Author: Saini, Hemraj
Publisher: IGI Global
ISBN: 1799834468
Category : Computers
Languages : en
Pages : 285
Book Description
Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one’s personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the current technological requirements. Large-Scale Data Streaming, Processing, and Blockchain Security is a collection of innovative research that explores the latest methodologies, modeling, and simulations for coping with the generation and management of large-scale data in both scientific and individual applications. Featuring coverage on a wide range of topics including security models, internet of things, and collaborative filtering, this book is ideally designed for entrepreneurs, security analysts, IT consultants, security professionals, programmers, computer technicians, data scientists, technology developers, engineers, researchers, academicians, and students.
Large-Scale Data Streaming, Processing, and Blockchain Security
Author: Saini, Hemraj
Publisher: IGI Global
ISBN: 1799834468
Category : Computers
Languages : en
Pages : 285
Book Description
Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one’s personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the current technological requirements. Large-Scale Data Streaming, Processing, and Blockchain Security is a collection of innovative research that explores the latest methodologies, modeling, and simulations for coping with the generation and management of large-scale data in both scientific and individual applications. Featuring coverage on a wide range of topics including security models, internet of things, and collaborative filtering, this book is ideally designed for entrepreneurs, security analysts, IT consultants, security professionals, programmers, computer technicians, data scientists, technology developers, engineers, researchers, academicians, and students.
Publisher: IGI Global
ISBN: 1799834468
Category : Computers
Languages : en
Pages : 285
Book Description
Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one’s personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the current technological requirements. Large-Scale Data Streaming, Processing, and Blockchain Security is a collection of innovative research that explores the latest methodologies, modeling, and simulations for coping with the generation and management of large-scale data in both scientific and individual applications. Featuring coverage on a wide range of topics including security models, internet of things, and collaborative filtering, this book is ideally designed for entrepreneurs, security analysts, IT consultants, security professionals, programmers, computer technicians, data scientists, technology developers, engineers, researchers, academicians, and students.
Research Anthology on Edge Computing Protocols, Applications, and Integration
Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1668457016
Category : Computers
Languages : en
Pages : 719
Book Description
Edge computing is quickly becoming an important technology throughout a number of fields as businesses and industries alike embrace the benefits it can have in their companies. The streamlining of data is crucial for the development and evolution of businesses in order to keep up with competition and improve functions overall. In order to appropriately utilize edge computing to its full potential, further study is required to examine the potential pitfalls and opportunities of this innovative technology. The Research Anthology on Edge Computing Protocols, Applications, and Integration establishes critical research on the current uses, innovations, and challenges of edge computing across disciplines. The text highlights the history of edge computing and how it has been adapted over time to improve industries. Covering a range of topics such as bandwidth, data centers, and security, this major reference work is ideal for industry professionals, computer scientists, engineers, practitioners, researchers, academicians, scholars, instructors, and students.
Publisher: IGI Global
ISBN: 1668457016
Category : Computers
Languages : en
Pages : 719
Book Description
Edge computing is quickly becoming an important technology throughout a number of fields as businesses and industries alike embrace the benefits it can have in their companies. The streamlining of data is crucial for the development and evolution of businesses in order to keep up with competition and improve functions overall. In order to appropriately utilize edge computing to its full potential, further study is required to examine the potential pitfalls and opportunities of this innovative technology. The Research Anthology on Edge Computing Protocols, Applications, and Integration establishes critical research on the current uses, innovations, and challenges of edge computing across disciplines. The text highlights the history of edge computing and how it has been adapted over time to improve industries. Covering a range of topics such as bandwidth, data centers, and security, this major reference work is ideal for industry professionals, computer scientists, engineers, practitioners, researchers, academicians, scholars, instructors, and students.
