|
Showing 1 - 25 of
67 matches in All Departments
This handbook introduces the basic principles and fundamentals of
cyber security towards establishing an understanding of how to
protect computers from hackers and adversaries. The highly
informative subject matter of this handbook, includes various
concepts, models, and terminologies along with examples and
illustrations to demonstrate substantial technical details of the
field. It motivates the readers to exercise better protection and
defense mechanisms to deal with attackers and mitigate the
situation. This handbook also outlines some of the exciting areas
of future research where the existing approaches can be
implemented. Exponential increase in the use of computers as a
means of storing and retrieving security-intensive information,
requires placement of adequate security measures to safeguard the
entire computing and communication scenario. With the advent of
Internet and its underlying technologies, information security
aspects are becoming a prime concern towards protecting the
networks and the cyber ecosystem from variety of threats, which is
illustrated in this handbook. This handbook primarily targets
professionals in security, privacy and trust to use and improve the
reliability of businesses in a distributed manner, as well as
computer scientists and software developers, who are seeking to
carry out research and develop software in information and cyber
security. Researchers and advanced-level students in computer
science will also benefit from this reference.
This handbook introduces the basic principles and fundamentals of
cyber security towards establishing an understanding of how to
protect computers from hackers and adversaries. The highly
informative subject matter of this handbook, includes various
concepts, models, and terminologies along with examples and
illustrations to demonstrate substantial technical details of the
field. It motivates the readers to exercise better protection and
defense mechanisms to deal with attackers and mitigate the
situation. This handbook also outlines some of the exciting areas
of future research where the existing approaches can be
implemented. Exponential increase in the use of computers as a
means of storing and retrieving security-intensive information,
requires placement of adequate security measures to safeguard the
entire computing and communication scenario. With the advent of
Internet and its underlying technologies, information security
aspects are becoming a prime concern towards protecting the
networks and the cyber ecosystem from variety of threats, which is
illustrated in this handbook. This handbook primarily targets
professionals in security, privacy and trust to use and improve the
reliability of businesses in a distributed manner, as well as
computer scientists and software developers, who are seeking to
carry out research and develop software in information and cyber
security. Researchers and advanced-level students in computer
science will also benefit from this reference.
This book includes high-quality, peer-reviewed papers from the
International Conference on Recent Advancement in Computer,
Communication and Computational Sciences (RACCCS-2017), held at
Aryabhatta College of Engineering & Research Center, Ajmer,
India on September 2-3, 2017, presenting the latest developments
and technical solutions in computational sciences. Data science,
data- and knowledge engineering require networking and
communication as a backbone and have a wide scope of implementation
in engineering sciences. Keeping this ideology in mind, the book
offers insights that reflect the advances in these fields from
upcoming researchers and leading academicians across the globe.
Covering a variety of topics, such as intelligent hardware and
software design, advanced communications, intelligent computing
technologies, advanced software engineering, the web and
informatics, and intelligent image processing, it helps those in
the computer industry and academia use the advances of
next-generation communication and computational technology to shape
real-world applications.
Data science, data engineering and knowledge engineering requires
networking and communication as a backbone and have wide scope of
implementation in engineering sciences. Keeping this ideology in
preference, this book includes the insights that reflect the
advances in these fields from upcoming researchers and leading
academicians across the globe. It contains high-quality
peer-reviewed papers of 'International Conference on Recent
Advancement in Computer, Communication and Computational Sciences
(ICRACCCS 2016)', held at Janardan Rai Nagar Rajasthan Vidyapeeth
University, Udaipur, India, during 25-26 November 2016. The volume
covers variety of topics such as Advanced Communication Networks,
Artificial Intelligence and Evolutionary Algorithms, Advanced
Software Engineering and Cloud Computing, Image Processing and
Computer Vision, and Security. The book will help the perspective
readers from computer industry and academia to derive the advances
of next generation communication and computational technology and
shape them into real life applications.
|
Security in Computing and Communications - 5th International Symposium, SSCC 2017, Manipal, India, September 13-16, 2017, Proceedings (Paperback, 1st ed. 2017)
Sabu M. Thampi, Gregorio Martinez Perez, Carlos Becker Westphall, Jiankun Hu, Chun I. Fan, …
|
R2,876
Discovery Miles 28 760
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 5th
International Symposium on Security in Computing and
Communications, SSCC 2017, held in Manipal, India, in September
2017. The 21 revised full papers presented together with 13 short
papers were carefully reviewed and selected from 84 submissions.
