Information Technology

Networking Communication

Per Page:
Sort:

Low-Power Wireless Communication Circuits and Systems: 60GHz and Beyond

Kiat Seng Yeo, Kaixue Ma
December 31, 2016

The increasing demand for extremely high-data-rate communications has urged researchers to develop new communication systems. Currently, wireless transmission with more than one Giga-bits-per-second (Gbps) data rates is becoming essential due to increased connectivity between different portable and...

Encyclopedia of Computer Science and Technology, Second Edition (Print)

Phillip A. Laplante
December 21, 2016

With breadth and depth of coverage, the Encyclopedia of Computer Science and Technology, Second Edition has a multi-disciplinary scope, drawing together comprehensive coverage of the inter-related aspects of computer science and technology. The topics covered in this encyclopedia include:...

Mobile Crowdsensing

Cristian Borcea, Manoop Talasila, Reza Curtmola
November 23, 2016

Mobile crowdsensing is a technology that allows large scale, cost-effective sensing of the physical world. In mobile crowdsensing, mobile personal devices such as smart phones or smart watches come equipped with a variety of sensors that can be leveraged to collect data related to environment,...

Culture Matters: Decision-Making in Global Virtual Teams

Norhayati Zakaria
November 18, 2016

Global virtual teams (GVTs) have evolved as a common work structure in multinational corporations due to their efficiency and cost-effectiveness. The cultural differences can produce great benefits in terms of perspective, creativity, and innovation, but can also exacerbate interpersonal...

Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices

Sajay Rai, Philip Chukwuma, Richard Cozart
November 10, 2016

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the...

Location Privacy in Wireless Sensor Networks

Ruben Rios, Javier Lopez, Jorge Cuellar
October 21, 2016

Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor...

Introduction to Cognitive Radio Networks and Applications

Geetam Tomar, Ashish Bagwari, Jyotshana Kanti
September 28, 2016

Cognitive radio is 5-G technology, comes under IEEE 802.22 WRAN (Wireless Regional Area Network) standards. It is currently experiencing rapid growth due to its potential to solve many of the problems affecting present-day wireless systems. The foremost objective of "Introduction to Cognitive Radio...

High-Performance IT Services

Terry Critchley
August 23, 2016

This book on performance fundamentals covers UNIX, OpenVMS, Linux, Windows, and MVS. Most of the theory and systems design principles can be applied to other operating systems, as can some of the benchmarks. The book equips professionals with the ability to assess performance characteristics in...

Network and Data Security for Non-Engineers

Frank M. Groom, Kevin Groom, Stephan S. Jones
August 22, 2016

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful...

Mobile Ad Hoc Networks: Bio-Inspired Quality of Service Aware Routing Protocols

G Ram Mohana Reddy, Kiran M
August 18, 2016

In recent years, a lot of work has been done in an effort to incorporate Swarm Intelligence (SI) techniques in building an adaptive routing protocol for Mobile Ad Hoc Networks (MANETs). Since centralized approach for routing in MANETs generally lacks in scalability and fault-tolerance, SI...

Practical Cloud Security: A Cross-Industry View

Melvin B. Greer, Jr., Kevin L. Jackson
August 02, 2016

Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of...

Protocols for Secure Electronic Commerce, Third Edition

Mostafa Hashem Sherif
May 25, 2016

Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications. Attending to a variety of electronic payment systems currently in use around the globe, this edition:...

Conferences

Year: