System Reliability and Security Techniques and Methodologies Because of the growing reliance on software concerns are growing as to how reliable a system is before it is commissioned for use how high the level of reliability is in the system and how many vulnerabilities exist in the system before its operationalization. Equally pressing issues include how to secure the system from internal and external security threats that may exist in the face of resident vulnerabilities. These two problems are considered increasingly important because they necessitate the development of tools and techniques capable of analyzing dependability and security aspects of a system. These concerns become more pronounced in the cases of safety-critical and mission-critical systems. System Reliability and Security: Techniques and Methodologies focuses on the use of soft computing techniques and analytical techniques in the modeling and analysis of dependable and secure systems. It examines systems and applications having complex distributed or networked architectures in such fields as: Nuclear energy Ground transportation systems Air traffic control Healthcare and medicine Communications System reliability engineering is a multidisciplinary field that uses computational methods for estimating or predicting the reliability aspects of a system and analyzing failure data obtained from real-world projects. System security is a related field that ensures that even a reliable system is secure against accidental or deliberate intrusions and is free of vulnerabilities. This book covers tools and techniques cutting-edge research topics and methodologies in the areas of system reliability and security. It examines prediction models and methods as well as how to secure a system as it is being developed. | System Reliability and Security Techniques and Methodologies GBP 59.99 1
Embedded Linux System Design and Development Based upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications Embedded Linux System Design and Development contains a full embedded Linux system development roadmap for systems architects and software programmers. Explaining the issues that arise out of the use of Linux in embedded systems the book facilitates movement to embedded Linux from traditional real-time operating systems and describes the system design model containing embedded Linux. This book delivers practical solutions for writing debugging and profiling applications and drivers in embedded Linux and for understanding Linux BSP architecture. It enables you to understand: various drivers such as serial I2C and USB gadgets; uClinux architecture and its programming model; and the embedded Linux graphics subsystem. The text also promotes learning of methods to reduce system boot time optimize memory and storage and find memory leaks and corruption in applications. This volume benefits IT managers in planning to choose an embedded Linux distribution and in creating a roadmap for OS transition. It also describes the application of the Linux licensing model in commercial products. GBP 56.99 1
The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation Uses the Running Operation as the Main Thread Difficulty in understanding an operating system (OS) lies not in the technical aspects but in the complex relationships inside the operating systems. The Art of Linux Kernel Design: Illustrating the Operating System Design Principle and Implementation addresses this complexity. Written from the perspective of the designer of an operating system this book tackles important issues and practical problems on how to understand an operating system completely and systematically. It removes the mystery revealing operating system design guidelines explaining the BIOS code directly related to the operating system and simplifying the relationships and guiding ideology behind it all. Based on the Source Code of a Real Multi-Process Operating System Using the 0. 11 edition source code as a representation of the Linux basic design the book illustrates the real states of an operating system in actual operations. It provides a complete systematic analysis of the operating system source code as well as a direct and complete understanding of the real operating system run-time structure. The author includes run-time memory structure diagrams and an accompanying essay to help readers grasp the dynamics behind Linux and similar software systems. Identifies through diagrams the location of the key operating system data structures that lie in the memory Indicates through diagrams the current operating status information which helps users understand the interrupt state and left time slice of processes Examines the relationship between process and memory memory and file file and process and the kernel Explores the essential association preparation and transition which is the vital part of operating system Develop a System of Your Own This text offers an in-dep | The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation GBP 170.00 1
UML Diagramming A Case Study Approach The Unified Modeling Language better known as UML has become the de facto standard modeling language for analyzing and designing software applications and systems. Software analysis and design is just as much an art as it is a science. UML Diagramming: A Catalog of Cases shows the art and the science behind successful software analysis and design with more than 35 case studies of applications of a variety of industries including: Transportation Healthcare Supply chain management Education Agriculture Manufacturing The book explains UML diagramming through case studies to help systems and software developers specify visualize construct and document the artifacts of software systems. The cases demonstrate how UML embodies software engineering best practices for modeling large and complex systems. They show how UML is an intuitive diagramming language that can be easily understood by end-users and business professionals. These cases studies also demonstrate how UML is a powerful language for communicating software designs to help developers and end users validate application scope requirements and features. Case studies highlighted in the book included: WEBMED healthcare service system services Inventory management system Business process outsourcing (BPO) management system Weather monitoring system Product recommendation system Textile management system Smart traffic management system Online pharmacy management system Placement automation system Farm management system Art gallery management system Website development This catalog of UML case studies is an invaluable reference for students studying software engineering programmers starting out their careers and seasoned systems developers needing a reference guide. | UML Diagramming A Case Study Approach GBP 48.99 1
Risk Analytics Data-Driven Decisions under Uncertainty The 2022 World Economic Forum surveyed 1 000 experts and leaders who indicated their risk perception that the earth’s conditions for humans are a main concern in the next 10 years. This means environmental risks are a priority to study in a formal way. At the same time innovation risks are present in theminds of leaders newknowledge brings new risk and the adaptation and adoption of risk knowledge is required to better understand the causes and effects can have on technological risks. These opportunities require not only adopting new ways of managing and controlling emerging processes for society and business but also adapting organizations to changes and managing new risks. Risk Analytics: Data-Driven Decisions Under Uncertainty introduces a way to analyze and design a risk analytics system (RAS) that integrates multiple approaches to risk analytics to deal with diverse types of data and problems. A risk analytics system is a hybrid system where human and artificial intelligence interact with a data gathering and selection process that uses multiple sources to the delivery of guidelines to make decisions that include humans and machines. The RAS system is an integration of components such as data architecture with diverse data and a risk analytics process and modeling process to obtain knowledge and then determine actions through the new knowledge that was obtained. The use of data analytics is not only connected to risk modeling and its implementation but also to the development of the actionable knowledge that can be represented by text in documents to define and share explicit knowledge and guidelines in the organization for strategy implementation. This book moves from a review of data to the concepts of a RAS. It reviews RAS system components required to support the creation of competitive advantage in organizations through risk analytics. Written for executives analytics professionals risk management professionals strategy professionals and postgraduate students this book shows a way to implement the analytics process to develop a risk management practice that creates an adaptive competitive advantage under uncertainty. | Risk Analytics Data-Driven Decisions under Uncertainty GBP 74.99 1
Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks An organization’s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods safeguards and techniques that help protect an organization from insider computer fraud. Drawing from the author’s vast experience assessing the adequacy of IT security for the banking and securities industries the book presents a practical framework for identifying measuring monitoring and controlling the risks associated with insider threats. It not only provides an analysis of application or system-related risks it demonstrates the interrelationships that exist between an application and the IT infrastructure components it uses to transmit process and store sensitive data. The author also examines the symbiotic relationship between the risks controls threats and action plans that should be deployed to enhance the overall information security governance processes. Increasing the awareness and understanding necessary to effectively manage the risks and controls associated with an insider threat this book is an invaluable resource for those interested in attaining sound and best practices over the risk management process. | Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks GBP 56.99 1
Industrial IoT Application Architectures and Use Cases As the number of Internet of Things (IoT) elements grows exponentially their interactions can generate a massive amount of raw and multi-structured data. The challenge with this data explosion is to transform any raw data into information and knowledge which can be used by people and systems to make intelligent decisions. Industrial IoT Application Architectures and Use Cases explores how artificial intelligence (AI) data analytics and IoT technology combine to promote intelligent decision-making and automation in a range of industries. With faster more stable AI algorithms and approaches knowledge discovery and dissemination from IoT-device data can be simplified and streamlined. An era of powerful cognitive technology is beginning due to cloud-based cognitive systems that are forming the foundation of game-changing intelligent applications. This book presents next-generation use cases of IoT and IoT data analytics for a variety of industrial verticals as given below: An Intelligent IoT framework for smart water managementAn IoT-enabled smart traffic control system for congestion control and smart traffic management An intelligent airport system for airport management and security surveillanceAn IoT framework for healthcare to integrate and report patient information Fuzzy scheduling with IoT for tracking and monitoring hotel assets An IoT system for designing drainage systems and monitoring drainage pipes Predictive maintenance of plant equipment to decide the actual mean time to malfunction Integrated neural networks and IoT systems for predictive equipment maintenance IoT integration in blockchain for smart waste management This book also includes a chapter on the IoT paradigm and an overview of uses cases for personal social and industrial applications. GBP 42.99 1