The papers focus on topics such as cryptosystems, algorithms,
primitives; security and privacy in networked systems; system and
network security; steganography, visual cryptography, image
forensics; applications security.
|
Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015, Proceedings, Part II (Paperback, 1st ed. 2015)
Guojun Wang, Albert Zomaya, Gregorio Martinez, Kenli Li
|
R1,714
Discovery Miles 17 140
|
Ships in 10 - 15 working days
|
This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the
refereed proceedings of the 15th International Conference on
Algorithms and Architectures for Parallel Processing, ICA3PP 2015,
held in Zhangjiajie, China, in November 2015. The 219 revised full
papers presented together with 77 workshop papers in these four
volumes were carefully reviewed and selected from 807 submissions
(602 full papers and 205 workshop papers). The first volume
comprises the following topics: parallel and distributed
architectures; distributed and network-based computing and internet
of things and cyber-physical-social computing. The second volume
comprises topics such as big data and its applications and parallel
and distributed algorithms. The topics of the third volume are:
applications of parallel and distributed computing and service
dependability and security in distributed and parallel systems. The
covered topics of the fourth volume are: software systems and
programming models and performance modeling and evaluation.
|
Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings (Paperback, 2014 ed.)
Gregorio Martinez Perez, Sabu M. Thampi, Ryan Ko, Lei Shu
|
R3,310
Discovery Miles 33 100
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the Second
International Conference on Security in Computer Networks and
Distributed Systems, SNDS 2014, held in Trivandrum, India, in March
2014. The 32 revised full papers presented together with 9 short
papers and 8 workshop papers were carefully reviewed and selected
from 129 submissions. The papers are organized in topical sections
on security and privacy in networked systems; multimedia security;
cryptosystems, algorithms, primitives; system and network security;
short papers. The workshop papers were presented at the following
workshops: Second International Workshop on Security in
Self-Organising Networks (Self Net 2014); Workshop on
Multidisciplinary Perspectives in Cryptology and Information
Security (CIS 2014); Second International Workshop on Trust and
Privacy in Cyberspace (Cyber Trust 2014).
The links between a firm's competitiveness and the natural
environment have been studied since the mid 90's. This volume
explores, both theoretically and empirically, the relationships
between environmental product innovation, green image and firm
performance.
The links between a firm's competitiveness and the natural
environment have been studied since the mid 90's. This volume
explores, both theoretically and empirically, the relationships
between environmental product innovation, green image and firm
performance.
"Focussing on innovation management, this book explores the role of
knowledge stocks or intellectual capital blocks (human, social,
technological, organizational and regional capitals) on the
technological innovation processes typologies (process/product,
radical/incremental) and firm performance, absorptive capabilities
and organizational learning"--
Focusing on innovation management, the authors explore the role of
knowledge stocks or intellectual capital blocks such as human,
social, technological, organizational and regional capitals, on
technological innovation process typologies and firm performance,
absorptive capabilities and organizational learning.
Today the capability to create and apply new knowledge represents
one of the main sources of sustained competitive advantage.
Nevertheless, there are very few empirical studies of this. This
book develops an improved and extended theoretical model about
knowledge creation and transfer within organizations and tests it
empirically with a survey in 115 knowledge-intensive firms. The
results show the different knowledge creation processes employed by
firms in practice and allow us to obtain evidence-driven models of
the various foms of knowledge creation process.
The capability to create and apply new knowledge is one of the main
sources of sustained competitive advantage, yet there are few
empirical studies of this. This book develops an improved and
extended theoretical model about knowledge creation and transfer
within organizations, testing it empirically with a survey in 115
knowledge-intensive firms.
This book covers selected high-quality research papers presented in
the International Conference on Cyber Security, Privacy and
Networking (ICSPN 2022), organized during September 09-11, 2022, in
Thailand in online mode. The objective of ICSPN 2022 is to provide
a premier international platform for deliberations on strategies,
recent trends, innovative approaches, discussions and presentations
on the most recent cyber security, privacy and networking
challenges and developments from the perspective of providing
security awareness and its best practices for the real world.
