Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Transforming Cybersecurity Solutions using Blockchain
  • Language: en
  • Pages: 234

Transforming Cybersecurity Solutions using Blockchain

This book is targeted towards cybersecurity professionals (especially those dealing with cloud security) or any stakeholders dealing with cybersecurity who want to understand the next level of security infrastructure using blockchain. The book's security and privacy analysis help with an understanding of the basics of blockchain, and it explores the quantifying impact of the new attack surfaces introduced by blockchain technologies and platforms. In addition, the book contains relevant and current updates on the topic. It follows a practical approach to help understand how blockchain technology is used to transform cybersecurity solutions.

Bioenergy
  • Language: en
  • Pages: 301

Bioenergy

This contributed volume discusses the impact of bioenergy on the environment and economy. The book contents include contributions on themes, such as the impact of emulsified biofuels on the environment, environmental impacts of the current uses of biomass energy, sustainable development in ecosystem, trends in microbial fuel cells and the ecological and economic impacts on biofuel production, among others. The book also uses visual elements to aid learning. This book is a valuable, hands-on resource for researchers, academics and industry professionals, who are interested in alternative fuels, sustainability, clean energy, biofuel production, waste management, environmental pollution, renewable energy and allied fields.

Advances in Cyber Security Analytics and Decision Systems
  • Language: en
  • Pages: 153

Advances in Cyber Security Analytics and Decision Systems

This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.

Data Analysis and Related Applications, Volume 1
  • Language: en
  • Pages: 484

Data Analysis and Related Applications, Volume 1

The scientific field of data analysis is constantly expanding due to the rapid growth of the computer industry and the wide applicability of computational and algorithmic techniques, in conjunction with new advances in statistical, stochastic and analytic tools. There is a constant need for new, high-quality publications to cover the recent advances in all fields of science and engineering. This book is a collective work by a number of leading scientists, computer experts, analysts, engineers, mathematicians, probabilists and statisticians who have been working at the forefront of data analysis and related applications. The chapters of this collaborative work represent a cross-section of current concerns, developments and research interests in the above scientific areas. The collected material has been divided into appropriate sections to provide the reader with both theoretical and applied information on data analysis methods, models and techniques, along with related applications.

Image Processing and Capsule Networks
  • Language: en
  • Pages: 829

Image Processing and Capsule Networks

This book emphasizes the emerging building block of image processing domain, which is known as capsule networks for performing deep image recognition and processing for next-generation imaging science. Recent years have witnessed the continuous development of technologies and methodologies related to image processing, analysis and 3D modeling which have been implemented in the field of computer and image vision. The significant development of these technologies has led to an efficient solution called capsule networks [CapsNet] to solve the intricate challenges in recognizing complex image poses, visual tasks, and object deformation. Moreover, the breakneck growth of computation complexities ...

Wireless Communication in Cyber Security
  • Language: en
  • Pages: 293

Wireless Communication in Cyber Security

WIRELESS COMMUNICATION in CYBERSECURITY Presenting the concepts and advances of wireless communication in cybersecurity, this volume, written and edited by a global team of experts, also goes into the practical applications for the engineer, student, and other industry professionals. Rapid advancement in wireless communications and related technologies has led to the use of newer technologies like 6G, Internet of Things (IoT), Radar, and others. Not only are the technologies expanding, but the impact of wireless communication is also changing, becoming an inevitable part of daily life. With increased use comes great responsibilities and challenges for any newer technology. The growing risks ...

3rd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing
  • Language: en
  • Pages: 258

3rd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing

This book features the proceedings of The EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2020), which took place 18 – 19 December 2020. The papers feature detail on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference focuses on technologies from knowledge representation techniques and natural language processing algorithms to dynamic learning approaches. Topics covered include Data Science for Cognitive Analysis, Real-Time Ubiquitous Data Science, Platform for Privacy Preserving Data Science, and Internet-Based Cognitive Platform.

Business Intelligence for Enterprise Internet of Things
  • Language: en
  • Pages: 289

Business Intelligence for Enterprise Internet of Things

This book discusses Internet of Things (IoT) as it relates to enterprise applications, systems, and infrastructures. The authors discuss IoT and how it’s disrupting industries such as enterprise manufacturing, enterprise transportation, enterprise smart market, enterprise utilities, and enterprise healthcare. They cover how IoT in the enterprise will have a major impact on the lives of consumers and professionals around the world and how it will change the way we think about professional and consumer networks. The book's topics include IoT enterprise system architecture, IoT enabling enterprise technologies, and IoT enterprise services and applications. Examples include enterprise on demand, market impacts, and implications on smart technologies, big data enterprise management, and future enterprise Internet design for various IoT use cases, such as share markets, healthcare, smart cities, smart environments, smart communications and smart homes.

Advances in Artificial Intelligence and Machine Learning in Big Data Processing
  • Language: en
  • Pages: 342
Computer Networks and Inventive Communication Technologies
  • Language: en
  • Pages: 1212

Computer Networks and Inventive Communication Technologies

This book is a collection of peer-reviewed best selected research papers presented at 3rd International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2020). The book covers new results in theory, methodology, and applications of computer networks and data communications. It includes original papers on computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings of this conference is a valuable resource, dealing with both the important core and the specialized issues in the areas of next generation wireless network design, control, and management, as well as in the areas of protection, assurance, and trust in information security practice. It is a reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners for advance work in the area.