Seems you have not registered as a member of localhost.saystem.shop!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

The Internet of Women - Accelerating Culture Change
  • Language: en
  • Pages: 208

The Internet of Women - Accelerating Culture Change

  • Type: Book
  • -
  • Published: 2022-09-01
  • -
  • Publisher: CRC Press

Female scientists, technologists, engineers, and mathematicians worldwide are making historic contributions to their fields. The modern workforce is closer to gender-equal than it has ever been, and many efforts are in place to support further progress. The Internet of Women provides an exciting look at personal narratives and case studies of female leaders and cultural shifts around the globe that illustrate this promising trend. From the United Nations' emphasis on girls and technology education in the SDGs (Sustainable Development Goals) to the increased female labor force in Zambia, a policy change that was inspired by the MDGs (UN Millennial Development Goals), The Internet of Women cap...

Holistic Approach to Quantum Cryptography in Cyber Security
  • Language: en
  • Pages: 257

Holistic Approach to Quantum Cryptography in Cyber Security

  • Type: Book
  • -
  • Published: 2022-08-09
  • -
  • Publisher: CRC Press

This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography and also covering cryptographic techniques and cyber security techniques, in a single volume. It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution, position-based quantum cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber security techniques’ architectures and design, cyber security techniques management, software-defined networks, and cyber security techniques for 5G communication. The text also discusses the security of practical quantum key distribution systems, applications and algorithms developed for quantum cryptography, as well as cyber security through quantum computing and quantum cryptography. The text will be beneficial for graduate students, academic researchers, and professionals working in the fields of electrical engineering, electronics and communications engineering, computer science, and information technology.

Biopsychosocial Perspectives and Practices for Addressing Communicable and Non-Communicable Diseases
  • Language: en
  • Pages: 368

Biopsychosocial Perspectives and Practices for Addressing Communicable and Non-Communicable Diseases

  • Type: Book
  • -
  • Published: 2020-04-17
  • -
  • Publisher: IGI Global

While there are a number of clinical practices for treating a variety of diseases, there is an urgent need to integrate bio-psychosocial perspectives and practices in order to promote comprehensive healthcare. Current research reports that diseases such as HIV/AIDS, malaria, diabetes, cardiovascular diseases, and heart diseases are a growing threat to the heath and quality of life of individuals across the globe. Considering that nearly all these diseases are directly related to the lifestyle of an individual, prevention and intervention should be devised to address psychological, emotional, social, and spiritual factors. Biopsychosocial Perspectives and Practices for Addressing Communicable...

Intelligent IoT for the Digital World
  • Language: en
  • Pages: 340

Intelligent IoT for the Digital World

INTELLIGENT IOT FOR THE DIGITAL WORLD DISCOVER HOW THE INTELLIGENT INTERNET OF THINGS WILL CHANGE THE INFORMATION AND COMMUNICATION TECHNOLOGY INDUSTRY IN THE NEXT DECADE In the digital world, most data and Internet of Things (IoT) services need to be efficiently processed and executed by intelligent algorithms using local or regional computing resources, thus greatly saving and reducing communication bandwidth, end-to-end service delay, long-distance data transmissions, and potential privacy breaches. This book proposes a pyramid model, where data, computing and algorithm jointly constitute the triangular base to support a variety of user-centric intelligent IoT services at the spire by usi...

Blockchain and Public Law
  • Language: en
  • Pages: 256

Blockchain and Public Law

  • Categories: Law

This important and topical book provides a comprehensive overview of the challenges raised by blockchain from the perspective of public law. It considers the ways in which traditional categories of public law such as sovereignty, citizenship and territory are shaped, as well as the impact of blockchain technology on fundamental rights and democratic values.

IoT
  • Language: en
  • Pages: 401

IoT

  • Type: Book
  • -
  • Published: 2020-06-03
  • -
  • Publisher: CRC Press

IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with securi...

IPv6 Security
  • Language: en
  • Pages: 705

IPv6 Security

IPv6 Security Protection measures for the next Internet Protocol As the world’s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world’s leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today’s best solutions. IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today’s networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them...

The Humanized Internet
  • Language: en
  • Pages: 250

The Humanized Internet

  • Type: Book
  • -
  • Published: 2019-03-31
  • -
  • Publisher: Unknown

In reading this book, there are key themes that are constant such as the notion of identity and identity sets; e-sovereignty and privacy and most importantly the function of an Internet that is inclusive, not "controlled" by a few organizations for their own profitability. Certainly, "enterprising" the Internet has been a process over these past years and there is no intent to set judgement here but rather pause for a moment and reflect on the impact of these technologies to individuals. Yes, this is The Humanized Internet. These tenets may sound libertarian but in fact we are speaking about core principles to guide the development and perhaps the return of the Internet to the people especia...

Human-Machine Interaction and IoT Applications for a Smarter World
  • Language: en
  • Pages: 323

Human-Machine Interaction and IoT Applications for a Smarter World

  • Type: Book
  • -
  • Published: 2022-08-02
  • -
  • Publisher: CRC Press

Human-Machine Interaction and IoT Applications for a Smarter World explores the futuristic trends at the cutting edge of study and research on Human-Machine Interaction (HMI), which is also known as Human-Computer Interface (HCI), and the Internet of Things (IoT) by featuring applications in a proficient, adaptable, and manageable way. It covers the mainstays of the IoT world through a thorough description of the present advancements, systems, and structures. This book: Discusses algorithms and design methodologies for the implementation of HMI based IoT systems. Covers real-time utility of IoT-based devices and systems. Provides human-machine interactive technologies and smart applications ...

MPLS VPN Security
  • Language: en
  • Pages: 286

MPLS VPN Security

The definitive guide to understanding MPLS security and implementing and operating secure MPLS networks.