Filter
(found 5365 products)
Book cover image
As innovators continue to explore and create new developments within the fields of artificial intelligence and computer science, subfields such as machine learning and the internet of things (IoT) have emerged. Now, the internet of everything (IoE), foreseen as a cohesive and intelligent connection of people, processes, data, and things, ...
Harnessing the Internet of Everything (IoE) for Accelerated Innovation Opportunities
As innovators continue to explore and create new developments within the fields of artificial intelligence and computer science, subfields such as machine learning and the internet of things (IoT) have emerged. Now, the internet of everything (IoE), foreseen as a cohesive and intelligent connection of people, processes, data, and things, is theorized to make internet connections more valuable by converting information into wise actions that create unprecedented capabilities, richer experiences, and economic opportunities to all players in the market. Harnessing the Internet of Everything (IoE) for Accelerated Innovation Opportunities discusses the theoretical, design, evaluation, implementation, and use of innovative technologies within the fields of IoE, machine learning, and IoT. Featuring research on topics such as low-power electronics, mobile technology, and artificial intelligence, this book is ideally designed for computer engineers, software developers, investigators, advanced-level students, professors, and professionals seeking coverage on the various contemporary theories, technologies, and tools in IoE engineering.
https://magrudy-assets.storage.googleapis.com/9781522573326.jpg
236.250000 USD

Harnessing the Internet of Everything (IoE) for Accelerated Innovation Opportunities

Hardback
Book cover image
Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant ...
Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities
Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques.
https://magrudy-assets.storage.googleapis.com/9781522579243.jpg
173.250000 USD

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities

Hardback
Book cover image
The number of hours individuals spend in front of screens, such as smartphones, televisions, computers, and tablets, is enormous in today's society because screen time plays a very important role in work contexts and an even more significant role in social interaction and cultural consumption. This almost compulsive relationship with ...
Managing Screen Time in an Online Society
The number of hours individuals spend in front of screens, such as smartphones, televisions, computers, and tablets, is enormous in today's society because screen time plays a very important role in work contexts and an even more significant role in social interaction and cultural consumption. This almost compulsive relationship with screens is more evident in children and young people and can have a lasting impact on how a society approaches screen time. Managing Screen Time in an Online Society is a collection of innovative research on how screen time seduces the person to stay in the online interaction leaving her/him in a state of alienation from her/his face-to-face context. While highlighting the methods and applications of time management in the context of screen time, especially during leisure, social interaction, and cultural consumption, this book covers topics including media consumption, psychology, and social networks. This book is ideal for researchers, students, and professionals seeking emerging information on the relationship between online interaction and personal relationships.
https://magrudy-assets.storage.googleapis.com/9781522581635.jpg
194.250000 USD

Managing Screen Time in an Online Society

Hardback
Book cover image
Connect your cloud and on-premise applications. This comprehensive guide to SAP Cloud Platform Integration will teach you how to integrate processes and data in your system by developing and configuring integration flows. In this updated and expanded practical guide, explore prepackaged integration content in the Integration Content Catalog, debug and ...
SAP Cloud Platform Integration: The Comprehensive Guide
Connect your cloud and on-premise applications. This comprehensive guide to SAP Cloud Platform Integration will teach you how to integrate processes and data in your system by developing and configuring integration flows. In this updated and expanded practical guide, explore prepackaged integration content in the Integration Content Catalog, debug and secure integration projects, enable B2B integration, develop custom adapters, and more. Follow step-by-step instructions to guide you through the full integration process. Key Features include: a. Fundamentals Find out how SAP Cloud Platform Integration fits into SAP's cloud strategy. Explore its architecture and tools, and learn how to run your first integration flow. b. Integration Development Whether you're using prepackaged integration content or developing custom integrations, this guide has you covered. Explore the development environment, the SAP Cloud Platform Integration runtime, and processes like debugging and error handling. c. Updated and Expanded Revised to include new connectivity options, keystore management, and integration flow migration. Explore new chapters on using SAP API Management and SAP Cloud Platform Integration together and business-to-business capabilities.
https://magrudy-assets.storage.googleapis.com/9781493217069.jpg
94.450000 USD

SAP Cloud Platform Integration: The Comprehensive Guide

by Volker Stiehl, Mandy Krimmel, Peter Gutsche, John Mutumba Bilay
Hardback
Book cover image
The increase in connected devices in the internet of things (IoT) is leading to an exponential increase in the data that an organization is required to manage. To successfully utilize IoT in businesses, big data analytics are necessary in order to efficiently sort through the increased data. The combination of ...
Handbook of Research on Big Data and the IoT
The increase in connected devices in the internet of things (IoT) is leading to an exponential increase in the data that an organization is required to manage. To successfully utilize IoT in businesses, big data analytics are necessary in order to efficiently sort through the increased data. The combination of big data and IoT can thus enable new monitoring services and powerful processing of sensory data streams. The Handbook of Research on Big Data and the IoT is a pivotal reference source that provides vital research on emerging trends and recent innovative applications of big data and IoT, challenges facing organizations and the implications of these technologies on society, and best practices for their implementation. While highlighting topics such as bootstrapping, data fusion, and graph mining, this publication is ideally designed for IT specialists, managers, policymakers, analysts, software engineers, academicians, and researchers.
https://magrudy-assets.storage.googleapis.com/9781522574323.jpg
309.750000 USD

