19 results (0,15541 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Acquiring Card Payments

Blockchain and IoT Integration Approaches and Applications

Blockchain and IoT Integration Approaches and Applications

As technology continues to advance and the interconnection of various devices makes our lives easier it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms turn on or off the lights and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain an encrypted distributed computer filing system can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable secure and permanent method of recording data processed by smart machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids smart cities and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems | Blockchain and IoT Integration Approaches and Applications

GBP 100.00
1

Intelligent Cities Enabling Tools and Technology

Intelligent Cities Enabling Tools and Technology

The emergence of highly promising and potent technologies has enabled the transition of ordinary objects into smart artifacts—providing wider connectivity of digitized entities that can facilitate the building of connected cities. This book provides readers with a solid foundation on the latest technologies and tools required to develop and enhance smart cities around the world. The book begins by examining the rise of the cloud as the fundamental technology for establishing and sustaining smart cities and enterprises. Explaining the principal technologies and platform solutions for implementing intelligent cities the book details the role of various technologies standards protocols and tools in establishing flexible homes and the buildings of the future. Examines IT platforms and tools from various product vendorsConsiders service-oriented architecture and event-driven architecture for smart city applicationsExplains how to leverage big data analytics for smart city enhancement and improved decision makingIncludes case studies of intelligent cities smart homes buildings transports healthcare systems and airports The authors explore the convergence of cloud computing and enterprise architecture and present valuable information on next-generation cloud computing. They also cover the various architectural types including enterprise-scale integration security management and governance. The book concludes by explaining the various security requirements of intelligent cities as well as the threats and vulnerabilities of the various components that form the basis of the intelligent city framework including cloud big data Internet of Things and mobile technologies. | Intelligent Cities Enabling Tools and Technology

GBP 44.99
1

The Internet of Things Enabling Technologies Platforms and Use Cases

The Internet of Things Enabling Technologies Platforms and Use Cases

As more and more devices become interconnected through the Internet of Things (IoT) there is an even greater need for this book which explains the technology the internetworking and applications that are making IoT an everyday reality. The book begins with a discussion of IoT ecosystems and the technology that enables them which includes:Wireless Infrastructure and Service Discovery Protocols Integration Technologies and Tools Application and Analytics Enablement PlatformsA chapter on next-generation cloud infrastructure explains hosting IoT platforms and applications. A chapter on data analytics throws light on IoT data collection storage translation real-time processing mining and analysis all of which can yield actionable insights from the data collected by IoT applications. There is also a chapter on edge/fog computing. The second half of the book presents various IoT ecosystem use cases. One chapter discusses smart airports and highlights the role of IoT integration. It explains how mobile devices mobile technology wearables RFID sensors and beacons work together as the core technologies of a smart airport. Integrating these components into the airport ecosystem is examined in detail and use cases and real-life examples illustrate this IoT ecosystem in operation. Another in-depth look is on envisioning smart healthcare systems in a connected world. This chapter focuses on the requirements promising applications and roles of cloud computing and data analytics. The book also examines smart homes smart cities and smart governments. The book concludes with a chapter on IoT security and privacy. This chapter examines the emerging security and privacy requirements of IoT environments. The security issues and an assortment of surmounting techniques and best practices are also discussed in this chapter. | The Internet of Things Enabling Technologies Platforms and Use Cases

GBP 44.99
1

Internet of Nano-Things and Wireless Body Area Networks (WBAN)

