61 results (0,20163 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Enterprise Systems Integration

Enterprise Systems Integration

The convergence of knowledge technology and human performance which comprises today's enterprise allows creative business process design. Thus an organization can create new and innovative ways to service customers or to do business with suppliers and make itself a leader in its field. This capability relies on a successful strategy that integrates the enterprise. Enterprise Systems Integration Second Edition continues to provide you with the business insight and the technical know-how that ensures successful systems integration. The book combines the perspectives knowledge and experience of more than 70 experts in the various areas that involve enterprise integration. Their expertise ranges from hands-on experience with technology and project management to the higher-level issues of business and management strategy. Each chapter examines an issue or technology relevant to today's enterprise. Collectively these chapters span the range of enterprise computing and systems integration. Once armed with the strategy and technologies you must successfully deploy ERP systems within budget and on time. In addition you must be able to integrate them into the rest of the enterprise. Still ERP software does not make up the full picture of today's enterprise. Legacy systems e-commerce and other Web-based systems client/server applications networks and communications systems data warehousing and integrated databases enter into the mix. Enterprise Systems Integration Second Edition paints a comprehensive picture of the technologies that comprise today's enterprise and shows you how to make them work together.

GBP 56.99
1

TCP Performance over UMTS-HSDPA Systems

TCP Performance over UMTS-HSDPA Systems

The evolution of the mobile communication market is causing a major increase in data traffic demands. This could lead to disrupted mobility and intermittent degraded channel conditions that contribute to poor transmission control protocol (TCP) performance. TCP Performance over UMTS-HSDPA Systems presents a comprehensive study of the effect of TCP on achieved application bit rate performance and system capacity and shows how to reduce the interaction of wireless networks on TCP with minimal cost. With self-contained chapters the book consists of two main sections. The first several chapters provide background and describe the state of the art for wireless networks emphasizing one of the third-generation (3G) wireless technologies: the universal mobile telecommunications system (UMTS). These chapters also include an analysis of the overall cell capacity for UMTS Release 99 and high-speed downlink packet access (HSDPA) systems. The second section focuses on the interaction of TCP with wireless systems presenting an exhaustive list of TCP versions and link layer solutions that adapt TCP (often modifying the original TCP) to a wireless network. This section also displays mathematical modeling of the interaction of hybrid automatic repeat request (HARQ) and TCP in UMTS networks. While offering information for advanced undergraduate students who are unfamiliar with code division multiple access (CDMA) wireless systems as well as UMTS and HSDPA cellular systems the book also provides extensive coverage of TCP over wireless systems problems and solutions for researchers developers and graduate students.

GBP 56.99
1

Requirements Engineering for Software and Systems

Requirements Engineering for Software and Systems

Solid requirements engineering has increasingly been recognized as the key to improved on-time and on-budget delivery of software and systems projects. New software tools are emerging that are empowering practicing engineers to improve their requirements engineering habits. However these tools are not usually easy to use without significant training. Requirements Engineering for Software and Systems Fourth Edition is intended to provide a comprehensive treatment of the theoretical and practical aspects of discovering analyzing modeling validating testing and writing requirements for systems of all kinds with an intentional focus on software-intensive systems. It brings into play a variety of formal methods social models and modern requirements writing techniques to be useful to practicing engineers. The book is intended for professional software engineers systems engineers and senior and graduate students of software or systems engineering. Since the first edition there have been made many changes and improvements to this textbook. Feedback from instructors students and corporate users was used to correct expand and improve the materials. The fourth edition features two newly added chapters: On Non-Functional Requirements and Requirements Engineering: Road Map to the Future. The latter provides a discussion on the relationship between requirements engineering and such emerging and disruptive technologies as Internet of Things Cloud Computing Blockchain Artificial Intelligence and Affective Computing. All chapters of the book were significantly expanded with new materials that keep the book relevant to current industrial practices. Readers will find expanded discussions on new elicitation techniques agile approaches (e. g. Kanpan SAFe and DEVOps) requirements tools requirements representation risk management approaches and functional size measurement methods. The fourth edition also has significant additions of vignettes exercises and references. Another new feature is scannable QR codes linked to sites containing updates tools videos and discussion forums to keep readers current with the dynamic field of requirements engineering.