Handbook of Research on Big Data and the IoT

Hardback
Book cover image
Artificial Intelligence for the Internet of Everything considers the foundations, metrics and applications of IoE systems. It covers whether devices and IoE systems should speak only to each other, to humans or to both. Further, the book explores how IoE systems affect targeted audiences (researchers, machines, robots, users) and society, ...
Artificial Intelligence for the Internet of Everything
Artificial Intelligence for the Internet of Everything considers the foundations, metrics and applications of IoE systems. It covers whether devices and IoE systems should speak only to each other, to humans or to both. Further, the book explores how IoE systems affect targeted audiences (researchers, machines, robots, users) and society, as well as future ecosystems. It examines the meaning, value and effect that IoT has had and may have on ordinary life, in business, on the battlefield, and with the rise of intelligent and autonomous systems. Based on an artificial intelligence (AI) perspective, this book addresses how IoE affects sensing, perception, cognition and behavior. Each chapter addresses practical, measurement, theoretical and research questions about how these things may affect individuals, teams, society or each other. Of particular focus is what may happen when these things begin to reason, communicate and act autonomously on their own, whether independently or interdependently with other things .
https://magrudy-assets.storage.googleapis.com/9780128176368.jpg
131.250000 USD

Artificial Intelligence for the Internet of Everything

Paperback / softback
Book cover image
How do you reply to your colleague's weird email? What might Debrett's say about your Tinder profile? And just how do you know if you're mansplaining? In this irreverent journey through the murky world of digital etiquette, WIRED's Victoria Turk provides an indispensable guide to minding our manners in a ...
Digital Etiquette: Everything you wanted to know about modern manners but were afraid to ask
How do you reply to your colleague's weird email? What might Debrett's say about your Tinder profile? And just how do you know if you're mansplaining? In this irreverent journey through the murky world of digital etiquette, WIRED's Victoria Turk provides an indispensable guide to minding our manners in a brave new online world. The digital revolution has put us all within a few clicks, taps and swipes of each other. But familiarity can breed contempt, and whilst we're more likely than ever to fall in love online, we're also more likely to fall headfirst into a blazing row with a stranger. Google's unofficial motto is Don't Be Evil, but sometimes that's easier said than done. If you've ever encountered the surreal battlefields of digital life and wondered why we don't all just go analogue, this is the book for you.
https://magrudy-assets.storage.googleapis.com/9781529102406.jpg
17.05 USD

Digital Etiquette: Everything you wanted to know about modern manners but were afraid to ask

by Victoria Turk
Hardback
Book cover image
Description Recommender systems are practically a necessity for keeping a site's content current, useful, and interesting to visitors. Recommender systems are everywhere, helping you find everything from movies to jobs, restaurants to hospitals, even romance. Practical Recommender Systems goes behind the curtain to show readers how recommender systems work and, ...
Practical Recommender Systems
Description Recommender systems are practically a necessity for keeping a site's content current, useful, and interesting to visitors. Recommender systems are everywhere, helping you find everything from movies to jobs, restaurants to hospitals, even romance. Practical Recommender Systems goes behind the curtain to show readers how recommender systems work and, more importantly, how to create and apply them for their site. This hands-on guide covers scaling problems and other issues they may encounter as their site grows. Key features * A behind the scenes look at recommender systems * Hands-on lessons * Step-by-step guide Audience This book assumes you're comfortable reading code in Python and have some experience with databases. About the Technology Using behavioral and demographic data, these systems make predictions about what users will be most interested in at a particular time, resulting in high-quality, ordered, personalized suggestions.
https://magrudy-assets.storage.googleapis.com/9781617292705.jpg
52.490000 USD