Moreover, the motivation to organize this conference is to promote
research by sharing innovative ideas among all levels of the
scientific community and to provide opportunities to develop
creative solutions to various security, privacy and networking
problems.
|
Smart City and Informatization - 7th International Conference, iSCI 2019, Guangzhou, China, November 12-15, 2019, Proceedings (Paperback, 1st ed. 2019)
Guojun Wang, Abdulmotaleb El Saddik, Xuejia Lai, Gregorio Martinez Perez, Kim-Kwang Raymond Choo
|
R1,685
Discovery Miles 16 850
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 7th
International Conference on Smart City and Informatization, iSCI
2019, held in Guangzhou, China, in November 2019. The volume
presents 52 full papers, which were carefully reviewed and selected
from 139 submissions. The papers are organized in topical sections
on Internet of Things (IoT) and smart sensing; urban computing and
big data; smart society informatization technologies;
cloud/edge/fog computing for smart city; applications for smart
city informatization; assistive engineering and information
technology; cyberspace security; blockchain and applications.
|
Advances in Services Computing - 10th Asia-Pacific Services Computing Conference, APSCC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings (Paperback, 1st ed. 2016)
Guojun Wang, Yanbo Han, Gregorio Martinez Perez
|
R3,149
Discovery Miles 31 490
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 10th
Asia-Pacific Services Computing Conference, APSCC 2016, held in
Zhangjiajie, China, in November 2016. The 38 revised full papers
presented in this book were carefully reviewed and selected from
107 submissions. The papers cover a wide range of topics in the
fields of cloud/utility/Web computing/big data; foundations of
services computing; social/peer-to-peer/mobile/ubiquitous/pervasive
computing; service-centric computing models; integration of
telecommunication SOA and Web services; business process
integration and management; and security in services.
|
Algorithms and Architectures for Parallel Processing - ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings (Paperback, 1st ed. 2015)
Guojin Wang, Albert Zomaya, Gregorio Martinez, Kenli Li
|
R3,150
Discovery Miles 31 500
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the Workshops and
Symposiums of the 15th International Conference on Algorithms and
Architectures for Parallel Processing, ICA3PP 2015, held in
Zhangjiajie, China, in November 2015. The program of this year
consists of 6 symposiums/workshops that cover a wide range of
research topics on parallel processing technology: the Sixth
International Workshop on Trust, Security and Privacy for Big Data,
TrustData 2015; the Fifth International Symposium on Trust,
Security and Privacy for Emerging Applications, TSP 2015; the Third
International Workshop on Network Optimization and Performance
Evaluation, NOPE 2015; the Second International Symposium on
Sensor-Cloud Systems, SCS 2015; the Second International Workshop
on Security and Privacy Protection in Computer and Network Systems,
SPPCN 2015; and the First International Symposium on Dependability
in Sensor, Cloud, and Big Data Systems and Applications, DependSys
2015. The aim of these symposiums/workshops is to provide a forum
to bring together practitioners and researchers from academia and
industry for discussion and presentations on the current research
and future directions related to parallel processing technology.
The themes and topics of these symposiums/workshops are a valuable
complement to the overall scope of ICA3PP 2015 and give additional
values and interests.
|
Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015, Proceedings, Part III (Paperback, 1st ed. 2015)
Guojun Wang, Albert Zomaya, Gregorio Martinez, Kenli Li
|
R1,735
Discovery Miles 17 350
|
Ships in 10 - 15 working days
|
This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the
refereed proceedings of the 15th International Conference on
Algorithms and Architectures for Parallel Processing, ICA3PP 2015,
held in Zhangjiajie, China, in November 2015. The 219 revised full
papers presented together with 77 workshop papers in these four
volumes were carefully reviewed and selected from 807 submissions
(602 full papers and 205 workshop papers). The first volume
comprises the following topics: parallel and distributed
architectures; distributed and network-based computing and internet
of things and cyber-physical-social computing. The second volume
comprises topics such as big data and its applications and parallel
and distributed algorithms. The topics of the third volume are:
applications of parallel and distributed computing and service
dependability and security in distributed and parallel systems. The
covered topics of the fourth volume are: software systems and
programming models and performance modeling and evaluation.
