10 results (0,13644 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Wireless Crime and Forensic Investigation

Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However based on the broad reach of wireless stopping someone from passively listening is just as critical. Intrusion detection systems firewalls and forensics are just a few of the key areas that must be understood and applied to proactively solve the wireless problem. From short text messaging to war driving Wireless Crime and Forensic Investigation explores all aspects of wireless technology how it is used in daily life and how it will be used in the future. The book provides a one-stop resource on the types of wireless crimes that are being committed and forensic investigation techniques for wireless devices and wireless networks. The author's straightforward and easy to read style seamlessly integrates the topics of wireless security and computer forensics. He provides a solid understanding of modern wireless technologies wireless security techniques and wireless crime techniques as well as conducting forensic analysis on wireless devices and networks. Each chapter while part of a greater whole can stand on its own making researching wireless technologies security crime or forensics easy. With a problem space as big and complex as wireless proactive measures must be put in place and put in place immediately. To protect your organization you need to be well versed in the new technology sooner rather than later. You can pay now or you can pay later. Later always costs more. This book not only has all the information required to become proficient in wireless technology but also provides the information required for conducting a forensic analysis in a wireless environment.

GBP 56.99
1

Internet of Nano-Things and Wireless Body Area Networks (WBAN)

TCP Performance over UMTS-HSDPA Systems

TCP Performance over UMTS-HSDPA Systems

The evolution of the mobile communication market is causing a major increase in data traffic demands. This could lead to disrupted mobility and intermittent degraded channel conditions that contribute to poor transmission control protocol (TCP) performance. TCP Performance over UMTS-HSDPA Systems presents a comprehensive study of the effect of TCP on achieved application bit rate performance and system capacity and shows how to reduce the interaction of wireless networks on TCP with minimal cost. With self-contained chapters the book consists of two main sections. The first several chapters provide background and describe the state of the art for wireless networks emphasizing one of the third-generation (3G) wireless technologies: the universal mobile telecommunications system (UMTS). These chapters also include an analysis of the overall cell capacity for UMTS Release 99 and high-speed downlink packet access (HSDPA) systems. The second section focuses on the interaction of TCP with wireless systems presenting an exhaustive list of TCP versions and link layer solutions that adapt TCP (often modifying the original TCP) to a wireless network. This section also displays mathematical modeling of the interaction of hybrid automatic repeat request (HARQ) and TCP in UMTS networks. While offering information for advanced undergraduate students who are unfamiliar with code division multiple access (CDMA) wireless systems as well as UMTS and HSDPA cellular systems the book also provides extensive coverage of TCP over wireless systems problems and solutions for researchers developers and graduate students.

GBP 56.99
1

Principles of Mobile Computing and Communications

Active and Programmable Networks for Adaptive Architectures and Services

Active and Programmable Networks for Adaptive Architectures and Services

Most conventional networks are passive with only basic traffic monitoring management routing and congestion control. At best they can be called reactive. Deploying new functions and integrating new standards into these architectures is difficult due to the rigid embedding of software and hardware into the network components. Active and Programmable Networks for Adaptive Architectures and Services introduces a new generation of network technologies and architecture that allows the creation customization and management of new services and applications deployed dynamically into network nodes. Following a brief introduction and historical overview the author outlines the architecture of active and programmable networks discusses the enabling technologies for network programmability in detail and introduces several paradigms and prototypes. He then explores packet scheduling management routing and security and examines active wireless and mobile networks. The final chapter presents several real-world examples of currently deployed active and programmable networks. Several tables present information on different schemes and architectures allowing easy comparison among a range of networking options. Placing the new paradigm in contrast with concepts such as TCP/IP and OSI Active and Programmable Networks for Adaptive Architectures and Services makes it easy to see how these new technologies can help you build more flexible and adaptive networks that can seamlessly integrate new functions.

GBP 56.99
1

Introduction to Mobile Communications Technology Services Markets

Introduction to Mobile Communications Technology Services Markets

The traditionally separate Fixed Mobile and Internet sectors have been evolving recently toward a single sector offering numerous implications for those involved in technology and business. It is therefore essential for telecommunication professionals to get a keen grasp of where the industry is heading. Providing a solid foundation in the industry Introduction to Mobile Communications: Technology Services Markets explores the core requirements of modern mobile telecommunications-from markets to technology. It explains how wireless systems work how mobility is supported the underlying infrastructure and what interactions are needed among the different functional components. The book also examines how mobile communications are evolving in order to meet the changing needs of users. The information provided in the book comes primarily from the four core modules of the Certificate in Mobile Communications Distance Learning program run by the Informa Telecoms Academy in London. Designed by a highly experienced training development team the program examines the complex and fascinating world of mobile communications. Designed to give a broad picture of mobile communications the book provides an excellent grounding for those involved in both business and engineering-leaving them much better equipped to fulfill roles within their current or prospective companies | Introduction to Mobile Communications Technology Services Markets