Practical Recommender Systems

by Kim Falk
Paperback / softback
Book cover image
This book is designed for use as a primary textbook for a course in cloud computing or as a resource for professionals in industry seeking to explore cloud services. The book highlights the recent developments in distributed computing and details the architecture, virtualization concepts, and security concerns of cloud computing. ...
Cloud Computing Basics
This book is designed for use as a primary textbook for a course in cloud computing or as a resource for professionals in industry seeking to explore cloud services. The book highlights the recent developments in distributed computing and details the architecture, virtualization concepts, and security concerns of cloud computing. It also provides a detailed understanding of the benefits of cloud computing that can encourage enterprises to switch to the cloud. Features: - Provides a basic understanding of the computing paradigm of cloud computing - Gives a brief introduction to cloud computing, its architecture, and the Hadoop distributed file system - Deals with cloud management concepts like scalable, fault tolerance, resiliency, provisioning, asset management, cloud governance, high availability, disaster recovery, and multi-tenancy - Includes case studies on MS Azure, Google, Amazon Web Services, Aneka, etc.
https://magrudy-assets.storage.googleapis.com/9781683923503.jpg
52.450000 USD

Cloud Computing Basics

by T B Rehman
Paperback / softback
Book cover image
Master Strategies for Achieving #1 Victory Royale Killer Fortnite Strategies: The Ultimate Unofficial Battle Royale Guide is an all-new, full-color, unofficial guide for adult gamers specifically covering the Windows PC and Mac versions of Fortnite: Battle Royale. With pro tips, expert strategies, and in-depth information, this guide covers everything from ...
Killer Fortnite Strategies: An Ultimate Unofficial Battle Royale Guide
Master Strategies for Achieving #1 Victory Royale Killer Fortnite Strategies: The Ultimate Unofficial Battle Royale Guide is an all-new, full-color, unofficial guide for adult gamers specifically covering the Windows PC and Mac versions of Fortnite: Battle Royale. With pro tips, expert strategies, and in-depth information, this guide covers everything from tweeking your computer and customizing your keyboard for your own personal game play experience to advanced tactics for resource gathering and weapon utilization. Features: Hundreds of full-color screenshots Customizing tips for the ultimate gaming experience Thorough exploration of the island In-depth information on weapons, ammo, and loot items Proven strategies for resource gathering and building structures Expert combat and survival tactics Tips for avoiding the storm and surviving the End Game (the Final Circle) And more! Regardless of your skill or experience level playing Fortnite: Battle Royale on a PC or Mac, this info-packed resource will up your game, improve your kill scores, and help you achieve #1 Victory Royale.
https://magrudy-assets.storage.googleapis.com/9781631584633.jpg
13.640000 USD

Killer Fortnite Strategies: An Ultimate Unofficial Battle Royale Guide

by Jason R. Rich
Paperback / softback
Book cover image
Web 2.0 makes headlines, but how does it make money? This concise guide explains what's different about Web 2.0 and how those differences can improve your company's bottom line. Whether you're an executive plotting the next move, a small business owner looking to expand, or an entrepreneur planning a startup, ...
Web 2.0: A Strategy Guide (paperback edition)
Web 2.0 makes headlines, but how does it make money? This concise guide explains what's different about Web 2.0 and how those differences can improve your company's bottom line. Whether you're an executive plotting the next move, a small business owner looking to expand, or an entrepreneur planning a startup, Web 2.0: A Strategy Guide illustrates through real-life examples how businesses, large and small, are creating new opportunities on today's Web. This book is about strategy. Rather than focus on the technology, the examples concentrate on its effect. You will learn that creating a Web 2.0 business, or integrating Web 2.0 strategies with your existing business, means creating places online where people like to come together to share what they think, see, and do. When people come together over the Web, the result can be much more than the sum of the parts. The customers themselves help build the site, as old-fashioned word of mouth becomes hypergrowth. Web 2.0: A Strategy Guide demonstrates the power of this new paradigm by examining how: Flickr, a classic user-driven business, created value for itself by helping users create their own value Google made money with a model based on free search, and changed the rules for doing business on the Web-opening opportunities you can take advantage of Social network effects can support a business-ever wonder how FaceBook grew so quickly? Businesses like Amazon tap into the Web as a source of indirect revenue, using creative new approaches to monetize the investments they've made in the Web
https://magrudy-assets.storage.googleapis.com/9781492049722.jpg
34.11 USD

Web 2.0: A Strategy Guide (paperback edition)

