Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Cyber Security in Intelligent Computing and Communications
  • Language: en
  • Pages: 361

Cyber Security in Intelligent Computing and Communications

This book looks at cyber security challenges with topical advancements in computational intelligence and communication technologies. This book includes invited peer-reviewed chapters on the emerging intelligent computing and communication technology research advancements, experimental outcomes, and cyber security practices, threats, and attacks with challenges. The book begins with a state-of-the-art survey and reviews of cyber security trends and issues. It further covers areas such as developments in intelligent computing and communication, smart healthcare, agriculture, transportation, online education, and many more real-life applications using IoT, big data, cloud computing, artificial intelligence, data science, and machine learning. This book is of interest to graduate/postgraduate students, researchers, and academicians. This book will be a valuable resource for practitioners and professionals working in smart city visualization through secure and intelligent application design, development, deployment to foster digital revolution, and reliable integration of advanced computing and communication technologies with global significance.

Cloud Computing Enviroment
  • Language: en
  • Pages: 61

Cloud Computing Enviroment

The purpose of this is to explain the importance of HIPAA and research what it takes for Healthcare data to be HIPAA Compliant. Also, explaining what is expected of Healthcare industries if there is an audit and how does Auditing play a big part in HIPAA compliance.

Smart and Innovative Trends in Next Generation Computing Technologies
  • Language: en
  • Pages: 843

Smart and Innovative Trends in Next Generation Computing Technologies

  • Type: Book
  • -
  • Published: 2018-06-08
  • -
  • Publisher: Springer

The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.

International Conference on Remote Sensing and Wireless Communications (RSWC 2014)
  • Language: en
  • Pages: 486

International Conference on Remote Sensing and Wireless Communications (RSWC 2014)

International Conference on Remote Sensing and Wireless Communications (RSWC 2014) will be held from February 22nd to 23rd, 2014 in Shanghai, China. RSWC 2014 will bring together top researchers from Asian Pacific areas, North America, Europe and around the world to exchange research results and address open issues in all aspects of Remote Sensing and Wireless Communications. The RSWC 2014 welcomes the submission of original full research papers, short papers, posters, workshop proposals, tutorials, and industrial professional reports.

Emerging Technologies in Computer Engineering: Cognitive Computing and Intelligent IoT
  • Language: en
  • Pages: 750

Emerging Technologies in Computer Engineering: Cognitive Computing and Intelligent IoT

This book constitutes the refereed proceedings of the 5th International Conference on Emerging Technologies in Computer Engineering, ICETCE 2021, held in Jaipur, India, in February 2022. The 40 revised full papers along with 20 short papers presented were carefully reviewed and selected from 235 submissions. The papers are organized according to the following topical headings: ​cognitive computing; Internet of Things (IoT); machine learning and applications; soft computing; data science and big data analytics; blockchain and cyber security.

ICIDSSD 2020
  • Language: en
  • Pages: 606

ICIDSSD 2020

The International Conference on ICT for Digital, Smart, and Sustainable Development (ICIDSSD’20) aims to provide an annual platform for the researchers, academicians, and professionals from across the world. ICIDSSD’20, held at Jamia Hamdard, New Delhi, India, is the second international conference of this series of conferences to be held annually. The conference majorly focuses on the recent developments in the areas relating to Information and Communication Technologies and contributing to Sustainable Development. ICIDSSD’20 has attracted research papers pertaining to an array of exciting research areas. The selected papers cover a wide range of topics including but not limited to Su...

Next Generation Computing Technologies on Computational Intelligence
  • Language: en
  • Pages: 389

Next Generation Computing Technologies on Computational Intelligence

The 18 full and 13 short papers presented were carefully reviewed and selected from 255 submissions. There were organized in topical sections named: Image Processing, Pattern Analysis and Machine Vision; Information and Data Convergence; Disruptive Technologies for Future; E-Governance and Smart World

Cloud Computing Systems and Applications in Healthcare
  • Language: en
  • Pages: 303

Cloud Computing Systems and Applications in Healthcare

  • Type: Book
  • -
  • Published: 2016-08-30
  • -
  • Publisher: IGI Global

The implementation of cloud technologies in healthcare is paving the way to more effective patient care and management for medical professionals around the world. As more facilities start to integrate cloud computing into their healthcare systems, it is imperative to examine the emergent trends and innovations in the field. Cloud Computing Systems and Applications in Healthcare features innovative research on the impact that cloud technology has on patient care, disease management, and the efficiency of various medical systems. Highlighting the challenges and difficulties in implementing cloud technology into the healthcare field, this publication is a critical reference source for academicians, technology designers, engineers, professionals, analysts, and graduate students.

Machine Learning, Image Processing, Network Security and Data Sciences
  • Language: en
  • Pages: 665

Machine Learning, Image Processing, Network Security and Data Sciences

This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine Learning, Image Processing, Network Security and Data Sciences, MIND 2020, held in Silchar, India. Due to the COVID-19 pandemic the conference has been postponed to July 2020. The 79 full papers and 4 short papers were thoroughly reviewed and selected from 219 submissions. The papers are organized according to the following topical sections: data science and big data; image processing and computer vision; machine learning and computational intelligence; network and cyber security.

Fundamentals of Network Forensics
  • Language: en
  • Pages: 220

Fundamentals of Network Forensics

  • Type: Book
  • -
  • Published: 2016-11-25
  • -
  • Publisher: Springer

This timely text/reference presents a detailed introduction to the essential aspects of computer network forensics. The book considers not only how to uncover information hidden in email messages, web pages and web servers, but also what this reveals about the functioning of the Internet and its core protocols. This, in turn, enables the identification of shortcomings and highlights where improvements can be made for a more secure network. Topics and features: provides learning objectives in every chapter, and review questions throughout the book to test understanding; introduces the basic concepts of network process models, network forensics frameworks and network forensics tools; discusses various techniques for the acquisition of packets in a network forensics system, network forensics analysis, and attribution in network forensics; examines a range of advanced topics, including botnet, smartphone, and cloud forensics; reviews a number of freely available tools for performing forensic activities.