Computer networking and communications Books

704 products


  • Cisco Digital Network Architecture: Intent-based

    Pearson Education (US) Cisco Digital Network Architecture: Intent-based

    2 in stock

    Book SynopsisThis guide systematically introduces Cisco’s Digital Network Architecture (DNA), the enterprise network architecture for the next decade. Combining indispensable new insider information with content previously scattered through multiple technical documents, Cisco Digital Network Architecture combines technical depth, coherence, and comprehensiveness. This “living book” will be supported with regular online updates at a Cisco Press DNA website, offering a single authoritative source for everyone involved with DNA planning, implementation, and operation. Authored by insiders responsible for helping Cisco’s largest customers succeed with DNA, it: Addresses emerging trends now driving business transformation Explains why networks must become radically more intelligent, flexible, and adaptable Shows how DNA empowers businesses by coherently integrating virtualization, automation, analytics, and cloud services. Authoritative and fully up-to-date, Cisco Digital Network Architecture will help technical professionals, decision-makers, and consultants prepare to drive maximum value from next-generation networking.Table of Contents Chapter 1 Why Transform Your Business Digitally? Chapter 2 The Business Value of DNA 1 Chapter 3 Designing for Humans Chapter 4 Introducing the Digital Network Architecture Chapter 5 The Digital Network Architecture Blueprint Chapter 6 Introduction to DNA Infrastructure Chapter 7 Hardware Innovations Chapter 8 Software Innovations Chapter 9 Protocol Innovations Chapter 10 DNA Infrastructure–Virtualization Chapter 11 DNA Cloud Chapter 12 Introduction to DNA Automation Chapter 13 Device Programmability Chapter 14 DNA Automation Chapter 15 Introduction to DNA Analytics Chapter 16 DNA Analytics Components Chapter 17 DNA Analytics Engines Chapter 18 DNA Virtualization Solutions: Enterprise Network Functions Virtualization and Secure Agile Exchange Chapter 19 DNA Software-Defined Access Chapter 20 DNA Application Policy Chapter 21 DNA Analytics and Assurance Chapter 22 DNA Encrypted Traffic Analytics Chapter 23 DNA Evolution

    2 in stock

    £39.59

  • Top-Down Network Design

    Pearson Education (US) Top-Down Network Design

    Out of stock

    Book SynopsisObjectives The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer’s business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you understand traffic flow, protocol behavior, and internetworking technologies. After completing this book, you will be equipped to design enterprise networks that meet a customer’s requirements for functionality, capacity, performance, availability, scalability, affordability, security, and manageability. Audience This book is for you if you are an internetworking professional responsible for designing and maintaining medium- to large-sized enterprise networks. If you are a network engineer, architect, or technician who has a working knowledge of network protocols and technologies, this book will provide you with practical advice on applying your knowledge to internetwork design. This book also includes useful information for consultants, systems engineers, and sales engineers who design corporate networks for clients. In the fast-paced presales environment of many systems engineers, it often is difficult to slow down and insist on a top-down, structured systems analysis approach. Wherever possible, this book includes shortcuts and assumptions that can be made to speed up the network design process. Finally, this book is useful for undergraduate and graduate students in computer science and information technology disciplines. Students who have taken one or two courses in networking theory will find Top-Down Network Design, Third Edition, an approachable introduction to the engineering and business issues related to developing real-world networks that solve typical business problems. Changes for the Third Edition Networks have changed in many ways since the second edition was published. Many legacy technologies have disappeared and are no longer covered in the book. In addition, modern networks have become multifaceted, providing support for numerous bandwidth-hungry applications and a variety of devices, ranging from smart phones to tablet PCs to high-end servers. Modern users expect the network to be available all the time, from any device, and to let them securely collaborate with coworkers, friends, and family. Networks today support voice, video, high-definition TV, desktop sharing, virtual meetings, online training, virtual reality, and applications that we can’t even imagine that brilliant college students are busily creating in their dorm rooms. As applications rapidly change and put more demand on networks, the need to teach a systematic approach to network design is even more important than ever. With that need in mind, the third edition has been retooled to make it an ideal textbook for college students. The third edition features review questions and design scenarios at the end of each chapter to help students learn top-down network design. To address new demands on modern networks, the third edition of Top-Down Network Design also has updated material on the following topics: ¿ Network redundancy ¿ Modularity in network designs ¿ The Cisco SAFE security reference architecture ¿ The Rapid Spanning Tree Protocol (RSTP) ¿ Internet Protocol version 6 (IPv6) ¿ Ethernet scalability options, including 10-Gbps Ethernet and Metro Ethernet ¿ Network design and management toolsTable of ContentsIntroduction Part I Identifying Your Customer's Needs and Goals Chapter 1 Analyzing Business Goals and Constraints 3 Using a Top-Down Network Design Methodology 3 Using a Structured Network Design Process 5 Systems Development Life Cycles 6 Plan Design Implement Operate Optimize (PDIOO) Network Life Cycle 7 Analyzing Business Goals 8 Working with Your Client 8 Changes in Enterprise Networks 10 Networks Must Make Business Sense 10 Networks Offer a Service 11 The Need to Support Mobile Users 12 The Importance of Network Security and Resiliency 12 Typical Network Design Business Goals 13 Identifying the Scope of a Network Design Project 14 Identifying a Customer's Network Applications 16 Analyzing Business Constraints 19 Politics and Policies 19 Budgetary and Staffing Constraints 20 Project Scheduling 21 Business Goals Checklist 22 Summary 23 Review Questions 23 Design Scenario 24 Chapter 2 Analyzing Technical Goals and Tradeoffs 25 Scalability 25 Planning for Expansion 26 Expanding Access to Data 26 Constraints on Scalability 27 Availability 27 Disaster Recovery 28 Specifying Availability Requirements 29 Five Nines Availability 30 The Cost of Downtime 31 Mean Time Between Failure and Mean Time to Repair 31 Network Performance 32 Network Performance Definitions 33 Optimum Network Utilization 34 Throughput 35 Throughput of Internetworking Devices 36 Application Layer Throughput 37 Accuracy 38 Efficiency 39 Delay and Delay Variation 40 Causes of Delay 41 Delay Variation 43 Response Time 44 Security 44 Identifying Network Assets 45 Analyzing Security Risks 46 Reconnaissance Attacks 47 Denial-of-Service Attacks 48 Developing Security Requirements 48 Manageability 49 Usability 50 Adaptability 50 Affordability 51 Making Network Design Tradeoffs 52 Technical Goals Checklist 54 Summary 55 Review Questions 56 Design Scenario 56 Chapter 3 Characterizing the Existing Internetwork 59 Characterizing the Network Infrastructure 59 Developing a Network Map 60 Characterizing Large Internetworks 60 Characterizing the Logical Architecture 62 Developing a Modular Block Diagram 64 Characterizing Network Addressing and Naming 64 Characterizing Wiring and Media 65 Checking Architectural and Environmental Constraints 68 Checking a Site for a Wireless Installation 69 Performing a Wireless Site Survey 70 Checking the Health of the Existing Internetwork 71 Developing a Baseline of Network Performance 72 Analyzing Network Availability 73 Analyzing Network Utilization 73 Measuring Bandwidth Utilization by Protocol 75 Analyzing Network Accuracy 76 Analyzing Errors on Switched Ethernet Networks 77 Analyzing Network Efficiency 79 Analyzing Delay and Response Time 80 Checking the Status of Major Routers, Switches, and Firewalls 82 Network Health Checklist 83 Summary 84 Review Questions 84 Hands-On Project 85 Design Scenario 85 Chapter 4 Characterizing Network Traffic 87 Characterizing Traffic Flow 87 Identifying Major Traffic Sources and Stores 87 Documenting Traffic Flow on the Existing Network 89 Characterizing Types of Traffic Flow for New Network Applications 90 Terminal/Host Traffic Flow 91 Client/Server Traffic Flow 91 Peer-to-Peer Traffic Flow 93 Server/Server Traffic Flow 94 Distributed Computing Traffic Flow 94 Traffic Flow in Voice over IP Networks 94 Documenting Traffic Flow for New and Existing Network Applications 95 Characterizing Traffic Load 96 Calculating Theoretical Traffic Load 97 Documenting Application-Usage Patterns 99 Refining Estimates of Traffic Load Caused by Applications 99 Estimating Traffic Load Caused by Routing Protocols 101 Characterizing Traffic Behavior 101 Broadcast/Multicast Behavior 101 Network Efficiency 102 Frame Size 103 Windowing and Flow Control 103 Error-Recovery Mechanisms 104 Characterizing Quality of Service Requirements 105 ATM QoS Specifications 106 Constant Bit Rate Service Category 107 Real-time Variable Bit Rate Service Category 107 Non-real-time Variable Bit Rate Service Category 107 Unspecified Bit Rate Service Category 108 Available Bit Rate Service Category 108 Guaranteed Frame Rate Service Category 108 IETF Integrated Services Working Group QoS Specifications 109 Controlled-Load Service 110 Guaranteed Service 110 IETF Differentiated Services Working Group QoS Specifications 111 Grade of Service Requirements for Voice Applications 112 Documenting QoS Requirements 113 Network Traffic Checklist 114 Summary 114 Review Questions 114 Design Scenario 115 Summary for Part I 115 Part II Logical Network Design Chapter 5 Designing a Network Topology 119 Hierarchical Network Design 120 Why Use a Hierarchical Network Design Model? 121 Flat Versus Hierarchical Topologies 122 Flat WAN Topologies 122 Flat LAN Topologies 123 Mesh Versus Hierarchical-Mesh Topologies 124 Classic Three-Layer Hierarchical Model 125 Core Layer 127 Distribution Layer 127 Access Layer 128 Guidelines for Hierarchical Network Design 128 Redundant Network Design Topologies 130 Backup Paths 131 Load Sharing 132 Modular Network Design 133 Cisco SAFE Security Reference Architecture 133 Designing a Campus Network Design Topology 135 Spanning Tree Protocol 135 Spanning Tree Cost Values 136 Rapid Spanning Tree Protocol 137 RSTP Convergence and Reconvergence 138 Selecting the Root Bridge 139 Scaling the Spanning Tree Protocol 140 Virtual LANs 141 Fundamental VLAN Designs 142 Wireless LANs 144 Positioning an Access Point for Maximum Coverage 145 WLANs and VLANs 146 Redundant Wireless Access Points 146 Redundancy and Load Sharing in Wired LANs 147 Server Redundancy 148 Workstation-to-Router Redundancy 150 Hot Standby Router Protocol 152 Gateway Load Balancing Protocol 153 Designing the Enterprise Edge Topology 153 Redundant WAN Segments 153 Circuit Diversity 154 Multihoming the Internet Connection 154 Virtual Private Networking 157 Site-to-Site VPNs 158 Remote-Access VPNs 159 Service Provider Edge 160 Secure Network Design Topologies 162 Planning for Physical Security 162 Meeting Security Goals with Firewall Topologies 162 Summary 163 Review Questions 165 Design Scenario 165 Chapter 6 Designing Models for Addressing and Numbering 167 Guidelines for Assigning Network Layer Addresses 168 Using a Structured Model for Network Layer Addressing 168 Administering Addresses by a Central Authority 169 Distributing Authority for Addressing 170 Using Dynamic Addressing for End Systems 170 IP Dynamic Addressing 171 IP Version 6 Dynamic Addressing 174 Zero Configuration Networking 175 Using Private Addresses in an IP Environment 175 Caveats with Private Addressing 177 Network Address Translation 177 Using a Hierarchical Model for Assigning Addresses 178 Why Use a Hierarchical Model for Addressing and Routing? 178 Hierarchical Routing 179 Classless Interdomain Routing 179 Classless Routing Versus Classful Routing 180 Route Summarization (Aggregation) 181 Route Summarization Example 182 Route Summarization Tips 183 Discontiguous Subnets 183 Mobile Hosts 184 Variable-Length Subnet Masking 185 Hierarchy in IP Version 6 Addresses 186 Link-Local Addresses 187 Global Unicast Addresses 188 IPv6 Addresses with Embedded IPv4 Addresses 189 Designing a Model for Naming 189 Distributing Authority for Naming 190 Guidelines for Assigning Names 191 Assigning Names in a NetBIOS Environment 192 Assigning Names in an IP Environment 193 The Domain Name System 193 Dynamic DNS Names 194 IPv6 Name Resolution 195 Summary 195 Review Questions 196 Design Scenario 197 Chapter 7 Selecting Switching and Routing Protocols 199 Making Decisions as Part of the Top-Down Network Design Process 200 Selecting Switching Protocols 201 Switching and the OSI Layers 202 Transparent Bridging 202 Selecting Spanning Tree Protocol Enhancements 203 PortFast 204 UplinkFast and BackboneFast 204 Unidirectional Link Detection 205 LoopGuard 206 Protocols for Transporting VLAN Information 207 IEEE 802.1Q 207 Dynamic Trunk Protocol 208 VLAN Trunking Protocol 208 Selecting Routing Protocols 209 Characterizing Routing Protocols 209 Distance-Vector Routing Protocols 210 Link-State Routing Protocols 212 Routing Protocol Metrics 214 Hierarchical Versus Nonhierarchical Routing Protocols 214 Interior Versus Exterior Routing Protocols 214 Classful Versus Classless Routing Protocols 214 Dynamic Versus Static and Default Routing 215 On-Demand Routing 216 Scalability Constraints for Routing Protocols 216 Routing Protocol Convergence 217 IP Routing 218 Routing Information Protocol 218 Enhanced Interior Gateway Routing Protocol 219 Open Shortest Path First 221 Intermediate System-to-Intermediate System 224 Border Gateway Protocol 225 Using Multiple Routing Protocols in an Internetwork 225 Routing Protocols and the Hierarchical Design Model 226 Redistribution Between Routing Protocols 227 Integrated Routing and Bridging 229 A Summary of Routing Protocols 230 Summary 231 Review Questions 231 Design Scenario 232 Chapter 8 Developing Network Security Strategies 233 Network Security Design 233 Identifying Network Assets 234 Analyzing Security Risks 234 Analyzing Security Requirements and Tradeoffs 235 Developing a Security Plan 235 Developing a Security Policy 236 Components of a Security Policy 237 Developing Security Procedures 237 Maintaining Security 237 Security Mechanisms 238 Physical Security 238 Authentication 239 Authorization 239 Accounting (Auditing) 240 Data Encryption 240 Public/Private Key Encryption 241 Packet Filters 243 Firewalls 244 Intrusion Detection and Prevention Systems 244 Modularizing Security Design 245 Securing Internet Connections 245 Securing Public Servers 246 Securing E-Commerce Servers 247 Securing Remote-Access and VPNs 248 Securing Remote-Access Technologies 248 Securing VPNs 249 Securing Network Services and Network Management 250 Securing Server Farms 251 Securing User Services 252 Securing Wireless Networks 253 Authentication in Wireless Networks 254 Data Privacy in Wireless Networks 258 Summary 261 Review Questions 261 Design Scenario 262 Chapter 9 Developing Network Management Strategies 263 Network Management Design 263 Proactive Network Management 264 Network Management Processes 264 Fault Management 265 Configuration Management 266 Accounting Management 266 Performance Management 266 Security Management 268 Network Management Architectures 269 In-Band Versus Out-of-Band Monitoring 270 Centralized Versus Distributed Monitoring 270 Selecting Network Management Tools and Protocols 271 Selecting Tools for Network Management 271 Simple Network Management Protocol 271 Management Information Bases (MIB) 272 Remote Monitoring (RMON) 273 Cisco Discovery Protocol 274 Cisco NetFlow Accounting 276 Estimating Network Traffic Caused by Network Management 276 Summary 277 Review Questions 278 Design Scenario 278 Summary for Part II 279 Part III Physical Network Design Chapter 10 Selecting Technologies and Devices for Campus Networks 283 LAN Cabling Plant Design 284 Cabling Topologies 284 Building-Cabling Topologies 285 Campus-Cabling Topologies 285 Types of Cables 285 LAN Technologies 289 Ethernet Basics 290 Ethernet and IEEE 802.3 290 Ethernet Technology Choices 291 Half-Duplex and Full-Duplex Ethernet 292 100-Mbps Ethernet 292 Gigabit Ethernet 293 10-Gbps Ethernet 295 Selecting Internetworking Devices for a Campus Network Design 299 Criteria for Selecting Campus Internetworking Devices 300 Optimization Features on Campus Internetworking Devices 302 Example of a Campus Network Design 303 Background Information for the Campus Network Design Project 303 Business Goals 304 Technical Goals 304 Network Applications 305 User Communities 306 Data Stores (Servers) 307 Current Network at WVCC 307 Traffic Characteristics of Network Applications 310 Summary of Traffic Flows 311 Performance Characteristics of the Current Network 312 Network Redesign for WVCC 313 Optimized IP Addressing and Routing for the Campus Backbone 313 Wireless Network 314 Improved Performance and Security for the Edge of the Network 315 Summary 316 Review Questions 317 Design Scenario 317 Chapter 11 Selecting Technologies and Devices for Enterprise Networks 319 Remote-Access Technologies 320 PPP 321 Multilink PPP and Multichassis Multilink PPP 321 Password Authentication Protocol and Challenge Handshake Authentication Protocol 322 Cable Modem Remote Access 323 Challenges Associated with Cable Modem Systems 324 Digital Subscriber Line Remote Access 325 Other DSL Implementations 326 PPP and ADSL 326 Selecting Remote-Access Devices for an Enterprise Network Design 327 Selecting Devices for Remote Users 327 Selecting Devices for the Central Site 328 WAN Technologies 328 Systems for Provisioning WAN Bandwidth 329 Leased Lines 330 Synchronous Optical Network 331 Frame Relay 332 Frame Relay Hub-and-Spoke Topologies and Subinterfaces 333 Frame Relay Congestion Control Mechanisms 335 Frame Relay Traffic Control 335 Frame Relay/ATM Interworking 336 ATM 337 Ethernet over ATM 337 Metro Ethernet 338 Selecting Routers for an Enterprise WAN Design 339 Selecting a WAN Service Provider 340 Example of a WAN Design 341 Background Information for the WAN Design Project 341 Business and Technical Goals 342

