Security in Wireless Mesh Networks

Security in Wireless Mesh Networks

Author: Yan Zhang

Publisher: CRC Press

Published: 2008-08-21

Total Pages: 547

ISBN-13: 0849382548

DOWNLOAD EBOOK

Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services.


Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing

Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing

Author: Hu, Wen-Chen

Publisher: IGI Global

Published: 2013-11-30

Total Pages: 337

ISBN-13: 1466647167

DOWNLOAD EBOOK

The development of new information and communication technologies has a considerable impact on the way humans interact with each other and their environment. The proper use of these technologies is an important consideration in the success of modern human endeavors. Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing explores some of the latest advances in wireless communication technologies, making use of empirical research and analytical case studies to evaluate best practices in the discipline. This book will provide insight into the next generation of information and communication technologies for developers, engineers, students, researchers, and managers in the telecommunications field.


Network Security Technologies: Design and Applications

Network Security Technologies: Design and Applications

Author: Amine, Abdelmalek

Publisher: IGI Global

Published: 2013-11-30

Total Pages: 348

ISBN-13: 1466647906

DOWNLOAD EBOOK

Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.


HCI Challenges and Privacy Preservation in Big Data Security

HCI Challenges and Privacy Preservation in Big Data Security

Author: Lopez, Daphne

Publisher: IGI Global

Published: 2017-08-10

Total Pages: 293

ISBN-13: 1522528644

DOWNLOAD EBOOK

Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.


Security Management in Mobile Cloud Computing

Security Management in Mobile Cloud Computing

Author: Munir, Kashif

Publisher: IGI Global

Published: 2016-08-01

Total Pages: 266

ISBN-13: 1522506039

DOWNLOAD EBOOK

Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern and developing effective methods to protect sensitive information and data on the cloud is imperative. Security Management in Mobile Cloud Computing explores the difficulties and challenges of securing user data and information on mobile cloud platforms. Investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms, this publication is an essential resource for IT specialists, researchers, and graduate-level students interested in mobile cloud computing concepts and security.


Research Anthology on Securing Mobile Technologies and Applications

Research Anthology on Securing Mobile Technologies and Applications

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2021-02-05

Total Pages: 837

ISBN-13: 1799886018

DOWNLOAD EBOOK

Mobile technologies have become a staple in society for their accessibility and diverse range of applications that are continually growing and advancing. Users are increasingly using these devices for activities beyond simple communication including gaming and e-commerce and to access confidential information including banking accounts and medical records. While mobile devices are being so widely used and accepted in daily life, and subsequently housing more and more personal data, it is evident that the security of these devices is paramount. As mobile applications now create easy access to personal information, they can incorporate location tracking services, and data collection can happen discreetly behind the scenes. Hence, there needs to be more security and privacy measures enacted to ensure that mobile technologies can be used safely. Advancements in trust and privacy, defensive strategies, and steps for securing the device are important foci as mobile technologies are highly popular and rapidly developing. The Research Anthology on Securing Mobile Technologies and Applications discusses the strategies, methods, and technologies being employed for security amongst mobile devices and applications. This comprehensive book explores the security support that needs to be required on mobile devices to avoid application damage, hacking, security breaches and attacks, or unauthorized accesses to personal data. The chapters cover the latest technologies that are being used such as cryptography, verification systems, security policies and contracts, and general network security procedures along with a look into cybercrime and forensics. This book is essential for software engineers, app developers, computer scientists, security and IT professionals, practitioners, stakeholders, researchers, academicians, and students interested in how mobile technologies and applications are implementing security protocols and tactics amongst devices.


Handbook of Research on Recent Developments in Intelligent Communication Application

Handbook of Research on Recent Developments in Intelligent Communication Application

Author: Bhattacharyya, Siddhartha

Publisher: IGI Global

Published: 2016-12-12

Total Pages: 696

ISBN-13: 1522517863

DOWNLOAD EBOOK

The communication field is evolving rapidly in order to keep up with society’s demands. As such, it becomes imperative to research and report recent advancements in computational intelligence as it applies to communication networks. The Handbook of Research on Recent Developments in Intelligent Communication Application is a pivotal reference source for the latest developments on emerging data communication applications. Featuring extensive coverage across a range of relevant perspectives and topics, such as satellite communication, cognitive radio networks, and wireless sensor networks, this book is ideally designed for engineers, professionals, practitioners, upper-level students, and academics seeking current information on emerging communication networking trends.


Intelligent Computing and Information and Communication

Intelligent Computing and Information and Communication

Author: Subhash Bhalla

Publisher: Springer

Published: 2018-01-19

Total Pages: 732

ISBN-13: 9811072450

DOWNLOAD EBOOK

The volume presents high quality research papers presented at Second International Conference on Information and Communication Technology for Intelligent Systems (ICICC 2017). The conference was held during 2–4 August 2017, Pune, India and organized communally by Dr. Vishwanath Karad MIT World Peace University, Pune, India at MIT College of Engineering, Pune and supported by All India Council for Technical Education (AICTE) and Council of Scientific and Industrial Research (CSIR). The volume contains research papers focused on ICT for intelligent computation, communications and audio, and video data processing.


Design, Development, and Use of Secure Electronic Voting Systems

Design, Development, and Use of Secure Electronic Voting Systems

Author: Zissis, Dimitrios

Publisher: IGI Global

Published: 2014-03-31

Total Pages: 290

ISBN-13: 1466658215

DOWNLOAD EBOOK

In modern electoral processes, Information and Communication Technologies play a crucial role, whether used in voter registration, ballot casting, or processing of results. Securing these systems is a necessary step in ensuring the fairness of the democratic process. Design, Development, and Use of Secure Electronic Voting Systems analyzes current research on the integration of modern technologies with traditional democratic systems, providing a framework for designing and deploying electronic voting systems in any context or society. Stakeholders, researchers, architects, designers, and scholars interested in the use of electronic systems in government processes will use this book to gain a broader understanding of some of the latest advances in this emerging field.