by Amy Shuen
Paperback / softback
Book cover image
Explores key challenges and solutions to assured cloud computing today and provides a provocative look at the face of cloud computing tomorrow This book offers readers a comprehensive suite of solutions for resolving many of the key challenges to achieving high levels of assurance in cloud computing. The distillation of ...
Assured Cloud Computing
Explores key challenges and solutions to assured cloud computing today and provides a provocative look at the face of cloud computing tomorrow This book offers readers a comprehensive suite of solutions for resolving many of the key challenges to achieving high levels of assurance in cloud computing. The distillation of critical research findings generated by the Assured Cloud Computing Center of Excellence (ACC-UCoE) of the University of Illinois, Urbana-Champaign, it provides unique insights into the current and future shape of robust, dependable, and secure cloud-based computing and data cyberinfrastructures. A survivable and distributed cloud-computing-based infrastructure can enable the configuration of any dynamic systems-of-systems that contain both trusted and partially trusted resources and services sourced from multiple organizations. To assure mission-critical computations and workflows that rely on such systems-of-systems it is necessary to ensure that a given configuration does not violate any security or reliability requirements. Furthermore, it is necessary to model the trustworthiness of a workflow or computation fulfillment to a high level of assurance. In presenting the substance of the work done by the ACC-UCoE, this book provides a vision for assured cloud computing illustrating how individual research contributions relate to each other and to the big picture of assured cloud computing. In addition, the book: Explores dominant themes in cloud-based systems, including design correctness, support for big data and analytics, monitoring and detection, network considerations, and performance Synthesizes heavily cited earlier work on topics such as DARE, trust mechanisms, and elastic graphs, as well as newer research findings on topics, including R-Storm, and RAMP transactions Addresses assured cloud computing concerns such as game theory, stream processing, storage, algorithms, workflow, scheduling, access control, formal analysis of safety, and streaming Bringing together the freshest thinking and applications in one of today's most important topics, Assured Cloud Computing is a must-read for researchers and professionals in the fields of computer science and engineering, especially those working within industrial, military, and governmental contexts. It is also a valuable reference for advanced students of computer science.
https://magrudy-assets.storage.googleapis.com/9781119428633.jpg
147.000000 USD

Assured Cloud Computing

Hardback
Book cover image
Great user experiences (UX) are essential for products today, but designing one can be a lengthy and expensive process. With this practical, hands-on book, you'll learn how to do it faster and smarter using Lean UX techniques. UX expert Laura Klein shows you what it takes to gather valuable input ...
UX for Lean Startups
Great user experiences (UX) are essential for products today, but designing one can be a lengthy and expensive process. With this practical, hands-on book, you'll learn how to do it faster and smarter using Lean UX techniques. UX expert Laura Klein shows you what it takes to gather valuable input from customers, build something they'll truly love, and reduce the time it takes to get your product to market. No prior experience in UX or design is necessary to get started. If you're an entrepreneur or an innovator, this book puts you right to work with proven tips and tools for researching, identifying, and designing an intuitive, easy-to-use product. Determine whether people will buy your product before you build it Listen to your customers throughout the product's lifecycle Understand why you should design a test before you design a product Get nine tools that are critical to designing your product Discern the difference between necessary features and nice-to-haves Learn how a Minimum Viable Product affects your UX decisions Use A/B testing in conjunction with good UX practices Speed up your product development process without sacrificing quality
https://magrudy-assets.storage.googleapis.com/9781492049586.jpg
31.490000 USD

UX for Lean Startups

by Laura Klein
Paperback / softback
Book cover image
In IoT scenarios, ways in which large-scale and cross-domain service systems can be established are still unclear, and no systematic or in-depth theories and methods have yet been found. An effective, formal foundation to IoT application designs could serve as a knowledge base for a variety of virtual world applications. ...
Integrating and Streamlining Event-Driven IoT Services
In IoT scenarios, ways in which large-scale and cross-domain service systems can be established are still unclear, and no systematic or in-depth theories and methods have yet been found. An effective, formal foundation to IoT application designs could serve as a knowledge base for a variety of virtual world applications. Integrating and Streamlining Event-Driven IoT Services discusses how to observe isolated services running by different observation sources, how to fuse different observations to deal with observation conflict and incompleteness, and how to deal with adversaries and physical system features for real-time property enforcement over the fused knowledge. Overall, presenting an exploration of systematic theories and methods for the design of IoT services based on the principles of streamlining and integration, this book features research on topics such as CEP service, virtual machine technologies, and hybrid EPC. It is ideally designed for engineers, researchers, and university students seeking coverage on applications for smart cities, smart grids, and Industry 4.0.
https://magrudy-assets.storage.googleapis.com/9781522576228.jpg
215.250000 USD

Integrating and Streamlining Event-Driven IoT Services

by Yanmeng Guo, Yang Zhang
Hardback
Book cover image
To provide the necessary security and quality assurance activities into Internet of Things (IoT)-based software development, innovative engineering practices are vital. They must be given an even higher level of importance than most other events in the field. Integrating the Internet of Things Into Software Engineering Practices provides research on ...
Integrating the Internet of Things Into Software Engineering Practices
To provide the necessary security and quality assurance activities into Internet of Things (IoT)-based software development, innovative engineering practices are vital. They must be given an even higher level of importance than most other events in the field. Integrating the Internet of Things Into Software Engineering Practices provides research on the integration of IoT into the software development life cycle (SDLC) in terms of requirements management, analysis, design, coding, and testing, and provides security and quality assurance activities to IoT-based software development. The content within this publication covers agile software, language specification, and collaborative software and is designed for analysts, security experts, IoT software programmers, computer and software engineers, students, professionals, and researchers.
https://magrudy-assets.storage.googleapis.com/9781522577904.jpg
225.750000 USD

