Skip to main content

Books in Internet and web technology

Tactile Internet for a Human-Centred Metaverse

  • 1st Edition
  • July 1, 2025
  • Frank H. P. Fitzek + 5 more
  • English
  • Paperback
    9 7 8 - 0 - 4 4 3 - 3 0 0 4 4 - 8
  • eBook
    9 7 8 - 0 - 4 4 3 - 3 0 0 4 5 - 5
Tactile Internet for a Human-Centred Metaverse is a ground-breaking, comprehensive guide to the Tactile Internet, an innovative communication platform that merges the physical and digital worlds, transforming how we experience the Metaverse and interact with robots and other cyber-physical systems. From exploring real-world applications in healthcare, industry, education, and beyond, to delving into the cutting-edge components, sensors, and communication systems that underpin this transformation, this book offers a multidisciplinary view of the Tactile Internet revolution. Tactile Internet for a Human-centred Metaverse is an essential read for academic researchers, students, industry professionals and R&D engineers engineers seeking a comprehensive, up-to-date and forward looking approach to understanding the Tactile Internet’s intersection with the Metaverse, together with its far reaching implications.

Cloud Computing

  • 3rd Edition
  • February 15, 2022
  • Dan C. Marinescu
  • English
  • Paperback
    9 7 8 - 0 - 3 2 3 - 8 5 2 7 7 - 7
  • eBook
    9 7 8 - 0 - 3 2 3 - 9 1 0 4 7 - 7
Cloud Computing: Theory and Practice, Third Edition provides students and IT professionals with an in-depth analysis of the cloud from the ground up. After an introduction to network-centric computing and network-centric content, the book reviews basic concepts of concurrency and parallel and distributed systems, presents critical components of the cloud ecosystem as cloud service providers, cloud access, cloud data storage, and cloud hardware and software, covers cloud applications and cloud security, and presents research topics in cloud computing. Specific topics covered include resource virtualization, resource management and scheduling, and advanced topics like the impact of scale on efficiency, cloud scheduling subject to deadlines, alternative cloud architectures, and vehicular clouds. An included glossary covers terms grouped in several categories, from general to services, virtualization, desirable attributes and security.

Designing with the Mind in Mind

  • 3rd Edition
  • August 14, 2020
  • Jeff Johnson
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 1 8 2 0 2 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 8 2 0 3 - 1
User interface (UI) design rules and guidelines, developed by early HCI gurus and recognized throughout the field, were based on cognitive psychology (study of mental processes such as problem solving, memory, and language), and early practitioners were well informed of its tenets. But today practitioners with backgrounds in cognitive psychology are a minority, as user interface designers and developers enter the field from a wide array of disciplines. HCI practitioners today have enough experience in UI design that they have been exposed to UI design rules, but it is essential that they understand the psychological basis behind the rules in order to effectively apply them. In Designing with the Mind in Mind, best-selling author Jeff Johnson provides designers with just enough background in perceptual and cognitive psychology that UI design guidelines make intuitive sense rather than being just a list of rules to follow.

Social Network Analytics

  • 1st Edition
  • November 16, 2018
  • Nilanjan Dey + 3 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 1 5 4 5 8 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 5 6 4 1 - 4
Social Network Analytics: Computational Research Methods and Techniques focuses on various technical concepts and aspects of social network analysis. The book features the latest developments and findings in this emerging area of research. In addition, it includes a variety of applications from several domains, such as scientific research, and the business and industrial sectors. The technical aspects of analysis are covered in detail, including visualizing and modeling, network theory, mathematical models, the big data analytics of social networks, multidimensional scaling, and more. As analyzing social network data is rapidly gaining interest in the scientific research community because of the importance of the information and insights that can be culled from the wealth of data inherent in the various aspects of the network, this book provides insights on measuring the relationships and flows between people, groups, organizations, computers, URLs, and more.

Cloud Computing

  • 2nd Edition
  • November 13, 2017
  • Dan C. Marinescu
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 2 8 1 1 - 4
Cloud Computing: Theory and Practice, Second Edition, provides students and IT professionals with an in-depth analysis of the cloud from the ground up. After an introduction to network-centric computing and network-centric content in Chapter One, the book is organized into four sections. Section One reviews basic concepts of concurrency and parallel and distributed systems. Section Two presents such critical components of the cloud ecosystem as cloud service providers, cloud access, cloud data storage, and cloud hardware and software. Section Three covers cloud applications and cloud security, while Section Four presents research topics in cloud computing. Specific topics covered include resource virtualization, resource management and scheduling, and advanced topics like the impact of scale on efficiency, cloud scheduling subject to deadlines, alternative cloud architectures, and vehicular clouds. An included glossary covers terms grouped in several categories, from general to services, virtualization, desirable attributes and security.

Safety of Web Applications

  • 1st Edition
  • April 6, 2017
  • Eric Quinton
  • English
  • Hardback
    9 7 8 - 1 - 7 8 5 4 8 - 2 2 8 - 1
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 2 3 6 2 - 4
Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications. The Internet is not secure, but it's very friendly as a tool for storing and manipulating data. Customer confidence in Internet software is based on it's ability to prevent damage and attacks, but secure software is complicated, depending on several factors, including good risk estimation, good code architecture, cyphering, web server configuration, coding to prevent the most common attacks, and identification and rights allocation.

Advances in Computers

  • 1st Edition
  • Volume 105
  • February 20, 2017
  • Atif Memon
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 1 2 2 3 2 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 2 2 3 3 - 4
Advances in Computers, the latest volume in the series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design, and applications. In addition, it provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of significant, lasting value in this rapidly expanding field.

Managing the Web of Things

  • 1st Edition
  • February 8, 2017
  • Michael Sheng + 3 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 7 6 4 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 7 6 5 - 6
Managing the Web of Things: Linking the Real World to the Web presents a consolidated and holistic coverage of engineering, management, and analytics of the Internet of Things. The web has gone through many transformations, from traditional linking and sharing of computers and documents (i.e., Web of Data), to the current connection of people (i.e., Web of People), and to the emerging connection of billions of physical objects (i.e., Web of Things). With increasing numbers of electronic devices and systems providing different services to people, Web of Things applications present numerous challenges to research institutions, companies, governments, international organizations, and others. This book compiles the newest developments and advances in the area of the Web of Things, ranging from modeling, searching, and data analytics, to software building, applications, and social impact. Its coverage will enable effective exploration, understanding, assessment, comparison, and the selection of WoT models, languages, techniques, platforms, and tools. Readers will gain an up-to-date understanding of the Web of Things systems that accelerates their research.

Securing the Internet of Things

  • 1st Edition
  • January 11, 2017
  • Shancang Li + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 5 8 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 5 0 5 - 3
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.

Federal Cloud Computing

  • 2nd Edition
  • January 5, 2017
  • Matthew Metheny
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 7 1 0 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 6 8 7 - 1
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing.

Related subjects