    Out of stock

    £56.99

  • Implementing Cisco IP Switched Networks SWITCH

    Pearson Education Implementing Cisco IP Switched Networks SWITCH

    1 in stock

    Book Synopsis

    1 in stock

    £67.50

  • Against the Obamanet

    Encounter Books,USA Against the Obamanet

    Out of stock

    Book SynopsisThe Internet is a platform of ceaseless innovation that has transformed our lives in a remarkably short time. And the United States has led that revolution: of the 15 largest websites in the world, 10 are American. But all that is now under threat. In February 2015, the Federal Communications Commission imposed extensive regulatory controls on this vibrant digital universe in an effort to mandate "network neutrality." In this Broadside, Brian C. Anderson explains how the FCC's power grab for "neutrality" could be devastating for the most dynamic sector of the U.S. economy. Network neutrality is at odds with everything that made today's Internet the market cornucopia that it is, and we must protect it from the encroach--ments of Washington in order to foster its further growth.

    Out of stock

    £6.50

  • Wireless LANs & Bluetooth, Volume 4: Wireless

    Nova Science Publishers Inc Wireless LANs & Bluetooth, Volume 4: Wireless

    Out of stock

    Book SynopsisWireless Local Area Network (LAN) and Bluetooth are two phenomena in wireless networks. They have become very successful in the current market and are deployed in many different environments. However, there are still many unresolved issues such as Mobility Management support, Quality of Service (QoS) support, etc. The primary focus of this book is to present these two hot and rapidly evolving areas as well as issues and solutions involved with them. It is this realisation that has motivated the editing of this book. The goal of the book is to serve as a reference for wireless LAN and Bluetooth. In this book, the authors review important developments and new strategies for these topics. Important features and limitations of methods and models are identified. Consequently, this book can serve as a useful reference for researchers, educators, graduate students, as well as practitioners in the field of wireless networks.

    Out of stock

    £122.99

  • Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

    Syngress Media,U.S. Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

    15 in stock

    Book SynopsisThe Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified “Insider Threats” as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely to pose a threat. Next, the reader will learn about the variety of tools and attacks used by insiders to commit their crimes including: encryption, steganography, and social engineering. The book will then specifically address the dangers faced by corporations and government agencies. Finally, the reader will learn how to design effective security systems to prevent insider attacks and how to investigate insider security breeches that do occur. Throughout the book, the authors will use their backgrounds in the CIA to analyze several, high-profile cases involving insider threats.Table of ContentsPart I – Insider Threat Basics 1. What Is There To Worry About? (40 pages) 2. Behind the Crime (60 pages) Part II – Government 3. State and Local Government (40 pages) 4. Federal Government (40 pages) Part III - Corporations 5. Commercial (40 pages) 6. Banking and Finance Sector (40 pages) 7. Government Contractors (20 pages) Part IV –Analysis 8. Profile (30 pages) 9. Response (20 pages) 10. Survivability and Prevention (40 pages)

    15 in stock

    £34.72

  • Ad Hoc Networks: New Research

    Nova Science Publishers Inc Ad Hoc Networks: New Research

    Out of stock

    Book SynopsisAn ad-hoc (or "spontaneous") network is a local area network or other small network, especially one with wireless or temporary plug-in connections, in which some of the network devices are part of the network only for the duration of a communications session or, in the case of mobile or portable devices, while in some close proximity to the rest of the network. The term has been applied to future office or home networks in which new devices can be quickly added, using, for example, Bluetooth technology in which devices communicate with the computer and perhaps other devices using wireless transmission. This book covers the latest research in the field.

    Out of stock

    £86.99

  • Goodheart-Wilcox Publisher Networking Fundamentals

    1 in stock

    Book Synopsis

    1 in stock

    £86.40

  • Integrating E-Business Models for Government

    IGI Global Integrating E-Business Models for Government

    1 in stock

    Book SynopsisThe expectations of citizens in delivery of services by government institutions have increased over the last decade. Although, governments all over the world are involved in transforming methodologies and processes to satisfy their stakeholders, still there are problems which are causing distress and waste of valuable resources. ""Integrating E-Business Models for Government Solutions: Citizen-Centric Service Oriented Methodologies and Processes"" provides a unique collection of essential tools and alternative e-business strategies that can be incorporated into e-government solutions. The goal is to help in evolving effective methodologies and processes and consequently provide cost effective and citizen-centric services. Useful to scholars, researchers, and academic institutions, this book will enable readers to examine current issues and promote research initiatives to improve service delivery in e-government.Table of ContentsCitizen-centric services for government; Citizens e-readiness; Collaborative e-government networks; CRM in e-government; Electronic government website usability; E-participation in local government decision making; Government transformation; Integrated e-business models for government solutions; Integrated service delivery; Interoperability in e-government; Knowledge management security requirements for e-government; Organizationally enabled e-government enterprise architecture; Security aware development of e-government systems; Service oriented methodologies and processes"".

    1 in stock

    £183.35

  • Handbook of Research on Information Technology

    IGI Global Handbook of Research on Information Technology

    Out of stock

    Book SynopsisAdvances in information technology have brought about a revolution in healthcare, enabling medical personnel to have round-the-clock access to clinical data regardless of geographic location. ""The Handbook of Research on Information Technology Management and Clinical Data Administration in Healthcare"" provides researchers, educators, students, and industry practitioners with new research, practical experiences, challenges, and opportunities within healthcare data management. A comprehensive reference source within the medical technology field, this ""Handbook of Research"" presents tools and techniques in all aspects of IT management and clinical data administration in healthcare. It includes: over 40 authoritative contributions by over 100 of the world's leading experts in clinical data administration in healthcare from 21 countries; comprehensive coverage of each specific topic, highlighting recent trends and describing the latest advances in the field; and, more than 2,000 references to existing literature and research on clinical data administration in healthcare. A compendium of over 200 key terms with detailed definitions, this book is organized by topic and indexed, making it a convenient method of reference for all IT/IS scholars and professionals. It offers cross-referencing of key terms, figures, and information pertinent to clinical data administration in healthcare.Table of ContentsAnesthesia information management systems Electronic patient monitoring Health information standards Health technology assessment and health economics Healthcare information management implementation Integrated health information networks IT in chronic disease management IT in global health disparities Novel data interface for evaluating cardiovascular outcomes Patient safety information system Social marketing in healthcare Telehealth technology model for information science Telemedicine and e-health systems

    Out of stock

    £441.75

  • Robust Control System Networks How to Achieve Reliable Control After Stuxnet

    McGraw-Hill Education Robust Control System Networks How to Achieve Reliable Control After Stuxnet

    15 in stock

    Book SynopsisFrom the researcher who was one of the first to identify and analyze the infamous industrial control system malware "Stuxnet," comes a book that takes a new, radical approach to making Industrial control systems safe from such cyber attacks: design the controls systems themselves to be "robust." Other security experts advocate risk management, implementing more firewalls and carefully managing passwords and access. Not so this book: those measures, while necessary, can still be circumvented. Instead, this book shows in clear, concise detail how a system that has been set up with an eye toward quality design in the first place is much more likely to remain secure and less vulnerable to hacking, sabotage or malicious control. It blends several well-established concepts and methods from control theory, systems theory, cybernetics and quality engineering to create the ideal protected system. The book's maxim is taken from the famous quality engineer William Edwards Deming, "If I had to reduce my message to management to just a few words, I'd say it all has to do with reducing variation." Highlights include: - An overview of the problem of "cyber fragility" in industrial control systems How to make an industrial control system "robust," including principal design objectives and overall strategic planning Why using the methods of quality engineering like the Taguchi method, SOP and UML will help to design more "armored" industrial control systems

    15 in stock

    £76.95

  • Bootstrapper's Guide to the Mobile Web: Practical

    Linden Publishing Co Inc Bootstrapper's Guide to the Mobile Web: Practical

    7 in stock

    Book SynopsisCreating a successful mobile-web presence is achievable with the tools found in this guide?without needing to learn a programming language or become a Web designer. Such a presence is now a necessity, rather than a luxury, for all businesses, organizations, and independent professionals to stay competitive. This quick, practical, hands-on introduction to the nuts and bolts of using the mobile web to grow a brand, improve sales, and increase profits is written for lay people and avoids jargon and programming concepts. Time- and money-saving solutions are presented, teaching technical novices how to quickly adapt their existing websites to the mobile ones and how to easily create mobile applications without having to learn to program. Step-by-step instructions stand alongside real-world examples of successful mobile-web transitions, and advice on best practices is provided to help business owners, entrepreneurs, marketing professionals, and creative professionals create the presence they need to help their business flourish.

    7 in stock

    £22.09

  • Artificial Neural Network Training & Software

    Nova Science Publishers Inc Artificial Neural Network Training & Software

    1 in stock

    Book SynopsisArtificial neural networks (ANN) are widely used in diverse fields of science and industry. Though there have been numerous techniques used for their implementations, the choice of a specific implementation is subjected to different factors including cost, accuracy, processing speed and overall performance. Featured with synaptic plasticity, the process of training is concerned with adjusting the individual weights between each of the individual ANN neurons until we can achieve close to the desired output. This book introduces the common trajectory-driven and evolutionary-based ANN training algorithms.