Integrating the Internet of Things Into Software Engineering Practices

Hardback
Book cover image
A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world Key Features Learn best practices to secure your data from the device to the cloud Use systems security engineering and privacy-by-design principles to design a secure IoT ...
Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem, 2nd Edition
A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world Key Features Learn best practices to secure your data from the device to the cloud Use systems security engineering and privacy-by-design principles to design a secure IoT ecosystem A practical guide that will help you design and implement cyber security strategies for your organization Book DescriptionWith the advent of the Internet of Things (IoT), businesses have to defend against new types of threat. The business ecosystem now includes the cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces. It therefore becomes critical to ensure that cybersecurity threats are contained to a minimum when implementing new IoT services and solutions. This book shows you how to implement cybersecurity solutions, IoT design best practices, and risk mitigation methodologies to address device and infrastructure threats to IoT solutions. In this second edition, you will go through some typical and unique vulnerabilities seen within various layers of the IoT technology stack and also learn new ways in which IT and physical threats interact. You will then explore the different engineering approaches a developer/manufacturer might take to securely design and deploy IoT devices. Furthermore, you will securely develop your own custom additions for an enterprise IoT implementation. You will also be provided with actionable guidance through setting up a cryptographic infrastructure for your IoT implementations. You will then be guided on the selection and configuration of Identity and Access Management solutions for an IoT implementation. In conclusion, you will explore cloud security architectures and security best practices for operating and managing cross-organizational, multi-domain IoT deployments. What you will learn Discuss the need for separate security requirements and apply security engineering principles on IoT devices Master the operational aspects of planning, deploying, managing, monitoring, and detecting the remediation and disposal of IoT systems Use Blockchain solutions for IoT authenticity and integrity Explore additional privacy features emerging in the IoT industry, such as anonymity, tracking issues, and countermeasures Design a fog computing architecture to support IoT edge analytics Detect and respond to IoT security incidents and compromises Who this book is forThis book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure the security of their organization's data when connected through the IoT. Business analysts and managers will also find this book useful.
https://magrudy-assets.storage.googleapis.com/9781788625821.jpg
52.490000 USD

Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem, 2nd Edition

by Drew Van Duren, Brian Russell
Paperback / softback
Book cover image
To provide the necessary security and quality assurance activities into Internet of Things (IoT)-based software development, innovative engineering practices are vital. They must be given an even higher level of importance than most other events in the field. Integrating the Internet of Things Into Software Engineering Practices provides research on ...
Integrating the Internet of Things into Software Engineering Practices
To provide the necessary security and quality assurance activities into Internet of Things (IoT)-based software development, innovative engineering practices are vital. They must be given an even higher level of importance than most other events in the field. Integrating the Internet of Things Into Software Engineering Practices provides research on the integration of IoT into the software development life cycle (SDLC) in terms of requirements management, analysis, design, coding, and testing, and provides security and quality assurance activities to IoT-based software development. The content within this publication covers agile software, language specification, and collaborative software and is designed for analysts, security experts, IoT software programmers, computer and software engineers, students, professionals, and researchers. Topics Covered The many academic areas covered in this publication include, but are not limited to: Agile Software Coding Standards Collaborative Software Language Specification Machine Learning Risk Assessment Security Assessment Software Architecture System Testing Web-Based Development
https://magrudy-assets.storage.googleapis.com/9781522586210.jpg
173.250000 USD

Integrating the Internet of Things into Software Engineering Practices

by D Jeya Mala
Hardback
Book cover image
This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including . Giving readers an in-depth introduction to different ...
Cryptographic and Information Security Approaches for Images and Videos
This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including . Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques.
https://magrudy-assets.storage.googleapis.com/9781138563841.jpg
189.40 USD

Cryptographic and Information Security Approaches for Images and Videos

by S. Ramakrishnan
Hardback
Book cover image
This book addresses researchers and graduate students at the forefront of study/research on the Internet of Things (IoT) by presenting state-of-the-art research together with the current and future challenges in building new smart applications (e.g., Smart Cities, Smart Buildings, and Industrial IoT) in an efficient, scalable, and sustainable way. It ...
Internet of Things: Architectures, Protocols and Standards
This book addresses researchers and graduate students at the forefront of study/research on the Internet of Things (IoT) by presenting state-of-the-art research together with the current and future challenges in building new smart applications (e.g., Smart Cities, Smart Buildings, and Industrial IoT) in an efficient, scalable, and sustainable way. It covers the main pillars of the IoT world (Connectivity, Interoperability, Discoverability, and Security/Privacy), providing a comprehensive look at the current technologies, procedures, and architectures.
https://magrudy-assets.storage.googleapis.com/9781119359678.jpg
131.250000 USD

