Smart Cities: Critical Debates on Big Data, Urban Development and Social Environmental Sustainability

Автор: literator от 7-05-2023, 19:17, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Smart Cities: Critical Debates on Big Data, Urban Development and Social Environmental SustainabilityНазвание: Smart Cities: Critical Debates on Big Data, Urban Development and Social Environmental Sustainability
Автор: Negin Minaei
Издательство: CRC Press
Год: 2022
Страниц: 167
Язык: английский
Формат: pdf (true), epub (true)
Размер: 11.0 MB

In the age of global climate change, society will require cities that are environmentally self-sufficient, able to withstand various environmental problems and recover quickly. It is interesting to note that many "smart" solutions for cities are leading to an unsustainable future, including further electrification, an increased dependence on the Internet, Internet of Things, Big Data, and Artificial Intelligence, and basically any technology that leads us to consume more electricity. This book examines critical topics in Smart Cities such as true sustainability and the resilience required for all cities. It explores sustainability issues in agriculture and the role of agri-technology for a sustainable future, including a city’s ability to locally produce food for its residents.

 

Successful Management of Cloud Computing and DevOps

Автор: literator от 7-05-2023, 17:44, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Successful Management of Cloud Computing and DevOpsНазвание: Successful Management of Cloud Computing and DevOps
Автор: Alka Jarvis, Prakash Anand, Johnson Jose
Издательство: Quality Press
Год: 2022
Страниц: 273
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

The rapid pace of technology often catches organizations unprepared and unable to take advantage of every leading-edge benefit. Cloud technology allows forward-thinking companies to launch products and services rapidly, control costs, streamline processes, and mitigate risks—when done correctly. This book addresses technological basics, as well as practical steps for implementing and fitting the cloud into your overall business strategy—which ultimately benefits your bottom line in delivering the best possible product and services to customers quickly. The first three chapters of the book cover the journey of the technology from the old-fashioned, on-prem data center to modern-world cloud offerings by commercial entities known as cloud service providers (CSPs). We have taken a balanced approach, using examples from the three major CSPs: Amazon Web Services (AWS), Google Cloud Platform (GCP), and Azure. While there are several published training courses and tutorials available, we hope that readers will benefit from our experience in converting the theories into real-life scenarios. Chapter 4 provides an overview of cloud operations. Chapter 5 takes a closer look at cloud monitoring and metrics. Chapters 6 and 7 discuss various cloud providers and how to build and publish an application on the cloud. We also present a view on how cloud providers compare with on-prem data centers and even how the offerings of these providers themselves compare.

 

Regulating Cyber Technologies: Privacy vs Security

Автор: literator от 6-05-2023, 03:13, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Regulating Cyber Technologies: Privacy vs SecurityНазвание: Regulating Cyber Technologies: Privacy vs Security
Автор: Nathalie Rebe
Издательство: World Scientific Publishing
Год: 2023
Страниц: 377
Язык: английский
Формат: pdf (true), epub
Размер: 15.7 MB

Regulating cyber matters is a complex task, as cyberspace is an intricate world full of new threats related to a person's identity, finance, and private information. Algorithm manipulation, hate crimes, cyber-laundering, and data theft are strong menaces in the cyber world. New technologies are generating both privacy and security issues involving anonymity, cross-border transactions, virtual communications, and assets, among others. This book is a collection of works by experts on cyber matters and legal considerations that need addressing in a timely manner. It comprises cross-disciplinary knowledge that is pooled to this end. Risk mitigation tools, including cyber risk management, data protection regulations, as well as ethical practice guidelines are reviewed in detail. A (Distributed) Denial of Service (DoS/DDoS) attack aims to compromise the operation of specific Internet-facing services. One of the most common types of DDoS attacks is the packet flood, whereby an inordinate number of packets are sent to the target system with the goal of consuming all open connections and overloading network usage, leading to the crippling or cessation of services running on that system.

