Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 28 matches in All Departments
This book addresses one of the most overlooked practical, methodological, and moral questions in the journey to secure and handle the massive amount of data being generated from smart devices interactions: the integration of Blockchain with 5G-enabled IoT. After an overview, this book discusses open issues and challenges, which may hinder the growth of Blockchain technology. Then, this book presents a variety of perspectives on the most pressing questions in the field, such as: how IoT can connect billions of objects together; how the access control mechanisms in 5G-enabled industrial environment works; how to address the real-time and quality-of-service requirements for industrial applications; and how to ensure scalability and computing efficiency. Also, it includes a detailed discussions on the complexity of adoption of Blockchain for 5G-Enabled IoT and presents comparative case studies with respect to various performance evaluation metrics such as scalability, data management, standardization, interoperability and regulations, accessibility, human-factors engineering and interfaces, reliability, heterogeneity, and QoS requirements. This book acts as a professional guide for the practitioners in information security and related topics.
This book provides an analysis of the role of fog computing, cloud computing, and Internet of Things in providing uninterrupted context-aware services as they relate to Healthcare 4.0. The book considers a three-layer patient-driven healthcare architecture for real-time data collection, processing, and transmission. It gives insight to the readers for the applicability of fog devices and gateways in Healthcare 4.0 environments for current and future applications. It also considers aspects required to manage the complexity of fog computing for Healthcare 4.0 and also develops a comprehensive taxonomy.
This book discusses the unique nature and complexity of fog data analytics (FDA) and develops a comprehensive taxonomy abstracted into a process model. The exponential increase in sensors and smart gadgets (collectively referred as smart devices or Internet of things (IoT) devices) has generated significant amount of heterogeneous and multimodal data, known as big data. To deal with this big data, we require efficient and effective solutions, such as data mining, data analytics and reduction to be deployed at the edge of fog devices on a cloud. Current research and development efforts generally focus on big data analytics and overlook the difficulty of facilitating fog data analytics (FDA). This book presents a model that addresses various research challenges, such as accessibility, scalability, fog nodes communication, nodal collaboration, heterogeneity, reliability, and quality of service (QoS) requirements, and includes case studies demonstrating its implementation. Focusing on FDA in IoT and requirements related to Industry 4.0, it also covers all aspects required to manage the complexity of FDA for IoT applications and also develops a comprehensive taxonomy.
Hospitals, medical practices and healthcare organizations are implementing new technologies at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of data security and privacy issues, fines, damage to their reputations, with serious potential consequences for the patients. Electronic Health Record systems (EHRs) consist of clinical notes, patient listings, lab results, imaging results and screening tests. EHRs are growing in complexity over time and requiring increasing amounts of data storage. With the development of the IoT, the Cloud and Smart Cities frameworks, new privacy and security methods are being pursued to secure healthcare-based systems and platforms. Presenting a detailed framework as well as comparative case studies for security protection, data integrity, privacy preservation, scalability, and healthcare legislation, this edited volume covers state of the art research and addresses privacy and security methods and technologies for EHRs.
This book presents the Fifth International Conference on Safety and Security with IoT (SaSeIoT 2021), which took place online. The conference aims to explore not only IoT and its related critical applications but also IoT towards Security and Safety. The conference solicits original and inspiring research contributions from experts, researchers, designers, and practitioners in academia, industry and related fields and provides a common platform to share knowledge, experience and best practices in various domains of IoT.
This book presents various areas related to cybersecurity. Different techniques and tools used by cyberattackers to exploit a system are thoroughly discussed and analyzed in their respective chapters. The content of the book provides an intuition of various issues and challenges of cybersecurity that can help readers to understand and have awareness about it. It starts with a very basic introduction of security, its varied domains, and its implications in any working organization; moreover, it will talk about the risk factor of various attacks and threats. The concept of privacy and anonymity has been taken into consideration in consecutive chapters. Various topics including, The Onion Router (TOR) and other anonymous services, are precisely discussed with a practical approach. Further, chapters to learn the importance of preventive measures such as intrusion detection system (IDS) are also covered. Due to the existence of severe cyberattacks, digital forensics is a must for investigating the crime and to take precautionary measures for the future occurrence of such attacks. A detailed description of cyberinvestigation is covered in a chapter to get readers acquainted with the need and demands. This chapter deals with evidence collection from the victim's device and the system that has importance in the context of an investigation. Content covered in all chapters is foremost and reported in the current trends in several journals and cybertalks. The proposed book is helpful for any reader who is using a computer or any such electronic gadget in their daily routine. The content of the book is prepared to work as a resource to any undergraduate and graduate-level student to get aware about the concept of cybersecurity, various cyberattacks, and threats in the security. In addition to that, it aimed at assisting researchers and developers to build a strong foundation for security provisioning in any newer technology which they are developing.