GBP 56.99
1

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range heralding the dawn of an era in which today’s Internet of People gives way to tomorrow’s Internet of Things — where billions of objects will have the ability to report their location identity and history over wireless connections. Connectivity and Communication — Anything Anywhere and Anytime An examination of the exciting expansion period in this research The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems provides comprehensive technical and practical deploying policy guidance that covers fundamentals and recent advances in pervasive networked systems. The book addresses the conceptual and technical issues that influence the technology roadmap and gives an in-depth introduction to the Internet of Things and its effect on businesses and individuals. Discussing case studies experience reports and best practice it contains information on emerging technologies market opportunities and policy implications. Practical Guidance and Balanced Coverage The first book of its kind to address major new technological developments and define the Internet of Things this text provides balanced coverage of theory and practical issues. Reflecting research trends and industry needs itis a comprehensive technical and practical guide to recent advances in pervasive networked systems. | The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

GBP 56.99
1

Healthcare Information Systems

Healthcare Information Systems

The move to manage medicine from a financial perspective i. e. managed care has added huge layers of bureaucratic and administrative functions to healthcare. The need to have the ability to track patient medical records mandated by government legislation such as HIPAA is bringing new technologies and processes into the healthcare arena. A universal medical record system and absolute patient portability is a definite possibility in the not too distant future. All of these issues beg for clear IT solutions. Healthcare Information Systems Second Edition approaches these challenges and opportunitites as pieces of a complex puzzle. It not only brings you up-to-date on the technology involved but also explains how that technology interrelates and affects healthcare organizations. The book gives you complete coverage of all aspects of information technology as it relates to the healthcare industry. In Healthcare Information Systems you will find:An overview of healthcare systemsTips on disaster planning and system securityImproving quality reducing risks and understanding costs An in-depth look into the HIPAA regulationsEMR and the data warehouseInformation on managing the healthcare communityA look at the changing organizationViews on telemedicine the Internet and emerging technologiesIdeas on using IT to deal with increasing government regulationIn addition the new edition has expanded coverage of HIPAA wireless networks and communications telemedicine and the increasing role of the Internet in all facets of healthcare. Healthcare Information Systems presents workable solutions to the real problems you will face both today and tomorrow.

GBP 56.99
1

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

#1 Best Selling Information Security Book by Taylor & Francis in 2019 2020 2021 and 2022! 2020 Cybersecurity CANON Hall of Fame Winner Todd Fitzgerald co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success Information Security Governance Simplified: From the Boardroom to the Keyboard co-author for the E-C Council CISO Body of Knowledge and contributor to many others including Official (ISC)2 Guide to the CISSP CBK COBIT 5 for Information Security and ISACA CSX Cybersecurity Fundamental Certification is back with this new book incorporating practical experience in leading building and sustaining an information security/cybersecurity program. CISO COMPASS includes personal pragmatic perspectives and lessons learned of over 75 award-winning CISOs security leaders professional association leaders and cybersecurity standard setters who have fought the tough battle. Todd has also for the first time adapted the McKinsey 7S framework (strategy structure systems shared values staff skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization capable of industry/ peer award-winning recognition enhance cybersecurity maturity gain confidence by senior management and avoid pitfalls. The book is a comprehensive soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy emerging trends and technologies cybersecurity organization structure and reporting models leveraging current incidents security control frameworks risk management laws and regulations data protection and privacy meaningful policies and procedures multi-generational workforce team dynamics soft skills and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity. | CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

GBP 44.99
1

Applied Edge AI Concepts Platforms and Industry Use Cases

Applied Edge AI Concepts Platforms and Industry Use Cases

The strategically sound combination of edge computing and artificial intelligence (AI) results in a series of distinct innovations and disruptions enabling worldwide enterprises to visualize and realize next-generation software products solutions and services. Businesses individuals and innovators are all set to embrace and experience the sophisticated capabilities of Edge AI. With the faster maturity and stability of Edge AI technologies and tools the world is destined to have a dazzling array of edge-native people-centric event-driven real-time service-oriented process-aware and insights-filled services. Further on business workloads and IT services will become competent and cognitive with state-of-the-art Edge AI infrastructure modules AI algorithms and models enabling frameworks integrated platforms accelerators high-performance processors etc. The Edge AI paradigm will help enterprises evolve into real-time and intelligent digital organizations. Applied Edge AI: Concepts Platforms and Industry Use Cases focuses on the technologies processes systems and applications that are driving this evolution. It examines the implementation technologies; the products processes platforms patterns and practices; and use cases. AI-enabled chips are exclusively used in edge devices to accelerate intelligent processing at the edge. This book examines AI toolkits and platforms for facilitating edge intelligence. It also covers chips algorithms and tools to implement Edge AI as well as use cases. FEATURES The opportunities and benefits of intelligent edge computing Edge architecture and infrastructure AI-enhanced analytics in an edge environment Encryption for securing information An Edge AI system programmed with Tiny Machine learning algorithms for decision making An improved edge paradigm for addressing the big data movement in IoT implementations by integrating AI and caching to the edge Ambient intelligence in healthcare services and in development of consumer electronic systems Smart manufacturing of unmanned aerial vehicles (UAVs) AI edge computing and blockchain in systems for environmental protection Case studies presenting the potential of leveraging AI in 5G wireless communication | Applied Edge AI Concepts Platforms and Industry Use Cases

GBP 99.99
1