|
Showing 1 - 11 of
11 matches in All Departments
This book provides the state-of-the-art development on security and
privacy for fog/edge computing, together with their system
architectural support and applications. This book is organized into
five parts with a total of 15 chapters. Each area corresponds to an
important snapshot. The first part of this book presents an
overview of fog/edge computing, focusing on its relationship with
cloud technology and the future with the use of 5G communication.
Several applications of edge computing are discussed. The second
part of this book considers several security issues in fog/edge
computing, including the secure storage and search services,
collaborative intrusion detection method on IoT-fog computing, and
the feasibility of deploying Byzantine agreement protocols in
untrusted environments. The third part of this book studies the
privacy issues in fog/edge computing. It first investigates the
unique privacy challenges in fog/edge computing, and then discusses
a privacy-preserving framework for the edge-based video analysis, a
popular machine learning application on fog/edge. This book also
covers the security architectural design of fog/edge computing,
including a comprehensive overview of vulnerabilities in fog/edge
computing within multiple architectural levels, the security and
intelligent management, the implementation of
network-function-virtualization-enabled multicasting in part four.
It explains how to use the blockchain to realize security services.
The last part of this book surveys applications of fog/edge
computing, including the fog/edge computing in Industrial IoT,
edge-based augmented reality, data streaming in fog/edge computing,
and the blockchain-based application for edge-IoT. This book is
designed for academics, researchers and government officials,
working in the field of fog/edge computing and cloud computing.
Practitioners, and business organizations (e.g., executives, system
designers, and marketing professionals), who conduct teaching,
research, decision making, and designing fog/edge technology will
also benefit from this book The content of this book will be
particularly useful for advanced-level students studying computer
science, computer technology, and information systems, but also
applies to students in business, education, and economics, who
would benefit from the information, models, and case studies
therein.
When Hong Kong is reunited with China on 1 July 1997 China will
face a great challenge: to preserve the prosperity and stability
that Hong Kong has achieved under the British legacy of a
democratic free-enterprise system and an efficient but
noninterfering government. China proposes to link its own
traditionally socialist economy and communist political system with
Hong Kong under a 'one country-two systems' plan. Cultural and
historical forces suggest that this marriage of opposites may well
succeed.
Intelligent Cyber-Physical Systems Security for Industry 4.0:
Applications, Challenges and Management presents new cyber-physical
security findings for Industry 4.0 using emerging technologies like
artificial intelligence (with machine/deep learning), data mining,
applied mathematics. All these are the essential components for
processing data, recognizing patterns, modeling new techniques, and
improving the advantages of data science. Features * Presents an
integrated approach with Cyber-Physical Systems, CPS security, and
Industry 4.0 in one place * Exposes the necessity of security
initiatives, standards, security policies, and procedures in the
context of industry 4.0 * Suggests solutions for enhancing the
protection of 5G and the Internet of Things (IoT) security *
Promotes how optimization or intelligent techniques envisage the
role of artificial intelligence-machine/deep learning (AI-ML/DL) in
cyberphysical systems security for industry 4.0 This book is
primarily aimed at graduates, researchers and professionals working
in the field of security. Executives concerned with security
management, knowledge dissemination, information, and policy
development for data and network security in different educational,
government, and non-government organizations will also find this
book useful.
This book provides the state-of-the-art development on security and
privacy for fog/edge computing, together with their system
architectural support and applications. This book is organized into
five parts with a total of 15 chapters. Each area corresponds to an
important snapshot. The first part of this book presents an
overview of fog/edge computing, focusing on its relationship with
cloud technology and the future with the use of 5G communication.
Several applications of edge computing are discussed. The second
part of this book considers several security issues in fog/edge
computing, including the secure storage and search services,
collaborative intrusion detection method on IoT-fog computing, and
the feasibility of deploying Byzantine agreement protocols in
untrusted environments. The third part of this book studies the
privacy issues in fog/edge computing. It first investigates the
unique privacy challenges in fog/edge computing, and then discusses
a privacy-preserving framework for the edge-based video analysis, a
popular machine learning application on fog/edge. This book also
covers the security architectural design of fog/edge computing,
including a comprehensive overview of vulnerabilities in fog/edge
computing within multiple architectural levels, the security and
intelligent management, the implementation of
network-function-virtualization-enabled multicasting in part four.