GBP 59.99
1

Healthcare Information Systems

Healthcare Information Systems

The move to manage medicine from a financial perspective i. e. managed care has added huge layers of bureaucratic and administrative functions to healthcare. The need to have the ability to track patient medical records mandated by government legislation such as HIPAA is bringing new technologies and processes into the healthcare arena. A universal medical record system and absolute patient portability is a definite possibility in the not too distant future. All of these issues beg for clear IT solutions. Healthcare Information Systems Second Edition approaches these challenges and opportunitites as pieces of a complex puzzle. It not only brings you up-to-date on the technology involved but also explains how that technology interrelates and affects healthcare organizations. The book gives you complete coverage of all aspects of information technology as it relates to the healthcare industry. In Healthcare Information Systems you will find:An overview of healthcare systemsTips on disaster planning and system securityImproving quality reducing risks and understanding costs An in-depth look into the HIPAA regulationsEMR and the data warehouseInformation on managing the healthcare communityA look at the changing organizationViews on telemedicine the Internet and emerging technologiesIdeas on using IT to deal with increasing government regulationIn addition the new edition has expanded coverage of HIPAA wireless networks and communications telemedicine and the increasing role of the Internet in all facets of healthcare. Healthcare Information Systems presents workable solutions to the real problems you will face both today and tomorrow.

GBP 56.99
1

Database Systems A Pragmatic Approach 3rd edition

Database Systems A Pragmatic Approach 3rd edition

This book provides a concise but comprehensive guide to the disciplines of database design construction implementation and management. Based on the authors’ professional experience in the software engineering and IT industries before making a career switch to academia the text stresses sound database design as a necessary precursor to successful development and administration of database systems. The discipline of database systems design and management is discussed within the context of the bigger picture of software engineering. Students are led to understand from the outset of the text that a database is a critical component of a software infrastructure and that proper database design and management is integral to the success of a software system. Additionally students are led to appreciate the huge value of a properly designed database to the success of a business enterprise. The text was written for three target audiences. It is suited for undergraduate students of computer science and related disciplines who are pursuing a course in database systems graduate students who are pursuing an introductory course to database and practicing software engineers and information technology (IT) professionals who need a quick reference on database design. Database Systems: A Pragmatic Approach 3rd Edition discusses concepts principles design implementation and management issues related to database systems. Each chapter is organized into brief reader-friendly conversational sections with itemization of salient points to be remembered. This pragmatic approach includes adequate treatment of database theory and practice based on strategies that have been tested proven and refined over several years. Features of the third edition include: Short paragraphs that express the salient aspects of each subject Bullet points itemizing important points for easy memorization Fully revised and updated diagrams and figures to illustrate concepts to enhance the student’s understanding Real-world examples Original methodologies applicable to database design Step-by-step student-friendly guidelines for solving generic database systems problems Opening chapter overviews and concluding chapter summaries Discussion of DBMS alternatives such as the Entity–Attributes–Value model NoSQL databases database-supporting frameworks and other burgeoning database technologies A chapter with sample assignment questions and case studies This textbook may be used as a one-semester or two-semester course in database systems augmented by a DBMS (preferably Oracle). After its usage students will come away with a firm grasp of the design development implementation and management of a database system. | Database Systems A Pragmatic Approach 3rd edition

GBP 59.99
1

ERP Systems for Manufacturing Supply Chains Applications Configuration and Performance

ERP Systems for Manufacturing Supply Chains Applications Configuration and Performance

