Author: Rawat, Danda B.
Publisher: IGI Global
ISBN: 1466646926
Category : Computers
Languages : en
Pages : 593
Book Description
"This book examines the current scope of theoretical and practical applications on the security of mobile and wireless communications, covering fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks"--Provided by publisher.
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
Author: Rawat, Danda B.
Publisher: IGI Global
ISBN: 1466646926
Category : Computers
Languages : en
Pages : 593
Book Description
"This book examines the current scope of theoretical and practical applications on the security of mobile and wireless communications, covering fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks"--Provided by publisher.
Publisher: IGI Global
ISBN: 1466646926
Category : Computers
Languages : en
Pages : 593
Book Description
"This book examines the current scope of theoretical and practical applications on the security of mobile and wireless communications, covering fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks"--Provided by publisher.
Security in Wireless Mesh Networks
Author: Yan Zhang
Publisher: CRC Press
ISBN: 0849382548
Category : Computers
Languages : en
Pages : 547
Book Description
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services.
Publisher: CRC Press
ISBN: 0849382548
Category : Computers
Languages : en
Pages : 547
Book Description
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services.
Securing Government Information and Data in Developing Countries
Author: Zoughbi, Saleem
Publisher: IGI Global
ISBN: 1522517049
Category : Computers
Languages : en
Pages : 325
Book Description
The ongoing growth of information and communication technology is a high priority for any developing country. These advances help progress with different sectors of socio-economic development within these countries, and strengthens our global economy as a whole. Securing Government Information and Data in Developing Countries provides an informative examination of the latest strategies and methods for protecting government information and data within developing countries. Presenting dynamic topics such as security-critical systems, watermarking authentication, hybrid biometrics, and e-voting systems, this publication is an ideal reference source for practitioners, academicians, students, and researchers who are interested in the emerging trends of data security for governments.
Publisher: IGI Global
ISBN: 1522517049
Category : Computers
Languages : en
Pages : 325
Book Description
The ongoing growth of information and communication technology is a high priority for any developing country. These advances help progress with different sectors of socio-economic development within these countries, and strengthens our global economy as a whole. Securing Government Information and Data in Developing Countries provides an informative examination of the latest strategies and methods for protecting government information and data within developing countries. Presenting dynamic topics such as security-critical systems, watermarking authentication, hybrid biometrics, and e-voting systems, this publication is an ideal reference source for practitioners, academicians, students, and researchers who are interested in the emerging trends of data security for governments.
HCI Challenges and Privacy Preservation in Big Data Security
Author: Lopez, Daphne
Publisher: IGI Global
ISBN: 1522528644
Category : Computers
Languages : en
Pages : 293
Book Description
Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.
Publisher: IGI Global
ISBN: 1522528644
Category : Computers
Languages : en
Pages : 293
Book Description
Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.
User-Centric Networking
Author: Alessandro Aldini
Publisher: Springer
ISBN: 3319052187
Category : Computers
Languages : en
Pages : 361
Book Description
This work represents a milestone for the "ULOOP User-centric Wireless Local Loop" project funded by the EU IST Seventh Framework Programme. ULOOP is focused on the robust, secure, and autonomic deployment of user-centric wireless networks. Contributions by ULOOP partners as well as invited tutorials by international experts in the field. The expected impact is to increase awareness to user-centric networking in terms, e.g., of business opportunities and quality of experience, and to present adequate technology to sustain the growth of user-friendly wireless architectures. Throughout the last 3 years, ULOOP has developed enabling technologies for user-centricity in wireless networks, with particular emphasis on social trust management, cooperation incentives, community building, mobility estimation, and resource management. This work will be of interest to researchers, policymakers, operators, vendors, and end-users interested in the current and future directions of user-centric access networks.
Publisher: Springer
ISBN: 3319052187
Category : Computers
Languages : en
Pages : 361
Book Description
This work represents a milestone for the "ULOOP User-centric Wireless Local Loop" project funded by the EU IST Seventh Framework Programme. ULOOP is focused on the robust, secure, and autonomic deployment of user-centric wireless networks. Contributions by ULOOP partners as well as invited tutorials by international experts in the field. The expected impact is to increase awareness to user-centric networking in terms, e.g., of business opportunities and quality of experience, and to present adequate technology to sustain the growth of user-friendly wireless architectures. Throughout the last 3 years, ULOOP has developed enabling technologies for user-centricity in wireless networks, with particular emphasis on social trust management, cooperation incentives, community building, mobility estimation, and resource management. This work will be of interest to researchers, policymakers, operators, vendors, and end-users interested in the current and future directions of user-centric access networks.
