Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Broadband Access Networks
  • Language: en
  • Pages: 385

Broadband Access Networks

Considering the key evolutions within the access network technologies as well as the unprecedented levels of bandwidth demands by end users, this book condenses the relentless research, design, and deployment experience of state-of-the-art access networks. Furthermore, it shares the critical steps and details of the developments and deployment of these emergent technologies; which is very crucial particularly as telecommunications vendors and carriers are looking for cost-effective ultra-broadband “last-mile” access solutions to stay competitive in the “post bubble” era. The book is written to provide a comprehensive overview of the major broadband access technologies and deployments involving internationally recognized authors and key players. Due to its scope and depth, the proposed book is able to fill an important gap of today’s available literature.

Innovations In Digital Forensics
  • Language: en
  • Pages: 343

Innovations In Digital Forensics

Digital forensics deals with the investigation of cybercrimes. With the growing deployment of cloud computing, mobile computing, and digital banking on the internet, the nature of digital forensics has evolved in recent years, and will continue to do so in the near future.This book presents state-of-the-art techniques to address imminent challenges in digital forensics. In particular, it focuses on cloud forensics, Internet-of-Things (IoT) forensics, and network forensics, elaborating on innovative techniques, including algorithms, implementation details and performance analysis, to demonstrate their practicality and efficacy. The innovations presented in this volume are designed to help various stakeholders with the state-of-the-art digital forensics techniques to understand the real world problems. Lastly, the book will answer the following questions: How do the innovations in digital forensics evolve with the emerging technologies? What are the newest challenges in the field of digital forensics?

Dying as a Shahid
  • Language: en
  • Pages: 312

Dying as a Shahid

Dying as a Shahid: Martyrs in Islam examines the motives, religious and psychological, which make the so-called “suicide bomber” tick. What is usually so-called, must rather be termed “Islamikaze” a combination of Islam and kamikaze, due to the phenomenological resemblance between the Japanese kamikaze who fought in the Pacific during World War II, and the present-day Muslim terrorists. In addition to the religious, social, and psychological underpinnings of the phenomenon of Shahid (martyr), there is a rich array of historical precedents that have fixated this sort of terrorism with self-immolation, dubbed “self-sacrifice,” as a prominent feature of Islamic life.

Towards an Optical Internet
  • Language: en
  • Pages: 397

Towards an Optical Internet

  • Type: Book
  • -
  • Published: 2013-06-05
  • -
  • Publisher: Springer

In these exciting times of quotidianly progressing developments in communication techniques, where more than ever in the history of a technological progress, society's reliance on communication networks for medicine, education, data transfer, commerce, and many other endeavours dominates the human's everyday life, the optical networks are certainly one of the most promising and challenging networking options. Since their commercial arrival in the nineties, they have fundamentally changed the way of dealing with traffic engineering by removing bandwidth bottlenecks and eliminating delays. Today, after the revolutionary bandwidth expansion, the networking functionality migrates more and more t...

Erased in a Moment
  • Language: en
  • Pages: 159

Erased in a Moment

Who is a Civilian?

Social Engineering in Cybersecurity
  • Language: en
  • Pages: 204

Social Engineering in Cybersecurity

  • Type: Book
  • -
  • Published: 2024-06-28
  • -
  • Publisher: CRC Press

In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation. Social engineering attacks have emerged as a formidable and often underestimated threat to information security. The primary aim of this textbook is to provide a comprehensive and in-depth exploration of social engineering attacks. The book seeks to equip cybersecurity professionals, IT practitioners, students, and anyone concerned with information security with the knowledge and tools needed to recognize, prevent, and mitigate the risks posed by social engineering. The scope of this textbook is broad and multifaceted. It c...

Edge Computing
  • Language: en
  • Pages: 188

Edge Computing

  • Type: Book
  • -
  • Published: 2018-11-09
  • -
  • Publisher: Springer

In this book, contributors provide insights into the latest developments of Edge Computing/Mobile Edge Computing, specifically in terms of communication protocols and related applications and architectures. The book provides help to Edge service providers, Edge service consumers, and Edge service developers interested in getting the latest knowledge in the area. The book includes relevant Edge Computing topics such as applications; architecture; services; inter-operability; data analytics; deployment and service; resource management; simulation and modeling; and security and privacy. Targeted readers include those from varying disciplines who are interested in designing and deploying Edge Computing. Features the latest research related to Edge Computing, from a variety of perspectives; Tackles Edge Computing in academia and industry, featuring a variety of new and innovative operational ideas; Provides a strong foundation for researchers to advance further in the Edge Computing domain.

NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
  • Language: en
  • Pages: 1487

NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems

  • Type: Book
  • -
  • Published: 2005-05-02
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 4th International IFIP-TC6 Networking Conference, NETWORKING 2005, held in Waterloo, Canada in May 2005. The 105 revised full papers and 36 posters were carefully reviewed and selected from 430 submissions. The papers are organized in topical sections on peer-to-peer networks, Internet protocols, wireless security, network security, wireless performance, network service support, network modeling and simulation, wireless LAN, optical networks, Internet performance and Web applications, ad-hoc networks, adaptive networks, radio resource management, Internet routing, queuing models, monitoring, network management, sensor networks, overlay multicast, QoS, wirless scheduling, multicast traffic management and engineering, mobility management, bandwith management, DCMA, and wireless resource management.

Proceedings of the International Conference on Applications of Machine Intelligence and Data Analytics (ICAMIDA 2022)
  • Language: en
  • Pages: 1027

Proceedings of the International Conference on Applications of Machine Intelligence and Data Analytics (ICAMIDA 2022)

This is an open access book. As on date, huge volumes of data are being generated through sensors, satellites, and simulators. Modern research on data analytics and its applications reveal that several algorithms are being designed and developed to process these datasets, either through the use of sequential and parallel processes. In the current scenario of Industry 4.0, data analytics, artificial intelligence and machine learning are being used to support decisions in space and time. Further, the availability of Graphical Processing Units (GPUs) and Tensor Processing Units (TPUs) have enabled to processing of these datasets. Some of the applications of Artificial Intelligence, Machine Lear...

Artificial Intelligence, Blockchain, Computing and Security Volume 1
  • Language: en
  • Pages: 1029

Artificial Intelligence, Blockchain, Computing and Security Volume 1

  • Type: Book
  • -
  • Published: 2023-12-01
  • -
  • Publisher: CRC Press

This book contains the conference proceedings of ICABCS 2023, a non-profit conference with the objective to provide a platform that allows academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad to exchange their research and innovative ideas in the field of Artificial Intelligence, Blockchain, Computing and Security. It explores the recent advancement in field of Artificial Intelligence, Blockchain, Communication and Security in this digital era for novice to profound knowledge about cutting edges in artificial intelligence, financial, secure transaction, monitoring, real time assistance and security for advanced stage lear...