ERP Systems for Manufacturing Supply Chains: Applications Configuration and Performance provides insight into the core architecture modules and process support of ERP systems used in a manufacturing supply chain. This book explains the building blocks of an ERP system and how they can be used to increase performance of manufacturing supply chains. Starting with an overview of basic concepts of supply chain and ERP systems the book delves into the core ERP modules that support manufacturing facilities and organizations. It examines each module’s structure and functionality as well as the process support the module provides. Cases illustrate how the modules can be applied in manufacturing environments. Also covered is how the ERP modules can be configured to support manufacturing supply chains. Setting up an ERP system to support the supply chain within single manufacturing facility provides insight into how an ERP system is used in the smallest of manufacturing enterprises as well as lays the foundation for ERP systems in manufacturing organizations. The book then supplies strategies for larger manufacturing enterprises and discusses how ERP systems can be used to support a complete manufacturing supply chain across different facilities and companies. The ERP systems on the market today tend to use common terminology and naming for describing specific functions and data units in the software. However there are differences among packages. The book discusses various data and functionalities found in different ERP-software packages and uses generic and descriptive terms as often as possible to make these valid for as many ERP systems as possible. Filled with insight into ERP system’s core modules and functions this book shows how ERP systems can be applied to support a supply chain in the smallest of manufacturing organizations that only consist of a single manufacturing facility as well as large enterprises where the manufacturing supply chain crosses multiple facilities and companies. | ERP Systems for Manufacturing Supply Chains Applications Configuration and Performance

GBP 42.99
1

Systems Engineering for Projects Achieving Positive Outcomes in a Complex World

Systems Engineering for Projects Achieving Positive Outcomes in a Complex World

Systems engineering has been applied to some of the most important projects of our time including those that have helped humanity explore the world and the universe expand our technical abilities and enhance the quality of human life. Without formal training in systems engineering the discipline is often difficult to understand and apply and its use within projects is often confusing. Systems Engineering for Projects: Achieving Positive Outcomes in a Complex World provides an approach that utilizes a combination of the most effective processes from both project management and systems engineering disciplines in a simplified and straightforward manner. The processes described in the book are lightweight flexible and tailorable. They provide the shortest path to success in projects across the entire project life cycle from research to operations and from simple to the most complex. The book also addresses how this methodology can be used in a continually adapting and changing world as projects span disciplines and become even more interconnected across all areas of human existence. Each chapter includes diagrams templates summary lists a case study and a thought-provoking question and answer section that assists readers in immediate application of the material to their own projects. The book is a project manager’s resource for understanding how to directly apply essential processes to projects in a way that increases the probability of achieving success. It is a comprehensive go-to manual on the application of systems engineering processes to projects of all types and complexity. | Systems Engineering for Projects Achieving Positive Outcomes in a Complex World

GBP 42.99
1

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range heralding the dawn of an era in which today’s Internet of People gives way to tomorrow’s Internet of Things — where billions of objects will have the ability to report their location identity and history over wireless connections. Connectivity and Communication — Anything Anywhere and Anytime An examination of the exciting expansion period in this research The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems provides comprehensive technical and practical deploying policy guidance that covers fundamentals and recent advances in pervasive networked systems. The book addresses the conceptual and technical issues that influence the technology roadmap and gives an in-depth introduction to the Internet of Things and its effect on businesses and individuals. Discussing case studies experience reports and best practice it contains information on emerging technologies market opportunities and policy implications. Practical Guidance and Balanced Coverage The first book of its kind to address major new technological developments and define the Internet of Things this text provides balanced coverage of theory and practical issues. Reflecting research trends and industry needs itis a comprehensive technical and practical guide to recent advances in pervasive networked systems. | The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