Internet of Things: Architectures, Protocols and Standards

by Luca Veltri, Marco Picone, Gianluigi Ferrari, Simone Cirani
Hardback
Book cover image
What makes WiFi faster at home than at a coffee shop? How does Google order search results? Is it really true that everyone on Facebook is connected by six steps or less? The Power of Networks answers questions like these for the first time in a way that all of ...
The Power of Networks: Six Principles That Connect Our Lives
What makes WiFi faster at home than at a coffee shop? How does Google order search results? Is it really true that everyone on Facebook is connected by six steps or less? The Power of Networks answers questions like these for the first time in a way that all of us can understand. Using simple language, analogies, stories, hundreds of illustrations, and no more math than simple addition and multiplication, Christopher Brinton and Mung Chiang provide a smart and accessible introduction to the handful of big ideas that drive the computer networks we use every day. The Power of Networks unifies these ideas through six fundamental principles of networking. These principles explain the difficulties in sharing network resources efficiently, how crowds can be wise or not so wise depending on the nature of their connections, why there are many layers in a network, and more. Along the way, the authors also talk with and share the special insights of renowned experts such as Google's Eric Schmidt, former Verizon Wireless CEO Dennis Strigl, and fathers of the Internet Vint Cerf and Bob Kahn.
https://magrudy-assets.storage.googleapis.com/9780691183305.jpg
34.12 USD

The Power of Networks: Six Principles That Connect Our Lives

by Mung Chiang, Christopher G. Brinton
Paperback / softback
Book cover image
Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud ...
Advancing Consumer-Centric Fog Computing Architectures
Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.
https://magrudy-assets.storage.googleapis.com/9781522571490.jpg
220.500000 USD

Advancing Consumer-Centric Fog Computing Architectures

Hardback
Book cover image
Automation techniques are meant to facilitate the delivery of flexible, agile, customized connectivity services regardless of the nature of the networking environment. New architectures combine advanced forwarding and routing schemes, mobility features, and customer-adapted resource facilities used for operation and delivery of services. Emerging Automation Techniques for the Future Internet ...
Emerging Automation Techniques for the Future Internet
Automation techniques are meant to facilitate the delivery of flexible, agile, customized connectivity services regardless of the nature of the networking environment. New architectures combine advanced forwarding and routing schemes, mobility features, and customer-adapted resource facilities used for operation and delivery of services. Emerging Automation Techniques for the Future Internet is a collection of innovative research on the methods and applications of new architectures for the planning, dynamic delivery, and operation of services with a particular focus on automated detection and mitigation of denial-of-service (DoS) attacks. While highlighting topics including policy enforcement, self-architectures, and automated networks, this book is ideally designed for engineers, IT consultants, professionals, researchers, academicians, and students seeking current research on techniques and structures used to enhance experience and services rendered.
https://magrudy-assets.storage.googleapis.com/9781522571469.jpg
204.750000 USD

Emerging Automation Techniques for the Future Internet

Hardback
Book cover image
An essential contribution to Internet activism and a must read for Indigenous educators, A Digital Bundle frames digital technology as an important tool for self-determination and idea sharing, ultimately contributing to Indigenous resurgence and nation building. By defining Indigenous Knowledge online in terms of digital bundles, Jennifer Wemigwans elevates both ...
A Digital Bundle: Protecting and Promoting Indigenous Knowledge Online
An essential contribution to Internet activism and a must read for Indigenous educators, A Digital Bundle frames digital technology as an important tool for self-determination and idea sharing, ultimately contributing to Indigenous resurgence and nation building. By defining Indigenous Knowledge online in terms of digital bundles, Jennifer Wemigwans elevates both cultural protocol and cultural responsibilities, grounds online projects within Indigenous philosophical paradigms, and highlights new possibilities for both the Internet and Indigenous communities.
https://magrudy-assets.storage.googleapis.com/9780889775510.jpg
40.94 USD

A Digital Bundle: Protecting and Promoting Indigenous Knowledge Online

by Jennifer Wemigwans
Paperback / softback
Book cover image
Social networking has increased drastically in recent years, resulting in an increased amount of data being created daily. Furthermore, diversity of issues and complexity of the social networks pose a challenge in social network mining. Traditional algorithm software cannot deal with such complex and vast amounts of data, necessitating the ...
Big Data Analytics: A Social Network Approach
Social networking has increased drastically in recent years, resulting in an increased amount of data being created daily. Furthermore, diversity of issues and complexity of the social networks pose a challenge in social network mining. Traditional algorithm software cannot deal with such complex and vast amounts of data, necessitating the development of novel analytic approaches and tools. This reference work deals with social network aspects ofbig data analytics. It covers theory, practices and challenges in social networking. The book spans numerous disciplines like neural networking, deep learning, artificial intelligence, visualization, e-learning in higher education, e-healthcare, security and intrusion detection.
https://magrudy-assets.storage.googleapis.com/9781138082168.jpg
221.81 USD

