You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
As we enter the Industrial Revolution 4.0, demands for an increasing degree of trust and privacy protection continue to be voiced. The development of blockchain technology is very important because it can help frictionless and transparent financial transactions and improve the business experience, which in turn has far-reaching effects for economic, psychological, educational and organizational improvements in the way we work, teach, learn and care for ourselves and each other. Blockchain is an eccentric technology, but at the same time, the least understood and most disruptive technology of the day. This book covers the latest technologies of cryptocurrencies and blockchain technology and t...
This comprehensive and timely book, New Age Analytics: Transforming the Internet through Machine Learning, IoT, and Trust Modeling, explores the importance of tools and techniques used in machine learning, big data mining, and more. The book explains how advancements in the world of the web have been achieved and how the experiences of users can be analyzed. It looks at data gathering by the various electronic means and explores techniques for analysis and management, how to manage voluminous data, user responses, and more. This volume provides an abundance of valuable information for professionals and researchers working in the field of business analytics, big data, social network data, computer science, analytical engineering, and forensic analysis. Moreover, the book provides insights and support from both practitioners and academia in order to highlight the most debated aspects in the field.
The internet is established in most households worldwide and used for entertainment purposes, shopping, social networking, business activities, banking, telemedicine, and more. As more individuals and businesses use this essential tool to connect with each other and consumers, more private data is exposed to criminals ready to exploit it for their gain. Thus, it is essential to continue discussions involving policies that regulate and monitor these activities, and anticipate new laws that should be implemented in order to protect users. Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications examines current internet and data protection laws and their impact on user experience and cybercrime, and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security and threats. Highlighting a range of topics such as online privacy and security, hacking, and online threat protection, this multi-volume book is ideally designed for IT specialists, administrators, policymakers, researchers, academicians, and upper-level students.
Recent years have seen a surge of interest in ‘the commons’ based on a simple yet radical idea: great improvements in production and management could be achieved by reducing barriers to knowledge exchange and power-sharing. Ranging from meadows, forests and parks to language, open-source software (FLOSS and Blockchain) and 3D printers, the commons are distributed or common property resources/infrastructures that are self-managed by their user communities. While acknowledging the significant contributions that can be made through commons-based peer production, this book provides a critical examination of the commons with the aim of contributing to their long-term sustainability. In partic...
Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.
This book includes high-quality research papers presented at the Third International Conference on Innovative Computing and Communication (ICICC 2020), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on 21–23 February, 2020. Introducing the innovative works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.
Forensic science is playing an increasingly important role in criminal investigations, as it provides scientific methods and techniques to gather and analyse evidence from crime scenes. Forensic evidence can be crucial in identifying suspects, linking them to the crime scene, and helping to secure convictions in court. In this sense, forensic science is seen as an aid to criminal investigation, providing reliable and objective evidence that can be used to uncover the truth behind criminal activities. The integration of forensic science with law and criminology is creating a new era of progressive thinking, where advanced techniques are being developed to better understand the nature of crime...
Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to these networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives but also by an inherent logistical bias that grants advantage to attackers. Research Anthology on Combating Denial-of-Service Attacks examines the latest research on the development of intrusion detection systems and best practices for preventing and combatting cyber-attacks intended to disrupt business and user experience. Highlighting a range of topics such as network administration, application-layer protocols, and malware detection, this publication is an ideal reference source for cybersecurity professionals, IT specialists, policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.
This book addresses the principles and applications of metaheuristic approaches in engineering and related fields. The first part covers metaheuristics tools and techniques such as ant colony optimization and Tabu search, and their applications to several classes of optimization problems. In turn, the book’s second part focuses on a wide variety of metaheuristics applications in engineering and/or the applied sciences, e.g. in smart grids and renewable energy. In addition, the simulation codes for the problems discussed are included in an appendix for ready reference. Intended for researchers aspiring to learn and apply metaheuristic techniques, and gathering contributions by prominent experts in the field, the book offers readers an essential introduction to metaheuristics, its theoretical aspects and applications.