GBP 56.99
1

Architecting Secure Software Systems

Architecting Secure Software Systems

Traditionally software engineers have defined security as a non-functional requirement. As such all too often it is only considered as an afterthought making software applications and services vulnerable to attacks. With the phenomenal growth in cybercrime it has become imperative that security be an integral part of software engineering so that all software assets are protected and safe. Architecting Secure Software Systems defines how security should be incorporated into basic software engineering at the requirement analysis phase continuing this sharp focus into security design secured programming security testing and secured deployment. Outlines Protection Protocols for Numerous ApplicationsThrough the use of examples this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX . NET Java mobile and Web environments. Finally they explore the security of telecommunications and other distributed services through Service Oriented Architecture (SOA). The book employs a versatile multi-platform approach that allows users to seamlessly integrate the material into their own programming paradigm regardless of their individual programming backgrounds. The text also provides real-world code snippets for experimentation. Define a Security Methodology from the Initial Phase of Development Almost all assets in our lives have a virtual presence and the convergence of computer information and telecommunications makes these assets accessible to everyone in the world. This volume enables developers engineers and architects to approach security in a holistic fashion at the beginning of the software development li

GBP 56.99
1

Analyzing and Securing Social Networks

Analyzing and Securing Social Networks

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location demographics and sentiments of the participants of the network and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems analyze such systems and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book together with the numerous references listed in each chapter have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies (2) basics of analyzing and securing social networks (3) the authors’ design and implementation of various social network analytics tools (4) privacy aspects of social networks (5) access control and inference control for social networks (6) experimental systems designed or developed by the authors on analyzing and securing social networks (7) social media application systems developed by the authors (8) secure social media systems developed by the authors and (9) some of the authors’ exploratory work and further directions.

GBP 42.99
1

UML Diagramming A Case Study Approach

UML Diagramming A Case Study Approach

The Unified Modeling Language better known as UML has become the de facto standard modeling language for analyzing and designing software applications and systems. Software analysis and design is just as much an art as it is a science. UML Diagramming: A Catalog of Cases shows the art and the science behind successful software analysis and design with more than 35 case studies of applications of a variety of industries including: Transportation Healthcare Supply chain management Education Agriculture Manufacturing The book explains UML diagramming through case studies to help systems and software developers specify visualize construct and document the artifacts of software systems. The cases demonstrate how UML embodies software engineering best practices for modeling large and complex systems. They show how UML is an intuitive diagramming language that can be easily understood by end-users and business professionals. These cases studies also demonstrate how UML is a powerful language for communicating software designs to help developers and end users validate application scope requirements and features. Case studies highlighted in the book included: WEBMED healthcare service system services Inventory management system Business process outsourcing (BPO) management system Weather monitoring system Product recommendation system Textile management system Smart traffic management system Online pharmacy management system Placement automation system Farm management system Art gallery management system Website development This catalog of UML case studies is an invaluable reference for students studying software engineering programmers starting out their careers and seasoned systems developers needing a reference guide. | UML Diagramming A Case Study Approach

GBP 48.99
1

Data Analytics for Internal Auditors

Embedded Linux System Design and Development

System Reliability and Security Techniques and Methodologies

System Reliability and Security Techniques and Methodologies

Because of the growing reliance on software concerns are growing as to how reliable a system is before it is commissioned for use how high the level of reliability is in the system and how many vulnerabilities exist in the system before its operationalization. Equally pressing issues include how to secure the system from internal and external security threats that may exist in the face of resident vulnerabilities. These two problems are considered increasingly important because they necessitate the development of tools and techniques capable of analyzing dependability and security aspects of a system. These concerns become more pronounced in the cases of safety-critical and mission-critical systems. System Reliability and Security: Techniques and Methodologies focuses on the use of soft computing techniques and analytical techniques in the modeling and analysis of dependable and secure systems. It examines systems and applications having complex distributed or networked architectures in such fields as: Nuclear energy Ground transportation systems Air traffic control Healthcare and medicine Communications System reliability engineering is a multidisciplinary field that uses computational methods for estimating or predicting the reliability aspects of a system and analyzing failure data obtained from real-world projects. System security is a related field that ensures that even a reliable system is secure against accidental or deliberate intrusions and is free of vulnerabilities. This book covers tools and techniques cutting-edge research topics and methodologies in the areas of system reliability and security. It examines prediction models and methods as well as how to secure a system as it is being developed. | System Reliability and Security Techniques and Methodologies