It explains how to use the blockchain to realize security services.
The last part of this book surveys applications of fog/edge
computing, including the fog/edge computing in Industrial IoT,
edge-based augmented reality, data streaming in fog/edge computing,
and the blockchain-based application for edge-IoT. This book is
designed for academics, researchers and government officials,
working in the field of fog/edge computing and cloud computing.
Practitioners, and business organizations (e.g., executives, system
designers, and marketing professionals), who conduct teaching,
research, decision making, and designing fog/edge technology will
also benefit from this book The content of this book will be
particularly useful for advanced-level students studying computer
science, computer technology, and information systems, but also
applies to students in business, education, and economics, who
would benefit from the information, models, and case studies
therein.
2D games are hugely popular across a wide range of platforms and
the ideal place to start if you're new to game development. With
Learn 2D Game Development with C#, you'll learn your way around the
universal building blocks of game development, and how to put them
together to create a real working game. C# is increasingly becoming
the language of choice for new game developers. Productive and
easier to learn than C++, C# lets you get your games working
quickly and safely without worrying about tricky low-level details
like memory management. This book uses MonoGame, an open source
framework that's powerful, free to use and easy to handle, to
further reduce low-level details, meaning you can concentrate on
the most interesting and universal aspects of a game development:
frame, camera, objects and particles, sprites, and the logic and
simple physics that determines how they interact. In each chapter,
you'll explore one of these key elements of game development in the
context of a working game, learn how to implement the example for
yourself, and integrate it into your own game library. At the end
of the book, you'll put everything you've learned together to build
your first full working game! And what's more, MonoGame is designed
for maximum cross-platform support, so once you've mastered the
fundamentals in this book, you'll be ready to explore and publish
games on a wide range of platforms including Windows 8, MAC OSX,
Windows Phone, iOS, Android, and Playstation Mobile. Whether you're
starting a new hobby or considering a career in game development,
Learn 2D Game Development with C# is the ideal place to start.
This book comprises select proceedings of the 4th International
Conference on Innovative Computing (IC 2021) focusing on
cutting-edge research carried out in the areas of information
technology, science, and engineering. Some of the themes covered in
this book are cloud communications and networking, high performance
computing, architecture for secure and interactive IoT, satellite
communication, wearable network and system, infrastructure
management, etc. The essays are written by leading international
experts, making it a valuable resource for researchers and
practicing engineers alike.
This book gathers the proceedings of the 11th International
Conference on Frontier Computing, held in Seoul, on July 13-17,
2021, and provides comprehensive coverage of the latest advances
and trends in information technology, science, and engineering. It
addresses a number of broad themes, including communication
networks, business intelligence and knowledge management, Web
intelligence, and related fields that inspire the development of
information technology. The respective contributions cover a wide
range of topics: database and data mining, networking and
communications, Web and Internet of things, embedded systems, soft
computing, social network analysis, security and privacy, optical
communication, and ubiquitous/pervasive computing. Many of the
papers outline promising future research directions, and the book
benefits students, researchers, and professionals alike. Further,
it offers a useful reference guide for newcomers to the field.
This book gathers the proceedings of the 10th International
Conference on Frontier Computing, held in Singapore, on July 10-13,
2020, and provides comprehensive coverage of the latest advances
and trends in information technology, science, and engineering. It
addresses a number of broad themes, including communication
networks, business intelligence and knowledge management, web
intelligence, and related fields that inspire the development of
information technology. The respective contributions cover a wide
range of topics: database and data mining, networking and
communications, web and Internet of things, embedded systems, soft
computing, social network analysis, security and privacy, optical
communication, and ubiquitous/pervasive computing. Many of the
papers outline promising future research directions, and the book
benefits students, researchers, and professionals alike. Further,
it offers a useful reference guide for newcomers to the field.
|
|