Industrial IoT Application Architectures and Use Cases

Industrial IoT Application Architectures and Use Cases

As the number of Internet of Things (IoT) elements grows exponentially their interactions can generate a massive amount of raw and multi-structured data. The challenge with this data explosion is to transform any raw data into information and knowledge which can be used by people and systems to make intelligent decisions. Industrial IoT Application Architectures and Use Cases explores how artificial intelligence (AI) data analytics and IoT technology combine to promote intelligent decision-making and automation in a range of industries. With faster more stable AI algorithms and approaches knowledge discovery and dissemination from IoT-device data can be simplified and streamlined. An era of powerful cognitive technology is beginning due to cloud-based cognitive systems that are forming the foundation of game-changing intelligent applications. This book presents next-generation use cases of IoT and IoT data analytics for a variety of industrial verticals as given below: An Intelligent IoT framework for smart water managementAn IoT-enabled smart traffic control system for congestion control and smart traffic management An intelligent airport system for airport management and security surveillanceAn IoT framework for healthcare to integrate and report patient information Fuzzy scheduling with IoT for tracking and monitoring hotel assets An IoT system for designing drainage systems and monitoring drainage pipes Predictive maintenance of plant equipment to decide the actual mean time to malfunction Integrated neural networks and IoT systems for predictive equipment maintenance IoT integration in blockchain for smart waste management This book also includes a chapter on the IoT paradigm and an overview of uses cases for personal social and industrial applications.

GBP 42.99
1

Elements of Digital Transformation

Securing IoT in Industry 4.0 Applications with Blockchain

Securing IoT in Industry 4.0 Applications with Blockchain

The Industry 4. 0 revolution is changing the world around us. Artificial intelligence and machine learning automation and robotics big data Internet of Things augmented reality virtual reality and creativity are the tools of Industry 4. 0. Improved collaboration is seen between smart systems and humans which merges humans' critical and cognitive thinking abilities with highly accurate and fast industrial automation. Securing IoT in Industry 4. 0 Applications with Blockchain examines the role of IoT in Industry 4. 0 and how it can be made secure through various technologies including blockchain. The book begins with an in-depth look at IoT and discusses applications architecture technologies tools and programming languages. It then examines blockchain and cybersecurity as well as how blockchain achieves cybersecurity. It also looks at cybercrimes and their preventive measures and issues related to IoT security and trust. Features An overview of how IoT is used to improve the performance of Industry 4. 0 systems The evolution of the Industrial Internet of Things (IIoT) its proliferation and market share and some examples across major industries An exploration of how smart farming is helping farmers prevent plant disease The concepts behind the Internet of Nano Things (IoNT) including the nanomachine and nanonetwork architecture and nano-communication paradigms A look at how blockchains can enhance cybersecurity in a variety of applications including smart contracts transferring financial instruments and Public Key Infrastructure An overview of the structure and working of a blockchain including the types evolution benefits and applications of blockchain to industries A framework of technologies designed to shield networks computers and data from malware vulnerabilities and unauthorized activities An explanation of the automation system employed in industries along with its classification functionality flexibility limitations and applications

GBP 115.00
1

Android Security Attacks and Defenses

Android Security Attacks and Defenses

Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming it will help readers get up to speed on the basics of the Android platform and its security issues. Explaining the Android security model and architecture the book describes Android permissions including Manifest permissions to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on security implications and covers JEB Decompiler. The authors describe how to write Android bots in JAVA and how to use reversing tools to decompile any Android application. They also cover the Android file system including import directories and files so readers can perform basic forensic analysis on file system and SD cards. The book includes access to a wealth of resources on its website: www. androidinsecurity. com. It explains how to crack SecureApp. apk discussed in the text and also makes the application available on its site. The book includes coverage of advanced topics such as reverse engineering and forensics mobile device pen-testing methodology malware analysis secure coding and hardening guidelines for Android. It also explains how to analyze security implications for Android mobile devices/applications and incorporate them into enterprise SDLC processes. The book’s site includes a resource section where readers can access downloads for applications tools created by users and sample applications created by the authors under the Resource section. Readers can easily download the files and use them in conjunction with the text wherever needed. Visit www. androidinsecurity. com for more information. | Android Security Attacks and Defenses

GBP 56.99
1

Intelligent Data Analytics IoT and Blockchain

Principles of Mobile Computing and Communications

AI-Based Data Analytics Applications for Business Management

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range heralding the dawn of an era in which today’s Internet of People gives way to tomorrow’s Internet of Things — where billions of objects will have the ability to report their location identity and history over wireless connections. Connectivity and Communication — Anything Anywhere and Anytime An examination of the exciting expansion period in this research The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems provides comprehensive technical and practical deploying policy guidance that covers fundamentals and recent advances in pervasive networked systems. The book addresses the conceptual and technical issues that influence the technology roadmap and gives an in-depth introduction to the Internet of Things and its effect on businesses and individuals. Discussing case studies experience reports and best practice it contains information on emerging technologies market opportunities and policy implications. Practical Guidance and Balanced Coverage The first book of its kind to address major new technological developments and define the Internet of Things this text provides balanced coverage of theory and practical issues. Reflecting research trends and industry needs itis a comprehensive technical and practical guide to recent advances in pervasive networked systems. | The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

