You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"This book presents in-depth insight through a case study approach into the current state of research in ICT as well as identified successful approaches, tools and methodologies in ICT research"--Provided by publisher.
Technological innovation and evolution continues to improve personal and professional lifestyles, as well as general organizational and business practices; however, these advancements also create potential issues in the security and privacy of the user’s information. Innovative Solutions for Access Control Management features a comprehensive discussion on the trending topics and emergent research in IT security and governance. Highlighting theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management, this publication is a pivotal reference source for researchers, practitioners, students, database vendors, and organizations within the information technology and computer science fields.
One of the main aspects of an organization is the efficiency of managerial concerns, daily interactions and the design and implementation of its business system. Therefore, integrating the latest technology is vital in assisting in the performance and productivity improvement of an organization. Cases on Performance Measurement and Productivity Improvement: Technology Integration and Maturity highlights the successes and failures which have shaped the modern business as well as the technological solutions taken to improve the organizational system. Providing essential research on these applied innovations, this collection of case studies appeals to both academics and practitioners in the business and IT management fields.
Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.
The edited book Intelligent Wireless Sensor Networks and Internet of Things: Algorithms, Methodologies and Applications is intended to discuss the progression of recent as well as future generation technologies for WSNs and IoTs applications through Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL). In general, computing time is obviously increased when the massive data is required from sensor nodes in WSN’s. the novel technologies such as 5G and 6G provides enough bandwidth for large data transmissions, however, unbalanced links faces the novel constraints on the geographical topology of the sensor networks. Above and beyond, data transmission congestion and data...
As information resources migrate to the Cloud and to local and global networks, protecting sensitive data becomes ever more important. In the modern, globally-interconnected world, security and privacy are ubiquitous concerns. Next Generation Wireless Network Security and Privacy addresses real-world problems affecting the security of information communications in modern networks. With a focus on recent developments and solutions, as well as common weaknesses and threats, this book benefits academicians, advanced-level students, researchers, computer scientists, and software development specialists. This cutting-edge reference work features chapters on topics including UMTS security, procedural and architectural solutions, common security issues, and modern cryptographic algorithms, among others.
Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.
"This book presents in-depth insight through a case study approach into the current state of research in ICT as well as identified successful approaches, tools and methodologies in ICT research"--Provided by publisher.
The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.
Information technology is everywhere. As we continue to expand our use of ICT in all aspects of our lives, the use of information communication technology has been developed in support of engaging citizens in the government decision making process. Cases on Progressions and Challenges in ICT Utilization for Citizen-Centric Governance is a collection of case studies on the advancements and challenges of information technology in the involvements of citizens with the government. With contributions from authors around the world, this compilation is relevant to researchers, academics, and practitioners who wish to stay informed of the new world of technology in the government.