Cyber Security and Digital Forensics
Author: Sabyasachi Pramanik
Publisher: John Wiley & Sons
ISBN: 1119795648
Category : Computers
Languages : en
Pages : 300
Book Description
CYBER SECURITY AND DIGITAL FORENSICS Cyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes. Current cyber threats are getting more complicated and advanced with the rapid evolution of adversarial techniques. Networked computing and portable electronic devices have broadened the role of digital forensics beyond traditional investigations into computer crime. The overall increase in the use of computers as a way of storing and retrieving high-security information requires appropriate security measures to protect the entire computing and communication scenario worldwide. Further, with the introduction of the internet and its underlying technology, facets of information security are becoming a primary concern to protect networks and cyber infrastructures from various threats. This groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical and socio-economic perspectives for the utilization of information and communication technologies and the development of practical solutions in cyber security and digital forensics. Not just for the professional working in the field, but also for the student or academic on the university level, this is a must-have for any library. Audience: Practitioners, consultants, engineers, academics, and other professionals working in the areas of cyber analysis, cyber security, homeland security, national defense, the protection of national critical infrastructures, cyber-crime, cyber vulnerabilities, cyber-attacks related to network systems, cyber threat reduction planning, and those who provide leadership in cyber security management both in public and private sectors
Publisher: John Wiley & Sons
ISBN: 1119795648
Category : Computers
Languages : en
Pages : 300
Book Description
CYBER SECURITY AND DIGITAL FORENSICS Cyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes. Current cyber threats are getting more complicated and advanced with the rapid evolution of adversarial techniques. Networked computing and portable electronic devices have broadened the role of digital forensics beyond traditional investigations into computer crime. The overall increase in the use of computers as a way of storing and retrieving high-security information requires appropriate security measures to protect the entire computing and communication scenario worldwide. Further, with the introduction of the internet and its underlying technology, facets of information security are becoming a primary concern to protect networks and cyber infrastructures from various threats. This groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical and socio-economic perspectives for the utilization of information and communication technologies and the development of practical solutions in cyber security and digital forensics. Not just for the professional working in the field, but also for the student or academic on the university level, this is a must-have for any library. Audience: Practitioners, consultants, engineers, academics, and other professionals working in the areas of cyber analysis, cyber security, homeland security, national defense, the protection of national critical infrastructures, cyber-crime, cyber vulnerabilities, cyber-attacks related to network systems, cyber threat reduction planning, and those who provide leadership in cyber security management both in public and private sectors
Research Anthology on Convergence of Blockchain, Internet of Things, and Security
Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1668471337
Category : Computers
Languages : en
Pages : 1363
Book Description
The rise of technology has proven to be a threat to personal data, cyberspace protection, and organizational security. However, these technologies can be used to enhance the effectiveness of institutional security. Through the use of blockchain and the internet of things (IoT), organizations may combat cybercriminals and better protect their privacy. The Research Anthology on Convergence of Blockchain, Internet of Things, and Security describes the implementation of blockchain and IoT technologies to better protect personal and organizational data as well as enhance overall security. It also explains the tools, applications, and emerging innovations in security and the ways in which they are enhanced by blockchain and IoT. Covering topics such as electronic health records, intrusion detection, and software engineering, this major reference work is an essential resource for business leaders and executives, IT managers, computer scientists, hospital administrators, security professionals, law enforcement, students and faculty of higher education, librarians, researchers, and academicians.
Publisher: IGI Global
ISBN: 1668471337
Category : Computers
Languages : en
Pages : 1363
Book Description
The rise of technology has proven to be a threat to personal data, cyberspace protection, and organizational security. However, these technologies can be used to enhance the effectiveness of institutional security. Through the use of blockchain and the internet of things (IoT), organizations may combat cybercriminals and better protect their privacy. The Research Anthology on Convergence of Blockchain, Internet of Things, and Security describes the implementation of blockchain and IoT technologies to better protect personal and organizational data as well as enhance overall security. It also explains the tools, applications, and emerging innovations in security and the ways in which they are enhanced by blockchain and IoT. Covering topics such as electronic health records, intrusion detection, and software engineering, this major reference work is an essential resource for business leaders and executives, IT managers, computer scientists, hospital administrators, security professionals, law enforcement, students and faculty of higher education, librarians, researchers, and academicians.
Blockchain Applications in IoT Security
Author: Patel, Harshita
Publisher: IGI Global
ISBN: 1799824160
Category : Computers
Languages : en
Pages : 275
Book Description
Like many other scientific innovations, scientists are looking to protect the internet of things (IoT) from unfortunate losses, theft, or misuse. As one of the current hot trends in the digital world, blockchain technology could be the solution for securing the IoT. Blockchain Applications in IoT Security presents research for understanding IoT-generated data security issues, existing security facilities and their limitations and future possibilities, and the role of blockchain technology. Featuring coverage on a broad range of topics such as cryptocurrency, remote monitoring, and smart computing, this book is ideally designed for security analysts, IT specialists, entrepreneurs, business professionals, academicians, researchers, students, and industry professionals seeking current studies on the limitations and possibilities behind competitive blockchain technologies.
Publisher: IGI Global
ISBN: 1799824160
Category : Computers
Languages : en
Pages : 275
Book Description
Like many other scientific innovations, scientists are looking to protect the internet of things (IoT) from unfortunate losses, theft, or misuse. As one of the current hot trends in the digital world, blockchain technology could be the solution for securing the IoT. Blockchain Applications in IoT Security presents research for understanding IoT-generated data security issues, existing security facilities and their limitations and future possibilities, and the role of blockchain technology. Featuring coverage on a broad range of topics such as cryptocurrency, remote monitoring, and smart computing, this book is ideally designed for security analysts, IT specialists, entrepreneurs, business professionals, academicians, researchers, students, and industry professionals seeking current studies on the limitations and possibilities behind competitive blockchain technologies.
Research Anthology on Big Data Analytics, Architectures, and Applications
Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1668436639
Category : Computers
Languages : en
Pages : 1988
Book Description
Society is now completely driven by data with many industries relying on data to conduct business or basic functions within the organization. With the efficiencies that big data bring to all institutions, data is continuously being collected and analyzed. However, data sets may be too complex for traditional data-processing, and therefore, different strategies must evolve to solve the issue. The field of big data works as a valuable tool for many different industries. The Research Anthology on Big Data Analytics, Architectures, and Applications is a complete reference source on big data analytics that offers the latest, innovative architectures and frameworks and explores a variety of applications within various industries. Offering an international perspective, the applications discussed within this anthology feature global representation. Covering topics such as advertising curricula, driven supply chain, and smart cities, this research anthology is ideal for data scientists, data analysts, computer engineers, software engineers, technologists, government officials, managers, CEOs, professors, graduate students, researchers, and academicians.
Publisher: IGI Global
ISBN: 1668436639
Category : Computers
Languages : en
Pages : 1988
Book Description
Society is now completely driven by data with many industries relying on data to conduct business or basic functions within the organization. With the efficiencies that big data bring to all institutions, data is continuously being collected and analyzed. However, data sets may be too complex for traditional data-processing, and therefore, different strategies must evolve to solve the issue. The field of big data works as a valuable tool for many different industries. The Research Anthology on Big Data Analytics, Architectures, and Applications is a complete reference source on big data analytics that offers the latest, innovative architectures and frameworks and explores a variety of applications within various industries. Offering an international perspective, the applications discussed within this anthology feature global representation. Covering topics such as advertising curricula, driven supply chain, and smart cities, this research anthology is ideal for data scientists, data analysts, computer engineers, software engineers, technologists, government officials, managers, CEOs, professors, graduate students, researchers, and academicians.
Data Science for Effective Healthcare Systems
Author: Hari Singh
Publisher: CRC Press
ISBN: 1000618854
Category : Computers
Languages : en
Pages : 275
Book Description
Data Science for Effective Healthcare Systems has a prime focus on the importance of data science in the healthcare domain. Various applications of data science in the health care domain have been studied to find possible solutions. In this period of COVID-19 pandemic data science and allied areas plays a vital role to deal with various aspect of health care. Image processing, detection & prevention from COVID-19 virus, drug discovery, early prediction, and prevention of diseases are some thrust areas where data science has proven to be indispensable. Key Features: The book offers comprehensive coverage of the most essential topics, including: Big Data Analytics, Applications & Challenges in Healthcare Descriptive, Predictive and Prescriptive Analytics in Healthcare Artificial Intelligence, Machine Learning, Deep Learning and IoT in Healthcare Data Science in Covid-19, Diabetes, Coronary Heart Diseases, Breast Cancer, Brain Tumor The aim of this book is also to provide the future scope of these technologies in the health care domain. Last but not the least, this book will surely benefit research scholar, persons associated with healthcare, faculty, research organizations, and students to get insights into these emerging technologies in the healthcare domain.