 

IoT and Cloud Computing-Based Healthcare Information Systems

Автор: literator от 5-05-2023, 21:47, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

IoT and Cloud Computing-Based Healthcare Information SystemsНазвание: IoT and Cloud Computing-Based Healthcare Information Systems
Автор: Anand Sharma, Hiren Kumar Deva Sarma, S.R. Biradar
Издательство: Apple Academic Press/CRC Press
Год: 2023
Страниц: 357
Язык: английский
Формат: pdf (true)
Размер: 22.2 MB

This new volume features new and innovative research on the positive contributions of IoT and cloud technology in healthcare information systems for the improvement of patient care and disease management, highlighting the challenges and difficulties along with solutions and strategies. The authors focus on theories, systems, methods, algorithms, and applications and showcase the interface between e-health and communication technologies and their beneficial contribution to building efficient and secure healthcare information systems. Healthcare information systems involve data generation, compilation, arrangement, examination and synthesis, and communication and use. This incorporates frameworks that gather, store, maintain, and protect patients’ electronic medical information and records, providing an invaluable resource for supporting medical services strategies and choices. This volume discusses a multitude of diverse new information technologies in telemedicine, in security for healthcare systems, for medical image authentication, in pulse oximetry via Bluetooth, for virus detection via smartphones, for tumor extraction via extreme learning machine and k-means clustering, for the detection of cancerous cells, for music therapy for mental health purposes, and much more.

 

Security in IoT: The Changing Perspective

Автор: literator от 5-05-2023, 19:10, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Security in IoT: The Changing PerspectiveНазвание: Security in IoT: The Changing Perspective
Автор: Rituparna Chaki, Debdutta Barman Roy
Издательство: CRC Press
Год: 2022
Страниц: 136
Язык: английский
Формат: pdf (true), epub (true)
Размер: 12.8 MB

The diverse applications of IoT are achieved by a set of complex inter-related networks of things and communications. IoT applications are also concerned about an array of devices such as sensors, mobile devices, personal computers, the smart systems such as Alexa, Eco, etc, besides the whole range of communication network binding them together in a seamless manner. This book explores the variegated perspectives of security in the complex context of Internet of Things.

 

How I Rob Banks: And Other Such Places

Автор: literator от 4-05-2023, 17:55, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

How I Rob Banks: And Other Such PlacesНазвание: How I Rob Banks: And Other Such Places
Автор: FC a.k.a Freakyclown
Издательство: Wiley
Год: 2023
Страниц: 259
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Follow FC as he steals from the world's most secure banks and government facilities—without breaking a single law. In How I Rob Banks: And Other Such Places, renowned ethical hacker and social engineer FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to "steal" money, data, and anything else he can get his hands on. In the book, you'll explore the secretive world of physical assessments and follow FC as he breaks into banks and secure government locations to identify security flaws and loopholes. Social engineering is the manipulation of people and situations to gain access or information that otherwise is not available to you. Social engineering can sometimes be used to bypass physical security - mechanisms in place to prevent access by unauthorized people - but not always. Organizations pay me to test their security. I use a combination of social engineering and physical attacks to do so. The security I test might be the locks on their doors, the security guards and receptionists, or their computer networks. A can't-miss account of real-life security exploits perfect for infosec pros, including red and blue teamers, pentesters, CIOs, CISSPs, and social engineers, How I Rob Banks also belongs in the hands of anyone who loves a great Ocean's 11-style story pulled straight from the real world.

 

Principles of Information Security (MindTap Course List), 7th Edition

Автор: literator от 4-05-2023, 17:28, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Principles of Information Security (MindTap Course List), 7th EditionНазвание: Principles of Information Security, 7th Edition
Автор: Michael E. Whitman, Herbert J. Mattord
Издательство: Cengage Learning
Год: 2022
Страниц: 562
Язык: английский
Формат: pdf (true)
Размер: 19.2 MB

Discover the latest trends, developments and technology in information security with Whitman/Mattord's market-leading PRINCIPLES OF INFORMATION SECURITY, 7th Edition. Designed specifically to meet the needs of information systems students like you, this edition's balanced focus addresses all aspects of information security, rather than simply offering a technical control perspective. This overview explores important terms and examines what is needed to manage an effective information security program. A new module details incident response and detection strategies. In addition, current, relevant updates highlight the latest practices in security operations as well as legislative issues, information management toolsets, digital forensics and the most recent policies and guidelines that correspond to federal and international standards.