|
Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015, Proceedings, Part IV (Paperback, 1st ed. 2015)
Guojun Wang, Albert Zomaya, Gregorio Martinez, Kenli Li
|
R1,748
Discovery Miles 17 480
|
Ships in 10 - 15 working days
|
This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the
refereed proceedings of the 15th International Conference on
Algorithms and Architectures for Parallel Processing, ICA3PP 2015,
held in Zhangjiajie, China, in November 2015. The 219 revised full
papers presented together with 77 workshop papers in these four
volumes were carefully reviewed and selected from 807 submissions
(602 full papers and 205 workshop papers). The first volume
comprises the following topics: parallel and distributed
architectures; distributed and network-based computing and internet
of things and cyber-physical-social computing. The second volume
comprises topics such as big data and its applications and parallel
and distributed algorithms. The topics of the third volume are:
applications of parallel and distributed computing and service
dependability and security in distributed and parallel systems. The
covered topics of the fourth volume are: software systems and
programming models and performance modeling and evaluation.
|
Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015, Proceedings, Part I (Paperback, 1st ed. 2015)
Guojun Wang, Albert Zomaya, Gregorio Martinez, Kenli Li
|
R3,132
Discovery Miles 31 320
|
Ships in 10 - 15 working days
|
This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the
refereed proceedings of the 15th International Conference on
Algorithms and Architectures for Parallel Processing, ICA3PP 2015,
held in Zhangjiajie, China, in November 2015. The 219 revised full
papers presented together with 77 workshop papers in these four
volumes were carefully reviewed and selected from 807 submissions
(602 full papers and 205 workshop papers). The first volume
comprises the following topics: parallel and distributed
architectures; distributed and network-based computing and internet
of things and cyber-physical-social computing. The second volume
comprises topics such as big data and its applications and parallel
and distributed algorithms. The topics of the third volume are:
applications of parallel and distributed computing and service
dependability and security in distributed and parallel systems. The
covered topics of the fourth volume are: software systems and
programming models and performance modeling and evaluation.
|
Security in Computing and Communications - International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings (Paperback, 2013 ed.)
Sabu M. Thampi, Pradeep K. Atrey, Chun I. Fan, Gregorio Martinez Perez
|
R1,596
Discovery Miles 15 960
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the International
Symposium on Security in Computing and Communications, SSCC 2013,
held in Mysore, India, in August 2013. The 24 revised full papers
presented together with 15 poster papers were carefully reviewed
and selected from 111 submissions. The papers cover all aspects of
secure computing and communication in networking and distributed
systems such as cloud-based data centers.
In a changing and complex environment currently facing the main
challenges of sustainable development, effective management of
knowledge, intellectual assets, organizational learning, and talent
management are the basis for social innovation and new ways of
competition. In this sense, management and business practice are
incorporating social and environmental demands made by all types of
stakeholders to improve business decisions and strategies.
Knowledge Management for Corporate Social Responsibility provides
research exploring the theoretical and practical aspects of linking
firm profitability, social development, and natural environment in
respect to business management practices. Featuring coverage on a
broad range of topics such as employer branding, intellectual
capital, and organizational performance, this book is ideally
designed for business professionals, small business owners,
entrepreneurs, academicians, researchers, and business students.
In a changing and complex environment currently facing the main
challenges of sustainable development, effective management of
knowledge, intellectual assets, organizational learning, and talent
management are the basis for social innovation and new ways of
competition. In this sense, management and business practice are
incorporating social and environmental demands made by all types of
stakeholders to improve business decisions and strategies.
Knowledge Management for Corporate Social Responsibility provides
research exploring the theoretical and practical aspects of linking
firm profitability, social development, and natural environment in
respect to business management practices. Featuring coverage on a
broad range of topics such as employer branding, intellectual
capital, and organizational performance, this book is ideally
designed for business professionals, small business owners,
entrepreneurs, academicians, researchers, and business students.
|
You may like...
Barbie
Margot Robbie, Ryan Gosling
Blu-ray disc
R266
Discovery Miles 2 660
Gloria
Sam Smith
CD
R407
Discovery Miles 4 070
Rockstar
Dolly Parton
CD
R421
Discovery Miles 4 210
|