GBP 56.99
1

Applied Semantic Web Technologies

Applied Semantic Web Technologies

The rapid advancement of semantic web technologies along with the fact that they are at various levels of maturity has left many practitioners confused about the current state of these technologies. Focusing on the most mature technologies Applied Semantic Web Technologies integrates theory with case studies to illustrate the history current state and future direction of the semantic web. It maintains an emphasis on real-world applications and examines the technical and practical issues related to the use of semantic technologies in intelligent information management. The book starts with an introduction to the fundamentals—reviewing ontology basics ontology languages and research related to ontology alignment mediation and mapping. Next it covers ontology engineering issues and presents a collaborative ontology engineering tool that is an extension of the Semantic MediaWiki. Unveiling a novel approach to data and knowledge engineering the text: Introduces cutting-edge taxonomy-aware algorithms Examines semantics-based service composition in transport logistics Offers ontology alignment tools that use information visualization techniques Explains how to enrich the representation of entity semantics in an ontology Addresses challenges in tackling the content creation bottleneck Using case studies the book provides authoritative insights and highlights valuable lessons learned by the authors—information systems veterans with decades of experience. They explain how to create social ontologies and present examples of the application of semantic technologies in building automation logistics ontology-driven business process intelligence decision making and energy efficiency in smart homes.

GBP 54.99
1

A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

Most academics still wrestle with the publish or perish phenomenon. Based on Dr. Liebowitz’s 25 years serving as the editor-in-chief of a leading international journal along with insights from some of the most knowledgeable journal editors this book shares key lessons learned to help new professors doctoral students and practitioner–scholars increase their chances of being published in selective refereed international journals. It focuses on the key practices needed to ensure journal publication with interesting cases and helpful tips sprinkled throughout the book. A Guide to Publishing for Academics provides useful knowledge from leading journal editors of both traditional and online journals as well as various tiers of journals. Although the focus is mainly in the business and IT areas much of the guidance provided can cross into other fields. The book contains interesting vignettes and do’s and don’ts so that potential authors can understand what goes on behind the scenes once the manuscript arrives on the journal editor’s desk. The book provides constructive guidance on choosing what and where to publish what to consider when writing a title for a paper how to prepare and submit journal manuscripts and how to position a paper for publication. It also has valuable information for current and future journal editors including models of editing and editorial boards editorial coaching advice and editing smart practices. With the information in this book the next generation of academics and practitioner–scholars will be well equipped to overcome the publish or perish phenomenon. | A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

GBP 56.99
1

UML Diagramming A Case Study Approach

UML Diagramming A Case Study Approach

The Unified Modeling Language better known as UML has become the de facto standard modeling language for analyzing and designing software applications and systems. Software analysis and design is just as much an art as it is a science. UML Diagramming: A Catalog of Cases shows the art and the science behind successful software analysis and design with more than 35 case studies of applications of a variety of industries including: Transportation Healthcare Supply chain management Education Agriculture Manufacturing The book explains UML diagramming through case studies to help systems and software developers specify visualize construct and document the artifacts of software systems. The cases demonstrate how UML embodies software engineering best practices for modeling large and complex systems. They show how UML is an intuitive diagramming language that can be easily understood by end-users and business professionals. These cases studies also demonstrate how UML is a powerful language for communicating software designs to help developers and end users validate application scope requirements and features. Case studies highlighted in the book included: WEBMED healthcare service system services Inventory management system Business process outsourcing (BPO) management system Weather monitoring system Product recommendation system Textile management system Smart traffic management system Online pharmacy management system Placement automation system Farm management system Art gallery management system Website development This catalog of UML case studies is an invaluable reference for students studying software engineering programmers starting out their careers and seasoned systems developers needing a reference guide. | UML Diagramming A Case Study Approach