    1 in stock

    £39.74

  • New Developments in Computer Networks

    Nova Science Publishers Inc New Developments in Computer Networks

    1 in stock

    Book Synopsis

    1 in stock

    £92.99

  • Nanocommunication Networks

    Nova Science Publishers Inc Nanocommunication Networks

    1 in stock

    Book Synopsis

    1 in stock

    £76.49

  • Network Protocols

    Nova Science Publishers Inc Network Protocols

    Out of stock

    Book Synopsis

    Out of stock

    £76.49

  • Mobile Middleware Content & Service Delivery

    Nova Science Publishers Inc Mobile Middleware Content & Service Delivery

    Out of stock

    Book Synopsis

    Out of stock

    £39.74

  • Amazon Web Services in Action

    Manning Publications Amazon Web Services in Action

    15 in stock

    Book Synopsis   DESCRIPTION Distributed systems are unpredictable, and it can be an enormous challenge to manage around potentially-crippling obstacles like hardware failures, unanticipated changes in load, and network issues. Amazon Web Services (AWS) is a platform for hosting distributed applications in a secure, flexible cloud environment. AWS provides a suite of services designed to keep the focus on what an application does instead of the infrastructure required to run it. Whether serving up blog pages, analyzing fast data in real-time, building software as a service, or implementing a massive e-commerce site, AWS provides both a stable platform and services that will scale with every application. Amazon Web Services in Action introduces readers to computing, storing, and networking in the AWS cloud. It starts with a broad overview of AWS, and shows how to spin up servers manually and from the command line. Then, it explores infrastructure automation with the AWS CloudFormation service, where readers can describe a blueprint of their infrastructure as code. Readers will learn how to isolate systems using private networks to increase security, how to use the most valuable AWS managed services available on AWS, and about the benefits of stateless servers. In the end, they’ll look to the AWS model for high availability, scaling, decoupling with queues and load balancers, and fault tolerance. KEY SELLING POINTS Explains the key concepts of AWS Gives an overview of the most important services Allows readers to take full advantage of the AWS platform AUDIENCE Written for developers and DevOps engineers who are moving traditionally-deployed distributed applications to the AWS platform. No experience with AWS is required. ABOUT THE TECHNOLOGY Amazon Web Services is a platform of services in the Cloud to provide everything needed to run applications—from hosting a private blog, to running one of the biggest websites on earth, analyzing data for cancer research, or providing business applications.

    15 in stock

    £35.99

  • Serverless Architectures on AWS

    Manning Publications Serverless Architectures on AWS

    2 in stock

    Book SynopsisDESCRIPTION Serverless architecture is about having more time to focus on code, and moving quickly. In these new architectures, traditional back-end servers are replaced with cloud functions acting as discrete singlepurpose services. With serverless compute technologies like AWS Lambda, developers can build entirely serverless platforms at scale. Serverless Architectures on AWS teaches how to build, secure and manage serverless architectures that can power the most demanding web and mobile apps. This book has many ready-made and real-world examples, code snippets, diagrams, and descriptions of architectures that can be readily applied. It describes a traditional application and its back end concerns and then shows how to solve these same problems with a serverless approach. By the end, readers will be able to reason about serverless systems and be able to compose their own systems by applying these ideas and examples. KEY FEATURES • Up-to-date with the most current platform trends • Real-world examples, code snippets, and diagrams• Learn to solve back end concerns with a serverless approach AUDIENCE This book is for all software developers interested in back end technologies. Experience with JavaScript (node.js) and AWS is useful but not required. ABOUT THE TECHNOLOGY Lambda is a compute service that executes code written in JavaScript (node.js), Python, or Java on AWS infrastructure. Source code is deployed to an isolated container that has its own allocation of memory, disk space, and CPU. Serverless architectures herald a new way of building scalable, powerful, cost-effective, and high-performing back end systems. They encourage a new way of creating applications through the use of a stateless compute service to execute code.

    2 in stock

    £37.99

  • Serverless Architectures on AWS

    Manning Publications Serverless Architectures on AWS

    15 in stock

    Book SynopsisServerless Architectures on AWS, Second Edition teaches you how to design, secure, and manage serverless backend APIs for web and mobile applications on the AWS platform. You'll get going quickly with this book's relevant real-world examples, code listings, diagrams, and clearly-described architectures that you can readily apply to your own work. You’ll master serverless systems using AWS Lambda and the myriad other services on the AWS platform. This new edition has been fully updated to reflect the newest serverless design best practices and changes to AWS. It features two entirely new chapters dedicated to DevOps, monitoring, and microservices, as well as working with DynamoDB, GraphQL and Kinesis. Key Features · First steps with serverless computing · The principles of serverless design · Transitioning from servers to services · Writing AWS Lambda functions and using the API Gateway Audience This book is for server-side and full-stack software developers with some experience using Node.js and AWS. Author Bio Peter Sbarski is VP of Engineering at A Cloud Guru and the head organizer of Serverlessconf, the world’s first conference dedicated entirely to serverless architectures and technologies. Throughout his extensive IT career, Peter has led teams across large enterprise solutions with a focus on web and AWS cloud technologies.

    15 in stock

    £34.19

  • Operations Anti-Patterns, DevOps Solutions

    Manning Publications Operations Anti-Patterns, DevOps Solutions

    1 in stock

    Book SynopsisOperations Anti-Patterns, DevOps Solutions shows how to implement DevOps techniques in the kind of imperfect environments most developers work in. Part technology tutorial, part reference manual, and part psychology handbook, this practical guide shows you realistic ways to bring DevOps to your team when you don’t have the flexibility to make sweeping changes in organizational structure. Focused on process improvements you can make from the bottom up, everything in Operations Anti-Patterns, DevOps Solutions is actionable for your team—from constructing a streamlined workflow system to developing dashboards and operational metrics to measure the right aspects of performance. To better understand the behavior of both individuals and organizations, you’ll also learn the psychological reasoning behind why DevOps techniques are effective. Key Features · Creating a post-mortem framework to analyze projects and incidents · Monitoring and managing team time · Building cultural touchstones that assist with team building · Automating change management · Techniques for adopting automation to power your workflows For team leaders and managers. About the technology By emphasising shared responsibility for delivering software, DevOps transforms the way technology departments work. Looking beyond tool choice and design philosophy, DevOps demands a change in an organization’s attitude and approach. Jeff Smith has been in the technology industry for over 15 years, both as management and individual contributor. He has managed DevOps transformations at Centro, an ad-tech firm, and Grubhub, an online ordering platform.

    1 in stock

    £37.99

  • Practical Automation with PowerShell

    Manning Publications Practical Automation with PowerShell

    1 in stock

    Book SynopsisTake PowerShell beyond simple scripts and build time-saving automations for your team, your users, and the world. In Practical Automation with PowerShell you will learn how to: Build PowerShell functions to automate common and complex tasks Create smart automations that are adaptable to new challenges Structure your code for sharing and reusability Store and secure your automations Execute automations with Azure Automation, Azure Functions, and Jenkins Share your automations with your team and non-technical colleagues Store and retrieve data, credentials, and variables Use source control solutions to maintain and test code changes Provide front-end UI solutions for PowerShell automations Practical Automation in PowerShell reveals how you can use PowerShell to build automation solutions for a huge number of common admin and DevOps tasks. It takes you beyond scripting basics and shows you how to handle the unforeseen complexities that can keep automations from becoming reusable and resilient. You'll discover tools and platforms that let you share your automations with your team and even roll them out to non-technical users through easy-to-understand Sharepoint frontends. about the technology Most repetitive tasks you face as an administrator or DevOps engineer can be automated using PowerShell. Mastering the basics of this powerful language, along with some best practices for saving and sharing your automations, can radically improve the consistency and efficiency of your work. about the book Practical Automation with PowerShell teaches you how to build, organize, and share useful automations with PowerShell. You'll start with development skills you might not have learned as a sysadmin, including techniques to help you structure and manage your code, and common pitfalls to avoid. You'll quickly progress to essential factors for sharable automations, such as securely storing information, connecting to remote machines, and creating automations that can adapt to different use cases. Finally, you'll take your automations out into the world. You'll learn how to share them with your team or end users, and build front ends that allow non-technical people to run them at the touch of a button.Trade Review'The book we needed to improve our work and sleep peacefully!' Leonardo Anastasia 'Not only tells you what to do, but also what not to.' Sander Zegveld 'A really great accessory to general Powershell tutorials.' Alice ChangTable of Contentstable of contents PART 1: GETTING STARTED WITH AUTOMATION READ IN LIVEBOOK 1WHY AUTOMATE WITH POWERSHELL READ IN LIVEBOOK 2GET STARTED AUTOMATING PART 2: WRITING SCRIPTS READ IN LIVEBOOK 3SCHEDULING AUTOMATION SCRIPTS READ IN LIVEBOOK 4HANDLING SENSITIVE DATA READ IN LIVEBOOK 5POWERSHELL REMOTE EXECUTION READ IN LIVEBOOK 6MAKING ADAPTABLE AUTOMATIONS READ IN LIVEBOOK 7WORKING WITH SQL READ IN LIVEBOOK 8CLOUD-BASED AUTOMATION 9 WORKING OUTSIDE OF POWERSHELL 10 AUTOMATION CODING BEST PRACTICES PART 3: MANAGING AUTOMATION SCRIPTS 11 SHARING SCRIPTS AMONG A TEAM 12 SHARING SCRIPTS WITH END-USERS (FRONT-END) 13 WHERE TO STORE YOUR CODE 14 FUTURE-PROOFING YOUR CODE APPENDIXES APPENDIX A: DEVELOPMENT ENVIRONMENT SET UP APPENDIX B: CLOUD ENVIRONMENT SETUP APPENDIX C: HELPER SCRIPTS

    1 in stock

    £34.19

  • Generative AI for the It Pro

    Manning Publications Generative AI for the It Pro

    1 in stock

    Book Synopsis

    1 in stock

    £40.50

  • Secret Key Cryptography

    Manning Publications Secret Key Cryptography

    4 in stock

    Book SynopsisExplore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods. In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: Measure the strength of your ciphers and learn how to guarantee their security Construct and incorporate data-compression codes Generate true random numbers in bulk Construct huge primes and safe primes Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers that could be developed decades from now Construct 30 unbreakable ciphers Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book's simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You'll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you'll explore both historic ciphers and groundbreaking new approaches—including a never-before-seen way to implement the uncrackable One-Time Pad algorithm. about the technology Secret Key cryptography is the backbone of all modern computing infrastructure. Secret Key ciphers use the same key to encrypt and decrypt messages. Properly designed, these algorithms are efficient and practical. Some Secret Key approaches are uncrackable, even under attacks backed by supercomputers or quantum technology! about the book Secret Key Cryptography teaches anyone how to create a wide range of ciphers—even if you have no background in math or creating codes. You'll combine Secret Key techniques to achieve ciphers that are effectively uncrackable and avoid common pitfalls that result in strong-looking but weak ciphers. The book reveals scores of different cipher methods, including both historic examples and current innovations in the field. RETAIL SELLING POINTS • Measure the strength of your ciphers and learn how to guarantee their security • Construct and incorporate data-compression codes • Generate true random numbers in bulk • Construct huge primes and safe primes • Add an undetectable backdoor to a cipher • Defeat hypothetical ultra computers that could be developed decades from now • Construct 30 unbreakable ciphers AUDIENCE For professional engineers, computer scientists, and cryptography hobbyists. No advanced math knowledge is required Table of Contentstable of contents detailed TOC READ IN LIVEBOOK 1 INTRODUCTION READ IN LIVEBOOK 2WHAT IS CRYPTOGRAPHY? READ IN LIVEBOOK 3PRELIMINARY CONCEPTS READ IN LIVEBOOK 4CRYPTOGRAPHER'S TOOLBOX READ IN LIVEBOOK 5SUBSTITUTION CIPHERS READ IN LIVEBOOK 6COUNTERMEASURES READ IN LIVEBOOK 7TRANSPOSITION READ IN LIVEBOOK 8JEFFERSON WHEEL CYPHER READ IN LIVEBOOK 9FRACTIONATION READ IN LIVEBOOK 10VARIABLE-LENGTH FRACTIONATION READ IN LIVEBOOK 11BLOCK CIPHERS READ IN LIVEBOOK 12PRINCIPLES FOR SECURE ENCRYPTION READ IN LIVEBOOK 13STREAM CIPHERS READ IN LIVEBOOK 14ONE-TIME PAD READ IN LIVEBOOK 15MATRIX METHODS READ IN LIVEBOOK 16THREE-PASS PROTOCOL READ IN LIVEBOOK 17CODES READ IN LIVEBOOK 18QUANTUM COMPUTERS READ IN LIVEBOOK 19 EPILOGUE READ IN LIVEBOOK 20 FUN PAGES CHALLENGE

    4 in stock

    £35.09

  • National Broadband Deployment & the Digital

    Nova Science Publishers Inc National Broadband Deployment & the Digital

    1 in stock

    Book Synopsis

    1 in stock

    £177.59

  • Network Coding & Data Compression: Theory,

    Nova Science Publishers Inc Network Coding & Data Compression: Theory,

    1 in stock

    Book Synopsis

    1 in stock

    £127.99

  • Computer Networking: The Complete Guide

    Murphy & Moore Publishing Computer Networking: The Complete Guide

    Out of stock

    Book Synopsis

    Out of stock

    £106.72

  • NY Research Press Internet of Things: Technologies and Applications

    Out of stock

    Book Synopsis

    Out of stock

    £118.83

  • Computer Networking: An Innovative Approach

    Clanrye International Computer Networking: An Innovative Approach

    Out of stock

    Book Synopsis

    Out of stock

    £101.14

  • Computer Networking: Principles and Practice

    Willford Press Computer Networking: Principles and Practice

    Out of stock

    Book Synopsis

    Out of stock

    £108.80

  • Multidisciplinary Applications of

    IGI Global Multidisciplinary Applications of

    Out of stock

    Book SynopsisComputer-mediated communication (CMC) refers to human communication mediated by electronic devices. CMC can be broken down into two forms: synchronous and asynchronous. Synchronous CMC provides opportunities for direct communication between involved parties. In contrast, asynchronous CMC refers to communication that takes place when the message sender does not receive an immediate response from the recipient. Further study is required to fully understand the uses and applications of this communication. Multidisciplinary Applications of Computer-Mediated Communication considers the future use of CMC and recent applications of CMC in different contexts in the world with implications for further development. Covering key topics such as learning environments, business communication, and social media, this reference work is ideal for industry professionals, researchers, scholars, academicians, practitioners, instructors, and students.

