Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
The book provides an examination of how fog security is changing the information technology industry and will continue to in the next decade. The authors first discuss how fog enables key applications in wireless 5G, the Internet of Things, and big data. The book then presents an overview of fog/edge computing, focusing on its relationship with cloud technology, Internet of Things and the future with the use of secure 5G/6G communication. The book also presents a comprehensive overview of liabilities in fog/edge computing within multi-level architectures and the intelligent management. The last part of the book reviews applications of fog/edge computing in smart cities, including in Industrial IoT, edge-based augmented reality, data streaming, and blockchain-based.
Unleashing the Potentials of Blockchain Technology for Healthcare Industries discusses blockchain and its adaptation in healthcare industries to provide a secured framework to safeguard healthcare data, both patient and hospital data. The book integrates key pillars of blockchain such as foundations, architecture, smart contracts, adoption, standards, service (BaaS), security, consensus algorithms, drug discovery process, among others, for fortifying the current practices in the healthcare industries. In addition, it offers solutions to the pressing issues currently being faced by the healthcare processes due to the COVD-19 pandemic. This will be a valuable resource for medical informaticians, researchers, healthcare professionals and members of the biomedical field who are interested in learning more about the potentials of blockchain in healthcare.
AI AND MACHINE LEARNING FOR NETWORK AND SECURITY MANAGEMENTExtensive Resource for Understanding Key Tasks of Network and Security ManagementAI and Machine Learning for Network and Security Management covers a range of key topics of network automation for network and security management, including resource allocation and scheduling, network planning and routing, encrypted traffic classification, anomaly detection, and security operations. In addition, the authors introduce their large-scale intelligent network management and operation system and elaborate on how the aforementioned areas can be integrated into this system, plus how the network service can benefit.Sample ideas covered in this thought-provoking work include:* How cognitive means, e.g., knowledge transfer, can help with network and security management* How different advanced AI and machine learning techniques can be useful and helpful to facilitate network automation* How the introduced techniques can be applied to many other related network and security management tasksNetwork engineers, content service providers, and cybersecurity service providers can use AI and Machine Learning for Network and Security Management to make better and more informed decisions in their areas of specialization. Students in a variety of related study programs will also derive value from the work by gaining a base understanding of historical foundational knowledge and seeing the key recent developments that have been made in the field.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.