Biometric systems hide many pitfalls that can lead to major security weaknesses and privacy threats. This book showcases a collection of comprehensive references from eminent researchers, providing concise coverage of state-of-the-art solutions.
Digital Platformization and Effects on Corporate Branding
This book reflects on digital platforms, their added value for sustainability through corporate branding, and the challenge of assessing performance in the sports, cultural, and creative sectors as platform-based models become embedded in everyday life.
In dynamic ad-hoc networks, link failures lead to unreliable and inefficient data transmission. This work proposes LR-EE-AOMDV, a novel extension of the AOMDV routing protocol, to find multiple link-reliable, energy-efficient paths for robust data transmission.
A virtual honeypot detects threats from hackers and captures data about their attacks. This book details how to confuse attackers and direct them onto the wrong path.
For students, researchers, and developers, this book offers a snapshot of ongoing European research and development in cloud computing. It covers the latest hot topics, including services, management, automation, and adoption.
This book provides a fresh look at the evolution of mobility management for next generation networks. It goes beyond traditional, centralized approaches, offering insights into practical ways of distributing mobility management for operators and end-users.
The growth of cybersecurity issues affects us all. This book addresses current challenges in information security for a wide range of users, from governments to students, discussing topics like educational frameworks and applications of security principles in specific domains.
Second Generation Mainframes
The IBM 7000 series led the way in many innovative concepts that helped to establish IBM as the foremost manufacturer of computer systems. This study describes IBM’s second generation of mainframe computers, detailing their new technology, new peripherals and advanced software.
This book highlights the current state of the art of cybersecurity, covering key areas from systems design and management to emerging technology trends. It will appeal to practitioners, faculty, and students in cybersecurity, information technology, and computer science.
The Evolution of the Net
This book describes the evolution of the Net for nonspecialists. It explains the infrastructure’s journey from the network transmission of Telephony, the medium of the 20th century, to the knowledge navigation of Telesophy, the future medium for moving from data to wisdom.
Trusted Routing Mechanisms
As our business and private lives rely on computing systems, digital security is imperative. This book offers solutions that ensure the integrity and confidentiality of network traffic by protecting data from third parties.
Identity theft is a growing concern in mobile ad-hoc networks. This book presents an innovative framework for identity management that puts users back in control. Using context-awareness and user-centricity, it protects identity and balances privacy with convenience.
Wireless Communication Technologies for IoT
The Internet of Things (IoT) uses wireless connections for real-time, data-driven decision-making. This book explores advancements in Wi-Fi, intelligent antennas, IoT-connected healthcare, smart agriculture, data analysis, energy harvesting, and smart home protocols.