دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Ahmed Banafa
سری: River Publishers Series in Computing and Information Science and Technology
ISBN (شابک) : 8770226849, 9788770226844
ناشر: River Publishers
سال نشر: 2023
تعداد صفحات: 259
[260]
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 20 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Quantum Computing and Other Transformative Technologies به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب محاسبات کوانتومی و سایر فناوریهای تحولآفرین نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب محاسبات کوانتومی را بهعنوان یک فناوری دگرگونکننده و کاربردهای آن در ارتباطات، رمزنگاری، حملونقل از راه دور، اینترنت اشیا، هوش مصنوعی و بلاک چین، علاوه بر مفهوم انقلابی اینترنت کوانتومی بررسی میکند. همچنین مفهوم داده های تاریک، کوچک و غلیظ را توضیح می دهد و مفهوم دریاچه داده را روشن می کند. سایر فناوریهای هیجانانگیز مانند محاسبات لبه/مه، CDN، SDN، فناوری پوشیدنی و موضوعات IoE به تفصیل در کتاب مورد بحث قرار گرفتهاند. کاربردهای امنیت اطلاعات مانند مدل اعتماد صفر، آسیبپذیری روز صفر و تحلیل اکتشافی و استفاده از هوش مصنوعی در امنیت سایبری مورد بررسی قرار گرفتهاند. دو مورد از جذابترین مفاهیم در محاسبات، "محاسبات عاطفی" و "محاسبات خودکار" توضیح داده شده و ساده شدهاند. برنامه های بلاک چین ارائه شده شامل بلاک چین و زنجیره تامین، جمع سپاری، ارز دیجیتال و اینترنت اشیا است. کتاب با نگاهی به استفاده از فناوری برای مبارزه با کووید-19 و همهگیریهای آینده به پایان میرسد.
This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. It also explains the concept of dark, small, thick data, and clarifies the concept of a data lake. Other exciting technologies like edge/fog computing, CDN, SDN, wearable technology and IoE topics are discussed in detail in the book. Information security applications like zero trust model, zero-day vulnerability and heuristic analysis, and use of AI in cybersecurity are explored. Two of the most intriguing concepts in computing, “affective computing” and “autonomic computing”, are explained and simplified. The blockchain applications presented include blockchain and supply chain, crowdsourcing, cryptocurrency, and IoT. The book ends with a look at using technology to fight COVID-19 and future pandemics.
Cover Half Title Series Page Title Page Copyright Page Dedication Table of Contents Preface Audience Acknowledgment List of Figures List of Abbreviations Introduction Part 1: Quantum Computing Chapter 1: What is Quantum Computing? 1.1: A Comparison of Classical and Quantum Computing 1.2: Quantum Superposition and Entanglement 1.3: Difficulties with Quantum Computers 1.4 The Future of Quantum Computing References Chapter 2: Quantum Cryptography 2.1: Problems with using Quantum Cryptography References Chapter 3: Quantum Internet 3.1: What is Quantum Internet? 3.2: Quantum Communications References Chapter 4: Quantum Teleportation 4.1: Quantum Teleportation: Paving the Way for a Quantum Internet References Chapter 5: Quantum Computing and IoT 5.1: A Comparison of Classical and Quantum Computing 5.2: Quantum Communications 5.3: Quantum Computing and IoT 5.4: The Road Ahead References Chapter 6: Quantum Computing and Blockchain: Myths and Facts 6.1: Difficulties with Quantum Computers 6.2: What Is Quantum Supremacy? 6.3: What is Quantum Cryptography? References Chapter 7: Quantum Computing and AI: A Mega-Buzzword 7.1: What is Quantum Computing? 