GBP 48.99
1

Blockchain for Information Security and Privacy

Blockchain for Information Security and Privacy

Distributed and peer-to-peer (P2P) applications are increasing daily and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain a decentralized cryptographic-based technology is a promising element for IoT security in manufacturing finance healthcare supply chain identity management e-governance defence education banking and trading. Blockchain has the potential to secure IoT through repetition changeless capacity and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security trust and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security trust and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e. g. vehicle web power web cloud internet and edge computing) this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives efficiency limitations computational complexity and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

GBP 99.99
1

Developing the Intuitive Executive Using Analytics and Intuition for Success

Developing the Intuitive Executive Using Analytics and Intuition for Success

The leading traits of executives often include creativity and innovation. Research shows that intuition can significantly enhance these traits. Developing intuitive executives and honing intuition coupled with the ability to apply data and evidence to inform decision making is the focus of Developing the Intuitive Executive: Using Analytics and Intuition for Success. Some researchers call the complement of applying data analytics to intuition as quantitative intuition rational intuition or informed intuition. Certainly in today's data-driven environment analytics plays a key role in executive decision-making. However an executive’s many years of experiential learning are not formally considered as part of the decision-making process. Learning from both failures and successes can help fine-tune intuitive awareness—what this book calls intuition-based decision-making. Research also shows that many executives do not trust the internal data quality in their organizations and so they rely on their intuition rather than strictly on data. This book presents the work of leading researchers worldwide on intuition in the management and executive domain. Their chapters cover key issues trends concepts techniques and opportunities for applying intuition as part of the executive decision-making process. Highlights include: Using intuition to manage new opportunities Intuition in medicine Rules based on intuition Balancing logic and intuition in decision-making Smart heuristics to manage complexity Intuition and competitiveness Intuitive investment decision-making across cultures Showing how intuition in executive decision-making should play an important role this book enables managers to complement their knowledge gained from experience with analytics to improve decision-making and business success. | Developing the Intuitive Executive Using Analytics and Intuition for Success

GBP 44.99
1

Applied Edge AI Concepts Platforms and Industry Use Cases

Applied Edge AI Concepts Platforms and Industry Use Cases

The strategically sound combination of edge computing and artificial intelligence (AI) results in a series of distinct innovations and disruptions enabling worldwide enterprises to visualize and realize next-generation software products solutions and services. Businesses individuals and innovators are all set to embrace and experience the sophisticated capabilities of Edge AI. With the faster maturity and stability of Edge AI technologies and tools the world is destined to have a dazzling array of edge-native people-centric event-driven real-time service-oriented process-aware and insights-filled services. Further on business workloads and IT services will become competent and cognitive with state-of-the-art Edge AI infrastructure modules AI algorithms and models enabling frameworks integrated platforms accelerators high-performance processors etc. The Edge AI paradigm will help enterprises evolve into real-time and intelligent digital organizations. Applied Edge AI: Concepts Platforms and Industry Use Cases focuses on the technologies processes systems and applications that are driving this evolution. It examines the implementation technologies; the products processes platforms patterns and practices; and use cases. AI-enabled chips are exclusively used in edge devices to accelerate intelligent processing at the edge. This book examines AI toolkits and platforms for facilitating edge intelligence. It also covers chips algorithms and tools to implement Edge AI as well as use cases. FEATURES The opportunities and benefits of intelligent edge computing Edge architecture and infrastructure AI-enhanced analytics in an edge environment Encryption for securing information An Edge AI system programmed with Tiny Machine learning algorithms for decision making An improved edge paradigm for addressing the big data movement in IoT implementations by integrating AI and caching to the edge Ambient intelligence in healthcare services and in development of consumer electronic systems Smart manufacturing of unmanned aerial vehicles (UAVs) AI edge computing and blockchain in systems for environmental protection Case studies presenting the potential of leveraging AI in 5G wireless communication | Applied Edge AI Concepts Platforms and Industry Use Cases

GBP 99.99
1