Project Management beyond Waterfall and Agile This book goes beyond the paint by numbers approach transcending the how of project management to the what and why which is critical for leaders of change. — Dr. Joel B. Carboni President and Founder GPM Global and President IPMA-USAProject Management beyond Waterfall and Agile presents a flexible universal and integrated three-dimensional model for managing projects the Customizable and Adaptable Methodology for Managing Projects™ (CAMMP™ ). By tailoring and customizing the model to a specific industry or organization and by adapting it to a function or project classification this model can be used to manage any project. CAMMP™ can also be used both in a traditional or an Agile environment. CAMMP™ integrates leading concepts on competence processes and sustainability. The model’s three dimensions are project lifecycle project management processes and finally competence sustainability and best practices. The book explains how to integrate these dimensions to manage a project across the three dimensions and the project stages. CAMMP™ is a stage-gate process which is vital for project success. The current state of practice in project management is not sustainable. The root causes of this problem include a lack of standardized processes missing methods or methodological approaches and no real organizational system for managing projects. This book introduces a system to address these shortcomings. It focuses on the elements of this system which is a practical and systematic methodological approach for managing and delivering all types of projects. CAMMP™ integrates the best learning from the various global associations in the field. The book distills the experience and knowledge of a practitioner working in different roles for more than three decades on various types of projects of all sizes and complexities. It is a practical book by a practitioner writing for practitioners. GBP 44.99 1
ERP Systems for Manufacturing Supply Chains Applications Configuration and Performance ERP Systems for Manufacturing Supply Chains: Applications Configuration and Performance provides insight into the core architecture modules and process support of ERP systems used in a manufacturing supply chain. This book explains the building blocks of an ERP system and how they can be used to increase performance of manufacturing supply chains. Starting with an overview of basic concepts of supply chain and ERP systems the book delves into the core ERP modules that support manufacturing facilities and organizations. It examines each module’s structure and functionality as well as the process support the module provides. Cases illustrate how the modules can be applied in manufacturing environments. Also covered is how the ERP modules can be configured to support manufacturing supply chains. Setting up an ERP system to support the supply chain within single manufacturing facility provides insight into how an ERP system is used in the smallest of manufacturing enterprises as well as lays the foundation for ERP systems in manufacturing organizations. The book then supplies strategies for larger manufacturing enterprises and discusses how ERP systems can be used to support a complete manufacturing supply chain across different facilities and companies. The ERP systems on the market today tend to use common terminology and naming for describing specific functions and data units in the software. However there are differences among packages. The book discusses various data and functionalities found in different ERP-software packages and uses generic and descriptive terms as often as possible to make these valid for as many ERP systems as possible. Filled with insight into ERP system’s core modules and functions this book shows how ERP systems can be applied to support a supply chain in the smallest of manufacturing organizations that only consist of a single manufacturing facility as well as large enterprises where the manufacturing supply chain crosses multiple facilities and companies. | ERP Systems for Manufacturing Supply Chains Applications Configuration and Performance GBP 42.99 1
Blockchain and IoT Integration Approaches and Applications As technology continues to advance and the interconnection of various devices makes our lives easier it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms turn on or off the lights and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain an encrypted distributed computer filing system can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable secure and permanent method of recording data processed by smart machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids smart cities and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems | Blockchain and IoT Integration Approaches and Applications GBP 100.00 1