This book presents best selected papers presented at the International Conference on Evolving Technologies for Computing, Communication and Smart World (ETCCS 2020) held on 31 January-1 February 2020 at C-DAC, Noida, India. It is co-organized by Southern Federal University, Russia; University of Jan Wyzykowski (UJW), Polkowice, Poland; and CSI, India. C-DAC, Noida received funding from MietY during the event. The technical services are supported through EasyChair, Turnitin, MailChimp and IAC Education. The book includes current research works in the areas of network and computing technologies, wireless networks and Internet of things (IoT), futuristic computing technologies, communication technologies, security and privacy.
This book explores opportunities and challenges in the field of IoE security and privacy under the umbrella of distributed ledger technologies and blockchain technology including distributed consensus mechanisms, crypto-sensors, encryption algorithms, and fault tolerance mechanisms for devices and systems. It focusses on the applicability of blockchain technology including architectures and platforms for blockchain and IoE, authentication and encryption algorithms for IoE, malicious transactions detection, blockchain for forensics and so forth. Outlines the major benefits as well as challenges associated with integration of blockchain with IoE Describes detailed framework to provide security in IoE using blockchain technology Reviews various issues while using distributed ledger technologies for IoE Provides comprehensive coverage of blockchain for IoE in securing information including encryption schemes, authentication, security issues, and challenges Includes case studies in realistic situations like healthcare informatics, smart industry, and smart transportation This book is aimed at researchers and graduate students in computing, cryptography, IoT, computer engineering, and networks.
The book intends to present emerging Federated Learning (FL) based architectures, frameworks, and models in Internet-of-Medical Things (IoMT) applications. It intends to build up onto the basics of healthcare industry, the current data sharing requirements, and security and privacy issues in medical data sharing. Once IoMT is presented, the shift is towards the proposal of privacy-preservation in IoMT, and explains how FL presents a viable solution to these challenges. The claims are supported through lucid illustrations, tables, and examples that presents effective and secured FL schemes, simulations, and practical discussion on use-case scenarios in simple manner. The book tends to create opportunities of healthcare communities to build effective FL solutions around the presented themes, and the divergent ideas that prosper from reading the book. It also intends to present breakthroughs and foster innovation in FL-based research, specifically in IoMT domain. The emphasis is on understanding the contributions of IoMT in healthcare analytics and its aim is to give the insights including evolution, research directions, challenges and the way to empower healthcare services through federated learning. The book also intends to cover the issues of ethical and social issues around the recent advancements in the field of decentralized Artificial Intelligence. The book is mainly intended for undergraduates, post-graduates, researchers, and healthcare professionals who wish to learn FL-based solutions right from scratch, and build practical FL solutions in different IoMT verticals.
This book addresses the Internet of Things (IoT), an essential topic in the technology industry, policy, and engineering circles, and one that has become headline news in both the specialty press and the popular media. The book focuses on energy efficiency concerns in IoT and the requirements related to Industry 4.0. It is the first-ever "how-to" guide on frequently overlooked practical, methodological, and moral questions in any nations' journey to reducing energy consumption in IoT devices. The book discusses several examples of energy-efficient IoT, ranging from simple devices like indoor temperature sensors, to more complex sensors (e.g. electrical power measuring devices), actuators (e.g. HVAC room controllers, motors) and devices (e.g. industrial circuit-breakers, PLC for home, building or industrial automation). It provides a detailed approach to conserving energy in IoT devices, and comparative case studies on performance evaluation metrics, state-of-the-art approaches, and IoT legislation.