    Out of stock

    £186.00

  • Cloud Computing Basics

    Mercury Learning and Information Cloud Computing Basics

    Out of stock

    Book SynopsisHighlights the recent developments in distributed computing and details the architecture, virtualization concepts, and security concerns of cloud computing. The book also provides a detailed understanding of the benefits of cloud computing that can encourage enterprises to switch to the cloud.

    Out of stock

    £43.22

  • Computer Networking

    Arcler Press Computer Networking

    Out of stock

    Book SynopsisThis text explores the fundamentals of networking technology and its applications in modern computing. The book covers topics such as network architectures, protocols, security, and wireless networking. It is designed to provide readers with a comprehensive understanding of how computer networks function and how they can be configured and managed effectively. Whether you are a student, a professional, or an enthusiast in the field of computer networking, this book is an essential resource for gaining knowledge and expertise in this dynamic and rapidly evolving field.Table of Contents Chapter 1 Basics of Computer Networking Chapter 2 Protocols and Standards of Computer Networks Chapter 3 Hardware and Software used in Computer Networks Chapter 4 Understanding Computer Network Security Chapter 5 Wireless Networking Chapter 6 Emerging Networking Applications Chapter 7 Network Performance and Optimization Chapter 8 Future of Computer Networking

    Out of stock

    £87.20

  • Apple Academic Press Inc. Advances in Intelligent Systems

    1 in stock

    1 in stock

    £142.50

  • Memory Machines: The Evolution of Hypertext

    Anthem Press Memory Machines: The Evolution of Hypertext

    Out of stock

    Book SynopsisThis book explores the history of hypertext, an influential concept that forms the underlying structure of the World Wide Web and innumerable software applications. Barnet tells both the human and the technological story by weaving together contemporary literature and her exclusive interviews with those at the forefront of hypertext innovation, tracing its evolutionary roots back to the analogue machine imagined by Vannevar Bush in 1945.Trade Review‘“Memory Machines” will appeal to anyone who is curious about the history of computing in general and hypertext in particular. This book is highly recommended for computer science students and for students of history of science and technology, as well as for computing and engineering enthusiasts.’ —Stephanie Wical, Online Information Review‘[A] richly layered account, focusing on oral histories as much as an analysis of documents. […] This volume provides a sophisticated and vital history of early computing, usefully exploring conceptual ideas around hypertext, outlining the constraints on pioneering efforts to implement models of hypertext as technical prototypes, and ultimately demonstrating how these collectively shaped all subsequent efforts to develop computer-based prototypes for information structuring and retrieval.’ —Craig Hight, ‘Media International Australia’Table of ContentsForeword: To Mandelbrot in Heaven – Stuart Moulthrop; Preface; Chapter 1: Technical Evolution; Chapter 2: Memex as an Image of Potentiality; Chapter 3: Augmenting the Intellect: NLS; Chapter 4. The Magical Place of Literary Memory: Xanadu; Chapter 5: Seeing and Making Connections: HES and FRESS; Chapter 6: Machine-Enhanced (Re)minding: The Development of Storyspace; Conclusion; Notes; Bibliography; Index

    Out of stock

    £23.75

  • Embedded Linux Projects Using Yocto Project Cookbook Over 70 handson recipes for professional embedded Linux developers to optimize and boost their Yocto knowhow

    15 in stock

    £39.99

  • Digital Transformation: Information System

    ISTE Ltd and John Wiley & Sons Inc Digital Transformation: Information System

    Out of stock

    Book SynopsisThe main aim of this book is to offer companies a simple and practical method to assess their maturity in the Governance Information System, so that they are in working order to face the challenges of Digital Transformation. How can companies effectively manage their investment in IT systems and make the most of their development?Table of ContentsForeword ix Preface xv Acknowledgments xxiii Part 1. Information Systems Governance at the Service of the Digital Transformation 1 Chapter 1. Enterprise Governance: A Framework that Includes IS Governance 3 Chapter 2. Challenges of Enterprise IS Governance 11 2.1. Value creation 13 2.2. IS risk management 16 Chapter 3. Objectives, Approaches and Key Success Factors of Enterprise IS Governance 21 3.1. Objectives of Enterprise IS governance (EISG) 21 3.2. Approaches, frameworks and ongoing reflections 23 3.3. Benefits of the approach and its key success factors 27 Chapter 4. How Can the Maturity of Enterprise IS Governance be Improved? 29 4.1. Scope of EISG and assessment of the company’s global maturity level 29 4.2. How can it be properly initiated? 33 4.3. What can be done once the diagnostics have been made? 34 4.4. How can the improvement process be initiated? 35 Part 2. Evaluation of the Maturity of Enterprise Information Systems Governance 37 Chapter 5. Maturity Evaluation Criteria for Each of the 11 Vectors 39 5.1. Vector 1: IS planning and integration into the overall company’s planning process 40 5.1.1. Issues of this vector in the digital transformation 40 5.1.2. Issues of the vector in terms of contribution to the IS gonernance 40 5.1.3. Best practices associated with the vector and measurement of the company’s maturity level in the vector 41 5.2. Vector 2: IS urbanization at the service of strategic challenges in the frame of the Enterprise Architecture 44 5.2.1. Issues of this vector in the digital transformation 44 5.2.2. Issues of the vector in terms of contribution to the IS governance 44 5.2.3. Best practices associated with the vector and measurement of the company’s level maturity in the vector 46 5.3. Vector 3: Portfolio management of value creation-oriented projects 49 5.3.1. Issues of this vector in the digital transformation 49 5.3.2. Issues of the vector in terms of contribution to the IS governance 50 5.3.3. Best practices associated with the vector and measurement of the company’s maturity level in the vector 52 5.4. Vector 4: alignment of the IT organization with respect to business processes 57 5.4.1. Issues of this vector in the digital transformation 57 5.4.2. Issues of the vector in terms of contribution to IS governance 57 5.4.3. Best practices associated with the vector and measurement of the company’s maturity level in the vector 60 5.5. Vector 5: IS-related budgetary management and costs control promoting transparency 64 5.5.1. Vector challenges in the digital transformation 64 5.5.2. Issues of the vector in terms of contribution to IS governance 65 5.5.3. Best practices associated with the vector and measurement of the company’s maturity level in the vector 67 5.6. Vector 6: project management with respect to business objectives 73 5.6.1. Issues of this vector in the digital transformation 73 5.6.2. Issues of the vector in terms of contribution to the IS governance 74 5.6.3. Best practices associated with the vector and measurement of the company’s maturity level in the vector 76 5.7. Vector 7: provision of IT services optimized with respect to clients’ expectations 81 5.7.1. Issues of this vector in the digital transformation 81 5.7.2. Issues of the vector in terms of contribution to IS governance 81 5.7.3. Best practices associated with the vector and measurement of the company’s level of maturity in the vector 87 5.8. Vector 8: prospective management of IT skills 95 5.8.1. Issues of this vector in the digital transformation 95 5.8.2. Issues of the vector in terms of contribution to IS governance 95 5.8.3. Best practices associated with the vector and measurement of the company’s maturity level in the vector 98 5.9. Vector 9: IS-related risk management adapted to business challenges 101 5.9.1. Issues of this vector in the digital transformation 101 5.9.2. Issues of the vector in terms of contribution to IS Governance 102 5.9.3. Best practices associated with the vector and measurement of the company’s maturity level in the vector 103 5.10. Vector 10: management and measurement of IS performance 107 5.10.1. Issues of this vector in the digital transformation 107 5.10.2. Issues of the vector in terms of contribution to IS governance 108 5.10.3. Best practices associated with the vector and measurement of the company’s maturity level in the vector 109 5.11. Vector 11: IS-related communication management 112 5.11.1. Issues of this vector in the digital transformation 112 5.11.2. Issues of the vector in terms of contribution to IS governance 112 5.11.3. Best practices associated with the vector and measurement of the company’s maturity level in the vector 113 Appendices 117 Appendix 1: IT Scorecard 119 Appendix 2: Economic Steering of IT Department 123 Appendix 3: Glossary 129 Bibliography 137 Index 141

    Out of stock

    £125.06

  • Internet of Things: Evolutions and Innovations

    ISTE Ltd and John Wiley & Sons Inc Internet of Things: Evolutions and Innovations

    Out of stock

    Book SynopsisThe development of connected, communicating objects is showing no signs of slowing down. With an increasing number of objects available on the market, the evolution of the Internet of Things is leading to more and more fields being explored via information and communication sciences. This book analyzes the ecosystem of the Internet of Things by retracing the historical and technological context of the Internet's evolution from traditional to dynamic, social and semantic, and then towards this ecosystem of connected objects. The evolution of concepts surrounding the Internet of Things is explored via real-life examples of connected objects; both those used for specific functions and for more general everyday objects. Numerous issues associated with these new technological and digital transformations in a "hyperconnected" world, as well as the impact of the massive influx of connected objects, are discussed. The crucial questions of potential intrusion into the private lives of users as well that of security are then studied.Table of ContentsIntroduction xi Chapter 1 The IoT: Intrusive or Indispensable Objects? 1Nasreddine BOUHAÏ 1.1 Introduction 1 1.2 The age of miniaturization and technological progress 2 1.3 The history of a digital ecosystem 3 1.4 Internet of Things, which definition? 5 1.5 The security of connected objects: the risks and the challenges 5 1.6 Protocols, standards and compatibility: toward a technological convergence 6 1.6.1 The origins of some norms and standards 7 1.7 Humanity, intelligence and technologies 9 1.7.1 Crowdfunding as an aid to innovation 9 1.7.2 Participatory environmental sensors and citizens 10 1.7.3 When digital art goes into connected mode 12 1.7.4 Home automation for a connected and communicating habitat 13 1.7.5 Connected objects, a step toward the enhanced human 15 1.8 Conclusion 17 1.9 Bibliography 18 Chapter 2 The Ecosystem of the Internet of Things 21Ioan ROXIN and Aymeric BOUCHEREAU 2.1 Introduction 21 2.2 Context, convergences and definition 22 2.2.1 The Internet Toaster or the first connected object in history 22 2.2.2 From the Internet of computers… 23 2.2.3 … to the Internet of objects 38 2.3 Conclusion 47 2.4 Bibliography 48 Chapter 3 Introduction to the Technologies of the Ecosystem of the Internet of Things 51Ioan ROXIN and Aymeric BOUCHEREAU 3.1 Architectures recommended by the Internet Architecture Board 52 3.1.1 Communication between objects 52 3.1.2 Communication from objects to the Cloud 53 3.1.3 Communication from objects to a gateway 54 3.1.4 From objects to back-end data sharing 55 3.2 Three-tier architecture 56 3.2.1 Layered architecture 57 3.3 Steps and technologies in the ecosystem of the IoT 59 3.3.1 Identifying 62 3.3.2 Capturing 64 3.3.3 Connecting 65 3.3.4 Integrating 68 3.3.5 Networking 79 3.4 Opportunities and threats in the IoT ecosystem 82 3.4.1 Opportunities 82 3.4.2 Threats 87 3.5 Conclusion 90 3.6 Bibliography 91 Chapter 4 Toward a Methodology of IoT-a: Embedded Agents for the Internet of Things 97Valérie RENAULT and Florent CARLIER 4.1 Introduction 97 4.2 Multi-agent simulations, ambient intelligence and the Internet of Things 98 4.3 Triskell3S: an architecture of embedded agent-oriented inter-actions 102 4.4 Transposition of the formalization of agent-oriented interaction to connected objects 103 4.5 Formalization 106 4.6 Experimentation and perspectives 110 4.7 Bibliography 112 Chapter 5 The Visualization of Information of the Internet of Things 117Adilson Luiz PINTO, Audilio GONZALES-AGUILAR, Moisés LIMA DUTRA, Alexandre RIBAS SEMELER, Marta DENISCZWICZ and Carole CLOSEL 5.1 Introduction 117 5.2 Internet of Things 120 5.3 InfoVis and DataVis in the Internet of Things 123 5.3.1 Visual analytics in the context of the Internet of Things 125 5.4 Analytical visualization in the context of the Internet of Things 130 5.5 Conclusion: the relevance of the use of visualization in the Internet of Things 134 5.6 Bibliography 135 Chapter 6 The Quantified Self and Mobile Health Applications: From Information and Communication Sciences to Social Innovation by Design 139Marie-Julie CATOIR-BRISSON 6.1 Introduction 139 6.2 The evolution of interfaces and connected objects toward anthropotechnics 141 6.2.1 From e-health to the “Quantified Self” 141 6.2.2 Anthropotechnics and the information ecosystem of Chris Dancy 143 6.2.3 Connected objects as the heirs of ubiquitous computing 145 6.3 Factitive dimension and value system at the heart of Chris Dancy’s relationship with his information technology 146 6.3.1 The progressive development of the figure of the enhanced human in socio-digital networks 146 6.3.2 Information design and data-visualization: the case of Fitbit and Existence 147 6.3.3 Animism and anthropomorphism: a particular relationship to connected objects 148 6.4 Critical perspective and avenues for reflection for reconsidering the use of connected objects and mobile applications in the field of health 153 6.4.1 Ethical and social issues related to data governance 153 6.4.2 The doctor-patient relationship transformed by connected objects and mobile health applications 156 6.4.3 The necessity of considering the point of view of doctors and healthcare professionals 158 6.4.4 Envisaging other paths for m-health technologies based on the anthropology of communication and social innovation by design 160 6.5 Conclusion 164 6.6 Bibliography 165 Chapter 7 Tweets from Fukushima: Connected Sensors and Social Media for Dissemination after a Nuclear Accident 169Antonin SEGAULT, Frederico TAJARIOL and Ioan ROXIN 7.1 Introduction 169 7.2 The IoT: a shift in the development of digital services 170 7.3 Social media and the dissemination of information during a catastrophe 172 7.4 Context of the study 174 7.5 Goals of our study 177 7.6 Methodology 177 7.7 Results 178 7.7.1 Comprehensive overview 179 7.7.2 Popularity of bots 179 7.7.3 Completeness of the shared measurements 180 7.7.4 Source of the measurements shared 181 7.8 Discussions 182 7.9 Conclusions 183 7.10 Acknowledgements 184 7.11 Bibliography 184 Chapter 8 Connected Objects: Transparency Back in Play 189Florent DI BARTOLO 8.1 Introduction 189 8.2 Sensitive objects 190 8.3 The myth of transparency 195 8.4 Transparency of interfaces and opacity of processes 200 8.5 Conclusion 207 8.6 Bibliography 208 Chapter 9 Status of the Body within the Internet of Things: Revolution or Evolution? 211Evelyne LOMBARDO and Christophe GUION 9.1 Introduction 211 9.2 Presence and absence of the body in the field of sports and e-health 212 9.3 The traceability of the body or the integration of data by a digital coach 212 9.4 The IoT creates a flow of information around the body: a present, readable and traceable cluster 213 9.5 The body in interaction: sharing Clouds to inform the informational environment 215 9.6 Clouds, persistence and trust: a mapped body without the right to be forgotten 216 9.7 The body, an object communicating between hyper-control and non-control 217 9.8 Conclusion 218 9.9 Bibliography 219 List of Authors 221 Index 223

