Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 44 matches in All Departments
Software-defined network (SDN) and network function virtualization (NFV) are two technology trends that have revolutionized network management, particularly in highly distributed networks that are used in public, private, or hybrid cloud services. SDN and NFV technologies, when combined, simplify the deployment of network resources, lower capital and operating expenses, and offer greater network flexibility. The increasing usage of NFV is one of the primary factors that make SDN adoption attractive. The integration of these two technologies; SDN and NFV, offer a complementary service, with NFV delivering many of the real services controlled in an SDN. While SDN is focused on the control plane, NFV optimizes the actual network services that manage the data flows. Devices such as routers, firewalls, and VPN terminators are replaced with virtual devices that run on commodity hardware in NFV physical networking. This resembles the 'as-a-service' typical model of cloud services in many aspects. These virtual devices can be accessed on-demand by communication, network, or data center providers.This book illustrates the fundamentals and evolution of SDN and NFV and highlights how these two technologies can be integrated to solve traditional networking problems. In addition, it will focus on the utilization of SDN and NFV to enhance network security, which will open ways to integrate them with current technologies such as IoT, edge computing and blockchain, SDN-based network programmability, and current network orchestration technologies. The basics of SDN and NFV and associated issues, challenges, technological advancements along with advantages and risks of shifting networking paradigm towards SDN are also discussed. Detailed exercises within the book and corresponding solutions are available online as accompanying supplementary material.
The main objective of this book is to provide insights into recent advances in distributed intelligent circuits, systems and their applications. Distributed intelligence is the key enabler for innovations in machine-to-machine communications. The innovations are directed towards keeping existing algorithms as the base and developing new intelligent systems by employing smart technologies. Artificial intelligence (AI) and, more specifically, deep learning (DL) are receiving significant attention in assisting doctors in the detection of disease patterns without much human intervention. In agriculture, robots automate slow, repetitive and dull tasks, allowing farmers to focus more on improving overall production yields.The evolving trends point to the interface of artificial intelligence with machines being a factor in enhancing the decision-making capabilities of smart machines. This book provides relevant theoretical frameworks that include basic models, algorithms, circuit designs and the latest developments in experimental aspects in the field of distributed intelligence systems for industrial applications. The challenges encountered in the development of models for distributed intelligence systems for environmental monitoring are mitigated with artificial intelligence, machine learning and deep learning. This book identifies challenges and helps in applying solutions in the development of advanced intelligent systems for environmental monitoring.
Every day approximately three-hundred thousand to four-hundred thousand new malware are registered, many of them being adware and variants of previously known malware. Anti-virus companies and researchers cannot deal with such a deluge of malware - to analyze and build patches. The only way to scale the efforts is to build algorithms to enable machines to analyze malware and classify and cluster them to such a level of granularity that it will enable humans (or machines) to gain critical insights about them and build solutions that are specific enough to detect and thwart existing malware and generic-enough to thwart future variants. Advances in Malware and Data-Driven Network Security comprehensively covers data-driven malware security with an emphasis on using statistical, machine learning, and AI as well as the current trends in ML/statistical approaches to detecting, clustering, and classification of cyber-threats. Providing information on advances in malware and data-driven network security as well as future research directions, it is ideal for graduate students, academicians, faculty members, scientists, software developers, security analysts, computer engineers, programmers, IT specialists, and researchers who are seeking to learn and carry out research in the area of malware and data-driven network security.
In today's modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a tool that has proven to be a versatile piece of software within IT. Unfortunately, the high usage of Cloud has raised many concerns related to privacy, security, and data protection that have prevented cloud computing solutions from becoming the prevalent alternative for mission critical systems. Up-to-date research and current techniques are needed to help solve these vulnerabilities in cloud computing. Modern Principles, Practices, and Algorithms for Cloud Security is a pivotal reference source that provides vital research on the application of privacy and security in cloud computing. While highlighting topics such as chaos theory, soft computing, and cloud forensics, this publication explores present techniques and methodologies, as well as current trends in cloud protection. This book is ideally designed for IT specialists, scientists, software developers, security analysts, computer engineers, academicians, researchers, and students seeking current research on the defense of cloud services.
Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.
With the proliferation of devices connected to the internet and connected to each other, the volume of data collected, stored, and processed is increasing every day, which brings new challenges in terms of information security. As big data expands with the help of public clouds, traditional security solutions tailored to private computing infrastructures and confined to a well-defined security perimeter, such as firewalls and demilitarized zones (DMZs), are no longer effective. New security functions are required to work over the heterogenous composition of diverse hardware, operating systems, and network domains. Security, Privacy, and Forensics Issues in Big Data is an essential research book that examines recent advancements in big data and the impact that these advancements have on information security and privacy measures needed for these networks. Highlighting a range of topics including cryptography, data analytics, and threat detection, this is an excellent reference source for students, software developers and engineers, security analysts, IT consultants, academicians, researchers, and professionals.
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.
