
Next-Generation Systems and Secure Computing
- 474 pages
- English
- PDF
- Available on iOS & Android
Next-Generation Systems and Secure Computing
About this book
Next-Generation Systems and Secure Computing is essential for anyone looking to stay ahead in the rapidly evolving landscape of technology. It offers crucial insights into advanced computing models and their security implications, equipping readers with the knowledge needed to navigate the complex challenges of today's digital world.
The development of technology in recent years has produced a number of scientific advancements in sectors like computer science. The advent of new computing models has been one particular development within this sector. New paradigms are always being invented, greatly expanding cloud computing technology. Fog, edge, and serverless computing are examples of these revolutionary advanced technologies. Nevertheless, these new approaches create new security difficulties and are forcing experts to reassess their current security procedures. Devices for edge computing aren't designed with the same IT hardware protocols in mind. There are several application cases for edge computing and the Internet of Things (IoT) in remote locations. Yet, cybersecurity settings and software upgrades are commonly disregarded when it comes to preventing cybercrime and guaranteeing data privacy.
Next-Generation Systems and Secure Computing compiles cutting-edge studies on the development of cutting-edge computing technologies and their role in enhancing current security practices. The book will highlight topics like fault tolerance, federated cloud security, and serverless computing, as well as security issues surrounding edge computing in this context, offering a thorough discussion of the guiding principles, operating procedures, applications, and unexplored areas of study. Next-Generation Systems and Secure Computing is a one-stop resource for learning about the technology, procedures, and individuals involved in next-generation security and computing.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Series Page
- Title Page
- Copyright Page
- Contents
- Preface
- Chapter 1 Yet Another Move Towards Securing Video Using Sudoku-Fernet
- Chapter 2 Watermarking: Characteristics, Methods, and Evaluation
- Chapter 3 A Comprehensive Study on Deep Learning and Artificial Intelligence for Malware Analysis
- Chapter 4 Transmit Texts Covertly Using Trigonometric Functions and Pythagorean Theorem
- Chapter 5 Exploring the Synergy of Cybersecurity and Blockchain: Strengthening Digital Defenses
- Chapter 6 Protecting in the Digital Age: A Comprehensive Examination of Cybersecurity and Legal Implications
- Chapter 7 A Novel Non-Orthogonal Multiple Access Scheme for Next Generation Millimeter-Wave 5G Communications
- Chapter 8 Generation of Key Predistribution Scheme Applying Quasi-Symmetric Designs and Bent Functions in the Wireless Sensor Network
- Chapter 9 Enhanced Security Measures Within the ITS Infrastructure Through the Application of Machine Learning Algorithms for Anomaly Detection
- Chapter 10 The Impact of Distributed Ledger in IoT: A Comprehensive Overview
- Chapter 11 A Cryptographic Technique Using Chemicals and Graphs
- Chapter 12 Federated Learning: A Secure Distributed Machine Learning Approach for IoT Technology
- Chapter 13 Security Analysis for Mobile Crowdsensing Scheme by Predicting Vehicle Mobility Using Deep Learning Algorithm
- Chapter 14 A Study on Protection of Multimedia System Contents Using a Biometric-Based Encryption Technique
- Chapter 15 Deep Learning Algorithms for Detecting Network Attacks—An Overview
- Chapter 16 Deep Learning Techniques for Detection of Fake News in Social Media with Huge Data
- Chapter 17 A Secure IoT-Based Heart Rate Monitoring and Analyzing System
- Chapter 18 A Secure IoT-Based Approach for Smart Irrigation System Using an Arduino Uno Microcontroller
- Chapter 19 Machine Learning Applications, Challenges, and Securities for Remote Healthcare: A Systematic Review
- Chapter 20 Enhancing Video Steganography Security for Cross-Platform Applications: A Focus on High-Definition Formats and Streaming Environments
- Index
- Also of Interest
- EULA