You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Embark on a captivating journey through the golden age of ancient India with our MCQ guide - "Gupta Empire Chronicles: MCQ Expedition through Ancient Indian Splendor." Tailored for history enthusiasts, students, and admirers of classical civilizations, this comprehensive resource offers a curated collection of multiple-choice questions that unveil the grandeur of the Gupta Empire. Explore the cultural flourishing, scientific advancements, and societal structures that defined this influential empire. Delve into the tales of renowned rulers, the contributions to art and literature, and the enduring legacy of the Gupta period. Perfect your understanding of the Gupta Empire and prepare confidently for exams. Elevate your historical acumen and immerse yourself in the splendor of ancient Indian history with "Gupta Empire Chronicles: MCQ Expedition through Ancient Indian Splendor." Uncover the secrets of the Gupta Empire with precision and depth.
The Internet of Things (IoT), with its technological advancements and massive innovations, is building the idea of inter-connectivity among everyday life objects. With an explosive growth in the number of Internet-connected devices, the implications of the idea of IoT on enterprises, individuals, and society are huge. IoT is getting attention from both academia and industry due to its powerful real-time applications that raise demands to understand the entire spectrum of the field. However, due to increasing security issues, safeguarding the IoT ecosystem has become an important concern. With devices and information becoming more exposed and leading to increased attack possibilities, adequat...
With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it’s a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.
The Handbook of Research on AI and ML for Intelligent Machines and Systems offers a comprehensive exploration of the pivotal role played by artificial intelligence (AI) and machine learning (ML) technologies in the development of intelligent machines. As the demand for intelligent machines continues to rise across various sectors, understanding the integration of these advanced technologies becomes paramount. While AI and ML have individually showcased their capabilities in developing robust intelligent machine systems and services, their fusion holds the key to propelling intelligent machines to a new realm of transformation. This handbook bridges the gap by presenting a comprehensive under...
With the proliferation of devices connected to the internet and connected to each other, the volume of data collected, stored, and processed is increasing every day, which brings new challenges in terms of information security. As big data expands with the help of public clouds, traditional security solutions tailored to private computing infrastructures and confined to a well-defined security perimeter, such as firewalls and demilitarized zones (DMZs), are no longer effective. New security functions are required to work over the heterogenous composition of diverse hardware, operating systems, and network domains. Security, Privacy, and Forensics Issues in Big Data is an essential research book that examines recent advancements in big data and the impact that these advancements have on information security and privacy measures needed for these networks. Highlighting a range of topics including cryptography, data analytics, and threat detection, this is an excellent reference source for students, software developers and engineers, security analysts, IT consultants, academicians, researchers, and professionals.
1. Master Guide CHSL provides complete coverage of syllabus. 2. Divided into 4 sections it gives complete overview of the theories. 3. 5 Section Tests are given in each chapter to indicate the examination trend. 4. 3 solved papers and Previous Years’ questions are encrypted for better understanding. 5. The book also contains 3 Mock Tests for rigorous practice. Every year the Staff Selection Commission (SSC) conducts SSC CHSL exams to recruit eligible candidates for various posts such as LDC, JSA, DEO, PA and SA in various departments of the Government of India. The book “Master Guide CHSL” is strictly prepared according to the prescribed syllabus for the aspirants of CHSL (10+2) Tier I...
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them. Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classifica...
Social media sites are constantly evolving with huge amounts of scattered data or big data, which makes it difficult for researchers to trace the information flow. It is a daunting task to extract a useful piece of information from the vast unstructured big data; the disorganized structure of social media contains data in various forms such as text and videos as well as huge real-time data on which traditional analytical methods like statistical approaches fail miserably. Due to this, there is a need for efficient data mining techniques that can overcome the shortcomings of the traditional approaches. Data Mining Approaches for Big Data and Sentiment Analysis in Social Media encourages resea...
This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.