This book provides a comprehensive overview of blockchain for 6G-enabled network-based applications. Following the key services of blockchain technology, this book will be instrumental to ideate and understand the necessities, challenges, and various case studies of different 6G-based applications. The emphasis is on understanding the contributions of blockchain technology in 6G-enabled applications, and its aim is to give insights into evolution, research directions, challenges, and the ways to empower 6G applications through blockchain. The book consistently emphasizes the missing connection between blockchain and 6G-enabled network applications. The entire ecosystem between these two futuristic technologies is explained in a comprehensive manner. The book constitutes a one-stop guide to students, researchers, and industry professionals. The book progresses from a general introduction toward more technical aspects while remaining easy to understand throughout. Comprehensive elaboration of material is supplemented with examples and diagrams, followed by easily understandable approaches with regard to technical information given thereon. Blockchain and its applications in 6G-enabled applications can drive many powerful solutions to real-world technical, scientific, and social problems. This book presents the most recent and exciting advances in blockchain for 6G-enabled network applications. Overall, this book is a complete outlet and is designed exclusively for professionals, scientists, technologists, developers, designers, and researchers in network technologies around blockchain integration with IoT, blockchain technology, information technology, and 6G-enabled industrial applications. Secondary readers include professionals involved in policy making and administration, security of public data and law, network policy developers, blockchain technology experts, regulators, and decision makers in government administrations.
Fully focused on addressing the missing connection between signal processing and ML. Provides one-stop guide reference for the readers. Oriented towards the material and flow with regard to general introduction, technical aspects. Comprehensively elaborates on the material with examples and.
A secured system for Healthcare 4.0 is vital to all stakeholders, including patients and caregivers. Using the new Blockchain system of trusted ledgers would help guarantee authenticity in the multi-access system that is Healthcare 4.0. This is the first comprehensive book that explores how to achieve secure systems for Healthcare 4.0 using Blockchain, with emphasis on the key challenges of privacy and security. The book is organized into four sections. The first section is focused on 5G healthcare privacy and security concerns. The second section discusses healthcare architecture and emerging technologies. The third section covers the role of artificial intelligence for data security and privacy in 5G healthcare services. Finally, the last section systematically illustrates the adoption of blockchain in various applications of 5G healthcare. The book is essential reading for all involved in setting up, running, and maintaining healthcare information systems. Engineers, scientists, technologists, developers, designers, and researchers in healthcare technologies, health informatics, security, and information technology will find the content particularly useful.
This book provides an analysis of the role of fog computing, cloud computing, and Internet of Things in providing uninterrupted context-aware services as they relate to Healthcare 4.0. The book considers a three-layer patient-driven healthcare architecture for real-time data collection, processing, and transmission. It gives insight to the readers for the applicability of fog devices and gateways in Healthcare 4.0 environments for current and future applications. It also considers aspects required to manage the complexity of fog computing for Healthcare 4.0 and also develops a comprehensive taxonomy.
This book discusses the unique nature and complexity of fog data analytics (FDA) and develops a comprehensive taxonomy abstracted into a process model. The exponential increase in sensors and smart gadgets (collectively referred as smart devices or Internet of things (IoT) devices) has generated significant amount of heterogeneous and multimodal data, known as big data. To deal with this big data, we require efficient and effective solutions, such as data mining, data analytics and reduction to be deployed at the edge of fog devices on a cloud. Current research and development efforts generally focus on big data analytics and overlook the difficulty of facilitating fog data analytics (FDA). This book presents a model that addresses various research challenges, such as accessibility, scalability, fog nodes communication, nodal collaboration, heterogeneity, reliability, and quality of service (QoS) requirements, and includes case studies demonstrating its implementation. Focusing on FDA in IoT and requirements related to Industry 4.0, it also covers all aspects required to manage the complexity of FDA for IoT applications and also develops a comprehensive taxonomy.
This book features selected research papers presented at the Second International Conference on Computing, Communications, and Cyber-Security (IC4S 2020), organized in Krishna Engineering College (KEC), Ghaziabad, India, along with Academic Associates; Southern Federal University, Russia; IAC Educational, India; and ITS Mohan Nagar, Ghaziabad, India during 3-4 October 2020. It includes innovative work from researchers, leading innovators, and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues.
This book features selected research papers presented at the First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019), organized by Northwest Group of Institutions, Punjab, India, Southern Federal University, Russia, and IAC Educational Trust, India along with KEC, Ghaziabad and ITS, College Ghaziabad as an academic partner and held on 12-13 October 2019. It includes innovative work from researchers, leading innovators and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues.
Blockchain is an emerging technology platform for developing decentralized applications and data storage, over and beyond its role as the technology underlying the cryptocurrencies. The basic tenet of this platform is that it allows one to create a distributed and replicated ledger of events, transactions, and data generated through various IT processes with strong cryptographic guarantees of tamper resistance, immutability, and verifiability. Public blockchain platforms allow us to guarantee these properties with overwhelming probabilities even when untrusted users are participants of distributed applications with the ability to transact on the platform. Even though, blockchain technology has become popularly known because of its use in the implementation of cryptocurrencies such as BitCoin, Ethereum, etc.; the technology itself holds much more promise in various areas such as time stamping, logging of critical events in a system, recording of transactions, trustworthy e-governance, etc. It introduces theoretical and practical aspects of blockchain technology. The book includes an in-depth insight into the need for decentralization, smart contracts, consensus both permissioned and permissionless, and various blockchain development frameworks, tools, and platforms. It can be used as a learning resource for various examinations and certifications related to cryptocurrency and blockchain technology. This book explained the nuts and bolts of blockchain technology in lucid language to make students more familiar with the implementation perspective of this much-needed technology.
Blockchain Applications for Healthcare Informatics: Beyond 5G offers a comprehensive survey of 5G-enabled technology in healthcare applications. This book investigates the latest research in blockchain technologies and seeks to answer some of the practical and methodological questions surrounding privacy and security in healthcare. It explores the most promising aspects of 5G for healthcare industries, including how hospitals and healthcare systems can do better. Chapters investigate the detailed framework needed to maintain security and privacy in 5G healthcare services using blockchain technologies, along with case studies that look at various performance evaluation metrics, such as privacy preservation, scalability and healthcare legislation.
Cyber-Physical Systems (CPS) integrate computing and communication capabilities by monitoring and controlling the physical systems via embedded hardware and computers. This book brings together new and futuristic findings on IoT, Cyber Physical Systems and Robotics leading towards Automation and solving issues of various critical applications in Real-time. The book initially overviews the concepts of IoT, IIoT and Cyber Physical Systems followed by various critical applications and discusses the latest designs and developments that provide common solutions for the convergence of technologies. In addition, the book specifies methodologies, algorithms and other relevant architectures in various fields that include Automation, Robotics, Smart Agriculture and Industry 4.0. The book is intended for practitioners, enterprise representatives, scientists, students and Ph.D Scholars in hopes of steering research further towards cyber physical systems design and development and implementation across various domains. Additionally, this book can be used as a secondary reference, or rather one-stop guide, by professionals for real-life implementation of cyber physical systems. The book highlights: * A Critical Coverage of various domains: IoT, Cyber Physical Systems, Industry 4.0, Smart Automation and related critical applications. * Advanced elaborations for target audiences to understand the conceptual methodology and future directions of cyber physical systems and IoT. * An approach towards Research Orientations to enable researchers to point out areas and scope for implementation of Cyber Physical Systems in several domains for better productivity.
This book presents best selected papers presented at the Second International Conference on Emerging Technologies for Computing, Communication and Smart Cities (ETCCS 2021) held on 21-22 August 2021 at BFCET, Punjab, India. IEI India members supported externally. It is co-organized by Southern Federal University, Russia; University of Jan Wyzykowski (UJW), Polkowice, Poland, SD College of Engineering & Technology, Muzaffarnagar Nagar, India as an academic partner and CSI, India for technical support. The book includes current research works in the areas of network and computing technologies, wireless networks and Internet of things (IoT), futuristic computing technologies, communication technologies, security and privacy.