    Out of stock

    £125.06

  • Technologies and African Societies in Pandemic

    ISTE Ltd and John Wiley & Sons Inc Technologies and African Societies in Pandemic

    Out of stock

    Book SynopsisIn February 2020, the Coronavirus pandemic became a worldwide health emergency, and in April of that year, the ITU and the WHO created a joint declaration to show their commitment to using ICTs to overcome the pandemic. Technologies and African Societies in Pandemic Times explores the impact of Covid-19 on African societies in North and West Africa through the lens of technology and social media. The authors of this book highlight how everyday people dealt with the pandemic from its onset, through the process of the development of the vaccine and to its eventual dissemination. This book tells stories of survival, of coping and, eventually, of economically thriving. The authors also describe how, in this extremely challenging moment for humanity, people used music, art and social media to reinvent the community, to share joy and pain and to try to remain connected.Table of ContentsForeword xi Mohamed SALIOU CAMARA Introduction xv Jean-Jacques Maomra BOGUI and Nanga Désiré COULIBALY Part 1 Covid-19, Information, and Communication 1 Chapter 1 Reinventing Everyday Life in the Covid-19 Era: The Uses of Information and Communication Technologies as Tactics in an Abidjanese “Ordinary Courtyard” 3 Youssouf SOUMAHORO 1.1 Introduction 3 1.1.1 Context and positioning of the research problem 3 1.1.2 Field and methods 5 1.2 Results 6 1.2.1 Social relational uses 6 1.2.2 Hedonic and playful uses 8 1.2.3 Emerging from the inactivity brought about by the pandemic 9 1.2.4 Uses for information retrieval and educational purposes 10 1.3 Conclusion 12 1.4 References 13 Chapter 2 Ambivalence of the Use of Digital Technologies in Public Communication About the Pandemic in Côte d’Ivoire 15 Nanga Désiré COULIBALY 2.1 Introduction: Ivorian context of digital technology use in the Covid-19 period 15 2.1.1 Literature and defining the Covid-19 problem in the Ivorian context 17 2.1.2 Objectives and research questions 18 2.2 Conceptualization of the social uses of technology in public communication 19 2.3 Collection and method for analyzing ambivalent uses of digital social media in the face of Covid-19 in Côte d’Ivoire 21 2.4 Digital social media, a popular source of information about the pandemic and a source of rumors and miscommunication 22 2.4.1 Digital social media, the preferred source of information 22 2.4.2 Rumors and fake news on digital social media, a remedy for miscommunication 26 2.5 Conclusion: understanding the ambivalence of digital social media use in times of Covid-19 27 2.6 References 30 Chapter 3 Fake News and Anti-Covid-19 Vaccines: Analysis of Facebook Users in Burkina Faso 33 Marcel BAGARE 3.1 Introduction 33 3.2 Methodology 36 3.3 The profiles of Facebook users and their content 37 3.4 Fake news in the representation of vaccine risks 43 3.4.1 The Covid-19 vaccine makes women infertile 44 3.4.2 Covid vaccines cause neurodegenerative diseases 46 3.4.3 Bill Gates and his geo-tagged vaccine against Covid 47 3.5 Facebook users confront the vaccine communication strategy and fake news 49 3.6 Conclusion 52 3.7 References 53 Part 2 Covid, Art and Culture 59 Chapter 4 Covid-19 Crisis and Musical Creation for Public Awareness in Africa 61 Julien ATCHOUA 4.1 Introduction: musical creation for prevention 61 4.1.1 Music as a support mechanism and collective commitment 61 4.1.2 Covid-19, a reality in Africa 62 4.1.3 The fundamental questions 64 4.2 Musical information and the Covid-19 crisis in Africa: collecting and deciphering content 65 4.2.1 Objective of the approach 65 4.2.2 Review and analysis of the corpus 65 4.3 Musical works for health prevention 67 4.3.1 Health awareness and music creation in Africa 67 4.3.2 Music as a medium for raising health awareness 68 4.3.3 The issue of health governance in creating music 71 4.4 Conclusion 74 4.4.1 The Covid-19 crisis in Africa: a prevention emergency 74 4.4.2 Music as a communication medium for health 74 4.5 References 76 Chapter 5 Rethinking Theatrical Performances in the Covid-19 Era: Strategies and Perspectives 79 Losséni FANNY 5.1 Introduction 79 5.2 Brief status of Ivorian theatrical performances before Covid-19 81 5.2.1 The glory years of theatrical performances 81 5.2.2 Theatrical performances facing difficulties 82 5.3 The situation of theatrical performances during Covid-19 84 5.3.1 The negative effects of Covid-19 on theatrical performances 84 5.3.2 Positive effects of Covid-19 on theatrical performances 86 5.4 Theatrical representations: resilience and resistance 88 5.4.1 Theatrical performances as a source of social resilience during Covid-19 88 5.4.2 Prospects for theater in situations of a health crisis 91 5.5 Conclusion 92 5.6 References 93 Chapter 6 Tourism and the Pandemic: How to be Resilient and Creative Thanks to NICTs Case study: Aloha Surf Camp in Morocco 95 Hanane MABROUK and John VAN DEN PLAS 6.1 Introduction 95 6.2 Research methodology 97 6.2.1 Field surveys using ethnographic and sociological methods 97 6.2.2 Research scope 99 6.3 Some geographical, economical and cultural notions of Moroccan surf tourism 100 6.3.1 Tourism in Morocco 101 6.3.2 The Bay of Taghazout: a flagship destination for “surf” and “luxury” tourism 101 6.3.3 Cultural diversity 102 6.3.4 Surf camps 103 6.4 Conceptual framework 105 6.4.1 Tourism and social networks 105 6.4.2 Digital nomadism 106 6.5 Results and discussions 108 6.5.1 Case study: Aloha surf camp 108 6.5.2 The surf camp 108 6.5.3 Crisis management: between resilience and innovation 110 6.5.4 From surfing tourists to nomadic artists 110 6.5.5 Perspectives for “Aloha” projects 111 6.6 Conclusion 112 6.7 References 113 Part 3 Business, Education and Covid 115 Chapter 7 Digital Technologies to Support Learning in the University Environment During the Pandemic at UFHB: From Hope to Disillusionment 117 Jean-Jacques Maomra BOGUI 7.1 Introduction 117 7.2 Digital technologies to support training in the university environment 119 7.3 Difficulties when appropriating ICTs within academic institutions in Africa 120 7.4. Improved access to ICTs, the digital divide in secondary education 121 7.5 The Covid-19 pandemic as a catalyst for the integration of ICTs into pedagogy and learning in the university setting 122 7.6 Methodology: meeting the students 124 7.7 Focus group characteristics 125 7.8 Smartphones, the students’ tool of choice 125 7.9 UFHB students’ perception of online learning 126 7.10 Pedagogy and experience of online courses 126 7.11 DSIC student critiques of the online training experience 127 7.12 Student suggestions for improving the organization of online courses 127 7.13 Discussion of the survey results 128 7.14 Conclusion 129 7.15 References 129 Chapter 8 The Use of ICT by Students of the University Ibn Zohr During Covid-19: Uses and Representations 133 Abderrahmane AMSIDDER, Samar CHAKHRATI and Semaya EL BOUTOULY 8.1 Introduction 133 8.2 Contextualization 134 8.3 Objective 134 8.4 Issue 134 8.5 Theoretical framework 135 8.6 Methodology and presentation of the tool 136 8.6.1 Sample 136 8.6.2 Questionnaire 136 8.7 Results and discussion 137 8.7.1 Some results related to the use and representations of ICT among students 138 8.7.2 Interpreting the survey results 142 8.8 Conclusion 142 8.9 References 144 Chapter 9 Digital Communication for the Continuity of Socioeconomic Activities in Times of Covid-19 in Côte d’Ivoire: An Inventory of the Uses of ICTs 147 Bassémory KONÉ 9.1 Introduction 147 9.2 Key theories 149 9.3 Method 150 9.4 The deployment of digital communication for socioeconomic activities 150 9.4.1 Political-administrative activities in times of Covid-19 151 9.4.2 Digital technology at the service of companies 152 9.4.3 Online courses in the education/training sector 153 9.4.4 Religious services 155 9.4.5 Identified obstacles 156 9.5 Recommendations to better adapt digital communication to managerial approaches 157 9.5.1 A greater commitment from the state 157 9.5.2 Greater involvement of civil society 157 9.6 Conclusion 158 9.7 References 158 List of Authors 161 Index 163

    Out of stock

    £118.80

  • Software Networks: Virtualization, SDN, 5G, and

    ISTE Ltd and John Wiley & Sons Inc Software Networks: Virtualization, SDN, 5G, and

    Out of stock

    Book SynopsisSoftware Networks describe new concepts for the Internet�s next generation. This architecture is based on virtual networking using Cloud and datacenter facilities. The main problems to be dealt with are the placement of virtual resources for opening a new network on the fly, and the urbanization of virtual resources implemented on physical network equipment. The digital architecture also deals with mechanisms capable of automatically controlling the placement of all virtual resources within the physical network. This book describes how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of virtual resource (e.g. switches, routers, LSRs, optical paths, firewalls, SIP-based servers, devices, servers, access points, etc.). Software Networks shows how this architecture is compatible with new advances in SDN (Software Defined Networking), new high-speed transport protocols such as TRILL (Transparent Interconnection of Lots of Links) and LISP (Locator/Identifier Separation Protocol), NGN, IMS, new generation Wi-Fi, and 4G/5G networks. Finally, the author introduces Clouds of security and the virtualization of secure elements (smartcards) that could certainly transform how to secure the Internet. For this second edition, the author addresses in five new chapters the importance of open source software for networks, mobile edge computing, fog networking, tactile internet – a network environment allowing remote access, and security – the use of Cloud of security, secure elements and the emergence of the blockchain.Table of ContentsIntroduction xi Chapter 1. Virtualization 1 1.1. Software networks 4 1.2. Hypervisors and containers 6 1.3. Kubernetes 8 1.4. Software networks 9 1.5. Virtual devices 11 1.6. Conclusion 12 Chapter 2. SDN (Software-Defined Networking) 13 2.1. The objective 14 2.2. The ONF architecture 16 2.3. NFV (Network Functions Virtualization) 21 2.4. OPNFV 23 2.5. Southbound interface 23 2.6. The controller 25 2.7. Northbound interface 26 2.8. Application layer 27 2.9. Urbanization 28 2.10. Conclusion 30 Chapter 3. Fabric, SD-WAN, vCPE, vRAN, vEPC 33 3.1. Fabrics control 33 3.2. NSX and VMware company 35 3.2.1. CISCO ACI (Application Centric Infrastructure) 39 3.2.2. OpenContrail and Juniper 40 3.2.3. Brocade 42 3.2.4. Nokia’s SDN architecture 43 3.3. SD-WAN 43 3.4. vCPE 47 3.5. vRAN 48 3.6. vEPC 49 Chapter 4. Open Source Software for Networks 51 4.1. Open source software 51 4.2. Open Compute Project (OCP) 53 4.3. OPNFV 54 4.4. ONAP (Open Network Automation Protocol) 61 4.5. Open vSwitch 64 4.6. OpenDaylight platform 65 4.7. FD.io 66 4.8. PNDA 67 4.9. SNAS 68 Chapter 5. MEC 69 5.1. eNodeB and gNodeB virtualization 70 5.2. C-RAN 74 Chapter 6. Fog Networking 79 6.1. Fog architectures 79 6.2. Fog controllers 82 6.3. Fog and the Internet of Things 86 6.4. Conclusion on the Fog solution 87 Chapter 7. Skin Networking 89 7.1. Skin networking architecture 89 7.2. Virtual access points 90 7.3. Software LANs 92 7.4. Participatory Internet 94 7.5. Conclusion 96 Chapter 8. Software Network Automation 97 8.1. Automation of the implementation of software networks 97 8.2. Management of a complex environment 99 8.3. Multi-agent systems 101 8.4. Reactive agent systems 105 8.5. Active, programmable and autonomous networks 107 8.6. Autonomic networks 109 8.7. Conclusion 113 Chapter 9. New-generation Protocols 115 9.1. OpenFlow 117 9.2. VXLAN 123 9.3. NVGRE 124 9.4. MEF Ethernet 125 9.5. Carrier-Grade Ethernet 126 9.6. TRILL (Transparent Interconnection of a Lot of Links) 129 9.7. LISP (Locator/Identifier Separation Protocol) 131 9.8. Conclusion 132 Chapter 10. Mobile Cloud Networking, the Mobile Cloud and Mobility Control 133 10.1. Mobile Cloud Networking 133 10.2. Mobile Cloud 137 10.3. Mobility control 139 10.4. Mobility protocols 143 10.4.1. Mobile IP or MIP 144 10.4.2. Solutions for micromobility 145 10.5. Multihoming 146 10.6. Network-level multihoming 148 10.6.1. HIP (Host Identity Protocol) 149 10.6.2. SHIM6 (Level 3 Multihoming Shim Protocol for IPv6) 150 10.6.3. mCoA (Multiple Care-of-Addresses) in Mobile IPv6 151 10.7. Transport-level multihoming 153 10.7.1. SCTP (Stream Control Transmission Protocol) 153 10.7.2. CMT (Concurrent Multipath Transfer) 157 10.7.3. MPTCP (Multipath TCP) 159 10.8. Conclusion 160 Chapter 11. Wi-Fi and 5G 161 11.1. 3GPP and IEEE 162 11.2. New-generation Wi-Fi 163 11.2.1. Wi-Fi 5 (IEEE 802.11ac) 164 11.2.2. IEEE 802.11ad 166 11.2.3. IEEE 802.11af 167 11.2.4. Halow (IEEE 802.11ah) 168 11.2.5. Wi-Fi 6 (IEEE 802.11ax) and super WiGig (IEEE 802.11ay) 169 11.3. Small cells 170 11.3.1. Femtocells 171 11.3.2. Hotspots 174 11.3.3. Wi-Fi Passpoint 175 11.3.4. Virtualization of Wi-Fi and HNB 179 11.3.5. Backhaul networks 182 11.4. Software radio and radio virtual machine 184 11.5. 5G 185 11.5.1. 5G radio 189 11.5.2. The core network 192 11.5.3. C-RAN 193 Chapter 12. The Internet of Things 197 12.1. Sensor networks 198 12.2. RFID 200 12.3. NFC (Near-Field Communication) 204 12.4. NFC contactless payment 206 12.5. HIP (Host Identity Protocol) 207 12.6. Healthcare Internet 207 12.7. Case study: the smart city 210 12.8. Conclusion 213 Chapter 13. Vehicular Networks 215 13.1. 5G 217 13.2. 5G standardization 220 13.2.1. 5G vehicular networks 220 13.2.2. Technological presentation of C-V2X 222 13.3. VLC 224 13.4. Conclusion 226 Chapter 14. Tactile Internet 227 14.1. Tactile internet applications 227 14.2. Functionalities required for the tactile internet 229 14.3. Technical specifications for 5G 232 14.4. Tactile internet in Industry 4.0 234 14.5. Conclusion on tactile internet 235 Chapter 15. Security 237 15.1. Secure element 239 15.2. Secure elements-based solution 242 15.2.1. Virtual secure elements 242 15.2.2. The TEE (Trusted Execution Environment) 244 15.2.3. TSM 245 15.2.4. Solution without a TSM 249 15.2.5. HCE 250 15.2.6. Securing solutions 250 15.3. The blockchain 256 15.4. Conclusion 257 Chapter 16. Concretization and Morphware Networks 259 16.1. Accelerators 260 16.2. A reconfigurable microprocessor 261 16.3. Morphware networks 266 16.4. Conclusion 268 Conclusion 269 References 271 Index 273