How to Win at CRM Strategy Implementation Management This book provides clarity and guidance on effective strategy implementation and management of CRM. It explores both the conceptual and cultural context of CRM initiatives along with the particulars of CRM system implementation and management. In order to provide this clarity it surveyed the existing academic publications surrounding CRM sales force automation and related topics within information systems literature. The book supplements this research with insights from CRM experts to provide a robust picture of the CRM landscape and how to improve it no matter what role you play within your organization. This book is for everyone who wants to achieve CRM success. | How to Win at CRM Strategy Implementation Management GBP 42.99 1
TCP Performance over UMTS-HSDPA Systems The evolution of the mobile communication market is causing a major increase in data traffic demands. This could lead to disrupted mobility and intermittent degraded channel conditions that contribute to poor transmission control protocol (TCP) performance. TCP Performance over UMTS-HSDPA Systems presents a comprehensive study of the effect of TCP on achieved application bit rate performance and system capacity and shows how to reduce the interaction of wireless networks on TCP with minimal cost. With self-contained chapters the book consists of two main sections. The first several chapters provide background and describe the state of the art for wireless networks emphasizing one of the third-generation (3G) wireless technologies: the universal mobile telecommunications system (UMTS). These chapters also include an analysis of the overall cell capacity for UMTS Release 99 and high-speed downlink packet access (HSDPA) systems. The second section focuses on the interaction of TCP with wireless systems presenting an exhaustive list of TCP versions and link layer solutions that adapt TCP (often modifying the original TCP) to a wireless network. This section also displays mathematical modeling of the interaction of hybrid automatic repeat request (HARQ) and TCP in UMTS networks. While offering information for advanced undergraduate students who are unfamiliar with code division multiple access (CDMA) wireless systems as well as UMTS and HSDPA cellular systems the book also provides extensive coverage of TCP over wireless systems problems and solutions for researchers developers and graduate students. GBP 56.99 1
Healthcare Information Systems The move to manage medicine from a financial perspective i. e. managed care has added huge layers of bureaucratic and administrative functions to healthcare. The need to have the ability to track patient medical records mandated by government legislation such as HIPAA is bringing new technologies and processes into the healthcare arena. A universal medical record system and absolute patient portability is a definite possibility in the not too distant future. All of these issues beg for clear IT solutions. Healthcare Information Systems Second Edition approaches these challenges and opportunitites as pieces of a complex puzzle. It not only brings you up-to-date on the technology involved but also explains how that technology interrelates and affects healthcare organizations. The book gives you complete coverage of all aspects of information technology as it relates to the healthcare industry. In Healthcare Information Systems you will find:An overview of healthcare systemsTips on disaster planning and system securityImproving quality reducing risks and understanding costs An in-depth look into the HIPAA regulationsEMR and the data warehouseInformation on managing the healthcare communityA look at the changing organizationViews on telemedicine the Internet and emerging technologiesIdeas on using IT to deal with increasing government regulationIn addition the new edition has expanded coverage of HIPAA wireless networks and communications telemedicine and the increasing role of the Internet in all facets of healthcare. Healthcare Information Systems presents workable solutions to the real problems you will face both today and tomorrow. GBP 56.99 1
Internet of Nano-Things and Wireless Body Area Networks (WBAN) The Internet of Nano-Things (IoNT) is a system of nano-connected devices objects or organisms that have unique identifiers to transfer data over a computer or cellular network wirelessly to the Cloud. Data delivery caching and energy consumption are among the most significant topics in the IoNT nowadays. The book addresses data routing and energy consumption challenges and proposes nano-sensing platforms in critical Wireless Body Area Networks (WBAN). This book covers both design and implementation aspects of data delivery models and strategies in a smart application enabled by the WBAN. It focuses on smart data delivery approaches and energy savings aspects in a reliable IoNT systems. | Internet of Nano-Things and Wireless Body Area Networks (WBAN) GBP 44.99 1
The Busy IT Manager’s Guide to Data Recovery No IT manager or worker enjoys being woken up the middle of the night over a system fault. But arguably the worst way to be awakened is over a situation where data loss has occurred – and the recovery is going wrong. The Busy IT Manager’s Guide to Data Recovery takes a razor focus on the details IT managers (and their teams) responsible for data recovery and resiliency within their business need to be aware of in the design of robust data protection systems. This book covers key architectural requirements of a data resilient system and the types of technology a business can deploy for data protection that maximises the potential for a successful recovery. With cyber-attacks being a daily challenge for IT and business now the book also takes an in-depth look at the special considerations companies need to take in order to guarantee the recoverability of data after a destructive cyber event. Regardless of whether your IT infrastructure runs on-premises or in the public cloud this book gives you the information you need to plan and run a successful data recovery solution that meets your business needs. Preston de Guise has been working with data recovery products for his entire career – designing implementing and supporting solutions for governments universities and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery but the management and procedural aspects too. GBP 22.99 1