7.2: Difficulties with Quantum Computers 7.3: Applications of Quantum Computing and AI 7.4: Processing Large Sets of Data 7.5: Solve Complex Problem Faster 7.6: Better Business Insights and Models 7.7: Integration of Multiple Sets of Data 7.8: The Future References Chapter 8: Quantum Computing Trends 8.1: A Comparison of Classical and Quantum Computing 8.2: Physical vs. Logical Qubits 8.3: Quantum Superposition and Entanglement 8.4: Quantum Emulator/Simulator 8.5: Quantum Annealer 8.6: Noisy Intermediate-Scale Quantum (NISQ) Computers 8.7: Universal Quantum Computers/Cryptographically Relevant Quantum Computers (CRQC) 8.8: Post-Quantum/Quantum-Resistant Codes 8.9: Difficulties with Quantum Computers References Part 2: Other Computing Technologies Chapter 9: What is Deep Learning? 9.1: Neural Network 9.2: Deep Learning vs. Machine Learning 9.3: The Deep Learning Game 9.4: The Future References Chapter 10: Affective Computing 10.1: Emotion in Machines 10.2: The Future References Chapter 11: Autonomic Computing 11.1: Benefits 11.2: Future of Autonomic Computing References Part 3: Big Data, Dark Data, Thick Data, and Small Data Chapter 12: Thick Data vs. Big Data 12.1: Comparison of Big Data and Thick Data References Chapter 13: Understanding Dark Data 13.1: Types of Dark Data 13.2: Value of Dark Data 13.3: Future of Dark Data References Chapter 14: Small Data vs. Big Data: Back to the Basics 14.1: Why Small Data? 14.2: The Future of Small Data References Chapter 15: What is a Data Lake? 15.1: Data Lake vs. Data Warehouse 15.2: Five Key Components of a Data Lake Architecture 15.3: Data Lake Advantages 15.4: Data Lake Disadvantages 15.5: The Future References Part 4: Cloud Computing Chapter 16: Edge Computing Paradigm 16.1: Advantages of Edge Computing 16.2: Benefits of Edge Computing 16.3: Real-Life Example 16.4: Future of Edge Computing References Chapter 17: The Internet of Everything 17.1: What is the Internet of Everything (IoE)? 17.2: Pillars of the Internet of Everything (IoE) 17.3: The Internet of Things (IoT) 17.4: The Difference Between IoE and IoT 17.5: The Future References Chapter 18: Content Delivery Networks – CDNs 18.1: Dynamics of CDNs 18.2: Difference Between Serving Content without a CDN and with a CDN 18.3: Types of Services 18.4: Advantages of CDNs 18.5: Disadvantages of CDNs 18.6: The Future References Chapter 19: Network Functions Virtualization (NFV) or Software-Defined Networking (SDN)? 19.1: What is Network Functions Virtualization (NFV)? 19.2: The Benefits of NFV 19.3: Types of NFV 19.4: Which is Better – SDN or NFV? 19.5: The Future of NFV References Chapter 20: What is Virtualization? 20.1: What is Virtualization? 20.2: Types of Virtualizations 20.3: How is Virtualization Different from Cloud Computing? 20.4: The Future of Virtualization References Chapter 21: Risks of Cloud Computing Explained (Both Sides) 21.1: The Risks Will Never Diminish References Chapter 22: Cloud-of-Clouds or (Intercloud) 22.1: The Future References Chapter 23: Myths and Facts About Cloud Computing 23.1: Types of Cloud Computing 23.2: The Promise of Cloud Computing 23.3: What is Next for Cloud Computing? Part 5: Security Chapter 24: Zero-Day Vulnerability and Heuristic Analysis 24.1: What is a Zero-Day Vulnerability? 24.2: Zero-Day Exploit 24.3: Zero-Day Threat 24.4: Defending Against Zero-Day Threats 24.5: What are Heuristics? References Chapter 25: The Zero Trust Model 25.1: “Outside-In” to “Inside-Out” Attacks 25.2: Zero Trust Recommendations References Chapter 26: Cloud Computing Security 26.1: Cloud Security Threats 26.2: The Future Chapter 27: First Line of Defense for Cybersecurity: AI 27.1: Four Fundamental Security Practices 27.1.1: Identifying the patterns 27.1.2: Educating the users 27.1.3: Patching the holes 27.1.4: Checking off the controls 27.2: Challenges Faced by AI in Cybersecurity 27.2.1: AI-powered attacks 27.2.2: More sandbox-evading malware 27.2.3: Ransomware and IoT 27.2.4: A rise of state-sponsored attacks 27.2.5: Shortage of skilled staff 27.2.6: IT infrastructure 27.3: The Future of Cybersecurity and AI