Incorporating Nature-Inspired Paradigms in Computational Applications
Author: Khosrow-Pour, Mehdi
Publisher: IGI Global
ISBN: 1522550216
Category : Computers
Languages : en
Pages : 398
Book Description
Many techniques have been developed to control the variety of dynamic systems. To develop those control techniques, it is fundamental to know the mathematical relations between the system inputs and outputs. Incorporating Nature-Inspired Paradigms in Computational Applications is a critical scholarly resource that examines the application of nature-inspired paradigms on system identification. Featuring coverage on a broad range of topics such as biogeographic computation, evolutionary control systems, and natural computing, this book is geared towards IT professionals, engineers, computer scientists, academicians, researchers, and graduate-level students seeking current research on the application of nature-inspired paradigms.
Publisher: IGI Global
ISBN: 1522550216
Category : Computers
Languages : en
Pages : 398
Book Description
Many techniques have been developed to control the variety of dynamic systems. To develop those control techniques, it is fundamental to know the mathematical relations between the system inputs and outputs. Incorporating Nature-Inspired Paradigms in Computational Applications is a critical scholarly resource that examines the application of nature-inspired paradigms on system identification. Featuring coverage on a broad range of topics such as biogeographic computation, evolutionary control systems, and natural computing, this book is geared towards IT professionals, engineers, computer scientists, academicians, researchers, and graduate-level students seeking current research on the application of nature-inspired paradigms.
Game Theory Solutions for the Internet of Things: Emerging Research and Opportunities
Author: Kim, Sungwook
Publisher: IGI Global
ISBN: 152251953X
Category : Mathematics
Languages : en
Pages : 235
Book Description
There is an enhanced level of connectivity available in modern society through the increased usage of various technological devices. Such developments have led to the integration of smart objects into the Internet of Things (IoT), an emerging paradigm in the digital age. Game Theory Solutions for the Internet of Things: Emerging Research and Opportunities examines the latest strategies for the management of IoT systems and the application of theoretical models to enhance real-world applications and improve system efficiency. Highlighting innovative algorithms and methods, as well as coverage on cloud computing, cross-domain applications, and energy control, this book is a pivotal source of information for researchers, practitioners, graduate students, professionals, and academics interested in the game theoretic solutions for IoT applications.
Publisher: IGI Global
ISBN: 152251953X
Category : Mathematics
Languages : en
Pages : 235
Book Description
There is an enhanced level of connectivity available in modern society through the increased usage of various technological devices. Such developments have led to the integration of smart objects into the Internet of Things (IoT), an emerging paradigm in the digital age. Game Theory Solutions for the Internet of Things: Emerging Research and Opportunities examines the latest strategies for the management of IoT systems and the application of theoretical models to enhance real-world applications and improve system efficiency. Highlighting innovative algorithms and methods, as well as coverage on cloud computing, cross-domain applications, and energy control, this book is a pivotal source of information for researchers, practitioners, graduate students, professionals, and academics interested in the game theoretic solutions for IoT applications.
Handbook of Research on Recent Developments in Intelligent Communication Application
Author: Bhattacharyya, Siddhartha
Publisher: IGI Global
ISBN: 1522517863
Category : Computers
Languages : en
Pages : 696
Book Description
The communication field is evolving rapidly in order to keep up with society’s demands. As such, it becomes imperative to research and report recent advancements in computational intelligence as it applies to communication networks. The Handbook of Research on Recent Developments in Intelligent Communication Application is a pivotal reference source for the latest developments on emerging data communication applications. Featuring extensive coverage across a range of relevant perspectives and topics, such as satellite communication, cognitive radio networks, and wireless sensor networks, this book is ideally designed for engineers, professionals, practitioners, upper-level students, and academics seeking current information on emerging communication networking trends.
Publisher: IGI Global
ISBN: 1522517863
Category : Computers
Languages : en
Pages : 696
Book Description
The communication field is evolving rapidly in order to keep up with society’s demands. As such, it becomes imperative to research and report recent advancements in computational intelligence as it applies to communication networks. The Handbook of Research on Recent Developments in Intelligent Communication Application is a pivotal reference source for the latest developments on emerging data communication applications. Featuring extensive coverage across a range of relevant perspectives and topics, such as satellite communication, cognitive radio networks, and wireless sensor networks, this book is ideally designed for engineers, professionals, practitioners, upper-level students, and academics seeking current information on emerging communication networking trends.
New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Author: Dawson, Maurice
Publisher: IGI Global
ISBN: 1466683465
Category : Computers
Languages : en
Pages : 389
Book Description
Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users. New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.
Publisher: IGI Global
ISBN: 1466683465
Category : Computers
Languages : en
Pages : 389
Book Description
Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users. New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.
Information Security in Diverse Computing Environments
Author: Kayem, Anne
Publisher: IGI Global
ISBN: 1466661593
Category : Computers
Languages : en
Pages : 380
Book Description
"This book provides the latest empirical research and theoretical frameworks in the area of information security, presenting research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems"--Provided by publisher.
Publisher: IGI Global
ISBN: 1466661593
Category : Computers
Languages : en
Pages : 380
Book Description
"This book provides the latest empirical research and theoretical frameworks in the area of information security, presenting research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems"--Provided by publisher.