Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 7 of 7 matches in All Departments
This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
This book highlights the recent research on hybrid intelligent systems and their various practical applications. It presents 34 selected papers from the 18th International Conference on Hybrid Intelligent Systems (HIS 2019) and 9 papers from the 15th International Conference on Information Assurance and Security (IAS 2019), which was held at VIT Bhopal University, India, from December 10 to 12, 2019. A premier conference in the field of artificial intelligence, HIS - IAS 2019 brought together researchers, engineers and practitioners whose work involves intelligent systems, network security and their applications in industry. Including contributions by authors from 20 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.
This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks. However, security was never the prime focus during the development of the IoT, hence vendors have sold IoT solutions without thorough preventive measures. The idea of incorporating networking appliances in IoT systems is relatively new, and hence IoT security has not always been considered in the product design. To improve security, an IoT device that needs to be directly accessible over the Internet should be segmented into its own network, and have general network access restricted. The network segment should be monitored to identify potential anomalous traffic, and action should be taken if a problem arises. This has generated an altogether new area of research, which seeks possible solutions for securing the devices, and communication amongst them. Internet of Things Security: Fundamentals, Techniques and Applications provides a comprehensive overview of the overall scenario of IoT Security whilst highlighting recent research and applications in the field. Technical topics discussed in the book include: * Machine-to-Machine Communications * IoT Architecture * Identity of Things * Block Chain * Parametric Cryptosystem * Software and Cloud Components
This book constitutes the thoroughly refereed proceedings of the Second Iberoamerican Conference, KGSWC 2020, held in Merida, Mexico, in November 2020. Due to the COVID-19 pandemic the conference was held online. The 15 papers presented were carefully reviewed and selected from 45 submissions. The papers cover research and practices in several fields of AI, such as knowledge representation and reasoning, natural language processing/text mining, machine/deep learning, semantic web, and knowledge graphs.
Soft computing and nature-inspired computing both play a significant role in developing a better understanding to machine learning. When studied together, they can offer new perspectives on the learning process of machines. The Handbook of Research on Soft Computing and Nature-Inspired Algorithms is an essential source for the latest scholarly research on applications of nature-inspired computing and soft computational systems. Featuring comprehensive coverage on a range of topics and perspectives such as swarm intelligence, speech recognition, and electromagnetic problem solving, this publication is ideally designed for students, researchers, scholars, professionals, and practitioners seeking current research on the advanced workings of intelligence in computing systems.
Data structure is a way of organizing data in a computer memory so that it can be used efficiently. Data structures can implement one or more particular abstract data types (ADT), which are the means of specifying the nature of operations and their complexity. This book focuses on the design and analysis of basic data structures and their implementation and intends to provide a strong conceptual and empirical understanding of data structures. The contents of this book will help the students to understand that how the data structures are implemented and why these implementations are vital. The initial chapters deal with introductory part of the subject and the later chapters focus on advanced and difficult problems and algorithms. The book explains how data is organized in computer memory; how it operates; and why it is important. Appendixes provide further information on algorithms along with their programming solutions. Readers of this book need only to be familiar with the basic syntax of C/C++ and similar languages. This book will be useful for B.Tech/M.Tech Computer Science and Engineering, IT Engineering, BSc (IT)/MSc (IT), and BCA/MCA students.
|
You may like...
The Hobbit: An Unexpected Journey
Martin Freeman, Ian McKellen, …
Blu-ray disc
(4)
R45 Discovery Miles 450
|