Big Data Analytics: A Social Network Approach

Hardback
Book cover image
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently. Yet in a short space of time it has become more mainstream and synonymous with a spectacular variety of commercial and civic 'problem'/'solution' concepts and ideals. From commodity provenance, ...
Regulating Blockchain: Critical Perspectives in Law and Technology
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently. Yet in a short space of time it has become more mainstream and synonymous with a spectacular variety of commercial and civic 'problem'/'solution' concepts and ideals. From commodity provenance, to electoral fraud prevention, to a wholesale decentralisation of power and the banishing of the exploitative practices of 'middlemen', blockchain stakeholders are nothing short of evangelical in their belief that it is a force for good. For these reasons and more the technology has captured the attention of entrepreneurs, venture capitalists, global corporations and governments the world over. Blockchain may indeed offer a unique technical opportunity to change cultures of transparency and trust within cyberspace, and as `revolutionary' and `disruptive' has the potential to shift global socioeconomic and political conventions. But as a yet largely unregulated, solutionist-driven phenomenon, blockchain exists squarely within the boundaries of capitalist logic and reason, fast becoming central to the business models of many sources of financial and political power the technology was specifically designed to undo, and increasingly allied to neoliberal strategies with scant regard for collective, political or democratic accountability in the public interest. Regulating Blockchain casts a critical eye over the technology, its `ecosystem' of stakeholders, and offers a challenge to the prevailing discourse proclaiming it to be the great techno-social enabler of our times.
https://magrudy-assets.storage.googleapis.com/9781138592766.jpg
196.22 USD

Regulating Blockchain: Critical Perspectives in Law and Technology

by Robert Herian
Hardback
Book cover image
This Internet Password Logbook is a timely and valuable resource in the age of the hacker. This essential notebook maintains your personal and financial safety. Record the necessarily complex passwords and user login names required to thwart hackers. This time- and headache-saving logbook has numerous, tabbed alphabetical pages to make ...
Internet Password Logbook (Red Leatherette): Keep track of usernames, passwords, web addresses in one easy and organized location
This Internet Password Logbook is a timely and valuable resource in the age of the hacker. This essential notebook maintains your personal and financial safety. Record the necessarily complex passwords and user login names required to thwart hackers. This time- and headache-saving logbook has numerous, tabbed alphabetical pages to make looking up a website address-and its corresponding login(s) and password(s)-easy to manage. And it conveniently fits within a purse or briefcase, if you need to take it with you. Each entry has multiple locations to note new/changing logins or passwords, some notes about creating user names and passwords, Internet safety tips, locations to record software and hardware license numbers, home and business network settings, and more. For the ultimate in online safety, follow these tips: Don't use dictionary words. Never use the same password twice. The longer your password, the longer it will take to crack. Just jam on your keyboard to create an entirely random password. Store your password off the computer. With this book, create and keep unique and difficult passwords and login names with ease!
https://magrudy-assets.storage.googleapis.com/9781631065668.jpg
11.93 USD

Internet Password Logbook (Red Leatherette): Keep track of usernames, passwords, web addresses in one easy and organized location

by Editors of Rock Point
Hardback
Book cover image
A book that challenges everything you thought you knew about the online economy The internet was supposed to fragment audiences and make media monopolies impossible. Instead, behemoths like Google and Facebook now dominate the time we spend online--and grab all the profits from the attention economy. The Internet Trap explains ...
The Internet Trap: How the Digital Economy Builds Monopolies and Undermines Democracy
A book that challenges everything you thought you knew about the online economy The internet was supposed to fragment audiences and make media monopolies impossible. Instead, behemoths like Google and Facebook now dominate the time we spend online--and grab all the profits from the attention economy. The Internet Trap explains how this happened. This provocative and timely book sheds light on the stunning rise of the digital giants and the online struggles of nearly everyone else--and reveals what small players can do to survive in a game that is rigged against them. Matthew Hindman shows how seemingly tiny advantages in attracting users can snowball over time. The internet has not reduced the cost of reaching audiences--it has merely shifted who pays and how. Challenging some of the most enduring myths of digital life, Hindman explains why the internet is not the postindustrial technology that has been sold to the public, how it has become mathematically impossible for grad students in a garage to beat Google, and why net neutrality alone is no guarantee of an open internet. He also explains why the challenges for local digital news outlets and other small players are worse than they appear and demonstrates what it really takes to grow a digital audience and stay alive in today's online economy. The Internet Trap shows why, even on the internet, there is still no such thing as a free audience.
https://magrudy-assets.storage.googleapis.com/9780691159263.jpg
40.95 USD

