• Contact

  • Newsletter

  • About us

  • Delivery options

  • News

  • 0
    Security Issues in Communication Devices, Networks and Computing Models: Volume 1

    Security Issues in Communication Devices, Networks and Computing Models by Kumar, Budati Anil; Ramakrishna, Akella; Makkena, Goutham;

    Volume 1

      • GET 10% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 115.00
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        58 201 Ft (55 430 Ft + 5% VAT)
      • Discount 10% (cc. 5 820 Ft off)
      • Discounted price 52 381 Ft (49 887 Ft + 5% VAT)

    58 201 Ft

    db

    Availability

    Not yet published.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Edition number 1
    • Publisher CRC Press
    • Date of Publication 8 May 2025

    • ISBN 9781032832111
    • Binding Hardback
    • No. of pages252 pages
    • Size 254x178 mm
    • Language English
    • Illustrations 112 Illustrations, black & white; 17 Halftones, black & white; 95 Line drawings, black & white; 33 Tables, black & white
    • 700

    Categories

    Short description:

    In summary, addressing security issues in communication devices, networks, and computing models is fundamental to the successful implementation of Industry 5.0. It not only protects the assets and operations of organizations but also contributes to the overall safety, reliability, and sustainability of advanced industrial systems.

    More

    Long description:

    The importance of addressing security issues in communication devices, networks, and computing models in Industry 5.0 cannot be overstated. Industry 5.0 represents the next phase in the evolution of manufacturing and industrial processes, characterized by increased connectivity, automation, and the integration of smart technologies. Here are several reasons why security is crucial in this context: Industry 5.0 involves the convergence of information technology (IT) and operational technology (OT), making industrial control systems susceptible to cyber threats. A breach in security could compromise critical infrastructure such as power grids, transportation systems, and water treatment plants. Securing computing models and networks is vital for protecting critical infrastructure and ensuring the safety and stability of essential services.


    Industry 5.0 encourages the use of advanced technologies such as the Industrial Internet of Things (IIoT) and edge computing, leading to increased data exchange and collaboration. Security issues could result in the theft or manipulation of intellectual property, proprietary designs, and sensitive business information. Robust security measures are necessary to safeguard intellectual property, maintain a competitive edge, and foster innovation within Industry 5.0 ecosystems. Communication devices and networks in Industry 5.0 transmit vast amounts of sensitive data, including production data, supply chain information, and operational metrics. Ensuring the integrity and confidentiality of this data is crucial for informed decision-making and maintaining a competitive advantage. Security breaches could lead to data manipulation, unauthorized access, and exposure of sensitive information, jeopardizing the trust of stakeholders and partners. Industry 5.0 involves interconnected supply chains, where multiple entities collaborate and share data. Weaknesses in communication devices and networks can be exploited to compromise the integrity of the entire supply chain, impacting product quality and safety. Securing communication channels and computing models is vital for maintaining the trustworthiness of the supply chain, ensuring product quality, and minimizing the risk of counterfeit components.


    In summary, addressing security issues in communication devices, networks, and computing models is fundamental to the successful implementation of Industry 5.0. It not only protects the assets and operations of organizations but also contributes to the overall safety, reliability, and sustainability of advanced industrial systems.

    More

    Table of Contents:

    About the Editors. List of Contributors. 1. Clean Architecture in Mobile Development by Practice. 2. Declarative iOS Programming and Architectural Patterns. 3. Android Malware Prediction Model using Hybrid Machine Learning Approach for Cybersecurity. 4. Dissecting PREFETCHX: Understanding Cross-Core Attacks in Hardware Security. 5. Exploring the Semantic Web in Healthcare. 6. Using Data-driven Approaches to Enhance Rider Experience via Wifi and Bluetooth. 7. Cooperative Spectrum Sensing using Random Forest Algorithm over Rayleigh Fading Channel. 8. A Novel Approach in Face Recognition for Smart- Attendance Monitoring System. 9. Fingerprint based Security System for Mitigating Voting Corruption. 10. PCG Classification using Scalogram and CNN Classifier. 11. Unlocking AI's Potential for Optimizing Personalized Treatment Plans and Predicting Lung Cancer. 12. Developing Wireless Body Area Network WBAN with Secure Data Access and Improved Hybrid Blockchain Technique. 13. Gesture Recognition Gloves for Sign Language Translation. 14. Photo Acoustic Tomography- Breast Cancer Detection using Point Spread Function. 15. A Computational Efficient Image Encryption Technique using 4DChaotic System (CIE4DC) in Dynamic Network. 16. Data Science Applications in Health Care Data Transmission. 17. Secure and Scalable Data Analysis Framework with Quantum. 18. Enhancing Privacy in Big Data Analytics with Blockchain-based Frameworks. 19. Enhancing Network Security Management with Scalable Blockchain Models. 20. Mathematical modelling for Identification using Fuzzy Matching System. 21. Performance Evaluation of a Pre-compensated ROF System. 22. Robust and Imperceptible Dual Watermarking for Watershed Images. Index. 

    More