You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book. This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles.
Crowd computing, crowdsourcing, crowd-associated network (CrAN), crowd-assisted sensing are some examples of crowd-based concepts that harness the power of people on the web or connected via web-like infrastructure to do tasks that are often difficult for individual users or computers to do alone. This creates many challenging issues like assessing reliability and correctness of crowd generated information, delivery of data and information via crowd, middleware for supporting crowdsourcing and crowd computing tasks, crowd associated networking and its security, Quality of Information (QoI) issues, etc. This book compiles the latest advances in the relevant fields.
Supplying comprehensive coverage of WSNs, this book covers the latest advances in WSN technologies. It considers some of theoretical problems in WSN, including issues with monitoring, routing, and power control, and details methodologies that can provide solutions to these problems. It examines applications of WSN across a range of fields, including health, defense military, transportation, and mining. Addressing the main challenges in applying WSNs across all phases of our life, it explains how WSNs can assist in community development.
Although several books and academic courses discuss data management and networking, few of them focus on the convergence of networking and software technologies for identifying, addressing, and managing distributed data. Focusing on this convergence, Identification and Management of Distributed Data: NGN, Content-Centric Networks and the Web collat
Until recently, most network design techniques employed a bottom-up approach with lower protocol layer mechanisms affecting the development of higher ones. This approach, however, has not yielded fascinating results in the case of wireless distributed networks. Addressing the emerging aspects of modern network analysis and design, Evolutionary Dynamics of Complex Communications Networks introduces and develops a top-bottom approach where elements of the higher layer can be exploited in modifying the lowest physical topology—closing the network design loop in an evolutionary fashion similar to that observed in natural processes. This book provides a complete overview of contemporary design ...
Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deploy
Although wireless sensor networks (WSNs) have been employed across a range of applications, there are few books available that cover the required algorithms, performance analysis, and applications of network management techniques in WSNs. Filling this need, this book presents new network management techniques that can address many of the shortcomings of traditional techniques. It summarizes traditional and classical network management techniques as well as state-of-the-art methods.
Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detec...
This book gathers key advances in various areas related to using wireless Internet and wireless connectivity to achieve a more connected world. The world is now highly dependent on Internet connectivity. Even though some parts of the globe remain isolated, the smoothly running world all around us relies on Internet services for countless businesses and activities. During the COVID-19 pandemic, we have seen that exclusively relying on wired Internet would leave out a large part of our tech-savvy world. Hence, wireless connectivity is essential to anywhere, anytime connectivity. Further, in the event of a new pandemic or other disaster of global scale, wireless Internet offers a reliable way to keep us all connected. The contributors to this book, hailing from academia, industrial and research laboratories, report on the latest solutions, trends and technologies with the potential to make wireless Internet more reliable and secure for the years to come.
"This book compiles recent research trends and practical issues in the fields of distributed computing and Internet technologies, providing advancements on emerging technologies that aim to support the effective design and implementation of service-oriented networks, future Internet environments and building management frameworks"--