The Internet Trap: How the Digital Economy Builds Monopolies and Undermines Democracy

by Matthew Hindman
Hardback
Book cover image
Nationalism, in China as much as elsewhere, is today adopted, filtered, transformed, enhanced, and accelerated through digital networks. And as we have increasingly seen, nationalism in digital spheres interacts in complicated ways with nationalism on the ground . If we are to understand the social and political complexities of the ...
China's Digital Nationalism
Nationalism, in China as much as elsewhere, is today adopted, filtered, transformed, enhanced, and accelerated through digital networks. And as we have increasingly seen, nationalism in digital spheres interacts in complicated ways with nationalism on the ground . If we are to understand the social and political complexities of the twenty-first century, we need to ask: what happens to nationalism when it goes digital? In China's Digital Nationalism, Florian Schneider explores the issue by looking at digital China first hand, exploring what search engines, online encyclopedias, websites, hyperlink networks, and social media can tell us about the way that different actors construct and manage a crucial topic in contemporary Chinese politics: the protracted historical relationship with neighbouring Japan. Using two cases, the infamous Nanjing Massacre of 1937 and the ongoing disputes over islands in the East China Sea, Schneider shows how various stakeholders in China construct networks and deploy power to shape nationalism for their own ends. These dynamics provide crucial lessons on how nation states adapt to the shifting terrain of the digital age and highlight how digital nationalism is today an emergent property of complex communication networks.
https://magrudy-assets.storage.googleapis.com/9780190876807.jpg
31.450000 USD

China's Digital Nationalism

by Florian Schneider
Paperback / softback
Book cover image
Do you ever obsess about your body? Do you lie awake at night, fretting about the state of your career?Does everyone else's life seem better than yours? Does it feel as if you'll never be good enough? Why Social Media is Ruining Your Life tackles head on the pressure cooker ...
Why Social Media is Ruining Your Life
Do you ever obsess about your body? Do you lie awake at night, fretting about the state of your career?Does everyone else's life seem better than yours? Does it feel as if you'll never be good enough? Why Social Media is Ruining Your Life tackles head on the pressure cooker of comparison and unreachable levels of perfection that social media has created in our modern world. In this book, Katherine Ormerod meets the experts involved in curating, building and combating the most addictive digital force humankind has ever created. From global influencers - who collectively have over 10 million followers - to clinical psychologists, plastic surgeons and professors, Katherine uncovers how our relationship with social media has rewired our behavioural patterns, destroyed our confidence and shattered our attention spans. Why Social Media is Ruining Your Life is a rallying cry that will provide you with the knowledge, tactics and weaponry you need to find a more healthy way to consume social media and reclaim your happiness. Reviews for Why Social Media is Ruining Your Life: 'This book is a call to arms from the eye of the storm' - Emma Gannon, author of The Multi-Hyphen Method 'Enter Ormerod's vital manual, which will help you navigate social media and turn it not into a weapon, but a useful tool' - Pandora Sykes
https://magrudy-assets.storage.googleapis.com/9781788400626.jpg
20.48 USD

Why Social Media is Ruining Your Life

by Katherine Ormerod
Hardback
Book cover image
In the months after the Federal Communications Commission's (FCC) 2017 decision to repeal network neutrality as US policy, it is easy to forget the decades of public, organizational, media and governmental struggle to control digital policy and open access to the internet. Using dialogic communication tactics, the public, governmental actors ...
Network Neutrality and Digital Dialogic Communication: How Public, Private and Government Forces Shape Internet Policy
In the months after the Federal Communications Commission's (FCC) 2017 decision to repeal network neutrality as US policy, it is easy to forget the decades of public, organizational, media and governmental struggle to control digital policy and open access to the internet. Using dialogic communication tactics, the public, governmental actors and organizations impacted the ruling through YouTube comments, the FCC online system and social network communities. Network neutrality, which requires that all digital sites can be accessed with equal speed and ability, is an important example of how dialogic communication facilitates public engagement in policy debates. However, the practice and ability of the public, organizations and media to engage in dialogic communication are also greatly impacted by the FCC's decision. This book reflects on decades of global engagement in the network neutrality debate and the evolution of dialogic communication techniques used to shape one of the most relevant and critical digital policies in history.
https://magrudy-assets.storage.googleapis.com/9781138317758.jpg
76.79 USD

Network Neutrality and Digital Dialogic Communication: How Public, Private and Government Forces Shape Internet Policy

by Melinda Sebastian, Alison N Novak
Hardback
Page 1 of 40