×
Receive a 20% Discount on All Purchases Directly Through IGI Global's Online Bookstore.
Additionally, libraries can receive an extra 5% discount.
Learn More
Shopping Cart
Login
Register
Language:
English
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
Subscribe to the latest research through IGI Global's new InfoSci-OnDemand Plus
InfoSci®-OnDemand Plus, a subscription-based service, provides researchers the ability to access full-text content from over 93,000+ peer-reviewed book chapters and 24,000+ scholarly journal articles covering 11 core subjects. Users can select articles or chapters that meet their interests and gain access to the full content permanently in their
personal online InfoSci-OnDemand Plus library
.
Subscribe
Purchase the Encyclopedia of Information Science and Technology, Fourth Edition
and Receive Complimentary E-Books of Previous Editions
When ordering directly through IGI Global's Online Bookstore, receive the complimentary e-books for the first, second, and third editions with the purchase of the Encyclopedia of Information Science and Technology, Fourth Edition e-book.
Purchase
Create a Free IGI Global Library Account to Receive a 25% Discount on All Purchases
Exclusive benefits include one-click shopping, flexible payment options, free COUNTER 4 and MARC records, and a 25% discount on all titles as well as the award-winning InfoSci
®
-Databases.
Sign Up Now!
InfoSci
®
-Journals Annual Subscription Price for New Customers: As Low As US$ 4,080*
This collection of over 185 e-journals offers unlimited access to highly-cited, forward-thinking content in full-text PDF and HTML with no DRM. There are no platform or maintenance fees and a guarantee of no more than 5% increase annually.
Learn More
Discounted Titles Only Available through IGI Global’s Online Bookstore
Take 20% off all publications purchased directly through the IGI Global Online Bookstore.
Shop Now
Books
Journals
InfoSci
®
-Databases
Articles/Chapters
Publish
with Us
Resources
Librarians
InfoSci
®
-Databases
Book Title List
Journal Title List
Video Title List
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Library Account Program
Instructors
Course Adoption
Teaching Cases
Researchers
Browse Books
Browse Journals
Streaming Videos
OnDemand Downloads
Webinars
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
Fair Use Policy
Copy Editing Service
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Catalogs
About Us
Newsroom
Bookstore Search
Reset
Total results: 155
Sort by:
Relevancy
Title (asc)
Title (desc)
Copyright Year (asc)
Copyright Year (desc)
Sample PDF
Cryptographic Security Solutions for the Internet of Things
Mohammad Tariq Banday. © 2019. 367 pages.
The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly...
Reference Book
Sample PDF
Mobile Network Forensics: Emerging Research and Opportunities
Filipo Sharevski. © 2019. 337 pages.
Modern communications are now more than ever heavily dependent on mobile networks, creating the potential for higher incidents of sophisticated crimes, terrorism acts, and high impact cyber security breaches. Disrupting these unlawful actions requires a number of digital forensic principles and a...
Reference Book
Sample PDF
Emergency and Disaster Management: Concepts, Methodologies, Tools, and Applications
Information Resources Management Association. © 2019. 1723 pages.
In a world of earthquakes, tsunamis, and terrorist attacks, emergency response plans are crucial to solving problems, overcoming challenges, and restoring and improving communities that have been affected by these catastrophic events. Although the necessity for quick and efficient aid is understood...
Reference Book
Sample PDF
Cybersecurity Education for Awareness and Compliance
Ismini Vasileiou, Steven Furnell. © 2019. 300 pages.
Understanding cybersecurity principles and practices is vital to all users of IT systems and services, and is particularly relevant in an organizational setting where the lack of security awareness and compliance amongst staff is the root cause of many incidents and breaches. If these are to be...
Reference Book
Sample PDF
Post-Narratology Through Computational and Cognitive Approaches
Takashi Ogata, Taisuke Akimoto. © 2019. 521 pages.
Studying narratives is an ideal method to gain a good understanding of how various aspects of human information are organized and integrated. The concept and methods of a narrative, which have been explored in narratology and literary theories, are likely to be connected with contemporary information...
Reference Book
Sample PDF
Machine Learning and Cognitive Science Applications in Cyber Security
Muhammad Salman Khan. © 2019. 350 pages.