Blockchain is an emerging technology platform for developing decentralized applications and data storage, over and beyond its role as the technology underlying the cryptocurrencies. The basic tenet of this platform is that it allows one to create a distributed and replicated ledger of events, transactions, and data generated through various IT processes with strong cryptographic guarantees of tamper resistance, immutability, and verifiability. Public blockchain platforms allow us to guarantee these properties with overwhelming probabilities even when untrusted users are participants of distributed applications with the ability to transact on the platform. Even though, blockchain technology has become popularly known because of its use in the implementation of cryptocurrencies such as BitCoin, Ethereum, etc.; the technology itself holds much more promise in various areas such as time stamping, logging of critical events in a system, recording of transactions, trustworthy e-governance, etc. It introduces theoretical and practical aspects of blockchain technology. The book includes an in-depth insight into the need for decentralization, smart contracts, consensus both permissioned and permissionless, and various blockchain development frameworks, tools, and platforms. It can be used as a learning resource for various examinations and certifications related to cryptocurrency and blockchain technology. This book explained the nuts and bolts of blockchain technology in lucid language to make students more familiar with the implementation perspective of this much-needed technology.
This book presents various areas related to cybersecurity. Different techniques and tools used by cyberattackers to exploit a system are thoroughly discussed and analyzed in their respective chapters. The content of the book provides an intuition of various issues and challenges of cybersecurity that can help readers to understand and have awareness about it. It starts with a very basic introduction of security, its varied domains, and its implications in any working organization; moreover, it will talk about the risk factor of various attacks and threats. The concept of privacy and anonymity has been taken into consideration in consecutive chapters. Various topics including, The Onion Router (TOR) and other anonymous services, are precisely discussed with a practical approach. Further, chapters to learn the importance of preventive measures such as intrusion detection system (IDS) are also covered. Due to the existence of severe cyberattacks, digital forensics is a must for investigating the crime and to take precautionary measures for the future occurrence of such attacks. A detailed description of cyberinvestigation is covered in a chapter to get readers acquainted with the need and demands. This chapter deals with evidence collection from the victim's device and the system that has importance in the context of an investigation. Content covered in all chapters is foremost and reported in the current trends in several journals and cybertalks. The proposed book is helpful for any reader who is using a computer or any such electronic gadget in their daily routine. The content of the book is prepared to work as a resource to any undergraduate and graduate-level student to get aware about the concept of cybersecurity, various cyberattacks, and threats in the security. In addition to that, it aimed at assisting researchers and developers to build a strong foundation for security provisioning in any newer technology which they are developing.
This edited book is comprised of original research that focuses on technological advancements for effective teaching with an emphasis on learning outcomes, ICT trends in higher education, sustainable developments and digital ecosystem in education, management and industries. The contents of the book are classified as; (i) Emerging ICT Trends in Education, Management and Innovations (ii) Digital Technologies for advancements in education, management and IT (iii) Emerging Technologies for Industries and Education, and (iv) ICT Technologies for Intelligent Applications. The book represents a useful tool for academics, researchers, industry professionals and policymakers to share and learn about the latest teaching and learning practices supported by ICT. It also covers innovative concepts applied in education, management and industries using ICT tools.
This book addresses one of the most overlooked practical, methodological, and moral questions in the journey to secure and handle the massive amount of data being generated from smart devices interactions: the integration of Blockchain with 5G-enabled IoT. After an overview, this book discusses open issues and challenges, which may hinder the growth of Blockchain technology. Then, this book presents a variety of perspectives on the most pressing questions in the field, such as: how IoT can connect billions of objects together; how the access control mechanisms in 5G-enabled industrial environment works; how to address the real-time and quality-of-service requirements for industrial applications; and how to ensure scalability and computing efficiency. Also, it includes a detailed discussions on the complexity of adoption of Blockchain for 5G-Enabled IoT and presents comparative case studies with respect to various performance evaluation metrics such as scalability, data management, standardization, interoperability and regulations, accessibility, human-factors engineering and interfaces, reliability, heterogeneity, and QoS requirements. This book acts as a professional guide for the practitioners in information security and related topics. |
You may like...
Discovering Daniel - Finding Our Hope In…
Amir Tsarfati, Rick Yohn
Paperback
|