 

AI and Blockchain in Healthcare

Автор: literator от 3-05-2023, 01:02, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

AI and Blockchain in HealthcareНазвание: AI and Blockchain in Healthcare
Автор: Bipin Kumar Rai, Gautam Kumar, Vipin Balyan
Издательство: Springer
Год: 2023
Страниц: 241
Язык: английский
Формат: pdf (true), epub
Размер: 25.0 MB

This book presents state-of-the-art blockchain and AI advances in health care. Healthcare service is increasingly creating the scope for blockchain and AI applications to enter the biomedical and healthcare world. Today, blockchain, AI, ML, and deep learning are affecting every domain. Through its cutting-edge applications, AI and ML are helping transform the healthcare industry for the better. Blockchain is a decentralization communication platform that has the potential to decentralize the way we store data and manage information. Blockchain technology has potential to reduce the role of middleman, one of the most important regulatory actors in our society. Transactions are simultaneously secure and trustworthy due to the use of cryptographic principles. In recent years, blockchain technology has become very trendy and has penetrated different domains, mostly due to the popularity of cryptocurrencies. One field where blockchain technology has tremendous potential is health care, due to the need for a more patient-centric approach in healthcare systems to connect disparate systems and to increase the accuracy of electronic healthcare records (EHRs). In today’s scenario, humankind has entered the domain of the Industrial revolution requirements with advanced tools and techniques. Artificial Intelligence (AI) plays a pivotal role in the simulation of human intelligence to process, especially in computing systems. The performance of AI has various applications to apply in expert systems, natural language processing, speech recognition, machine vision, and more.

 

Handbook of Research on Cybersecurity Risk in Contemporary Business Systems

Автор: literator от 1-05-2023, 04:59, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Handbook of Research on Cybersecurity Risk in Contemporary Business SystemsНазвание: Handbook of Research on Cybersecurity Risk in Contemporary Business Systems
Автор: Festus Fatai Adedoyin, Bryan Christiansen
Издательство: IGI Global
Год: 2023
Страниц: 476
Язык: английский
Формат: epub (true)
Размер: 29.7 MB

The field of cybersecurity is becoming increasingly important due to the continuously expanding reliance on computer systems, the internet, wireless network standards such as Bluetooth and Wi-Fi, and the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the Internet of Things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and technology. The Handbook of Research on Cybersecurity Risk in Contemporary Business Systems examines current risks involved in the cybersecurity of various business systems today from a global perspective and investigates critical business systems. Covering key topics such as Artificial Intelligence, hacking, and software, this reference work is ideal for computer scientists, industry professionals, policymakers, researchers, academicians, scholars, instructors, and students.

 

Information Security and Privacy in Smart Devices : Tools, Methods, and Applications

Автор: literator от 1-05-2023, 03:55, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Information Security and Privacy in Smart Devices : Tools, Methods, and ApplicationsНазвание: Information Security and Privacy in Smart Devices: Tools, Methods, and Applications
Автор: Carlos Rabadao, Leonel Santos
Издательство: IGI Global
Год: 2023
Страниц: 352
Язык: английский
Формат: epub (true)
Размер: 13.8 MB

In recent years, smart devices have become commonplace in our daily lives. On the Internet of Things (IoT), these devices powered new intelligent services. Their application enabled the rise of intelligent cities, smart agriculture, and Industry 4.0. However, smart devices collect and share large amounts of data, including the habits and preferences of their users. Cybersecurity incidents in intelligent environments may impact services used by millions across the world and make private information public. Information Security and Privacy in Smart Devices: Tools, Methods, and Applications presents research challenges, innovative insights, and trends related to solutions, methods, processes, and applications for maintaining information security and privacy in intelligent environments.