Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Mobile Edge Computing and Communications
  • Language: en
  • Pages: 293

Mobile Edge Computing and Communications

An up-to-dated and comprehensive guide to mobile edge computing and communications Mobile Edge Computing and Communications offers a practical guide to mobile edge computing and communications (MEC). With contributions from noted experts on the topic, the book covers the design, deployment, and operational aspects of this rapidly growing domain. The text provides the information needed to understand the mainstream system architectures and integration methods that have been proposed in MEC. In addition, the book clearly illustrates critical lifecycle functions and stages of MEC, and shows how to deploy MEC in 5G and beyond mobile networks. Comprehensive in scope, the book contains discussions...

Web and Big Data
  • Language: en
  • Pages: 274

Web and Big Data

  • Type: Book
  • -
  • Published: 2017-11-07
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the First APWeb-WAIM 2017 Workshops, held jointly with the First International Joint Conference APWeb-WAIM 2017, held in Beijing, China, in July 2017. The 25 full papers presented were carefully reviewed and selected from 40 submissions. The papers originating from six workshops present cutting-edge ideas, results, experiences, techniques, and tools from all aspects of web data management with the focus on mobile web data analytics; big spatial data and urban computing; graph data management and analytics; mobility analytics from spatial and social data.

Passive and Active Measurement
  • Language: en
  • Pages: 292

Passive and Active Measurement

  • Type: Book
  • -
  • Published: 2013-03-15
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 14th International Conference on Passive and Active Measurement, PAM 2013, held in Hong Kong, China, in March 2013. The 24 revised full papers presented were carefully reviewed and selected from 74 submissions. The papers have been organized in the following topical sections: measurement design, experience and analysis; Internet wireless and mobility; performance measurement; protocol and application behavior; characterization of network usage; and network security and privacy. In addition, 9 poster abstracts have been included.

Network and System Security
  • Language: en
  • Pages: 505

Network and System Security

  • Type: Book
  • -
  • Published: 2018-12-18
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 12th International Conference on Network and System Security, NSS 2018, held in Hong Kong, China, in August 2018. The 26 revised full papers and 9 short papers presented in this book were carefully reviewed and selected from 88 initial submissions. The papers cover a wide range of topics in the field, including blockchain, mobile security, applied cryptography, authentication, biometrics, IoT, privacy, and education.

The Wiley 5G REF
  • Language: en
  • Pages: 340

The Wiley 5G REF

THE WILEY 5G REF Explore cutting-edge subjects in 5G privacy and security In The Wiley 5G REF: Security, a team of distinguished researchers delivers an insightful collection of articles selected from the online-only The Wiley 5G Reference. The editors introduce the security landscape of 5G, including the significant security and privacy risks associated with 5G networks. They also discuss different security solutions for various segments of the 5G network, like the radio, edge, access, and core networks. The book explores the security threats associated with key network softwarization technologies, like SDN, NFV, NS, and MEC, as well as those that come with new 5G and IoT services. There is...

Social Engineering in Cybersecurity
  • Language: en
  • Pages: 204

Social Engineering in Cybersecurity

  • Type: Book
  • -
  • Published: 2024-06-28
  • -
  • Publisher: CRC Press

In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation. Social engineering attacks have emerged as a formidable and often underestimated threat to information security. The primary aim of this textbook is to provide a comprehensive and in-depth exploration of social engineering attacks. The book seeks to equip cybersecurity professionals, IT practitioners, students, and anyone concerned with information security with the knowledge and tools needed to recognize, prevent, and mitigate the risks posed by social engineering. The scope of this textbook is broad and multifaceted. It c...

Mobile Computing, Applications, and Services
  • Language: en
  • Pages: 296

Mobile Computing, Applications, and Services

  • Type: Book
  • -
  • Published: 2018-05-05
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Mobile Computing, Applications, and Services (MobiCASE 2015) held in Osaka, Japan, February 28 – March 2, 2018. The 10 full papers and 13 demo/ poster papers were carefully reviewed and selected from 35 submissions. The conference papers are covering intelligent caching; activity recognition and crowdsourcing; mobile frameworks; middleware; interactive applications; and mobility.

Theses on the Metaphors of Digital-Textual History
  • Language: en
  • Pages: 458

Theses on the Metaphors of Digital-Textual History

Digital spaces are saturated with metaphor: we have pages, sites, mice, and windows. Yet, in the world of digital textuality, these metaphors no longer function as we might expect. Martin Paul Eve calls attention to the digital-textual metaphors that condition our experience of digital space, and traces their history as they interact with physical cultures. Eve posits that digital-textual metaphors move through three life phases. Initially they are descriptive. Then they encounter a moment of fracture or rupture. Finally, they go on to have a prescriptive life of their own that conditions future possibilities for our text environments—even when the metaphors have become untethered from the...

Orchestrating a Resource-aware Edge
  • Language: en
  • Pages: 122

Orchestrating a Resource-aware Edge

More and more services are moving to the cloud, attracted by the promise of unlimited resources that are accessible anytime, and are managed by someone else. However, hosting every type of service in large cloud datacenters is not possible or suitable, as some emerging applications have stringent latency or privacy requirements, while also handling huge amounts of data. Therefore, in recent years, a new paradigm has been proposed to address the needs of these applications: the edge computing paradigm. Resources provided at the edge (e.g., for computation and communication) are constrained, hence resource management is of crucial importance. The incoming load to the edge infrastructure varies...

Cyber Threat Intelligence for the Internet of Things
  • Language: en
  • Pages: 98

Cyber Threat Intelligence for the Internet of Things

This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperat...