Author:Machaka, P; Nelwamondo, Fulufhelo VDate:Aug 2016This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service ...Read more
Author:Harmse, Henriette; Britz, Katarina; Gerber, Aurona JDate:Sep 2018The W3C standardized Semantic Web languages enable users to capture data without a schema in a manner which is intuitive to them. The challenge is that, for the data to be useful, it should be possible to query the data and to query it ...Read more
Author:Venter, JP; De Waal, A; Willers, NDate:Jan 2007Forensic analysis requires a keen detective mind, but the human mind has neither the ability nor the time to process the millions of bytes on a typical computer hard disk. Digital forensic investigators need powerful tools that can automate ...Read more