Publisher: CRC Press
ISBN: 1000618854
Category : Computers
Languages : en
Pages : 275
Book Description
Data Science for Effective Healthcare Systems has a prime focus on the importance of data science in the healthcare domain. Various applications of data science in the health care domain have been studied to find possible solutions. In this period of COVID-19 pandemic data science and allied areas plays a vital role to deal with various aspect of health care. Image processing, detection & prevention from COVID-19 virus, drug discovery, early prediction, and prevention of diseases are some thrust areas where data science has proven to be indispensable. Key Features: The book offers comprehensive coverage of the most essential topics, including: Big Data Analytics, Applications & Challenges in Healthcare Descriptive, Predictive and Prescriptive Analytics in Healthcare Artificial Intelligence, Machine Learning, Deep Learning and IoT in Healthcare Data Science in Covid-19, Diabetes, Coronary Heart Diseases, Breast Cancer, Brain Tumor The aim of this book is also to provide the future scope of these technologies in the health care domain. Last but not the least, this book will surely benefit research scholar, persons associated with healthcare, faculty, research organizations, and students to get insights into these emerging technologies in the healthcare domain.
Handbook of Research on Digital Transformation and Challenges to Data Security and Privacy
Author: Anunciação, Pedro Fernandes
Publisher: IGI Global
ISBN: 1799842029
Category : Computers
Languages : en
Pages : 529
Book Description
Heavily dominated by the sector of information and communication technologies, economic organizations pursue digital transformation as a differentiating factor and source of competitive advantage. Understanding the challenges of digital transformation is critical to managers to ensure business sustainability. However, there are some problems, such as architecture, security, and reliability, among others, that bring with them the need for studies and investments in this area to avoid significant financial losses. Digital transformation encompasses and challenges many areas, such as business models, organizational structures, human privacy, management, and more, creating a need to investigate the challenges associated with it to create a roadmap for this new digital transformation era. The Handbook of Research on Digital Transformation and Challenges to Data Security and Privacy presents the main challenges of digital transformation and the threats it poses to information security and privacy, as well as models that can contribute to solving these challenges in economic organizations. While highlighting topics such as information systems, digital trends, and information governance, this book is ideally intended for managers, data analysts, cybersecurity professionals, IT specialists, practitioners, researchers, academicians, and students working in fields that include digital transformation, information management, information security, information system reliability, business continuity, and data protection.
Publisher: IGI Global
ISBN: 1799842029
Category : Computers
Languages : en
Pages : 529
Book Description
Heavily dominated by the sector of information and communication technologies, economic organizations pursue digital transformation as a differentiating factor and source of competitive advantage. Understanding the challenges of digital transformation is critical to managers to ensure business sustainability. However, there are some problems, such as architecture, security, and reliability, among others, that bring with them the need for studies and investments in this area to avoid significant financial losses. Digital transformation encompasses and challenges many areas, such as business models, organizational structures, human privacy, management, and more, creating a need to investigate the challenges associated with it to create a roadmap for this new digital transformation era. The Handbook of Research on Digital Transformation and Challenges to Data Security and Privacy presents the main challenges of digital transformation and the threats it poses to information security and privacy, as well as models that can contribute to solving these challenges in economic organizations. While highlighting topics such as information systems, digital trends, and information governance, this book is ideally intended for managers, data analysts, cybersecurity professionals, IT specialists, practitioners, researchers, academicians, and students working in fields that include digital transformation, information management, information security, information system reliability, business continuity, and data protection.
