You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This innovative resource provides comprehensive coverage of the policies, practices, and guidelines needed to address the security issues related to today's wireless sensor networks, satellite services, mobile e-services, and inter-system roaming and interconnecting systems. It details the major mobile standards for securing mobile communications and examines architectures that can provide data confidentiality, authentication, integrity, and privacy in various wireless environments. The book defines the roles and responsibilities that network operators, service providers, and even customers need to fulfill to assure mobile communications are as secure as they are prolific.
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle can be discovered, which has the propensity to propagate throughout mul- faceted disciplines. FGIT 2009...
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
Written by award-winning engineers whose research has been sponsored by the U.S. National Science Foundation (NSF), IBM, and Cisco's University Research Program, Wireless Sensor Networks: Principles and Practice addresses everything product developers and technicians need to know to navigate the field. It provides an all-inclusive examina
Advances In Digital Government presents a collection of in-depth articles that addresses a representative cross-section of the matrix of issues involved in implementing digital government systems. These articles constitute a survey of both the technical and policy dimensions related to the design, planning and deployment of digital government systems. The research and development projects within the technical dimension represent a wide range of governmental functions, including the provisioning of health and human services, management of energy information, multi-agency integration, and criminal justice applications. The technical issues dealt with in these projects include database and onto...
This book constitutes the refereed proceedings of the Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, held in St. Petersburg, Russia in September 2005. The 25 revised full papers and 12 revised short papers presented together with 5 invited papers were carefully reviewed and selected from a total of 85 submissions. The papers are organized in topical sections on mathematical models, architectures and protocols for computer network security, authentication, authorization and access control, information flow analysis, covert channels and trust management, security policy and operating system security, threat modeling, vulnerability assessment and network forensics, and intrusion detection.
Exploring the practical aspects of atmospheric optical communication and light detection and ranging (LIDAR), Applied Aspects of Optical Communication and LIDAR details the role of atmospheric structures in propagation phenomena that influence the transmission of optical signals through perturbed atmospheric communication channels. It examines nume
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay
Small and medium-sized enterprises (SMEs) play a critical role in rejuvenating and sustaining the modern economy, generating substantial employment and serving as important innovation engines for the global economy. Global Perspectives on Small and Medium Enterprises and Strategic Information Systems: International Approaches aims to spread research conducted on SMEs internationally and place it at the disposal of academics, practitioners, consultants, the vendor community, and policymakers. The goal of this book is to highlight the challenges faced by SMEs and how they are coping with the adverse environment through skillful use of IT and technologies such as Web 2.0, Enterprise Resource Planning (ERP), e-commerce, open source software, Business Process Digitization (BPD), and other emerging technologies.
This book discusses the evolution of future-generation technologies through the Internet of things, bringing together all the related technologies on a single platform to offer valuable insights for undergraduate and postgraduate students, researchers, academics and industry practitioners. The book uses data, network engineering and intelligent decision- support system-by-design principles to design a reliable IoT-enabled ecosystem and to implement cyber-physical pervasive infrastructure solutions. It takes readers on a journey that begins with understanding the insight paradigm of IoT-enabled technologies and how it can be applied. It walks readers through engaging with real-time challenges...