Android Security Attacks and Defenses Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming it will help readers get up to speed on the basics of the Android platform and its security issues. Explaining the Android security model and architecture the book describes Android permissions including Manifest permissions to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on security implications and covers JEB Decompiler. The authors describe how to write Android bots in JAVA and how to use reversing tools to decompile any Android application. They also cover the Android file system including import directories and files so readers can perform basic forensic analysis on file system and SD cards. The book includes access to a wealth of resources on its website: www. androidinsecurity. com. It explains how to crack SecureApp. apk discussed in the text and also makes the application available on its site. The book includes coverage of advanced topics such as reverse engineering and forensics mobile device pen-testing methodology malware analysis secure coding and hardening guidelines for Android. It also explains how to analyze security implications for Android mobile devices/applications and incorporate them into enterprise SDLC processes. The book’s site includes a resource section where readers can access downloads for applications tools created by users and sample applications created by the authors under the Resource section. Readers can easily download the files and use them in conjunction with the text wherever needed. Visit www. androidinsecurity. com for more information. | Android Security Attacks and Defenses GBP 56.99 1
A Technical Guide to IPSec Virtual Private Networks What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry yet there continuously seems to be different impressions of what VPNs really are and can become. A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design implementation operations and security. Starting with a primer on the IP protocol suite the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory cryptography RAS authentication IKE IPSec encapsulation keys and policies. After explaining the technologies and their interrelationships the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security network and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies. GBP 160.00 1
Modeling Software with Finite State Machines A Practical Approach Modeling Software with Finite State Machines: A Practical Approach explains how to apply finite state machines to software development. It provides a critical analysis of using finite state machines as a foundation for executable specifications to reduce software development effort and improve quality. This book discusses the design of a state machine and of a system of state machines. It also presents a detailed analysis of development issues relating to behavior modeling with design examples and design rules for using finite state machines. This volume describes a coherent and well-tested framework for generating reliable software for even the most complex tasks. The authors demonstrate that the established practice of using a specification as a basis for coding is wrong. Divided into three parts this book opens by delivering the authors' expert opinions on software covering the evolution of development as well as costs methods programmers and the development cycle. The remaining two parts encourage the use of state machines: promoting the virtual finite state machine (Vfsm) method and the StateWORKS development tools. | Modeling Software with Finite State Machines A Practical Approach GBP 56.99 1
Software Engineering A Methodical Approach 2nd Edition Software Engineering: A Methodical Approach (Second Edition) provides a comprehensive but concise introduction to software engineering. It adopts a methodical approach to solving software engineering problems proven over several years of teaching with outstanding results. The book covers concepts principles design construction implementation and management issues of software engineering. Each chapter is organized systematically into brief reader-friendly sections with itemization of the important points to be remembered. Diagrams and illustrations also sum up the salient points to enhance learning. Additionally the book includes the author’s original methodologies that add clarity and creativity to the software engineering experience. New in the Second Edition are chapters on software engineering projects management support systems software engineering frameworks and patterns as a significant building block for the design and construction of contemporary software systems and emerging software engineering frontiers. The text starts with an introduction of software engineering and the role of the software engineer. The following chapters examine in-depth software analysis design development implementation and management. Covering object-oriented methodologies and the principles