledge management. Taking a learning-centric rather than information-centric approach, it emphasizes the continuous acquisition and application of knowledge. The book is organized into three sections, each opening with a classic work from a leader in the field. The first section, Strategy, discusses the motivation for knowledge management and how to structure a knowledge management program. The second section, Process, discusses the use of knowledge management to make existing practices more effective, the speeding up of organizational learning, and effective methods for implementing knowledge management. The third section, Metrics, discusses how to measure the impact of knowledge management on an organization. In addition to the classic essays, each section contains unpublished works that further develop the foundational concepts and strategies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Canon CL-446XL High-Yield Ink Cartridge…
 (2)
R352 Discovery Miles 3 520
Casio LW-200-7AV Watch with 10-Year…
R899 R765 Discovery Miles 7 650
Nancy Gold & Black Sunglasses
R99 R59 Discovery Miles 590
Loot
Nadine Gordimer Paperback  (2)
R336 R269 Discovery Miles 2 690
Premium A5 Notebook - The Joker: Hahaha
R299 Discovery Miles 2 990
Green Book
Viggo Mortensen, Mahershala Ali, … Blu-ray disc  (1)
R251 Discovery Miles 2 510
Simply Child Hot Air Balloon Mobile…
R390 Discovery Miles 3 900
Godzilla 2: King Of The Monsters
Vera Farmiga, Kyle Chandler, … DVD R160 R29 Discovery Miles 290
Muvit TGUSC0003 USB cable 1.2 m USB A…
R249 Discovery Miles 2 490
Oral-BŪ Vitality Precision Clean…
R549 Discovery Miles 5 490

 

Partners