River Publishers Series in Information Science and Technology Series

Quantum Computing and Other Transformative Technologies

March 2022
More details
  • Publisher
    River Publishers
  • ISBN 9788770226844
  • Language English
  • Pages 200 pp.
  • Size 6" x 9"
Lib E-Book

Library E-Books

We are signed up with aggregators who resell networkable e-book editions of our titles to academic libraries. These editions, priced at par with simultaneous hardcover editions of our titles, are not available direct from Stylus.

These aggregators offer a variety of plans to libraries, such as simultaneous access by multiple library patrons, and access to portions of titles at a fraction of list price under what is commonly referred to as a "patron-driven demand" model.

March 2022
More details
  • Publisher
    River Publishers
  • ISBN 9788770226837
  • Language English
  • Pages 200 pp.
  • Size 6" x 9"

This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. It also explains the concept of dark, small, thick data, and clarifies what the concept of a data lake is. Other exciting technologies such as edge/fog computing, CDN, SDN, wearable technology and IoE topics are discussed in detail. Information security applications like zero trust model, zero-day vulnerability and heuristic analysis, and use of AI in cybersecurity are explored. Two of the most intriguing concepts in computing “affective computing” and “autonomic computing” are explained and simplified. The blockchain applications presented include blockchain and supply chain, crowdsourcing, cryptocurrency, and IoT. The book ends with a look at using technology to fight COVID-19 and future pandemics.

Part 1: Quantum Computing
1 What is Quantum Computing
2 Quantum Cryptography
3 Quantum Internet
4 Quantum teleportation
5 Quantum Computing and IoT
6 Quantum Computing and Blockchain: Myths and Facts
7 Quantum Computing and AI: A Mega-Buzzword
8 Future of Quantum Computing
Part 2: Big Data
9 Big Data and Thick Data
10 Small Data vs. Big Data
11 Understanding Dark Data
12 What is a Data Lake?
Part 3: Cloud Computing
13 Risks of Cloud Computing explained
14 The Smart Platform: Wearable Computing Devices (WCD)
15 Fog Computing
16 Content Delivery Networks – CDNs
17 Network Functions Virtualization (NFV) and Software-defined Networking (SDN)
18 The Internet of Everything
Part 4: Security
19 The Zero Trust Model
20 Zero-Day Vulnerability and Heuristic Analysis
21 Cybersecurity and AI
22 IoT Security
Part 5: Data Analytics
23 What Is Deep Learning?
24 Affective Computing
25 Autonomic Computing
Part 6: Blockchain
26 What is Blockchain
27 Blockchain Technology and Supply Chain Management
28 How Blockchain Is Revolutionizing Crowdfunding
29 Blockchain and Cybersecurity
30 Blockchain and IoT
31 Blockchain and AI
32 Blockchain and Cryptocurrency
Part 7: Technology and COVID-19
33 IoT and COVID-19
34 Blockchain Technology and COVID-19
35 Eight Key Tech Trends in a Post-COVID-19 World

Ahmed Banafa

Professor Ahmed Banafa has extensive experience in research, operations and management, with a focus on IoT, blockchain, cybersecurity and AI. He is the recipient of a Certificate of Honor from the City and County of San Francisco and the Author & Artist Award 2019 of San Jose State University. He was named number 1 tech voice to follow, technology fortune teller and influencer by LinkedIn in 2018, his research has been featured in Forbes, IEEE and MIT Technology Review, and he has been interviewed by ABC, CBS, NBC, CNN, BBC, NPR and Fox. He is a member of the MIT Technology Review Global Panel. He is the author of the book Secure and Smart Internet of Things (IoT) using Blockchain and Artificial Intelligence (AI) which won 3 awards, the San Jose State University Author & Artist Award, One of the Best Technology eBooks of all Time Award, and One of the Best AI Model Books of All Time Award. His second book was Blockchain Technology and Applications used at Stanford University and other prestigious schools in the USA. He studied Electrical Engineering at Lehigh University, Cybersecurity at Harvard University and Digital Transformation at Massachusetts Institute of Technology (MIT).

Quantum Computing; Affective Computing; Fog Computing; Cloud Computing; Big Data; Small Data; Thick Data; Big Data Analytics; AI; Blockchain; Bitcoin; Ethereum; IoT; Internet of Things; Cybersecurity; Network Security; Zero-Trust Model; Deep Learning; Google; Facebook; Quantum Cryptography; Quantum Internet; Quantum teleportation; Dark Data; Data Lake; Wearable Computing Devices (WCD); Content Delivery Networks – CDNs; Autonomic Computing; Network Functions Virtualization (NFV) and Software-Defined Networking (SDN); The Internet of Everything; Cryptocurrency; COVID-19; Zero-Day Vulnerability and Heuristic Analysis Smart Contracts; Hybrid Cloud Computing; Private Cloud Computing; Hybrid Blockchain; Private Blockchain; Hybrid Blockchain; Superposition; Entanglement; Quantum Communications; VUI; Voice User Interface; Internet of Everything; VR; AR; 5G; Virtual Reality; Augment Reality; IIoT; Industrial Internet of Things; Robots; Crowdsourcing; Supply Chain; WHO; Open Source; Microsoft; Wearable Technology; Smart Devices; Alexa; Siri; R2D2; C3PO; Jarvis; Sci-Fi movies; Wi-Fi; 4G; LTE; IEEE