of object-oriented information engineering the book reinforces an object-oriented approach to the early phases of the software development life cycle. It covers various diagramming techniques and emphasizes object classification and object behavior. The text features comprehensive treatments of: Project management aids that are commonly used in software engineering An overview of the software design phase including a discussion of the software design process design strategies architectural design interface design database design and design and development standards User interface design Operations design Design considerations including system catalog product documentation user message management design for real-time software design for reuse system security and the agile effect Human resource management from a software engineering perspective Software economics Software implementation issues that range from operating environments to the marketing of software Software maintenance legacy systems and re-engineering This textbook can be used as a one-semester or two-semester course in software engineering augmented with an appropriate CASE or RAD tool. It emphasizes a practical methodical approach to software engineering avoiding an overkill of theoretical calculations where possible. The primary objective is to help students gain a solid grasp of the activities in the software development life cycle to be confident about taking on new software engineering projects. | Software Engineering A Methodical Approach 2nd Edition GBP 59.99 1
Database Systems A Pragmatic Approach 3rd edition This book provides a concise but comprehensive guide to the disciplines of database design construction implementation and management. Based on the authors’ professional experience in the software engineering and IT industries before making a career switch to academia the text stresses sound database design as a necessary precursor to successful development and administration of database systems. The discipline of database systems design and management is discussed within the context of the bigger picture of software engineering. Students are led to understand from the outset of the text that a database is a critical component of a software infrastructure and that proper database design and management is integral to the success of a software system. Additionally students are led to appreciate the huge value of a properly designed database to the success of a business enterprise. The text was written for three target audiences. It is suited for undergraduate students of computer science and related disciplines who are pursuing a course in database systems graduate students who are pursuing an introductory course to database and practicing software engineers and information technology (IT) professionals who need a quick reference on database design. Database Systems: A Pragmatic Approach 3rd Edition discusses concepts principles design implementation and management issues related to database systems. Each chapter is organized into brief reader-friendly conversational sections with itemization of salient points to be remembered. This pragmatic approach includes adequate treatment of database theory and practice based on strategies that have been tested proven and refined over several years. Features of the third edition include: Short paragraphs that express the salient aspects of each subject Bullet points itemizing important points for easy memorization Fully revised and updated diagrams and figures to illustrate concepts to enhance the student’s understanding Real-world examples Original methodologies applicable to database design Step-by-step student-friendly guidelines for solving generic database systems problems Opening chapter overviews and concluding chapter summaries Discussion of DBMS alternatives such as the Entity–Attributes–Value model NoSQL databases database-supporting frameworks and other burgeoning database technologies A chapter with sample assignment questions and case studies This textbook may be used as a one-semester or two-semester course in database systems augmented by a DBMS (preferably Oracle). After its usage students will come away with a firm grasp of the design development implementation and management of a database system. | Database Systems A Pragmatic Approach 3rd edition GBP 59.99 1
Intelligent Data Analytics IoT and Blockchain This book focuses on data analytics with machine learning using IoT and blockchain technology. Integrating these three fields by examining their interconnections Intelligent Data Analytics IoT and Blockchain examines the opportunities and challenges of developing systems and applications exploiting these technologies. Written primarily for researchers who are working in this multi-disciplinary field the book also benefits industry experts and technology executives who want to develop their organizations’ decision-making capabilities. Highlights of the book include: Using image processing with machine learning techniques A deep learning approach for facial recognition A scalable system architecture for smart cities based on cognitive IoT Source authentication of videos shared on social media Survey of blockchain in healthcare Accident prediction by vehicle tracking Big data analytics in disaster management Applicability limitations and opportunities of blockchain technology The book presents novel ideas and insights on different aspects of data analytics blockchain technology and IoT. It views these technologies as interdisciplinary fields concerning processes and systems that extract knowledge and insights from data. Focusing on recent advances the book offers a variety of solutions to real-life challenges with an emphasis on security. GBP 150.00 1
