Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Security Breaches and Threat Prevention in the Internet of Things
  • Language: en
  • Pages: 290

Security Breaches and Threat Prevention in the Internet of Things

  • Type: Book
  • -
  • Published: 2017-02-01
  • -
  • Publisher: IGI Global

As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.

Handbook of Research on the Internet of Things Applications in Robotics and Automation
  • Language: en
  • Pages: 433

Handbook of Research on the Internet of Things Applications in Robotics and Automation

  • Type: Book
  • -
  • Published: 2019-09-13
  • -
  • Publisher: IGI Global

With near-universal internet access and ever-advancing electronic devices, the ability to facilitate interactions between various hardware and software provides endless possibilities. Though internet of things (IoT) technology is becoming more popular among individual users and companies, more potential applications of this technology are being sought every day. There is a need for studies and reviews that discuss the methodologies, concepts, and possible problems of a technology that requires little or no human interaction between systems. The Handbook of Research on the Internet of Things Applications in Robotics and Automation is a pivotal reference source on the methods and uses of advancing IoT technology. While highlighting topics including traffic information systems, home security, and automatic parking, this book is ideally designed for network analysts, telecommunication system designers, engineers, academicians, technology specialists, practitioners, researchers, students, and software developers seeking current research on the trends and functions of this life-changing technology.

Advanced Information Technology, Services and Systems
  • Language: en
  • Pages: 522

Advanced Information Technology, Services and Systems

  • Type: Book
  • -
  • Published: 2017-11-10
  • -
  • Publisher: Springer

This book includes the proceedings of the International Conference on Advanced Information Technology, Services and Systems (AIT2S-17) held on April 14–15, 2017 in Tangier, Morocco. Presenting the latest research in the field, it stimulates debate, discusses new challenges and provides insights into the field in order to promote closer interaction and interdisciplinary collaboration between researchers and practitioners. Intended for researchers and practitioners in advanced information technology/management and networking, the book is also of interest to those in emergent fields such as data science and analytics, big data, Internet of Things, smart networked systems, artificial intelligence and expert systems, pattern recognition, and cloud computing.

Security in Computing and Communications
  • Language: en
  • Pages: 457

Security in Computing and Communications

  • Type: Book
  • -
  • Published: 2014-08-27
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2014, held in Delhi, India, in September 2013. The 36 revised full papers presented together with 12 work-in-progress papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on security and privacy in networked systems; authentication and access control systems; encryption and cryptography; system and network security; work-in-progress.

Computational Methods and Data Engineering
  • Language: en
  • Pages: 563

Computational Methods and Data Engineering

The book features original papers from International Conference on Computational Methods and Data Engineering (ICCMDE 2021), organized by School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu, India, during November 25–26, 2021. The book covers innovative and cutting-edge work of researchers, developers, and practitioners from academia and industry working in the area of advanced computing.

Recent Trends in Networks and Communications
  • Language: en
  • Pages: 742

Recent Trends in Networks and Communications

The Second International Conference on Networks and Communications (NeCoM 2010), the Second International Conference on Wireless and Mobile Networks (WiMoN 2010), and the Second International Conference on Web and Semantic Technology (WeST 2010) were held in Chennai, India, during July 23–25, 2010. They attracted many local and int- national delegates, presenting a balanced mixture of intellects from the East and from the West. The goal of these conferences is to bring together researchers and practitioners from academia and industry to focus on understanding computer networks, wireless networks, mobile networks and the Web, semantic technologies and to establish new collaborations in thes...

Recent Trends in Wireless and Mobile Networks
  • Language: en
  • Pages: 443

Recent Trends in Wireless and Mobile Networks

  • Type: Book
  • -
  • Published: 2011-06-16
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the Third International Conference on Wireless, Mobile Networks, WiMo 2011, and of The Third International Conference on Computer Networks and Communications, CoNeCo 2011, held in Ankara, Turkey, in June 2011. The 40 revised full papers presented were carefully reviewed and selected from 202 submissions.

Managing Security Services in Heterogenous Networks
  • Language: en
  • Pages: 120

Managing Security Services in Heterogenous Networks

  • Type: Book
  • -
  • Published: 2020-12-31
  • -
  • Publisher: CRC Press

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters...

Intelligent Systems Design and Applications
  • Language: en
  • Pages: 1158

Intelligent Systems Design and Applications

  • Type: Book
  • -
  • Published: 2019-04-11
  • -
  • Publisher: Springer

This book highlights recent research on Intelligent Systems and Nature Inspired Computing. It presents 212 selected papers from the 18th International Conference on Intelligent Systems Design and Applications (ISDA 2018) and the 10th World Congress on Nature and Biologically Inspired Computing (NaBIC), which was held at VIT University, India. ISDA-NaBIC 2018 was a premier conference in the field of Computational Intelligence and brought together researchers, engineers and practitioners whose work involved intelligent systems and their applications in industry and the “real world.” Including contributions by authors from over 40 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.

Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism
  • Language: en
  • Pages: 396

Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism

  • Type: Book
  • -
  • Published: 2019-05-31
  • -
  • Publisher: IGI Global

Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional education. However, multidisciplinary research can and will also improve the extent to which a country can protect its critical and vital assets. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism is an essential scholarly publication that provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity to understand the multidisciplinary nature of intelligence and science in order to improve current intelligence activities and contribute to the protection of the nation. Each chapter of the book discusses various components of science that should be applied to the intelligence arena. Featuring coverage on a range of topics including cybersecurity, economics, and political strategy, this book is ideal for law enforcement, intelligence and security practitioners, students, educators, and researchers.