GBP 59.99
1

Industrial IoT Application Architectures and Use Cases

Industrial IoT Application Architectures and Use Cases

As the number of Internet of Things (IoT) elements grows exponentially their interactions can generate a massive amount of raw and multi-structured data. The challenge with this data explosion is to transform any raw data into information and knowledge which can be used by people and systems to make intelligent decisions. Industrial IoT Application Architectures and Use Cases explores how artificial intelligence (AI) data analytics and IoT technology combine to promote intelligent decision-making and automation in a range of industries. With faster more stable AI algorithms and approaches knowledge discovery and dissemination from IoT-device data can be simplified and streamlined. An era of powerful cognitive technology is beginning due to cloud-based cognitive systems that are forming the foundation of game-changing intelligent applications. This book presents next-generation use cases of IoT and IoT data analytics for a variety of industrial verticals as given below: An Intelligent IoT framework for smart water managementAn IoT-enabled smart traffic control system for congestion control and smart traffic management An intelligent airport system for airport management and security surveillanceAn IoT framework for healthcare to integrate and report patient information Fuzzy scheduling with IoT for tracking and monitoring hotel assets An IoT system for designing drainage systems and monitoring drainage pipes Predictive maintenance of plant equipment to decide the actual mean time to malfunction Integrated neural networks and IoT systems for predictive equipment maintenance IoT integration in blockchain for smart waste management This book also includes a chapter on the IoT paradigm and an overview of uses cases for personal social and industrial applications.

GBP 42.99
1

Acquiring Card Payments

Driving Justice Equity Diversity and Inclusion

Driving Justice Equity Diversity and Inclusion

Navigating the volatility uncertainty complexity and ambiguity (VUCA) characterizing the business world in the 21st century requires a new paradigm focused on an integrated bottom line – planet people and profit (PPP). Global trends include resource scarcity and growing inequities in income wealth education and healthcare. Stakeholders are demanding that organizations address systemic barriers to promote justice and equity within organizations and across broader social systems. Transformational change requires leadership to analyze internal and external systems through a social and environmental justice lens. Despite a growing focus on justice equity diversity and inclusion the imbalance of power remains within our institutions organizations and social systems. To move the needle leaders can turn to Driving Justice Equity Diversity and Inclusion which explains developing a North Star vision and creating a strategy to redesign organizational process and systems as well as leveraging tools for data-driven decision-making. It presents a framework to build an inclusive organization as well as a model to engage and support senior and middle management beginning the process of capacity building and systemic change. By layering in AI and other technologies to support data-driven decision-making the book guides leaders in navigating their organization’s journey along the maturity continuum to achieve their North Star vision of becoming a just and equitable organization. The book also helps managers to: Assess ecosystems and organizational systems that justice equity diversity and inclusion impact Take a deeper dive into transformational and operational components to gain insights on the deep systemic realignment of the North Star vision Identify and engage with diverse stakeholders to gain perspective and understand issues crucial for transformative change Leverage people-centered design to create a process promoting diversity of voices and to better align outcomes with shared organizational vision Use data to drive decision-making and reduce bias by removing intuition from the decision-making process Leverage the book's frameworks to drive collaborative systemic change Adapt insights highlighted in multiple interviews with DEI practitioners Benefit from lessons learned and best practices featured in the book's case studies This book features a primer which is a quick reference guide to key terms concepts and definitions. It helps to define justice equity diversity inclusion and other key terms such as unconscious bias stereotypes and microaggressions. It also features a toolkit which includes checklists to help managers lead organizations to realize their own North Star vision.

GBP 44.99
1

Blockchain for Information Security and Privacy

Blockchain for Information Security and Privacy

Distributed and peer-to-peer (P2P) applications are increasing daily and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain a decentralized cryptographic-based technology is a promising element for IoT security in manufacturing finance healthcare supply chain identity management e-governance defence education banking and trading. Blockchain has the potential to secure IoT through repetition changeless capacity and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security trust and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security trust and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e. g. vehicle web power web cloud internet and edge computing) this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives efficiency limitations computational complexity and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

GBP 99.99
1

Software Configuration Management

Business Strategies for the Next-Generation Network

Business Strategies for the Next-Generation Network

Carriers and service providers have united around the concept of the Next-Generation Network (NGN). Although leveraging a broad basket of Internet technologies the NGN is not being planned as the next-generation Internet. In its intention and architecture it is more accurately described as Broadband-ISDN release 2. 0. The NGN transition is hard for both practitioners and observers to understand because it weaves together a number of distinct strands: the development of a new architecture and technology base including advanced IT automation systems the development of a portfolio of ‘new wave’ products and services which exploits the power of the new network the design of a new kind of organization which can utilize the higher levels of automation in the NGN and reduce costs and the development of an effective transition plan which can smoothly move operators from their current legacy networks systems and processes to the NGN future. The book begins with a review of the failures of previous attempts by carriers to retool for the future. It describes in detail the technologies and capabilities supporting “new wave’” services focusing particularly on multimedia interactive services TV and Video-on-Demand. The author looks at the IMS layer and how it interworks both downwards into the QoS-enabled IP transport layer and upwards to enable new kinds of applications. However equal attention is addressed to the business models of players in the value chain carriers service providers broadcasters and production companies. The author then examines how carriers have attempted to remodel themselves as IP companies along the dimensions of people processes and IT automation systems describing the lessons to be learned from numerous failures. He identifies more innovativebusiness models exploresPeer-to-Peer networking and reviews the prospects for | Business Strategies for the Next-Generation Network

GBP 54.99
1

Intelligent Data Analytics IoT and Blockchain

Handbook of e-Business Security

Applied Edge AI Concepts Platforms and Industry Use Cases

Applied Edge AI Concepts Platforms and Industry Use Cases

The strategically sound combination of edge computing and artificial intelligence (AI) results in a series of distinct innovations and disruptions enabling worldwide enterprises to visualize and realize next-generation software products solutions and services. Businesses individuals and innovators are all set to embrace and experience the sophisticated capabilities of Edge AI. With the faster maturity and stability of Edge AI technologies and tools the world is destined to have a dazzling array of edge-native people-centric event-driven real-time service-oriented process-aware and insights-filled services. Further on business workloads and IT services will become competent and cognitive with state-of-the-art Edge AI infrastructure modules AI algorithms and models enabling frameworks integrated platforms accelerators high-performance processors etc. The Edge AI paradigm will help enterprises evolve into real-time and intelligent digital organizations. Applied Edge AI: Concepts Platforms and Industry Use Cases focuses on the technologies processes systems and applications that are driving this evolution. It examines the implementation technologies; the products processes platforms patterns and practices; and use cases. AI-enabled chips are exclusively used in edge devices to accelerate intelligent processing at the edge. This book examines AI toolkits and platforms for facilitating edge intelligence. It also covers chips algorithms and tools to implement Edge AI as well as use cases. FEATURES The opportunities and benefits of intelligent edge computing Edge architecture and infrastructure AI-enhanced analytics in an edge environment Encryption for securing information An Edge AI system programmed with Tiny Machine learning algorithms for decision making An improved edge paradigm for addressing the big data movement in IoT implementations by integrating AI and caching to the edge Ambient intelligence in healthcare services and in development of consumer electronic systems Smart manufacturing of unmanned aerial vehicles (UAVs) AI edge computing and blockchain in systems for environmental protection Case studies presenting the potential of leveraging AI in 5G wireless communication | Applied Edge AI Concepts Platforms and Industry Use Cases

GBP 99.99
1

Blockchain and IoT Integration Approaches and Applications

Blockchain and IoT Integration Approaches and Applications

As technology continues to advance and the interconnection of various devices makes our lives easier it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms turn on or off the lights and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain an encrypted distributed computer filing system can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable secure and permanent method of recording data processed by smart machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids smart cities and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems | Blockchain and IoT Integration Approaches and Applications

GBP 100.00
1

Enterprise Operations Management Handbook Second Edition