|
Showing 1 - 6 of
6 matches in All Departments
Blockchain has potential to revolutionize how manufacturers design,
engineer, make and scale their products. Blockchain is gradually
proving to be an effective "middleware" solution for enabling
seamless interoperability within complex supply chains. Due to its
technological nature, blockchain enables secure, transparent and
fast data exchanges as well as allowing for the creation of
immutable records databases The main advantage of Blockchain in
Manufacturing Industries is product traceability, supply chain
transparency, compliance monitoring, and auditability. Moreover,
leveraging blockchain technology into a manufacturing enterprise
can enhance its security and reduce the rates of systematic
failures. So, blockchain is now used in various sectors of the
manufacturing industry, such as automotive, aerospace, defense,
pharmaceutical, consumer electronics, textile, food and beverages,
and more. Hence, Blockchain should be seen as an investment in
future-readiness and customer-centricity, not as an experimental
technology - because, the evidence is overwhelming. This book will
explore the strengths of Blockchain adaptation in Manufacturing
Industries and Logistics Management, cover different use cases of
Blockchain Technology for Manufacturing Industries and Logistics
Management, and will discuss the role, impact and challenges of
adopting Blockchain in Manufacturing industries and Logistics
Management. The chapters will also provide the current open issues
and future research trends of Blockchain, especially for
Manufacturing Industries and Logistics, and will encapsulate
quantitative and qualitative research for a wide spectrum of
readers of the book.
Steganography is the art of secret writing. The purpose of
steganography is to hide the presence of a message from the
intruder by using state-of-the-art methods, algorithms,
architectures, models, and methodologies in the domains of cloud,
internet of things (IoT), and the Android platform. Though security
controls in cloud computing, IoT, and Android platforms are not
much different than security controls in an IT environment, they
might still present different types of risks to an organization
than the classic IT solutions. Therefore, a detailed discussion is
needed in case there is a breach in security. It is important to
review the security aspects of cloud, IoT, and Android platforms
related to steganography to determine how this new technology is
being utilized and improved continuously to protect information
digitally. The benefits and challenges, along with the current and
potential developments for the future, are important keystones in
this critical area of security research. Multidisciplinary Approach
to Modern Digital Steganography reviews the security aspects of
cloud, IoT, and Android platforms related to steganography and
addresses emerging security concerns, new algorithms, and case
studies in the field. Furthermore, the book presents a new approach
to secure data storage on cloud infrastructure and IoT along with
including discussions on optimization models and security controls
that could be implemented. Other important topics include data
transmission, deep learning techniques, machine learning, and both
image and text stenography. This book is essential for forensic
engineers, forensic analysts, cybersecurity analysts, cyber
forensic examiners, security engineers, cybersecurity network
analysts, cyber network defense analysts, and digital forensic
examiners along with practitioners, researchers, academicians, and
students interested in the latest techniques and state-of-the-art
methods in digital steganography.
This new book discusses the concepts while also highlighting the
challenges in the field of quantum cryptography and also covering
cryptographic techniques and cyber security techniques, in a single
volume. It comprehensively covers important topics in the field of
quantum cryptography with applications, including quantum key
distribution, position-based quantum cryptography, quantum
teleportation, quantum e-commerce, quantum cloning, cyber security
techniques' architectures and design, cyber security techniques
management, software-defined networks, and cyber security
techniques for 5G communication. The text also discusses the
security of practical quantum key distribution systems,
applications and algorithms developed for quantum cryptography, as
well as cyber security through quantum computing and quantum
cryptography. The text will be beneficial for graduate students,
academic researchers, and professionals working in the fields of
electrical engineering, electronics and communications engineering,
computer science, and information technology.
Blockchain technology has the potential to utterly transform supply
chains, streamline processes, and improve the whole of security.
Manufacturers across the globe face challenges with forecasting
demand, controlling inventory, and accelerating digital
transformation to cater to the challenges of changing market
dynamics and evolving customer expectations. Hence, blockchain
should be seen as an investment in future-readiness and
customer-centricity, not as an experimental technology. Utilizing
Blockchain Technologies in Manufacturing and Logistics Management
explores the strengths of blockchain adaptation in manufacturing
industries and logistics management, which include product
traceability, supply chain transparency, compliance monitoring, and
auditability, and also examines the current open issues and future
research trends of blockchain. Leveraging blockchain technology
into a manufacturing enterprise can enhance its security and reduce
the rates of systematic failures. Covering topics such as fraud
detection, Industry 4.0, and security threats, this book is a ready
premier reference for graduate and post-graduate students,
academicians, researchers, industrialists, consultants, and
entrepreneurs, as well as micro, small, and medium enterprises.
Steganography is the art of secret writing. The purpose of
steganography is to hide the presence of a message from the
intruder by using state-of-the-art methods, algorithms,
architectures, models, and methodologies in the domains of cloud,
internet of things (IoT), and the Android platform. Though security
controls in cloud computing, IoT, and Android platforms are not
much different than security controls in an IT environment, they
might still present different types of risks to an organization
than the classic IT solutions. Therefore, a detailed discussion is
needed in case there is a breach in security. It is important to
review the security aspects of cloud, IoT, and Android platforms
related to steganography to determine how this new technology is
being utilized and improved continuously to protect information
digitally. The benefits and challenges, along with the current and
potential developments for the future, are important keystones in
this critical area of security research. Multidisciplinary Approach
to Modern Digital Steganography reviews the security aspects of
cloud, IoT, and Android platforms related to steganography and
addresses emerging security concerns, new algorithms, and case
studies in the field. Furthermore, the book presents a new approach
to secure data storage on cloud infrastructure and IoT along with
including discussions on optimization models and security controls
that could be implemented. Other important topics include data
transmission, deep learning techniques, machine learning, and both
image and text stenography. This book is essential for forensic
engineers, forensic analysts, cybersecurity analysts, cyber
forensic examiners, security engineers, cybersecurity network
analysts, cyber network defense analysts, and digital forensic
examiners along with practitioners, researchers, academicians, and
students interested in the latest techniques and state-of-the-art
methods in digital steganography.
|
You may like...
One Life
Anthony Hopkins
Blu-ray disc
R207
Discovery Miles 2 070
|