Social media sites are constantly evolving with huge amounts of scattered data or big data, which makes it difficult for researchers to trace the information flow. It is a daunting task to extract a useful piece of information from the vast unstructured big data; the disorganized structure of social media contains data in various forms such as text and videos as well as huge real-time data on which traditional analytical methods like statistical approaches fail miserably. Due to this, there is a need for efficient data mining techniques that can overcome the shortcomings of the traditional approaches. Data Mining Approaches for Big Data and Sentiment Analysis in Social Media encourages researchers to explore the key concepts of data mining, such as how they can be utilized on online social media platforms, and provides advances on data mining for big data and sentiment analysis in online social media, as well as future research directions. Covering a range of concepts from machine learning methods to data mining for big data analytics, this book is ideal for graduate students, academicians, faculty members, scientists, researchers, data analysts, social media analysts, managers, and software developers who are seeking to learn and carry out research in the area of data mining for big data and sentiment.
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of appropriate mitigation techniques are essential research areas for these systems. Adoption of best practices and maintaining a balance between ease of use and security are, again, crucial for the effective performance of these systems. Recent Advances in Security, Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses and presents techniques and methodologies, as well as a wide range of examples and illustrations, to effectively show the principles, algorithms, challenges, and applications of security, privacy, and trust for IoT and CPS. Book features: Introduces new directions for research, development, and engineering security, privacy, and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles, algorithms, challenges, and applications Covers most of the important security aspects and current trends not present in other reference books This book will also serve as an excellent reference in security, privacy, and trust of IoT and CPS for professionals in this fast-evolving and critical field. The chapters present high-quality contributions from researchers, academics, and practitioners from various national and international organizations and universities.
The integration of new technologies is resulting in an increased demand for security and authentication in all types of data communications. Cybersecurity is the protection of networks and systems from theft. Biometric technologies use unique traits of particular parts of the body such facial recognition, iris, fingerprints and voice to identify individuals' physical and behavioural characteristics. Although there are many challenges associated with extracting, storing and processing such data, biometric and cybersecurity technologies along with artificial intelligence (AI) are offering new approaches to verification procedures and mitigating security risks. This book presents cutting-edge research on the use of AI for biometrics and cybersecurity including machine and deep learning architectures, emerging applications and ethical and legal concerns. Topics include federated learning for enhanced cybersecurity; artificial intelligence-based biometric authentication using ECG signal; deep learning for email phishing detection methods; biometrics for secured IoT systems; intelligent authentication using graphical one-time-passwords; and AI in social cybersecurity. Artificial Intelligence for Biometrics and Cybersecurity: Technology and applications is aimed at artificial intelligence, biometrics and cybersecurity experts, industry and academic researchers, network security engineers, cybersecurity professionals, and advanced students and newcomers to the field interested in the newest advancements in artificial intelligence for cybersecurity and biometrics.
Unique selling point: * Contains electronics device, Circuits, systems as well as applications of Integrated Circuits in healthcare and security never before considered Core audience: * Researchers and post graduates Place in the market: * Includes key new finding of electronic devices for Security Applications, and Integrated Circutis for healthcare and security Applications with advanced
A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.
With the proliferation of information, big data management and analysis have become an indispensable part of any system to handle such amounts of data. The amount of data generated by the multitude of interconnected devices increases exponentially, making the storage and processing of these data a real challenge.Big data management and analytics have gained momentum in almost every industry, ranging from finance or healthcare. Big data can reveal key insights if handled and analyzed properly; it has great application potential to improve the working of any industry. This book covers the spectrum aspects of big data; from the preliminary level to specific case studies. It will help readers gain knowledge of the big data landscape.Highlights of the topics covered include description of the Big Data ecosystem; real-world instances of big data issues; how the Vs of Big Data (volume, velocity, variety, veracity, valence, and value) affect data collection, monitoring, storage, analysis, and reporting; structural process to get value out of Big Data and recognize the differences between a standard database management system and a big data management system.Readers will gain insights into choice of data models, data extraction, data integration to solve large data problems, data modelling using machine learning techniques, Spark's scalable machine learning techniques, modeling a big data problem into a graph database and performing scalable analytical operations over the graph and different tools and techniques for processing big data and its applications including in healthcare and finance.
Digital solutions are sufficiently versatile and agile to shape business processes and enterprise architecture, answer the COVID-19 crisis, solve climate change, temper political conflict, generate new employment operating models, and solve health issues. These solutions benefit businesses as an integral part of the economy and society and therefore must be studied further to ensure they are utilized appropriately. The Handbook of Research on Digitalization Solutions for Social and Economic Needs introduces the agile operating model that has triggered digital transformation and the plethora of ways it has become of practical use recently. The book also argues the business rationale of digitalization. Covering key topics such as innovation, sustainability, and business transformation, this major reference work is ideal for business owners, managers, computer scientists, industry professionals, researchers, scholars, academicians, librarians, policymakers, practitioners, educators, and students.
Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and their adoptions that aim to enable excellence in business in Industry 4.0. Furthermore, this book explores how the adoption of these technologies is related to rising concerns about privacy and trusted communication issues that concern management and leaders of business organizations. Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing not only targets IT experts and drills down on the technical issues but also provides readers from various groups with a well-linked concept about how the latest trends of mobile technologies are closely related to daily living and the workplace at managerial and even individual levels.
i. This book will contain AI, ML, DL, big data and security never before considered ii. Innovative artificial intelligence techniques and algorithms iii. Only emerging from recent research and development, e.g. AI for big data from security perspective, which are not covered in any existing texts iv. Artificial Intelligence for big data and security Applications with advanced features v. Key new finding of machine learning and deep learning for Security Applications
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of appropriate mitigation techniques are essential research areas for these systems. Adoption of best practices and maintaining a balance between ease of use and security are, again, crucial for the effective performance of these systems. Recent Advances in Security, Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses and presents techniques and methodologies, as well as a wide range of examples and illustrations, to effectively show the principles, algorithms, challenges, and applications of security, privacy, and trust for IoT and CPS. Book features: Introduces new directions for research, development, and engineering security, privacy, and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles, algorithms, challenges, and applications Covers most of the important security aspects and current trends not present in other reference books This book will also serve as an excellent reference in security, privacy, and trust of IoT and CPS for professionals in this fast-evolving and critical field. The chapters present high-quality contributions from researchers, academics, and practitioners from various national and international organizations and universities.
Focuses on the latest development in Big IoT Data Analytics Presents different issues of Security and Privacy Analytics for Fog-enabled IoT system Offers the latest Big Data Technologies for security analytics in Fog-enabled IoT Network Discusses the emerging role of Big Data Analytics and Technologies in detection of Cyberattacks in IoT networks Presents the prospects on Big IoT Data Analytics in Fog-enabled IoT system
Simplicity and Uniqueness Structure of the book content Simple English and Ease of Undersatanding Exhaustive research in the content of the book
With the increasing demand of robots for industrial and domestic use, it becomes indispensable to ensure their safety, security, and reliability. Safety, Security and Reliability of Robotic Systems: Algorithms, Applications, and Technologies provides a broad and comprehensive coverage of the evolution of robotic systems, as well as industrial statistics and future forecasts. First, it analyzes the safety-related parameters of these systems. Then, it covers security attacks and related countermeasures, and how to establish reliability in these systems. The later sections of the book then discuss various applications of these systems in modern industrial and domestic settings. By the end of this book, you will be familiarized with the theoretical frameworks, algorithms, applications, technologies, and empirical research findings on the safety, security, and reliability of robotic systems, while the book's modular structure and comprehensive material will keep you interested and involved throughout. This book is an essential resource for students, professionals, and entrepreneurs who wish to understand the safe, secure, and reliable use of robotics in real-world applications. It is edited by two specialists in the field, with chapter contributions from an array of experts on robotics systems and applications.
This book bridges principles and real-world applications, while also providing thorough theory and technology for the development of artificial intelligence and robots. A lack of cross-pollination between AI and robotics research has led to a lack of progress in both fields. Now that both technologies have made significant strides, there is increased interest in combining the two domains in order to create a new integrated AI and robotics trend. In order to achieve wiser urbanization and more sustainable development, AI in smart cities will play a significant part in equipping the cities with advanced features that will allow residents to safely move about, stroll, shop, and enjoy a more comfortable way of life. If you are a student, researcher, engineer, or professional working in this field, or if you are just curious in the newest advancements in robotics and artificial intelligence for cybersecurity, this book is for you!
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart card-based systems. The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart card-based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart card-based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks. The book continues with a focus on the security attacks against remote user authentication mechanisms in smart card-based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart card-based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart card-based systems and applications. The final chapter explains the role of blockchain technology for securing smart card-based transactions and quantum cryptography for designing secure smart card-based algorithms. Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications.
Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the modern era. In spite of the opportunities that multimedia creates for businesses and companies, information sharing remains vulnerable to cyber attacks and hacking due to the open channels in which this data is being transmitted. Protecting the authenticity and confidentiality of information is a top priority for all professional fields that currently use multimedia practices for distributing digital data. The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges. Featuring coverage on a broad range of topics such as cryptographic protocols, feature extraction, and chaotic systems, this book is ideally designed for scientists, researchers, developers, security analysts, network administrators, scholars, IT professionals, educators, and students seeking current research on developing strategies in multimedia security.
This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks. |
You may like...
Understanding Macroeconomics
Philip Mohr, Cecilia van Zyl, …
Paperback
(6)
Law and Economics from an Evolutionary…
Glen Atkinson, Stephen P. Paschall
Hardcover
R2,670
Discovery Miles 26 700
FutureNEXT - Reimagining Our World…
John Sanei, Iraj Abedian
Paperback
The Status of Women in Classical…
Robert Dimand, Chris Nyland
Hardcover
R3,499
Discovery Miles 34 990
The Big Con - How The Consulting…
Mariana Mazzucato, Rosie Collington
Paperback
The Future - More Than 80 Key Trends For…
Dion Chang, Bronwyn Williams, …
Paperback
|