Skip to main content

Books in Internet and web technology

21-30 of 169 results in All results

Cloud Storage Security

  • 1st Edition
  • July 6, 2015
  • Aaron Wheeler + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 9 3 0 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 9 3 1 - 2
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information.

The Cloud Security Ecosystem

  • 1st Edition
  • June 1, 2015
  • Raymond Choo + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 5 9 5 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 7 8 0 - 7
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security.

To MOOC or Not to MOOC

  • 1st Edition
  • May 11, 2015
  • Sarah Porter
  • English
  • Paperback
    9 7 8 - 0 - 0 8 - 1 0 0 0 4 8 - 9
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 0 0 6 1 - 8
Scarcely a week goes by without coverage in the UK and international media about the latest MOOC revelation. Despite some significant initiatives in the dotcom era, online learning has somehow never delivered on its promise to revolutionize education. To MOOC or not to MOOC explores the history of MOOCs and analyses the current MOOC context by describing six institutions and the story of their engagement with MOOCs. Looking at each of the different type of institution in turn, it analyses the processes behind their decision to engage with online learning and MOOCs, how the MOOC project is managed and led, and discusses issues such as quality assurance, governance and partnerships. Chapters draw together and analyse the data and draw out advice for institutions, to help them make choices about how to respond to MOOCs and other high-impact changes in digital education. The book contains checklists and planning tools to support strategy and planning, and concludes with a future look at MOOCs exploring some of the possible trends that may impact upon higher education, such as business models, data and analytics, learning design and competitors in the MOOC marketplace.

Digital Identity Management

  • 1st Edition
  • March 24, 2015
  • Maryline Laurent + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 0 5 9 1 - 0
In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analysis on the digital ID issue, it describes the different technical and legal approaches to protect digital identities with a focus on authentication systems, identity federation techniques and privacy preservation solutions. The limitations of these solutions and research issues in this field are also discussed to further understand the changes that are taking place.

Social Sensing

  • 1st Edition
  • March 23, 2015
  • Dong Wang + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 8 6 7 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 1 3 1 - 7
Increasingly, human beings are sensors engaging directly with the mobile Internet. Individuals can now share real-time experiences at an unprecedented scale. Social Sensing: Building Reliable Systems on Unreliable Data looks at recent advances in the emerging field of social sensing, emphasizing the key problem faced by application designers: how to extract reliable information from data collected from largely unknown and possibly unreliable sources. The book explains how a myriad of societal applications can be derived from this massive amount of data collected and shared by average individuals. The title offers theoretical foundations to support emerging data-driven cyber-physical applications and touches on key issues such as privacy. The authors present solutions based on recent research and novel ideas that leverage techniques from cyber-physical systems, sensor networks, machine learning, data mining, and information fusion.

Introduction to Social Media Investigation

  • 1st Edition
  • March 13, 2015
  • Jennifer Golbeck
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 6 5 6 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 8 0 2 - 6
If you’re interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds of millions of users. The public information that people share on these sites can be valuable for anyone interested in investigating people of interest through open, public sources. Social media as an investigative device is in its infancy and not well understood. This book presents an overview of social media and discusses special skills and techniques to use when conducting investigations. The book features hands-on tutorials and case studies and offers additional data-gathering techniques.

Cloud Data Centers and Cost Modeling

  • 1st Edition
  • February 27, 2015
  • Caesar Wu + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 4 1 3 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 6 8 8 - 6
Cloud Data Centers and Cost Modeling establishes a framework for strategic decision-makers to facilitate the development of cloud data centers. Just as building a house requires a clear understanding of the blueprints, architecture, and costs of the project; building a cloud-based data center requires similar knowledge. The authors take a theoretical and practical approach, starting with the key questions to help uncover needs and clarify project scope. They then demonstrate probability tools to test and support decisions, and provide processes that resolve key issues. After laying a foundation of cloud concepts and definitions, the book addresses data center creation, infrastructure development, cost modeling, and simulations in decision-making, each part building on the previous. In this way the authors bridge technology, management, and infrastructure as a service, in one complete guide to data centers that facilitates educated decision making.

Communicating the UX Vision

  • 1st Edition
  • February 19, 2015
  • Martina Schell + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 2 0 1 9 7 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 7 9 9 9 2 4 - 1
This book identifies the 13 main challenges designers face when they talk about their work and provides communication strategies so that a better design, not a louder argument, is what makes it into the world. It is a fact that we all want to put great design into the world, but no product ever makes it out of the building without rounds of reviews, feedback, and signoff. As an interaction or UX designer, you’ve felt the general trend toward faster development, more work, and less discussion. As we spend time crafting, we become attached to our own ideas and it gets all too easy to react to feedback emotionally or dismiss it, when we should be taking the time to decode it and explain or adapt the design. Communicating the UX Vision helps you identify the skills and behavioral patterns to present your work in more persuasive ways, and respond more constructively to feedback from coworkers and stakeholders.

How to Attack and Defend Your Website

  • 1st Edition
  • December 5, 2014
  • Henry Dalziel
  • Alejandro Caceres
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 7 3 2 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 7 5 4 - 7
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools – most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.

Online Arab Spring

  • 1st Edition
  • December 3, 2014
  • Reza Jamali
  • English
  • Paperback
    9 7 8 - 1 - 8 4 3 3 4 - 7 5 7 - 6
  • eBook
    9 7 8 - 1 - 7 8 0 6 3 - 4 3 8 - 8
What is the role of social media on fundamental change in Arab countries in the Middle East and North Africa? <I>Online Arab Spring</I> responds to this question, considering five countries: Egypt, Libya, Jordan, Yemen, and Tunisia, along with additional examples. The book asks why the penetration rate for social media differs in different countries: are psychological and social factors at play? Each chapter considers national identity, the legitimacy crisis, social capital, information and media literacy, and socialization. Religious attitudes are introduced as a key factor in social media, with Arabic countries in the Middle East and North Africa being characterized by Islamic trends. The insight gained will be helpful for analysing online social media effects internationally, and predicting future movements in a social context.

Related subjects