Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Cases on ICT Utilization, Practice and Solutions: Tools for Managing Day-to-Day Issues
  • Language: en
  • Pages: 346

Cases on ICT Utilization, Practice and Solutions: Tools for Managing Day-to-Day Issues

  • Type: Book
  • -
  • Published: 2010-11-30
  • -
  • Publisher: IGI Global

"This book presents in-depth insight through a case study approach into the current state of research in ICT as well as identified successful approaches, tools and methodologies in ICT research"--Provided by publisher.

Handbook of Research on Security Considerations in Cloud Computing
  • Language: en
  • Pages: 409

Handbook of Research on Security Considerations in Cloud Computing

  • Type: Book
  • -
  • Published: 2015-07-28
  • -
  • Publisher: IGI Global

Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing in their organizations. The Handbook of Research on Security Considerations in Cloud Computing brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs, this book is an essential reference source for researchers, scholars, postgraduate students, and developers of cloud security systems.

NIGERIA: ECHOES OF A CENTURY
  • Language: en
  • Pages: 415

NIGERIA: ECHOES OF A CENTURY

  • Type: Book
  • -
  • Published: 2013-04-17
  • -
  • Publisher: AuthorHouse

ONE HUNDRED years past and gone, just like yesterday, and Nigeria is still in transition. Created on the vagaries of British imperialism, Lord Frederick Lugard, on January 1, 1914, unilaterally stitched together, two diametrically opposed Northern and Southern parts of the Niger bend to form an entity he called NIGERIA. Since then, Nigeria has remained changeless but with severe internal contradictions that threaten the shaky foundation on which it was formed. By the amalgamation of 1914, Nigeria marks her centenary in 2014 – a century that reverberates 46 years of colonial domination, which set the agenda for political instability and internal conflicts; 29 wasted years of incessant blood...

Cyber Crime: Concepts, Methodologies, Tools and Applications
  • Language: en
  • Pages: 1885

Cyber Crime: Concepts, Methodologies, Tools and Applications

  • Type: Book
  • -
  • Published: 2011-11-30
  • -
  • Publisher: IGI Global

Threatening the safety of individuals, computers, and entire networks, cyber crime attacks vary in severity and type. Studying this continually evolving discipline involves not only understanding different types of attacks, which range from identity theft to cyberwarfare, but also identifying methods for their prevention. Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law. As cyber crime continues to change and new types of threats emerge, research focuses on developing a critical understanding of different types of attacks and how they can best be managed and eliminated.

Handbook of Research on Information Communication Technology Policy: Trends, Issues and Advancements
  • Language: en
  • Pages: 994

Handbook of Research on Information Communication Technology Policy: Trends, Issues and Advancements

  • Type: Book
  • -
  • Published: 2010-07-31
  • -
  • Publisher: IGI Global

The Handbook of Research on Information Communication Technology Policy: Trends, Issues and Advancements provides a comprehensive and reliable source of information on current developments in information communication technologies. This source includes ICT policies; a guide on ICT policy formulation, implementation, adoption, monitoring, evaluation and application; and background information for scholars and researchers interested in carrying out research on ICT policies.

CLAT (PG) LLM Sample Practise Papers
  • Language: en
  • Pages: 154

CLAT (PG) LLM Sample Practise Papers

This book contains 50 sample papers with answers which are based on latest exam pattern given by CLAT Consortium. This books also contains previous year solved paper.

Advancing Consumer-Centric Fog Computing Architectures
  • Language: en
  • Pages: 217

Advancing Consumer-Centric Fog Computing Architectures

  • Type: Book
  • -
  • Published: 2018-12-07
  • -
  • Publisher: IGI Global

Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today’s technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative res...

Security Management in Mobile Cloud Computing
  • Language: en
  • Pages: 248

Security Management in Mobile Cloud Computing

  • Type: Book
  • -
  • Published: 2016-08-01
  • -
  • Publisher: IGI Global

Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern and developing effective methods to protect sensitive information and data on the cloud is imperative. Security Management in Mobile Cloud Computing explores the difficulties and challenges of securing user data and information on mobile cloud platforms. Investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms, this publication is an essential resource for IT specialists, researchers, and graduate-level students interested in mobile cloud computing concepts and security.

Technological Developments in Networking, Education and Automation
  • Language: en
  • Pages: 623

Technological Developments in Networking, Education and Automation

Technological Developments in Networking, Education and Automation includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the following areas: Computer Networks: Access Technologies, Medium Access Control, Network architectures and Equipment, Optical Networks and Switching, Telecommunication Technology, and Ultra Wideband Communications. Engineering Education and Online Learning: including development of courses and systems for engineering, technical and liberal studies programs; online laboratories; intelligent testing using fuzzy logic; taxonomy of e-courses; and evaluation of online courses. Pedagogy: including benchmar...

Security and Software for Cybercafes
  • Language: en
  • Pages: 360

Security and Software for Cybercafes

  • Type: Book
  • -
  • Published: 2008-04-30
  • -
  • Publisher: IGI Global

Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information, there is a need for their systems to have well-installed software in order to ensure smooth service delivery. Security and Software for Cybercafes provides relevant theoretical frameworks and current empirical research findings on the security measures and software necessary for cybercafes, offering information technology professionals, scholars, researchers, and educators detailed knowledge and understanding of this innovative and leading-edge issue, both in industrialized and developing countries.