    Out of stock

    £125.06

  • Security and its Challenges in the 21st Century

    ISTE Ltd and John Wiley & Sons Inc Security and its Challenges in the 21st Century

    Out of stock

    Book SynopsisBy the year 2000, a balance was sought between security requirements and a respect for privacy, as well as for individual and collective freedoms. As we progress further into the 21st century, however, security is taking precedence within an increasingly controlled society.This shift is due to advances in innovative technologies and the investments made by commercial companies to drive constant technological progress. Despite the implementation of the General Data Protection Regulation (GDPR) within the EU in 2018 or 2020’s California Consumer Privacy Act (CCPA), regulatory bodies do not have the ability to fully manage the consequences presented by emerging technologies. Security and Its Challenges in the 21st Century provides students and researchers with an international legal and geopolitical analysis; it is also intended for those interested in societal development, artificial intelligence, smart cities and quantum cryptology.Table of ContentsIntroduction ix Chapter 1 Security: Actors and Rights 1 1.1 Numerous actors 1 1.1.1 Nation-states 1 1.1.2 Multinationals 3 1.1.3 The GAFAM 9 1.2 Rights and security 10 1.2.1 The law of armed conflict 10 1.2.2 Environmental law 16 Chapter 2 Interceptions 25 2.1 International interceptions 25 2.1.1 Interceptions in the 20th century 25 2.1.2 Interceptions in the 21st century 27 2.2 Interceptions in France 37 2.2.1 The 1991 law 38 2.2.2 The law of March 9, 2004 41 2.2.3 The 2015 Intelligence Act 42 2.2.4 Reform of the code of criminal procedure 52 Chapter 3 Geolocation and Video Protection 59 3.1 International standards for both geolocation and video protection/video surveillance 59 3.1.1 Comparative legal issues in the era of geolocalization 59 3.1.2 Belgian legislation on geolocation 61 3.1.3 Video surveillance/video protection 63 3.2 France 67 3.2.1 The legislative and regulatory framework 67 3.2.2 The case law just before the LOPPSI 2 and the Jean-Marc Philippe establishments 69 3.2.3 The entry into force of the LOPPSI 2 74 3.2.4 Jurisprudence after LOPPSI 2 74 3.2.5 Video protection and terrorism 88 Chapter 4 Biometrics or “the Second Circle” 89 4.1 Biometrics and international law 90 4.1.1 The United States: a historical outline 90 4.1.2 Standardization 93 4.1.3 The European Union and biometrics 94 4.2 France 98 4.2.1 Visa control 98 4.2.2 Passports 99 4.2.3 The TES database 101 4.2.4 Setting up Alicem 117 4.3 Facial recognition at the heart of globalization 119 Chapter 5 Personal Data in the United States and Europe 121 5.1 The United States and the protection of personal data in the European Union: Directive 95/46 122 5.1.1 Sensitive data 122 5.1.2 The right of access 123 5.1.3 Security 123 5.1.4 The directive of December 15, 1997, followed by the directive of July 12, 2002 and supplemented by the directive of November 25, 2009 124 5.1.5 Geolocalization 125 5.1.6 Cookies 125 5.2 The GDPR 126 5.2.1 Consent 127 5.2.2 Metadata and the “Privacy” bill 134 5.3 Cloud computing 138 5.3.1 Definition 138 5.3.2 The Safe Harbor Principles agreement 139 5.3.3 Privacy Shields 140 5.3.4 Two models 140 Chapter 6 Cybersecurity and Privacy 145 6.1 Cybersecurity itself 146 6.1.1 Cybersecurity in the United States 146 6.1.2 Cybersecurity in China 147 6.1.3 Cybersecurity in Japan 147 6.1.4 Cybersecurity and the European Union 148 6.1.5 Cybersecurity in the United Kingdom 149 6.1.6 Cybersecurity in France 149 6.1.7 The dangers of cyber-attacks 151 6.1.8 Two interesting cases 154 6.2 Cybersecurity and cryptology 158 6.2.1 Cryptology: the science of secrecy 158 6.2.2 Risks 161 6.3 PNR data 164 6.3.1 Element of definition 164 6.3.2 PNR data and nation-states 166 6.4 Smart cities 179 6.4.1 The development of standardization and certification 181 6.4.2 Strategies and CSIRTs 182 Chapter 7 Security Instruments in Texts Relating to Terrorism 185 7.1 Security instruments 185 7.1.1 The millimeter-wave scanner 185 7.1.2 The body camera 196 7.1.3 UAVs: a dual use – military and civilian 202 7.2 Standards in relation to terrorism 208 7.2.1 The law of 2014 209 7.2.2 The law strengthening internal security and the fight against terrorism 219 Chapter 8 Security and Democracy 225 8.1 Fake news 226 8.1.1 The definition 227 8.1.2 Obligations 227 8.2 Hate speech 237 8.2.1 The report 237 8.2.2 The proposed new mechanism 239 Conclusion 245 References 249 Index 251

    Out of stock

    £124.15

  • From Logistic Networks to Social Networks:

    ISTE Ltd and John Wiley & Sons Inc From Logistic Networks to Social Networks:

    Out of stock

    Book SynopsisAs a result of its widespread implementation in economic and social structures, the network concept appears to be a paradigm of the contemporary world. The need for various services – transport, energy, consumption of manufacturing goods, provision of care, information and communication, etc. – draws users into interwoven networks which are meshes of material and immaterial flows. In this context, the user is a consumer of goods and services from industries and administrations, or they themselves are part of the organization (digital social networks).This book examines the invariants that unify networks in their diversity, as well as the specificities that differentiate them. It provides a reading grid that distinguishes a generic level where these systems find a common interpretation, and a specific level where appropriate analytical methods are used. Three case studies from different fields are presented to illustrate the purpose of the book in detail.Table of ContentsForeword ix Introduction xi Part 1. Network Variety and Modeling 1 Chapter 1. Network Typology 3 1.1. Introduction 3 1.1.1. Network description levels 3 1.1.2. Network, graph and flow 4 1.1.3. Shared or dedicated infrastructure 5 1.1.4. User inclusion 6 1.2. The principal networks 6 1.2.1. (Human) transport networks 6 1.2.2. (Goods) distribution and collection networks 7 1.2.3. Dedicated distribution and collection networks (of fluids and energy) 8 1.2.4. IT networks 9 1.2.5. Communication networks 9 1.2.6. Social and digital social networks 10 1.3. Characterization and typology of networks 11 1.3.1. Key characteristics 11 1.3.2. Network integration 12 1.3.3. Typology 13 1.4. Engineering issues 16 1.5. Performance indicators, evaluation, optimization 18 1.5.1. Performance indicators 18 1.5.2. Evaluation and optimization 20 1.6. Conclusion 23 Chapter 2. Modeling Discrete Flow Networks 25 2.1. Introduction 25 2.2. Structure 28 2.3. Characterization of a discrete flow 30 2.3.1. Statistical description 30 2.3.2. Probabilistic description 32 2.4. Activities 32 2.5. Control system 37 2.6. Resources 40 2.7. Fluid kinematics 41 2.7.1. Flow/resource/decision synchronization 42 2.7.2. Congestion phenomenon 48 2.7.3. Dissemination of information in social networks 51 2.8. Formalisms for modeling flows in a network 52 2.8.1. BPM tools 53 2.8.2. Timed Petri nets 53 2.8.3. Flow networks 54 2.8.4. Queuing networks 55 2.9. Multi-modeling 57 2.9.1. Multi-formalism versus mono-formalism 57 2.9.2. The DEVS hierarchical model 60 2.9.3. Multi-layer networks 62 2.10. Conclusion 64 Part 2. Network Analysis Methods and Applications 67 Chapter 3. Exact Methods Applied to the Flow Analysis of Topological Networks 69 3.1. Introduction 69 3.2. Additive flow networks – deterministic modelling by flow networks 71 3.2.1. Two-terminal series–parallel graph 72 3.2.2. General case – max-flow/min-cut 74 3.3. Additive flow networks – stochastic modelling by queuing networks 76 3.4. Synchronized flow networks – modeling by timed event graphs 81 3.4.1. Steady-state analysis of timed event graphs 81 3.4.2. Example of application: sizing a flow-shop 83 3.5. Conclusion 88 Chapter 4. Simulation Techniques Applied to the Analysis of Sociological Networks 91 4.1. Introduction 91 4.2. Simulation techniques 92 4.2.1. Discrete event simulation (worldviews) 94 4.2.2. DEVS formalism 96 4.2.3. Coupling simulation/resolutive methods 100 4.2.4. Distributed simulation 102 4.2.5. Architectural solutions 103 4.2.6. Time management and synchronization 104 4.2.7. Pessimistic approach 104 4.2.8. Optimistic approach 105 4.2.9. HLA 106 4.2.10. Cosimulation 107 4.2.11. FMI/FMU 108 4.2.12. FMI/FMU and HLA coupling 109 4.3. Simulation of flows in sociological networks 110 4.3.1. Behavioral simulation based on DEVS formalism 111 4.3.2. Application study 113 4.4. Conclusion 116 Part 3. Case Studies 119 Chapter 5. Smart Grid 121 5.1. Summary of the study 122 5.2. Demand profile 122 5.3. Solar power station, fuel station and regional import 123 5.4. Hydroelectric power station and PHES 123 5.5. Operational issues 124 5.6. Model 125 5.6.1. Decision variables 125 5.6.2. Constraints 126 5.6.3. Objective function 127 5.7. Optimization results 128 Chapter 6. Forestry Logistics 131 6.1. Summary of the study 132 6.2. Forest timber supply problem 132 6.3. Tactical planning model 134 6.4. Logistics benchmarking 136 6.4.1. AS IS scenario (non-collaborative logistics) 136 6.4.2. TO BE scenario (collaborative logistics) 137 6.4.3. Results 138 6.5. Conclusion 139 Chapter 7. Multi-layered Digital Social Networks 143 7.1. Summary of the study 144 7.2. Digital social networks 144 7.3. Studying digital social networks via an interview broadcast 145 7.3.1. Pre-interview social network scenario 146 7.3.2. Social network audience 148 7.4. Modeling and simulation 148 7.4.1. Modeling the interview production and broadcast processes 148 7.4.2. MSN/HLA simulation architecture 149 7.5. Simulation results 152 7.6. Conclusion and perspectives 154 References 157 Index 167

    Out of stock

    £112.50

  • Software-Defined Networking 2: Extending SDN

    ISTE Ltd and John Wiley & Sons Inc Software-Defined Networking 2: Extending SDN

    Out of stock

    Book SynopsisThis book reviews the concept of Software-Defined Networking (SDN) by studying the SDN architecture. It provides a detailed analysis of state-of-the-art distributed SDN controller platforms by assessing their advantages and drawbacks and classifying them in novel ways according to various criteria. Additionally, a thorough examination of the major challenges of existing distributed SDN controllers is provided along with insights into emerging and future trends in that area. Decentralization challenges in large-scale networks are tackled using three novel approaches, applied to the SDN control plane presented in the book. The first approach addresses the SDN controller placement optimization problem in large-scale IoT-like networks by proposing novel scalability and reliability aware controller placement strategies. The second and third approaches tackle the knowledge sharing problem between the distributed controllers by suggesting adaptive multilevel consistency models following the concept of continuous Quorum-based consistency. These approaches have been validated using different SDN applications, developed from real-world SDN controllers.Table of ContentsAcronyms ix Preface xiii Introduction xvii Chapter 1 Toward a Decentralized SDN Control Architecture: Overview and Taxonomy 1 1.1. Introduction 1 1.2. Software-defined networking: a centralized control architecture 2 1.2.1. Conventional networking and the SDN paradigm 2 1.2.2. The SDN architecture 3 1.3. Physical classification of existing SDN control plane architectures 8 1.3.1. Physically centralized SDN control 8 1.3.2. Physically distributed SDN control 11 1.4. Logical classification of existing SDN control plane architectures 16 1.4.1. Logically centralized SDN control 17 1.4.2. Logically distributed SDN control 22 1.5. Conclusion 26 Chapter 2. Decentralized SDN Control: Major Open Challenges 27 2.1. Introduction 27 2.2. Scalability 28 2.2.1. Data plane extensions 30 2.2.2. Control plane distribution 32 2.3. Reliability 33 2.3.1. Control state redundancy 33 2.3.2. Controller failover 34 2.4. Controller state consistency 35 2.4.1. Static consistency 36 2.4.2. Adaptive multi-level consistency 37 2.5. Interoperability 38 2.5.1. Interoperability between the SDN controllers 38 2.5.2. SDN interoperability with legacy networks 38 2.6. Other challenges 39 2.7. Conclusion 40 Chapter 3 Scalability and Reliability Aware SDN Controller Placement Strategies 41 3.1. Introduction 41 3.2. Related work 42 3.3. The SDN controller placement optimization problem 44 3.3.1. Problem statement 44 3.3.2. Problem formulation 45 3.3.3. Placement metrics 45 3.4. The proposed SDN controller placement scheme 49 3.4.1. The adopted approach 49 3.4.2. Multi-criteria placement algorithms 50 3.4.3. Gradual strategies 52 3.5. Performance evaluation 53 3.5.1. Simulation settings 53 3.5.2. Simulation results 54 3.6. Discussion 60 3.7. Conclusion 62 Chapter 4 Adaptive and Continuous Consistency for Distributed SDN Controllers: Anti-Entropy Reconciliation Mechanism 65 4.1. Introduction 65 4.2. Related work 66 4.3. The consistency problem in SDN 68 4.3.1. Consistency trade-offs in SDN 68 4.3.2. Consistency models in SDN 69 4.4. Consistency models in ONOS 70 4.4.1. Strong consistency in ONOS 70 4.4.2. Eventual consistency in ONOS 71 4.5. The proposed adaptive consistency for ONOS 72 4.5.1. A continuous consistency model for ONOS 72 4.5.2. Our consistency adaptation strategy for ONOS 74 4.5.3. Our implementation approach 74 4.6. Performance evaluation 76 4.6.1. Experimental setup 76 4.6.2. Results 76 4.7. Conclusion 79 Chapter 5 Adaptive and Continuous Consistency for Distributed SDN Controllers: Quorum-Based Replication 81 5.1. Introduction 81 5.2. Background on eventual consistency in distributed data stores 83 5.2.1. Consistency and performance metrics 83 5.2.2. Adaptive consistency control 84 5.2.3. Existing modern tunable consistency systems 84 5.3. The proposed adaptive Quorum-inspired consistency for ONOS 86 5.3.1. A continuous consistency model for ONOS 86 5.3.2. Our Quorum-inspired consistency adaptation strategy for ONOS 87 5.4. Implementation approach on ONOS 93 5.4.1. Design of a CDN-like application 93 5.4.2. State synchronization and content distribution 94 5.4.3. Content delivery to customers 95 5.5. Performance evaluation 97 5.5.1. Application-specific performance and consistency metrics 97 5.5.2. Experimental setup 98 5.5.3. Results 103 5.6. Conclusion 112 Conclusions and Perspectives 115 C.1. Summary of contributions 115 C.2. Perspectives and future work 117 References 121 Index 139

    Out of stock

    £112.50

  • Troubleshooting for Network Operators: The Road

    ISTE Ltd and John Wiley & Sons Inc Troubleshooting for Network Operators: The Road

    Out of stock

    Book SynopsisNowadays, the Internet is becoming more and more complex due to an everincreasing number of network devices, various multimedia services and a prevalence of encrypted traffic. Therefore, in this context, this book presents a novel efficient multi modular troubleshooting architecture to overcome limitations related to encrypted traffic and high time complexity. This architecture contains five main modules: data collection, anomaly detection, temporary remediation, root cause analysis and definitive remediation. In data collection, there are two sub modules: parameter measurement and traffic classification. This architecture is implemented and validated in a software-defined networking (SDN) environment.Table of ContentsPreface ix Introduction xi Chapter 1 State of the Art on Network Troubleshooting 1 1.1 Network troubleshooting 1 1.1.1 State of the art 2 1.1.2 Traditional troubleshooting architecture 9 1.2 Background on encryption protocols 10 1.2.1 QUIC 11 1.2.2 Other protocols 16 1.3 Drawbacks of troubleshooting with encrypted traffic 18 1.3.1 Network performance monitoring 18 1.3.2 Intrusion detection system 20 1.4 Conclusion 22 Chapter 2 Novel Global Troubleshooting Framework for Encrypted Traffic 25 2.1 Novel network troubleshooting architecture for encrypted traffic 25 2.2 Proof of concept of novel troubleshooting architecture in SDN 28 2.3 Data collection 32 2.3.1 Data classification 32 2.3.2 Monitoring tools 34 2.3.3 Parameter measurement 37 2.4 Troubleshooting dataset 40 2.4.1 Datasets for root cause analysis 40 2.4.2 Dataset for traffic classification 42 2.5 Conclusion 43 Chapter 3 Traffic Classification: Novel QUIC Traffic Classifier Based on Convolutional Neural Network 45 3.1 Introduction 45 3.2 Background 48 3.2.1 Convolutional network 48 3.2.2 Characteristics of QUIC-based applications 49 3.3 Traffic classification approaches 50 3.3.1 Port-based approaches 50 3.3.2 Payload-based approaches 51 3.3.3 Statistic-based approaches 51 3.3.4 DL-based approaches 52 3.4 Novel traffic classification method for QUIC traffic 53 3.4.1 Traffic collection 55 3.4.2 Flow-based features 55 3.4.3 Preprocessing 56 3.4.4 Novel traffic classification method 56 3.5 Experimental results 59 3.5.1 Dataset specification 59 3.5.2 Performance metrics 60 3.5.3 Performance analysis 61 3.6 Conclusion 65 Chapter 4 Anomaly Detection 67 4.1 Introduction 67 4.2 Anomaly detection approaches 68 4.2.1 Knowledge-based mechanisms 68 4.2.2 Rule inductions 69 4.2.3 Information theory 70 4.2.4 ML-based mechanisms 70 4.3 Anomaly detection approach using machine learning 71 4.3.1 ML-based anomaly detection method 72 4.3.2 Data collection and processing 74 4.4 Experimental results 75 4.4.1 Experimental setup 75 4.4.2 Performance analysis 76 4.5 Conclusion 79 Chapter 5 Temporary Remediation: SDN-based Application-aware Segment Routing for Large-scale Networks 81 5.1 Introduction 81 5.2 Application-aware routing mechanisms 84 5.2.1 Application-aware routing 84 5.2.2 Application-aware MPLS 86 5.2.3 Application-aware SR 86 5.3 Adaptive segment routing mechanism for encrypted traffic 87 5.3.1 Overview of the SDN-based adaptive segment routing framework 87 5.3.2 Network monitoring 89 5.3.3 Anomaly detection 90 5.3.4 Application-aware remediation 91 5.4 Experimental results 95 5.4.1 Experiment setup 95 5.4.2 Benchmark 97 5.4.3 Performance analysis 97 5.5 Conclusion 104 Chapter 6 Root Cause Analysis and Definitive Remediation 107 6.1 Root cause analysis: machine learning based root cause analysis for SDN network 107 6.1.1 Introduction 107 6.1.2 Root cause analysis mechanisms 109 6.1.3 ML-based RCA mechanism 111 6.1.4 Experimental results 114 6.1.5 Conclusion 119 6.2 Definitive remediation: adaptive QUIC BBR algorithm using reinforcement learning for dynamic networks 121 6.2.1 Introduction 121 6.2.2 Congestion control mechanisms 123 6.2.3 Adaptive BBR algorithm 126 6.2.4 Experimental results 128 6.2.5 Conclusion 133 Conclusions and Prospects 135 References 141 Index 159

    Out of stock

    £118.80

  • Python Network Programming Cookbook

    Packt Publishing Limited Python Network Programming Cookbook

    2 in stock

    Book SynopsisDiscover practical solutions for a wide range of real-world network programming tasksAbout This Book Solve real-world tasks in the area of network programming, system/networking administration, network monitoring, and more. Familiarize yourself with the fundamentals and functionalities of SDN Improve your skills to become the next-gen network engineer by learning the various facets of Python programmingWho This Book Is ForThis book is for network engineers, system/network administrators, network programmers, and even web application developers who want to solve everyday network-related problems. If you are a novice, you will develop an understanding of the concepts as you progress with this book. What You Will Learn Develop TCP/IP networking client/server applications Administer local machines' IPv4/IPv6 network interfaces Write multi-purpose efficient web clients for HTTP and HTTPS protocols Perform remote system administration tasks over Telnet and SSH connections Interact with popular websites via web services such as XML-RPC, SOAP, and REST APIs Monitor and analyze major common network security vulnerabilities Develop Software-Defined Networks with Ryu, OpenDaylight, Floodlight, ONOS, and POX Controllers Emulate simple and complex networks with Mininet and its extensions for network and systems emulations Learn to configure and build network systems and Virtual Network Functions (VNF) in heterogeneous deployment environments Explore various Python modules to program the InternetIn DetailPython Network Programming Cookbook - Second Edition highlights the major aspects of network programming in Python, starting from writing simple networking clients to developing and deploying complex Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) systems. It creates the building blocks for many practical web and networking applications that rely on various networking protocols. It presents the power and beauty of Python to solve numerous real-world tasks in the area of network programming, network and system administration, network monitoring, and web-application development. In this edition, you will also be introduced to network modelling to build your own cloud network. You will learn about the concepts and fundamentals of SDN and then extend your network with Mininet. Next, you'll find recipes on Authentication, Authorization, and Accounting (AAA) and open and proprietary SDN approaches and frameworks. You will also learn to configure the Linux Foundation networking ecosystem and deploy and automate your networks with Python in the cloud and the Internet scale. By the end of this book, you will be able to analyze your network security vulnerabilities using advanced network packet capture and analysis techniques. Style and approachThis book follows a practical approach and covers major aspects of network programming in Python. It provides hands-on recipes combined with short and concise explanations on code snippets. This book will serve as a supplementary material to develop hands-on skills in any academic course on network programming. This book further elaborates network softwarization, including Software-Defined Networking (SDN), Network Functions Virtualization (NFV), and orchestration. We learn to configure and deploy enterprise network platforms, develop applications on top of them with Python.

