The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines.
Network Function Virtualization provides an architectural, vendor-neutral level overview of the issues surrounding the large levels of data storage and transmission requirements needed for today's companies, also enumerating the benefits of NFV for the enterprise.
This book provides detailed information on a low-cost, high-speed infrastructure to support applications and services based on 5G/6G, the Internet of Things (IoT), smart cities, and fiber-to-the-x (FTTX).
Digital communications plays an important role in numerical transmission systems due to the proliferation of radio beams, satellite, optic fibbers, radar, and mobile wireless systems.
The emerging field of network science represents a new style of research that can unify such traditionally-diverse fields as sociology, economics, physics, biology, and computer science.
Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr.
Service orchestration techniques combine the benefits of Service Oriented Architecture (SOA) and Business Process Management (BPM) to compose and coordinate distributed software services.
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT).
With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred.
mmWave Massive MIMO: A Paradigm for 5G is the first book of its kind to hinge together related discussions on mmWave and Massive MIMO under the umbrella of 5G networks.
Traditionally, networking has had little or no basis in analysis or architectural development, with designers relying on technologies they are most familiar with or being influenced by vendors or consultants.
Comprehensive Answers to the "e;Why"e; of Wireless MobilityIn this unique guide, Cisco wireless expert Neil Reid incorporates best practices from some of the most complex and challenging wireless deployments in the industry and provides an insider's view of the "e;why"e; of wireless mobility.
Learn from Ian Neil, one of the world's top CompTIA Security+ trainers in the world, and enhance your analytical skills to pass the CompTIA Security+ SY0-501 examKey FeaturesBecome a pro at answering questions from all six of the domains of the SY0-501 examLearn about cryptography algorithms, security policies, and their real-world implementationsSolve practice tests that complement the official CompTIA Security+ certification examBook DescriptionCompTIA Security+ is a core security certification that will validate your baseline skills for a career in cybersecurity.
New edition of the bestselling guide to mastering Python Networking, updated to Python 3 and including the latest on network data analysis, Cloud Networking, Ansible 2.
Technology is rapidly moving into our bodies, writes cyber expert Keenan, and this book gives a chilling look ahead into where that road may lead us on a one way trip to the total surrender of privacy and the commoditization of intimacy.
"e;a provocative new book"e; — The New York TimesAI-centric organizations exhibit a new operating architecture, redefining how they create, capture, share, and deliver value.
If youre looking for a way to more effectively manage your inbox, your email programs built-in filtering tools can do a lot of the heavy liftingand this short book by social media expert Alexandra Samuel shows you how to set them up.
This book presents various computational and cognitive modeling approaches in the areas of health, education, finance, environment, engineering, commerce and industry.
Trust the best-selling Cert Guide series from Pearson IT Certification to help you learn, prepare, and practice for the CC Certified in Cybersecurity exam.
A digital twin represents the indistinguishable digital counterpart of the physical object to simulate, monitor and test with real time synchronization.
The three-volume set LNCS 10860, 10861 and 10862 constitutes the proceedings of the 18th International Conference on Computational Science, ICCS 2018, held in Wuxi, China, in June 2018.
This book gathers high-quality research papers presented at the 7th International Conference on Advanced Computing and Intelligent Engineering (ICACIE 2022) organized by the Department of Computer Science and Engineering, DRIEMS (Autonomous) Engineering College, Odisha, India, during December 23-24, 2022.
This book includes peer reviewed article from the 2nd International Conference on Trends in Architecture and Construction (ICTAC-2024) held at Chandigarh in India.
This book gathers selected high-quality research papers presented at the Ninth International Congress on Information and Communication Technology, held in London, on February 19-22, 2024.
This book constitutes the refereed proceedings of the Third International Conference on Smart Computing and Communications, SmartCom 2018, held in Tokyo, Japan, in December 2018.
This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019.
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area.
Leverage the full potential of IoT with the combination of Raspberry Pi 3 and Python and architect a complete IoT system that is the best fit for your organizationKey FeaturesBuild complex Python-based applications with IoTExplore different concepts, technologies, and tradeoffs in the IoT architectural stackDelve deep into each element of the IoT design-from sensors to the cloudBook DescriptionThe Internet of Things (IoT) is the fastest growing technology market.
Clarifying the purpose and place of strategy in an information security program, this book explains how to select, develop, and deploy the security strategy best suited to your organization.
This is a practical certification guide covering all the exam topics in an easy-to-follow manner backed with self-assessment scenarios for better preparation.