In the past few years, with the evolution of advanced persistent threats and mutation techniques, sensitive and damaging information from a variety of sources have been exposed to possible corruption and hacking. Machine learning, artificial intelligence, predictive analytics, and similar disciplines...
Reference Book
Sample PDF
Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems
S. Geetha, Asnath Victy Phamila. © 2019. 334 pages.
The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and...
Reference Book
Sample PDF
Developments in Information Security and Cybernetic Wars
Muhammad Sarfraz. © 2019. 320 pages.
As internet technologies continue to advance, new types and methods of data and security breaches threaten national security. These potential breaches allow for information theft and can provide footholds for terrorist and criminal organizations. Developments in Information Security and Cybernetic Wars...
Reference Book
Sample PDF
Biotechnology: Concepts, Methodologies, Tools, and Applications
Information Resources Management Association. © 2019. 2250 pages.
Biotechnology can be defined as the manipulation of biological process, systems, and organisms in the production of various products. With applications in a number of fields such as biomedical, chemical, mechanical, and civil engineering, research on the development of biologically inspired materials...
Reference Book
Sample PDF
International Journal of Translation, Interpretation, and Applied Linguistics (IJTIAL)
Wei Zhao, Ying Cui. © 2019.
The International Journal of Translation, Interpretation, and Applied Linguistics (IJTIAL) is a biannual innovative forum for researchers and practitioners from any part of the world to disseminate the latest trends, techniques, and practical solutions in the growing fields of translation...
Journal
Sample PDF
International Journal of Cyber Research and Education (IJCRE)
Lawrence A. Tomei. © 2019.
The International Journal of Cyber Research and Education (IJCRE) is a high quality, peer-reviewed journal that covers applied, theoretical, and operational research, sponsored academic education and corporate training, and the application to knowledge in academia, government, corporate, and law...
Journal
Sample PDF
Use of Social Media for Disaster Management: A Prescriptive Framework
Louis Ngamassi, Thiagarajan Ramakrishnan, Shahedur Rahman. © 2019. 21 pages.
Social media is emerging as an important information-based communication tool for disaster management. Yet there are many relief organizations that are not able to develop strategies and allocate resources to effectively use social media for disaster management. The reason behind this inability may be...
Source:
Emergency and Disaster Management: Concepts, Methodologies, Tools, and...
Sample PDF
The Risk Management Profession in Australia: Business Continuity Plan Practices
Adela McMurray, Jean Cross, Carlo Caponecchia. © 2019. 14 pages.
This study aimed to identify to what extent Australian organizations have any plans to manage business continuity threats, and the nature and content of these plans. Sixty-four respondents who were risk management professionals were surveyed to explore the Business Continuity Practices within their...
Source:
Emergency and Disaster Management: Concepts, Methodologies, Tools, and...
Sample PDF
Application of Conventional Data Mining Techniques and Web Mining to Aid Disaster Management
Akshay Kumar, Alok Bhushan Mukherjee, Akhouri Pramod Krishna. © 2019. 30 pages.
Data mining techniques have potential to unveil the complexity of an event and yields knowledge that can create a difference. They can be employed to investigate natural phenomena; since these events are complex in nature and are difficult to characterize as there are elements of uncertainty involved...
Source:
Emergency and Disaster Management: Concepts, Methodologies, Tools, and...
Sample PDF
Using Long Endurance Remotely Piloted Aircraft Systems to Support Humanitarian Logistic Operations: A Case Study of Cyclone Winston
Peter Tatham, Catherine M. Ball, Yong Wu, Pete Diplas. © 2019. 15 pages.
Whilst there has been some limited use of Remotely Piloted Aircraft Systems (RPAS) as part of the response to natural disasters, to date these have typically employed short range mini or micro systems. Using a case study of Cyclone Winston that struck Fiji in February 2016, this chapter demonstrates...
Source:
Emergency and Disaster Management: Concepts, Methodologies, Tools, and...
Sample PDF
Processing Big Data for Emergency Management
Rajendra Akerkar. © 2019. 21 pages.
Emergencies are typically complex problems with serious consequences that must be solved in a limited amount of time to reduce any possible damage. Big data analysis leads to more assured decision making and better decisions can mean greater operational efficiencies, cost reductions and reduced risk....
