Information Technology

Networking Communication

Per Page:
Sort:

Data Protection: Ensuring Data Availability

Preston de Guise
February 22, 2017

This is the fundamental truth about data protection: backup is dead. Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization. So what is...

Advances in Smart Cities: Smarter People, Governance, and Solutions

Arpan Kumar Kar, M P Gupta, P. Vigneswara Ilavarasan, Yogesh K. Dwivedi
January 17, 2017

This is an edited book based on the selected submissions made to the conference titled "International Conference in Smart Cities". The project provides an innovative and new approach to holistic management of cities physical, socio-economic, environmental, transportation and political assets across...

Encyclopedia of Computer Science and Technology, Second Edition (Print)

Phillip A. Laplante
December 21, 2016

With breadth and depth of coverage, the Encyclopedia of Computer Science and Technology, Second Edition has a multi-disciplinary scope, drawing together comprehensive coverage of the inter-related aspects of computer science and technology. The topics covered in this encyclopedia include:...

Mobile Crowdsensing

Cristian Borcea, Manoop Talasila, Reza Curtmola
November 23, 2016

Mobile crowdsensing is a technology that allows large scale, cost-effective sensing of the physical world. In mobile crowdsensing, mobile personal devices such as smart phones or smart watches come equipped with a variety of sensors that can be leveraged to collect data related to environment,...

Culture Matters: Decision-Making in Global Virtual Teams

Norhayati Zakaria
November 18, 2016

Global virtual teams (GVTs) have evolved as a common work structure in multinational corporations due to their efficiency and cost-effectiveness. The cultural differences can produce great benefits in terms of perspective, creativity, and innovation, but can also exacerbate interpersonal...

Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices

Sajay Rai, Philip Chukwuma, Richard Cozart
November 10, 2016

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the...

Location Privacy in Wireless Sensor Networks

Ruben Rios, Javier Lopez, Jorge Cuellar
October 21, 2016

Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor...

Introduction to Cognitive Radio Networks and Applications

Geetam Tomar, Ashish Bagwari, Jyotshana Kanti
September 28, 2016

Cognitive radio is 5-G technology, comes under IEEE 802.22 WRAN (Wireless Regional Area Network) standards. It is currently experiencing rapid growth due to its potential to solve many of the problems affecting present-day wireless systems. The foremost objective of "Introduction to Cognitive Radio...

High-Performance IT Services

Terry Critchley
August 23, 2016

This book on performance fundamentals covers UNIX, OpenVMS, Linux, Windows, and MVS. Most of the theory and systems design principles can be applied to other operating systems, as can some of the benchmarks. The book equips professionals with the ability to assess performance characteristics in...

Network and Data Security for Non-Engineers

Frank M. Groom, Kevin Groom, Stephan S. Jones
August 22, 2016

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful...

Mobile Ad Hoc Networks: Bio-Inspired Quality of Service Aware Routing Protocols

G Ram Mohana Reddy, Kiran M
August 18, 2016

In recent years, a lot of work has been done in an effort to incorporate Swarm Intelligence (SI) techniques in building an adaptive routing protocol for Mobile Ad Hoc Networks (MANETs). Since centralized approach for routing in MANETs generally lacks in scalability and fault-tolerance, SI...

Practical Cloud Security: A Cross-Industry View

Melvin B. Greer, Jr., Kevin L. Jackson
August 02, 2016

Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of...

Conferences

Year: