Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 15 of 15 matches in All Departments
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of appropriate mitigation techniques are essential research areas for these systems. Adoption of best practices and maintaining a balance between ease of use and security are, again, crucial for the effective performance of these systems. Recent Advances in Security, Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses and presents techniques and methodologies, as well as a wide range of examples and illustrations, to effectively show the principles, algorithms, challenges, and applications of security, privacy, and trust for IoT and CPS. Book features: Introduces new directions for research, development, and engineering security, privacy, and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles, algorithms, challenges, and applications Covers most of the important security aspects and current trends not present in other reference books This book will also serve as an excellent reference in security, privacy, and trust of IoT and CPS for professionals in this fast-evolving and critical field. The chapters present high-quality contributions from researchers, academics, and practitioners from various national and international organizations and universities.
Today, cloud computing, big data, and the internet of things (IoT) are becoming indubitable parts of modern information and communication systems. They cover not only information and communication technology but also all types of systems in society including within the realms of business, finance, industry, manufacturing, and management. Therefore, it is critical to remain up-to-date on the latest advancements and applications, as well as current issues and challenges. The Handbook of Research on Cloud Computing and Big Data Applications in IoT is a pivotal reference source that provides relevant theoretical frameworks and the latest empirical research findings on principles, challenges, and applications of cloud computing, big data, and IoT. While highlighting topics such as fog computing, language interaction, and scheduling algorithms, this publication is ideally designed for software developers, computer engineers, scientists, professionals, academicians, researchers, and students.
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of appropriate mitigation techniques are essential research areas for these systems. Adoption of best practices and maintaining a balance between ease of use and security are, again, crucial for the effective performance of these systems. Recent Advances in Security, Privacy and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) discusses and presents techniques and methodologies, as well as a wide range of examples and illustrations, to effectively show the principles, algorithms, challenges, and applications of security, privacy, and trust for IoT and CPS. Book features: Introduces new directions for research, development, and engineering security, privacy, and trust of IoT and CPS Includes a wealth of examples and illustrations to effectively demonstrate the principles, algorithms, challenges, and applications Covers most of the important security aspects and current trends not present in other reference books This book will also serve as an excellent reference in security, privacy, and trust of IoT and CPS for professionals in this fast-evolving and critical field. The chapters present high-quality contributions from researchers, academics, and practitioners from various national and international organizations and universities.
Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.
A comprehensive text on both current and emerging areas of cognitive vehicular networks, this book focuses on a new class of mobile ad hoc networks. It uses a pedagogical approach utilizing cognitive aspects applied to vehicular environments and comprises contributions from well-known and high profile researchers in their respective specialties. The book provides significant technical and practical insights on different perspectives, starting from a basic background on cognitive radio, interrelated technologies, application to vehicular networks, technical challenges, and future trends.
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.
This book features selected high-quality research papers presented at the International Conference on Machine Intelligence and Signal Processing (MISP 2019), held at the Indian Institute of Technology, Allahabad, India, on September 7-10, 2019. The book covers the latest advances in the fields of machine learning, big data analytics, signal processing, computational learning theory, and their real-time applications. The topics covered include support vector machines (SVM) and variants like least-squares SVM (LS-SVM) and twin SVM (TWSVM), extreme learning machine (ELM), artificial neural network (ANN), and other areas in machine learning. Further, it discusses the real-time challenges involved in processing big data and adapting the algorithms dynamically to improve the computational efficiency. Lastly, it describes recent developments in processing signals, for instance, signals generated from IoT devices, smart systems, speech, and videos and addresses biomedical signal processing: electrocardiogram (ECG) and electroencephalogram (EEG).
Scalable parallel systems or, more generally, distributed memory systems offer a challenging model of computing and pose fascinating problems regarding compiler optimization, ranging from language design to run time systems. Research in this area is foundational to many challenges from memory hierarchy optimizations to communication optimization.This unique, handbook-like monograph assesses the state of the art in the area in a systematic and comprehensive way. The 21 coherent chapters by leading researchers provide complete and competent coverage of all relevant aspects of compiler optimization for scalable parallel systems. The book is divided into five parts on languages, analysis, communication optimizations, code generation, and run time systems. This book will serve as a landmark source for education, information, and reference to students, practitioners, professionals, and researchers interested in updating their knowledge about or active in parallel computing.
This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community, and to provide opportunities to develop creative solutions to various security, privacy and networking problems.
This book gives readers an in-depth analysis of the fundamentals behind designing on-demand medium access control (MAC) protocols for multihop wireless networks, esp. with nodes having multiple antenna technologies. This is the first attempt towards designing and analyzing on-demand, also known as contention-based, MAC protocols for multiple beam smart antennas (MBSA). The book begins with a general introduction of the state-of-art problems and solutions that then forms the basis of this book. The book then introduces mathematical models to analyze MBSA and derive basic MAC fundamentals. The readers are then exposed to step-by-step MAC design for MBSA in wireless ad hoc networks. Once the basic design is completed, advanced concepts such as wireless mesh network architecture, Quality of Service (QoS), interoperability with existing IEEE802.11 standards and co-existence with other antenna technologies, viz., omnidirectional and directional, are introduced. Finally, the book ends with introducing link layer reliable and energy-efficient communication mechanisms for wireless sensor networks.
"Spectrum Selection, Sensing, and Sharing in Cognitive Radio Networks" introduces the readers to a comprehensive idea about the evolution and functionality of Cognitive Radio from a network perspective. The book covers an efficient modeling technique of spectrum occupancy patterns of primary users in licensed bands, substantiating the results based on real-time experiments performed in Boston, MA, USA. The next chapter introduces a new idea for cognitive radio termed as "Spectrum Selection," a concept of preferable selection of spectrum for further spectrum sensing. A separate chapter on application of Hidden Markov Models is discussed for efficient spectrum sensing techniques. Additionally, Game theoretic approaches are illustrated with examples in one chapter for spectrum sharing and coexistence of secondary and primary users in licensed bands. The concept of NC-OFDMA is also introduced as an option for efficient spectrum allocation in coexistence of secondary networks. Finally, the book ends with an invaluable concept on cross-layer architecture for future software defined radio based cognitive radio that are critical to the successful development of commercial products.
Broadband Last Mile: Access Technologies for Multimedia Communications provides in-depth treatments of access technologies and the applications that rely upon them or support them. It examines innovations and enhancements along multiple dimensions in access, with the overarching goal of ensuring that the last mile is not the weak link in the broadband chain. Written by experts from the academic and commercial segments of the field, the book's self-contained sections address topics related to the disciplines of communications, networking, computing, and signal processing. The core of this treatment contains contemporary reviews of broadband pipes in the classes of copper, cable, fiber, wireless, and satellite. It emphasizes the coexistence of these classes within a network, the importance of optical communications for unprecedented bandwidth, and the flexibility and mobility provided by wireless. The book also includes perspective on the increasingly important topic of network management, providing insights that are true regardless of the nature of the pipe. The text concludes with a discussion of newly emerging applications and broadband services. This book offers an all-in-one treatment of the physical pipes and network architectures that make rich and increasingly personalized applications possible. It serves as a valuable resource for researchers and practitioners working in the increasingly pervasive field of broadband.
A comprehensive text on both current and emerging areas of cognitive vehicular networks, this book focuses on a new class of mobile ad hoc networks. It uses a pedagogical approach utilizing cognitive aspects applied to vehicular environments and comprises contributions from well-known and high profile researchers in their respective specialties. The book provides significant technical and practical insights on different perspectives, starting from a basic background on cognitive radio, interrelated technologies, application to vehicular networks, technical challenges, and future trends.
|
You may like...
Personalized Medicine - A New Medical…
Nada Bodiroga-Vukobrat, Daniel Rukavina, …
Hardcover
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi
Paperback
Essential EU Climate Law
Edwin Woerdman, Martha Roggenkamp, …
Paperback
R1,160
Discovery Miles 11 600
A practitioner's guide to the mental…
A. Landman, W. Landman
Paperback
|