Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

GUPTA EMPIRE
  • Language: en
  • Pages: 118

GUPTA EMPIRE

Embark on a captivating journey through the golden age of ancient India with our MCQ guide - "Gupta Empire Chronicles: MCQ Expedition through Ancient Indian Splendor." Tailored for history enthusiasts, students, and admirers of classical civilizations, this comprehensive resource offers a curated collection of multiple-choice questions that unveil the grandeur of the Gupta Empire. Explore the cultural flourishing, scientific advancements, and societal structures that defined this influential empire. Delve into the tales of renowned rulers, the contributions to art and literature, and the enduring legacy of the Gupta period. Perfect your understanding of the Gupta Empire and prepare confidently for exams. Elevate your historical acumen and immerse yourself in the splendor of ancient Indian history with "Gupta Empire Chronicles: MCQ Expedition through Ancient Indian Splendor." Uncover the secrets of the Gupta Empire with precision and depth.

Internet of Things Security
  • Language: en
  • Pages: 115

Internet of Things Security

  • Type: Book
  • -
  • Published: 2020-02-24
  • -
  • Publisher: CRC Press

The Internet of Things (IoT), with its technological advancements and massive innovations, is building the idea of inter-connectivity among everyday life objects. With an explosive growth in the number of Internet-connected devices, the implications of the idea of IoT on enterprises, individuals, and society are huge. IoT is getting attention from both academia and industry due to its powerful real-time applications that raise demands to understand the entire spectrum of the field. However, due to increasing security issues, safeguarding the IoT ecosystem has become an important concern. With devices and information becoming more exposed and leading to increased attack possibilities, adequat...

Monetary Planning for India
  • Language: en
  • Pages: 260

Monetary Planning for India

None

Secure Searchable Encryption and Data Management
  • Language: en
  • Pages: 93

Secure Searchable Encryption and Data Management

  • Type: Book
  • -
  • Published: 2021-03-16
  • -
  • Publisher: CRC Press

With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it’s a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.

Handbook of Research on AI and ML for Intelligent Machines and Systems
  • Language: en

Handbook of Research on AI and ML for Intelligent Machines and Systems

The Handbook of Research on AI and ML for Intelligent Machines and Systems offers a comprehensive exploration of the pivotal role played by artificial intelligence (AI) and machine learning (ML) technologies in the development of intelligent machines. As the demand for intelligent machines continues to rise across various sectors, understanding the integration of these advanced technologies becomes paramount. While AI and ML have individually showcased their capabilities in developing robust intelligent machine systems and services, their fusion holds the key to propelling intelligent machines to a new realm of transformation. This handbook bridges the gap by presenting a comprehensive under...

Security, Privacy, and Forensics Issues in Big Data
  • Language: en
  • Pages: 456

Security, Privacy, and Forensics Issues in Big Data

  • Type: Book
  • -
  • Published: 2019-08-30
  • -
  • Publisher: IGI Global

With the proliferation of devices connected to the internet and connected to each other, the volume of data collected, stored, and processed is increasing every day, which brings new challenges in terms of information security. As big data expands with the help of public clouds, traditional security solutions tailored to private computing infrastructures and confined to a well-defined security perimeter, such as firewalls and demilitarized zones (DMZs), are no longer effective. New security functions are required to work over the heterogenous composition of diverse hardware, operating systems, and network domains. Security, Privacy, and Forensics Issues in Big Data is an essential research book that examines recent advancements in big data and the impact that these advancements have on information security and privacy measures needed for these networks. Highlighting a range of topics including cryptography, data analytics, and threat detection, this is an excellent reference source for students, software developers and engineers, security analysts, IT consultants, academicians, researchers, and professionals.

SSC CHSL (10+2) Combined Higher Secondary Tier 1 Guide 2022
  • Language: en
  • Pages: 675

SSC CHSL (10+2) Combined Higher Secondary Tier 1 Guide 2022

1. Master Guide CHSL provides complete coverage of syllabus. 2. Divided into 4 sections it gives complete overview of the theories. 3. 5 Section Tests are given in each chapter to indicate the examination trend. 4. 3 solved papers and Previous Years’ questions are encrypted for better understanding. 5. The book also contains 3 Mock Tests for rigorous practice. Every year the Staff Selection Commission (SSC) conducts SSC CHSL exams to recruit eligible candidates for various posts such as LDC, JSA, DEO, PA and SA in various departments of the Government of India. The book “Master Guide CHSL” is strictly prepared according to the prescribed syllabus for the aspirants of CHSL (10+2) Tier I...

Distributed Denial of Service (DDoS) Attacks
  • Language: en
  • Pages: 107

Distributed Denial of Service (DDoS) Attacks

  • Type: Book
  • -
  • Published: 2021-03-01
  • -
  • Publisher: CRC Press

The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them. Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classifica...

Data Mining Approaches for Big Data and Sentiment Analysis in Social Media
  • Language: en
  • Pages: 313

Data Mining Approaches for Big Data and Sentiment Analysis in Social Media

  • Type: Book
  • -
  • Published: 2021-12-31
  • -
  • Publisher: IGI Global

Social media sites are constantly evolving with huge amounts of scattered data or big data, which makes it difficult for researchers to trace the information flow. It is a daunting task to extract a useful piece of information from the vast unstructured big data; the disorganized structure of social media contains data in various forms such as text and videos as well as huge real-time data on which traditional analytical methods like statistical approaches fail miserably. Due to this, there is a need for efficient data mining techniques that can overcome the shortcomings of the traditional approaches. Data Mining Approaches for Big Data and Sentiment Analysis in Social Media encourages resea...

Security and Privacy Preserving for IoT and 5G Networks
  • Language: en
  • Pages: 283

Security and Privacy Preserving for IoT and 5G Networks

This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.