Source:
Emergency and Disaster Management: Concepts, Methodologies, Tools, and...
Sample PDF
Assessing Risk and Safeguarding Rare Library Materials During Exhibition Loans
Patti Gibbons. © 2019. 12 pages.
Rare book and archival materials on loan to libraries and other cultural heritage institutions are very often historically significant, highly valuable, and frequently irreplaceable. Lenders minimize risks present during exhibitions loans of these valuable materials by identifying and addressing...
Source:
Emergency and Disaster Management: Concepts, Methodologies, Tools, and...
Sample PDF
Emergency Ethics, Law, Policy and IT Innovation in Crises
Xaroula Kerasidou, Monika Buscher, Michael Liegl, Rachel Oliphant. © 2019. 27 pages.
Ethics, law, and policy are cornerstones for effective IT innovation in crisis response and management. While many researchers and practitioners recognise this, it can be hard to find good resources for circumspect innovation approaches. This paper reviews The Library of Essays on Emergency Ethics, Law...
Source:
Emergency and Disaster Management: Concepts, Methodologies, Tools, and...
Sample PDF
Network Forensics: Practice
© 2019. 27 pages.
In the last few decades, networks have grown to accommodate evolved technologies on every open system for interconnection (OSI) level. On the physical and data link layers, numerous wireless innovations introduced the mobile networks and the interconnection of smart objects. The innovations in network...
Source:
Mobile Network Forensics: Emerging Research and Opportunities
Sample PDF
Taking Perspectives in Digital Storytelling on Business Planning
Yoko Takeda. © 2019. 23 pages.
Digital storytelling for business planning has the narrative mode and the logical scientific mode. This chapter explores how the structure of the digital storytelling work affects its effectiveness and how the storyteller's reflection influences the improvement of the work. It is critical to...
Source:
Post-Narratology Through Computational and Cognitive Approaches
Sample PDF
Smart Video Surveillance Systems and Identification of Human Behavior Analysis
M. Sivabalakrishnan, R. Menaka, S. Jeeva. © 2019. 34 pages.
Smart surveillance cameras are placed in many places such as bank, hospital, toll gates, airports, etc. To take advantage of the video in real time, a human must monitor the system continuously in order to alert security officers if there is an emergency. Besides, for event detection a person can...
Source:
Countering Cyber Attacks and Preserving the Integrity and Availability of...
Sample PDF
Lightweight Secure Architectural Framework for Internet of Things
Muthuramalingam S., Nisha Angeline C. V., Raja Lavanya. © 2019. 12 pages.
In this IoT era, we have billions of devices connected to the internet. These devices generate tons of data that has to be stored, processed, and used for making intelligent decisions. This calls for the need for a smart heterogeneous network which could handle this data and make the real-time systems...
Source:
Countering Cyber Attacks and Preserving the Integrity and Availability of...
Sample PDF
Blockchain Technology Is a Boost to Cyber Security: Block Chain
Sowmiya B., Poovammal E. © 2019. 13 pages.
The information in any real-time application is needed to be digitalized across the world. Since digitalization of data happens, there comes the role of privacy. Blockchain could address the security challenge that happens in the any real sector. There are a few more challenges that prevail in the...
Source:
Countering Cyber Attacks and Preserving the Integrity and Availability of...
Sample PDF
Encryption Principles and Techniques for the Internet of Things
Kundankumar Rameshwar Saraf, Malathi P. Jesudason. © 2019. 25 pages.
This chapter explores the encryption techniques used for the internet of things (IoT). The security algorithm used for IoT should follow many constraints of an embedded system. Hence, lightweight cryptography is an optimum security solution for IoT devices. This chapter mainly describes the need for...
Source:
Cryptographic Security Solutions for the Internet of Things
Sample PDF
Hardware Primitives-Based Security Protocols for the Internet of Things
Muhammad Naveed Aman, Kee Chaing Chua, Biplab Sikdar. © 2019. 25 pages.
IoT is the enabling technology for a variety of new exciting services in a wide range of application areas including environmental monitoring, healthcare systems, energy management, transportation, and home and commercial automation. However, the low-cost and straightforward nature of IoT devices...
Source:
Cryptographic Security Solutions for the Internet of Things
Page
/
7