Visibilities and Invisibilities in Smart Cities: Emerging Research and Opportunities
Author: McKenna, H. Patricia
Publisher: IGI Global
ISBN: 179983851X
Category : Political Science
Languages : en
Pages : 289
Book Description
Throughout history, humanity has sought the betterment of its communities. In the 21st century, humanity has technology on its side in the process of improving its cities. Smart cities make their improvements by gathering real-world data in real time. Still, there are many complexities that many do not catch—they are invisible. It is important to understand how people make sense at the urban level and in extra-urban spaces of the combined complexities of invisibilities and visibilities in their environments, interactions, and infrastructures enabled through their own enhanced awareness together with aware technologies that are often embedded, pervasive, and ambient. This book probes the visible and invisible dimensions of emerging understandings of smart cities and regions in the context of more aware people interacting with each other and through more aware and pervasive technologies. Visibilities and Invisibilities in Smart Cities: Emerging Research and Opportunities contributes to the research literature for urban theoretical spaces, methodologies, and applications for smart and responsive cities; the evolving of urban theory and methods for 21st century cities and urbanities; and the formulation of a conceptual framework for associated methodologies and theoretical spaces. This work explores the relationships between variables using a case study approach combined with an explanatory correlational design. It is based on an urban research study conducted from mid-2015 to mid-2020 that spanned multiple countries across three continents. The book is split into four sections: introduction to the concepts of visible and invisible, frameworks for understanding the interplay of the two concepts, associated and evolving theory and methods, and extending current research as opportunities in smart city environments and regions. Covering topics including human geography, smart cities, and urban planning, this book is essential for urban planners, designers, city officials, community agencies, business managers and owners, academicians, researchers, and students, including those who work across multiple domains such as architecture, environmental design, human-computer interaction, human geography, information technology, sociology, and affective computing.
Publisher: IGI Global
ISBN: 179983851X
Category : Political Science
Languages : en
Pages : 289
Book Description
Throughout history, humanity has sought the betterment of its communities. In the 21st century, humanity has technology on its side in the process of improving its cities. Smart cities make their improvements by gathering real-world data in real time. Still, there are many complexities that many do not catch—they are invisible. It is important to understand how people make sense at the urban level and in extra-urban spaces of the combined complexities of invisibilities and visibilities in their environments, interactions, and infrastructures enabled through their own enhanced awareness together with aware technologies that are often embedded, pervasive, and ambient. This book probes the visible and invisible dimensions of emerging understandings of smart cities and regions in the context of more aware people interacting with each other and through more aware and pervasive technologies. Visibilities and Invisibilities in Smart Cities: Emerging Research and Opportunities contributes to the research literature for urban theoretical spaces, methodologies, and applications for smart and responsive cities; the evolving of urban theory and methods for 21st century cities and urbanities; and the formulation of a conceptual framework for associated methodologies and theoretical spaces. This work explores the relationships between variables using a case study approach combined with an explanatory correlational design. It is based on an urban research study conducted from mid-2015 to mid-2020 that spanned multiple countries across three continents. The book is split into four sections: introduction to the concepts of visible and invisible, frameworks for understanding the interplay of the two concepts, associated and evolving theory and methods, and extending current research as opportunities in smart city environments and regions. Covering topics including human geography, smart cities, and urban planning, this book is essential for urban planners, designers, city officials, community agencies, business managers and owners, academicians, researchers, and students, including those who work across multiple domains such as architecture, environmental design, human-computer interaction, human geography, information technology, sociology, and affective computing.
Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks
Author: Sagayam, K. Martin
Publisher: IGI Global
ISBN: 1799850692
Category : Computers
Languages : en
Pages : 405
Book Description
Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides emerging research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. Featuring coverage on a broad range of topics such as clustering protocols, intrusion detection, and energy harvesting, this book is ideally designed for researchers, developers, IT professionals, educators, policymakers, practitioners, scientists, theorists, engineers, academicians, and students seeking current research on integrating intelligent techniques into sensor networks for more reliable security practices.
Publisher: IGI Global
ISBN: 1799850692
Category : Computers
Languages : en
Pages : 405
Book Description
Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides emerging research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. Featuring coverage on a broad range of topics such as clustering protocols, intrusion detection, and energy harvesting, this book is ideally designed for researchers, developers, IT professionals, educators, policymakers, practitioners, scientists, theorists, engineers, academicians, and students seeking current research on integrating intelligent techniques into sensor networks for more reliable security practices.