References Chapter 28: Second Line of Defense for Cybersecurity: Blockchain 28.1: Implementing Blockchain in Cybersecurity 28.2: Advantages of using Blockchain in Cybersecurity 28.2.1: Decentralization 28.2.2: Tracking and tracing 28.2.3: Confidentiality 28.2.4: Fraud security 28.2.5: Sustainability 28.2.6: Integrity 28.2.7: Resilience 28.2.8: Data quality 28.2.9: Smart contracts 28.2.10: Availability 28.2.11: Increased customer trust 28.3: Disadvantages of using Blockchain in Cybersecurity 28.3.1: Irreversibility 28.3.2: Storage limits 28.3.3: Risk of cyberattacks 28.3.4: Adaptability challenges 28.3.5: High operation costs 28.3.6: Blockchain literacy 28.4: Conclusion References Chapter 29: Network Security Needs Big Data 29.1: Zero Trust Model (ZTM) 29.2: Big Data and ZTM Part 6: Blockchain Chapter 30: Blockchain Technology and COVID-19 30.1: Major Challenges of COVID-19 30.2: Can Blockchain Help in Preventing Pandemics? 30.3: Tracking Infectious Disease Outbreaks 30.4: Donations Tracking 30.5: Crisis Management 30.6: Securing Medical Supply Chains 30.7: WHO and Blockchain Technology References Chapter 31: How Blockchain is Revolutionizing Crowdfunding 31.1: Limitations of Current Crowdfunding Platforms 31.2: How Blockchain Helps Crowdfunding References Chapter 32: Blockchain Technology and Supply Chain Management 32.1: Blockchain and SCM 32.2: Applications of Blockchain in SCM References Part 7: IoT Chapter 33: IoT and COVID-19 33.1: IoT and WFH 33.2: IoT and Blockchain 33.3: IoT and E-Commerce 33.4: IoT and Telemedicine References Chapter 34: IoT and 5G Convergence 34.1: Benefits of using 5G in IoT 34.1.1: Higher transmission speed 34.1.2: More devices connected 34.1.3: Lower latency 34.2: Challenges Faced by 5G and IoT Convergence 34.2.1: Operating across multiple spectrum bands 34.2.2: A gradual upgradation from 4G to 5G 34.2.3: Data interoperability 34.2.4: Establishing 5G business models 34.3: Examples of Applications of 5G in IoT 34.3.1: Automotive 34.3.2: Industrial 34.3.3: Healthcare References Part 8: Wearable and Mobile Technology Chapter 35: The Smart Platform: Wearable Computing Devices (WCD) 35.1: Concerns with Wearable Computing Devices 35.2: Applications of Wearable Computing Devices 35.3: The Future of Wearable Computing Devices References Chapter 36: Your Smart Device Will Feel Your Pain and Fear References Chapter 37: Technology Under Your Skin: Three Challenges of Microchip Implants References Part 9: Future Trends in Technology Chapter 38: The Metaverse: A Different Perspective 38.1: Different Perspective of the Metaverse 38.2: Pillars of the Metaverse 38.3: The Future References Chapter 39: The Metaverse: Myths and Facts 39.1: Myths about the Metaverse 39.1.1: Myth #1: No one knows what the metaverse is 39.1.2: Myth #2: The metaverse is only gaming 39.1.3: Myth #3: The metaverse is only virtual reality 39.1.4: Myth #4: The metaverse will replace the real world 39.1.5: Myth #5: The metaverse is a fad 39.1.6: Myth #6: The metaverse will be a monopoly 39.1.7: Myth #7: The speed of technology will set the pace for adoption 39.1.8: Myth #8: The metaverse is already here 39.1.9: Myth #9: The metaverse is inevitable 39.1.10: Myth #10: The metaverse is suitable for everything 39.2: What is the Future of the Metaverse? References Chapter 40: Eight Key Tech Trends in a Post-COVID-19 World 40.1: Artificial Intelligence (AI) 40.2: Cloud Computing 40.3: VR/AR 40.4: 5G Networks 40.5: Voice User Interface (VUI) 40.6: Internet of Things (IoT) 40.7: Cybersecurity 40.8: Blockchain Technology 40.9: Tracking Infectious Disease Outbreaks 40.10: Donations Tracking 40.11: Crisis Management 40.12: Securing Medical Supply Chains References References Index About the Author