    2 in stock

    £39.99

  • Internet Oligopoly: The Corporate Takeover of Our

    Emerald Publishing Limited Internet Oligopoly: The Corporate Takeover of Our

    Out of stock

    Book SynopsisOver the last decade, the digital technologies in everyday life have multiplied. Our lives have been gradually taken over by digital devices, networks, and services. Although useful, they have also become invasive additions to our personal, professional and public lives. This process has occurred in a globalized and deregulated economy and a few US-based start-ups transformed into an oligopoly of multinationals that today govern the informational infrastructure of our societies. This book offers an analytical framework of the contemporary internet studied through the lens of history and political economy. Google, Apple, Facebook, Amazon and Microsoft are examined as emblematic products of a new capitalist order that is resolutely opposed to the original project of the internet. The author retraces the process of commodification that resulted in financial rationales taking over from collective and individual emancipation and uncovers how this internet oligopoly uses its exorbitant market power to eliminate competition; take advantage of global financialization to exploit human labour on a global scale and to avoid taxation; and how it implements strategies to control our communication methods for accessing information and content online, thus increasingly controlling the digital public sphere. The book reveals how the reshaping of society via private company business models impact on the place of work in future societies, social and economic inequalities, and, ultimately, democracy.Trade ReviewIn a critique of the digital political economy, information and communication scholar Smyrnaios traces how the Internet-and therefore much of people's lives-came under the control of five giant corporations-Google, Apple, Facebook, Amazon, and Microsoft. He covers the commodification of the Internet, the privatization of the Internet, the conditions leading to the emergence of the Internet oligarchy, the oligarchy's strategies for integration and info-mediation, and the advertising dominance of the Internet. -- Annotation ©2018 * (protoview.com) *Table of ContentsIntroduction Chapter 1. The Commodification of the Internet Chapter 2. The Privatisation of the Internet Chapter 3. The Conditions Leading to the Emergence of the Internet Oligopoly Chapter 4. The Oligopoly's Strategies for Integration and Infomediation Chapter 5. The Advertising Dominance of the Internet Conclusion

    Out of stock

    £46.54

  • Multimedia Security 1: Authentication and Data

    ISTE Ltd Multimedia Security 1: Authentication and Data

    Out of stock

    Book SynopsisToday, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics.It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today’s "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it.Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.Table of ContentsForeword by Gildas Avoine xi Foreword by Cédric Richard xiii Preface xvilliam PUECH Chapter 1 How to Reconstruct the History of a Digital Image, and of Its Alterations 1Quentin BAMMEY, Miguel COLOM, Thibaud EHRET, Marina GARDELLA, Rafael GROMPONE, Jean-Michel MOREL, Tina NIKOUKHAH and Denis PERRAUD 1.1 Introduction 2 1.1.1 General context 2 1.1.2 Criminal background 3 1.1.3 Issues for law enforcement 4 1.1.4 Current methods and tools of law enforcement 5 1.1.5 Outline of this chapter 5 1.2 Describing the image processing chain 8 1.2.1 Raw image acquisition 8 1.2.2 Demosaicing 8 1.2.3 Color correction 10 1.2.4 JPEG compression 11 1.3 Traces left on noise by image manipulation 11 1.3.1 Non-parametric estimation of noise in images 11 1.3.2 Transformation of noise in the processing chain 13 1.3.3 Forgery detection through noise analysis 15 1.4 Demosaicing and its traces 18 1.4.1 Forgery detection through demosaicing analysis 19 1.4.2 Detecting the position of the Bayer matrix 20 1.4.3 Limits of detection demosaicing 23 1.5 JPEG compression, its traces and the detection of its alterations 23 1.5.1 The JPEG compression algorithm 23 1.5.2 Grid detection 25 1.5.3 Detecting the quantization matrix 27 1.5.4 Beyond indicators, making decisions with a statistical model 28 1.6 Internal similarities and manipulations 31 1.7 Direct detection of image manipulation 33 1.8 Conclusion 34 1.9 References 35 Chapter 2 Deep Neural Network Attacks and Defense: The Case of Image Classification 41Hanwei ZHANG, Teddy FURON, Laurent AMSALEG and Yannis AVRITHIS 2.1 Introduction 41 2.1.1 A bit of history and vocabulary 42 2.1.2 Machine learning 44 2.1.3 The classification of images by deep neural networks 46 2.1.4 Deep Dreams 48 2.2 Adversarial images: definition 49 2.3 Attacks: making adversarial images 51 2.3.1 About white box 52 2.3.2 Black or gray box 62 2.4 Defenses 64 2.4.1 Reactive defenses 64 2.4.2 Proactive defenses 66 2.4.3 Obfuscation technique 67 2.4.4 Defenses: conclusion 68 2.5 Conclusion 68 2.6 References 69 Chapter 3 Codes and Watermarks 77Pascal LEFEVRE, Philippe CARRE and Philippe GABORIT 3.1 Introduction 77 3.2 Study framework: robust watermarking 78 3.3 Index modulation 81 3.3.1 LQIM: insertion 81 3.3.2 LQIM: detection 82 3.4 Error-correcting codes approach 82 3.4.1 Generalities 84 3.4.2 Codes by concatenation 86 3.4.3 Hamming codes 88 3.4.4 BCH codes 90 3.4.5 RS codes 93 3.5 Contradictory objectives of watermarking: the impact of codes 96 3.6 Latest developments in the use of correction codes for watermarking 98 3.7 Illustration of the influence of the type of code, according to the attacks 102 3.7.1 JPEG compression 103 3.7.2 Additive Gaussian noise 106 3.7.3 Saturation 106 3.8 Using the rank metric 108 3.8.1 Rank metric correcting codes 109 3.8.2 Code by rank metric: a robust watermarking method for image cropping 113 3.9 Conclusion 121 3.10 References 121 Chapter 4 Invisibility 129Pascal LEFEVRE, Philippe CARRE and David ALLEYSSON 4.1 Introduction 129 4.2 Color watermarking: an approach history? 131 4.2.1 Vector quantization in the RGB space 132 4.2.2 Choosing a color direction 133 4.3 Quaternionic context for watermarking color images 135 4.3.1 Quaternions and color images 135 4.3.2 Quaternionic Fourier transforms 137 4.4 Psychovisual approach to color watermarking 139 4.4.1 Neurogeometry and perception 139 4.4.2 Photoreceptor model and trichromatic vision 141 4.4.3 Model approximation 144 4.4.4 Parameters of the model 145 4.4.5 Application to watermarking color images 146 4.4.6 Conversions 147 4.4.7 Psychovisual algorithm for color images 148 4.4.8 Experimental validation of the psychovisual approach for color watermarking 151 4.5 Conclusion 155 4.6 References 157 Chapter 5 Steganography: Embedding Data Into Multimedia Content 161Patrick BAS, Remi COGRANNE and Marc CHAUMONT 5.1 Introduction and theoretical foundations 162 5.2 Fundamental principles 163 5.2.1 Maximization of the size of the embedded message 163 5.2.2 Message encoding 165 5.2.3 Detectability minimization 166 5.3 Digital image steganography: basic methods 168 5.3.1 LSB substitution and matching 168 5.3.2 Adaptive embedding methods 169 5.4 Advanced principles in steganography 172 5.4.1 Synchronization of modifications 173 5.4.2 Batch steganography 175 5.4.3 Steganography of color images 177 5.4.4 Use of side information 178 5.4.5 Steganography mimicking a statistical model 180 5.4.6 Adversarial steganography 182 5.5 Conclusion 186 5.6 References 186 Chapter 6 Traitor Tracing 189Teddy FURON 6.1 Introduction 189 6.1.1 The contribution of the cryptography community 190 6.1.2 Multimedia content 191 6.1.3 Error probabilities 192 6.1.4 Collusion strategy 192 6.2 The original Tardos code 194 6.2.1 Constructing the code 195 6.2.2 The collusion strategy and its impact on the pirated series 195 6.2.3 Accusation with a simple decoder 197 6.2.4 Study of the Tardos code-Škori´c original 199 6.2.5 Advantages 202 6.2.6 The problems 204 6.3 Tardos and his successors 205 6.3.1 Length of the code 205 6.3.2 Other criteria 205 6.3.3 Extensions 207 6.4 Research of better score functions 208 6.4.1 The optimal score function 208 6.4.2 The theory of the compound communication channel 209 6.4.3 Adaptive score functions 211 6.4.4 Comparison 213 6.5 How to find a better threshold 213 6.6 Conclusion 215 6.7 References 216 Chapter 7 3D Watermarking 219Sebastien BEUGNON, Vincent ITIER and William PUECH 7.1 Introduction 220 7.2 Preliminaries 221 7.2.1 Digital watermarking 221 7.2.2 3D objects 222 7.3 Synchronization 224 7.3.1 Traversal scheduling 224 7.3.2 Patch scheduling 224 7.3.3 Scheduling based on graphs 225 7.4 3D data hiding 230 7.4.1 Transformed domains 231 7.4.2 Spatial domain 231 7.4.3 Other domains 232 7.5 Presentation of a high-capacity data hiding method 233 7.5.1 Embedding of the message 234 7.5.2 Causality issue 235 7.6 Improvements 236 7.6.1 Error-correcting codes 236 7.6.2 Statistical arithmetic coding 236 7.6.3 Partitioning and acceleration structures 237 7.7 Experimental results 238 7.8 Trends in high-capacity 3D data hiding 240 7.8.1 Steganalysis 240 7.8.2 Security analysis 241 7.8.3 3D printing 242 7.9 Conclusion 242 7.10 References 243 Chapter 8 Steganalysis: Detection of Hidden Data in Multimedia Content 247Remi COGRANNE, Marc CHAUMONT and Patrick BAS 8.1 Introduction, challenges and constraints 247 8.1.1 The different aims of steganalysis 248 8.1.2 Different methods to carry out steganalysis 249 8.2 Incompatible signature detection 250 8.3 Detection using statistical methods 252 8.3.1 Statistical test of χ2 252 8.3.2 Likelihood-ratio test 256 8.3.3 LSB match detection 261 8.4 Supervised learning detection 263 8.4.1 Extraction of characteristics in the spatial domain 264 8.4.2 Learning how to detect with features 269 8.5 Detection by deep neural networks 270 8.5.1 Foundation of a deep neural network 271 8.5.2 The preprocessing module 272 8.6 Current avenues of research 279 8.6.1 The problem of Cover-Source mismatch 279 8.6.2 The problem with steganalysis in real life 279 8.6.3 Reliable steganalysis 280 8.6.4 Steganalysis of color images 280 8.6.5 Taking into account the adaptivity of steganography 281 8.6.6 Grouped steganalysis (batch steganalysis) 281 8.6.7 Universal steganalysis 282 8.7 Conclusion 283 8.8 References 283 List of Authors 289 Index 293

    Out of stock

    £124.15

  • Edge Networking: Internet of Edges

    ISTE Ltd Edge Networking: Internet of Edges

    Out of stock

    Book SynopsisThe Internet of Edges is a new paradigm whose objective is to keep data and processing close to the user. This book presents three different levels of Edge networking: MEC (Multi-access Edge Computing), Fog and Far Edge (sometimes called Mist or Skin). It also reviews participatory networks, in which user equipment provides the resources for the Edge network. Edge networks can be disconnected from the core Internet, and the interconnection of autonomous edge networks can then form the Internet of Edges. This book analyzes the characteristics of Edge networks in detail, showing their capacity to replace the imposing Clouds of core networks due to their superior server response time, data security and energy saving.Table of ContentsIntroduction ix Chapter 1. Edge Architectures 1 1.1. The three levels of Edge Networking 1 1.2. Edge Computing architectures 4 1.3. Security and domain name system on Edge 14 1.4. The digital infrastructure of the participatory Internet 16 1.5. Conclusion 17 1.6. References 18 Chapter 2. MEC Networks 21 2.1. The MEC level of 5G architecture 21 2.2. 5G 25 2.3. 5G Edge 29 2.4. Conclusion 37 2.5. References 37 Chapter 3. Fog Networks 39 3.1. Fog architectures 39 3.2. Fog controllers 44 3.3. Fog and the Internet of Things 48 3.4. Wi-Fi in the Fog’s digital infrastructure 50 3.5. The new generation Wi-Fi 54 3.6. The next generation of mobile Wi-Fi 63 3.7. Private 5G for Fog Networking 64 3.8. Conclusion 69 3.9. References 69 Chapter 4. Skin Networks 73 4.1. The architecture of Skin networks 73 4.2. Virtual access points 74 4.3. Participatory Internet networks 77 4.4. Conclusion 82 4.5. References 83 Chapter 5. Ad hoc and Mesh Networks 85 5.1. Ad hoc networks 85 5.2. Routing 88 5.3. Mesh networks 93 5.4. Participatory networks 95 5.5. Local services 96 5.6. The digital infrastructure of the Internet of the Edges 97 5.7. Conclusion 101 5.8. References 102 Chapter 6. Applications of the Internet of Edges 105 6.1. Civil security and defense applications 107 6.2. Applications of the Internet of Things 108 6.3. The tactile Internet. 110 6.4. Telecom applications 115 6.5. Industry 4.0 116 6.6. The smart city 118 6.7. Conclusion 121 6.8. References 121 Chapter 7. Vehicular Networks 123 7.1. Communication techniques for vehicular networks 123 7.2. Vehicular Ad hoc NETworks 126 7.3. Connected and intelligent vehicles 127 7.4. The MEC and the VEC 128 7.5. Intelligent transport systems (ITS)-G5 130 7.6. 5G V2X 133 7.7. The VLC 139 7.8. Conclusion 140 7.9. References 140 Chapter 8. Virtualization of the Internet of Edges 143 8.1. Network virtualization 143 8.2. Virtualization on the Edge 145 8.3. Using virtual networks on the Edge 151 8.3.1. Isolation 152 8.3.2. Extending network virtualization 153 8.4. Mobile Edge Computing 155 8.4.1. Examples of MEC applications 155 8.4.2. Geolocation 156 8.4.3. Augmented reality 156 8.4.4. Video analytics 157 8.4.5. Content optimization 158 8.4.6. Content cache and DNS cache 158 8.4.7. Performance optimization 159 8.4.8. Positioning of MEC servers 159 8.5. Conclusion 162 8.6. References 162 Chapter 9. Security 165 9.1. Cloud of security on the Edge 165 9.2. Secure element 170 9.2.1. Security based on secure elements 174 9.2.2. The TEE 175 9.2.3. The trusted service manager 176 9.2.4. The Cloud-based security solution 177 9.2.5. Solutions for security 178 9.3. Blockchain 183 9.3.1. Blockchain consensus 184 9.3.2. Blockchain in Edge Computing. 185 9.4. Conclusion 188 9.5. References 188 Chapter 10. The Example of Green Communications 193 10.1. The Green PI solution 194 10.2. The Edge Cloud 194 10.3. The IoE 195 10.4. The IoE platform 199 10.5. Use cases: IoT in constrained environments 201 10.6. IoT in motion 202 10.7. Massive IoT 203 10.8. The advantages 205 10.9. References 205 Chapter 11. Deployment of the Participatory Internet 207 11.1. The deployment 207 11.2. The Green Cloud 208 11.2.1. My Network 211 11.2.2. Chat 212 11.2.3. Talk 212 11.2.4. Storage 212 11.2.5. vCard Editor 212 11.3. Scaling up 212 11.4. Energy savings 214 11.5. Security 219 11.6. Wi-Fi and LTE hybridization 220 11.7. Conclusion 223 11.8. References 223 Chapter 12. The Future 225 12.1. The short-term future 225 12.2. The medium-term future 226 12.3. The long-term future 227 12.4. Participatory Internet and IPV6 228 12.5. References 231 List of Authors 235 Index 237

    Out of stock

    £112.50

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account