You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The ubiquity of modern technologies has allowed for increased connectivity between people and devices across the globe. This connected infrastructure of networks creates numerous opportunities for applications and uses. The Internet of Things: Breakthroughs in Research and Practice is an authoritative reference source for the latest academic material on the interconnectivity of networks and devices in the digital era and examines best practices for integrating this advanced connectivity across multiple fields. Featuring extensive coverage on innovative perspectives, such as secure computing, regulatory standards, and trust management, this book is ideally designed for engineers, researchers, professionals, graduate students, and practitioners seeking scholarly insights on the Internet of Things.
High-performance computing (HPC) describes the use of connected computing units to perform complex tasks. It relies on parallelization techniques and algorithms to synchronize these disparate units in order to perform faster than a single processor could, alone. Used in industries from medicine and research to military and higher education, this method of computing allows for users to complete complex data-intensive tasks. This field has undergone many changes over the past decade, and will continue to grow in popularity in the coming years. Innovative Research Applications in Next-Generation High Performance Computing aims to address the future challenges, advances, and applications of HPC and related technologies. As the need for such processors increases, so does the importance of developing new ways to optimize the performance of these supercomputers. This timely publication provides comprehensive information for researchers, students in ICT, program developers, military and government organizations, and business professionals.
This book explores the impact of industry 4.0 on agricultural supply chains, exploring how changes such as increased digitisation, automation, and the digital value chain, will impact food production globally. At a time when increasing population and environmental degradation puts stress on food supply chains, traditional farming operation models struggle to maintain both sustainability and transparency. Industry 4.0 could lead to digitalised ways of farming and agricultural production processes that will transform the traditional operating and process models to digital, data-intensive methods focusing on analytics and decision-making practices. This book aims to provider the reader with an ...
Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private “e-Discovery” industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.
Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.
The lack of clear communication, especially internationally, plagues the modern world in a variety of fields. Researchers and practitioners within the modern networking and communication industries strive to discover new and innovative ways for humans to better contact one another. Strategic Innovations and Interdisciplinary Perspectives in Telecommunications and Networking provides emerging research exploring the theoretical and practical aspects of network management and security, as well as applications within computer science, mobile and wireless computing, and multimedia technology. Featuring coverage on a broad range of topics such as coding theory, mobile devices, and contextual advertising, this book is ideal for students, researchers, social media marketers, brand managers, networking professionals, and engineers seeking current research on cross-disciplinary applications of electrical engineering, computer science, and information technology.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart...
The study is the result of a theological research and is based on current discussions on digitalization in Christian Social Ethics. The book answers questions such as: How can the Church use digitalization to advance her mission in the modern world? Since digitalization has redefined the landscape of evangelization and is now very much favoured by young people, how can the Church use digitalization to engage the young people in her mandate to evangelize the world? This work also examines how digitalization could be used to combat corruption, especially in the Nigerian public and private sectors. It suggests various measures by which internet fraud and corruption could be reduced, using digital tools. It stresses, however, that these measures can only have a positive outcome, if the government and its institutions are sincere and resolute in their determination to curb such corruption.
By the end of the decade, approximately 50 billion devices will be connected over the internet using multiple services such as online gaming, ultra-high definition videos, and 5G mobile services. The associated data traffic demand in both fixed and mobile networks is increasing dramatically, causing network operators to have to migrate the existing optical networks towards next-generation solutions. The main challenge within this development stems from network operators having difficulties finding cost-effective next-generation optical network solutions that can match future high capacity demand in terms of data, reach, and the number of subscribers to support multiple network services on a ...