Security without Obscurity A Guide to PKI Operations Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography X. 509 certificates certificate authority (CA) hierarchies or certificate policy (CP) and certificate practice statements. While algorithms certificates and theoretical policy are all excellent discussions the real-world issues for operating a commercial or private CA can be overwhelming. Security without Obscurity: A Guide to PKI Operations provides a no-nonsense approach and realistic guide to operating a PKI system. In addition to discussions on PKI best practices the book supplies warnings against bad PKI practices. Scattered throughout the book are anonymous case studies identifying both good and bad practices. The highlighted bad practices based on real-world scenarios from the authors’ experiences illustrate how bad things are often done with good intentions but cause bigger problems than the original one being solved. This book offers readers the opportunity to benefit from the authors’ more than 50 years of combined experience in developing PKI-related policies standards practices procedures and audits as well as designing and operating various commercial and private PKI systems. | Security without Obscurity A Guide to PKI Operations GBP 42.99 1
Cyber Crime Investigator's Field Guide Transhumanism Artificial Intelligence the Cloud Robotics Electromagnetic Fields Intelligence Communities Rail Transportation Open-Source Intelligence (OSINT)—all this and more is discussed in Cyber Crime Investigator’s Field Guide Third Edition. Many excellent hardware and software products exist to protect our data communications systems but security threats dictate that they must be all the more enhanced to protect our electronic environment. Many laws rules and regulations have been implemented over the past few decades that have provided our law enforcement community and legal system with the teeth needed to take a bite out of cybercrime. But there is still a major need for individuals and professionals who know how to investigate computer network security incidents and can bring them to a proper resolution. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. The third edition provides the investigative framework that needs to be followed along with information about how cyberspace works and the tools that reveal the who where what when why and how in the investigation of cybercrime. Features New focus area on rail transportation OSINT medical devices and transhumanism / robotics Evidence collection and analysis tools Covers what to do from the time you receive the call arrival on site chain of custody and more This book offers a valuable Q&A by subject area an extensive overview of recommended reference materials and a detailed case study. Appendices highlight attack signatures Linux commands Cisco firewall commands port numbers and more. | Cyber Crime Investigator's Field Guide GBP 56.99 1
Social Media and Crowdsourcing Application and Analytics Social media and crowdsourcing are important tools for solving complex problems. The benefit of crowdsourcing is that it leverages the power of human intelligence cost effectively and with less time. Social Media and Crowdsourcing: Application and Analytics examines the concepts of social media and crowdsourcing as well as their analytical aspects. It explores how these technologies contribute to the real world and examines such applications as promoting social good agriculture healthcare tourism disaster management education crime control and cultural heritage. The book also looks at ethical issues in crowdsourcing and future scenarios and challenges for policy. Highlights of the book include the following: A crowdsourcing application in agriculture Crowdsourcing outline for a contemporary aided medicinal backup system Crowdsourcing-based recommendation in the tourism industry Crowdsourcing mechanisms for reviving cultural heritage Expanding the overarching concept of utilizing social media and crowdsourcing to solve various real-life problems this book discusses how to bring together the wisdom of crowds for various decision-making problems in agriculture disaster management and healthcare. It addresses the various ethical issues arising out of various crowdsourcing-based applications. It puts forward diverse methodologies to involve crowdsourcing in education to implement new strategies to enhance learning outcomes. This book also addresses various problem-solving techniques for recommender applications in the travel and tourism industry. Providing a systematic discussion of the many sectors using crowdsourcing as an essential part of social innovation this book is a theoretical and methodological look at the application of social media. | Social Media and Crowdsourcing Application and Analytics GBP 89.99 1
Secure Data Provenance and Inference Control with Semantic Web With an ever-increasing amount of information on the web it is critical to understand the pedigree quality and accuracy of your data. Using provenance you can ascertain the quality of data based on its ancestral data and derivations track back to sources of errors allow automatic re-enactment of derivations to update data and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain you can easily apply the methods presented in the book to a range of other domains. The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhance the scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes products tools and standards for secure data management secure Semantic Web secure web services and secure cloud computing. GBP 56.99 1