0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (269)
  • R250 - R500 (870)
  • R500+ (13,583)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Internet Protocol-based Emergency Services (Hardcover): H Tschofenig Internet Protocol-based Emergency Services (Hardcover)
H Tschofenig
R2,350 Discovery Miles 23 500 Ships in 18 - 22 working days

Written by international experts in the field, this book covers the standards, architecture and deployment issues related to IP-based emergency services This book brings together contributions from experts on technical and operational aspects within the international standardisation and regulatory processes relating to routing and handling of IP-based emergency calls. Readers will learn how these standards work, how various standardization organizations contributed to them and about pilot projects, early deployment and current regulatory situation. Key Features: * Provides an overview of how the standards related to IP-based emergency services work, and how various organizations contributed to them * Focuses on SIP and IMS-based communication systems for the Internet * Covers standards, architecture and deployment issues * International focus, with coverage of the major national efforts in this area * Written by the experts who were/are involved in the development of the standards (NENA, EENA, 3GPP, IETF, ETSI, etc.) * Accompanying website provides updates on standards and deployment (http://ip-emergency.net) This book is an excellent resource for vendors building software and equipment for emergency services, engineers/researchers engaged in development of networks and network elements and standardization, emergency services providers, standardization experts, product persons, those within the regulatory environment. Students and lecturers, infrastructure and application service providers will also find this book of interest.

Multiaccess, Mobility and Teletraffic for Wireless Communications, volume 6 (Hardcover, 2002 ed.): Xavier Lagrange, Bijan... Multiaccess, Mobility and Teletraffic for Wireless Communications, volume 6 (Hardcover, 2002 ed.)
Xavier Lagrange, Bijan Jabbari
R4,206 Discovery Miles 42 060 Ships in 18 - 22 working days

Third generation networks have been specified and are now being deployed in a few countries. They are expected to reach maturity in the next several years and to provide various services including audio, video, and world wide web browsing. Furthermore, radio terminals are expected to be integrated in a number of devices such as personal computers, personal digital assistants, and even television sets. Such a wide-usage of radio mandates ongoing research to address design of networks with high capacity while providing acceptable quality of service. Included in Multiaccess, Mobility and Teletraffic for Wireless Communications: Volume 6 are new results on the optimization of protocols in third generation systems. The radio channel is dynamically shared among several users using packet access, it must adapt to a varying number of users and accomodate various services. Several chapters deal with radio resource management and packet access both in second and third generation systems. The book also considers the performance of low layer protocols (MAC/RLC) and transport protocols (e.g., TCP) when they are combined to offer data services. IPv6 will probably be an in-use network protocol in the near future. It must efficiently manage mobility and support multimedia flows. Wireless internet is an important area and related topics are included in this book. The improvement of the network performance relies on a sophisticated and optimized physical layer. The book includes studies on joint multiple access detection, MIMO systems, use of turbo-codes and methods to improve the analysis of the channel capacity. The book also covers location management, handoff optimization, multi-hop networks andnetwork management. Mobility and Teletraffic for Wireless Communications: Volume 6 is an important book for researchers, students and professionals working in the area of wireless communications and mobile computing.

Cross-Media Service Delivery (Hardcover, 2003 ed.): Diomidis Spinellis Cross-Media Service Delivery (Hardcover, 2003 ed.)
Diomidis Spinellis
R4,141 Discovery Miles 41 410 Ships in 18 - 22 working days

Cross-Media Service Delivery is of interest to professionals and academicians working in content authoring and electronic publishing platforms; as well as in media and broadcasting.
The digitization of traditional media formats, such as text, images, video, and sound provides us with the ability to store, process, and transport content in a uniform way. This has led the formerly distinct industries of media, telecommunications, and information technology to converge. Cross-media publishing and service delivery are important new trends emerging in the content industry landscape. Mass-media organizations and content providers transitionally targeted content production towards a single delivery channel. However, recent economic and technological changes in the industry led content providers to extend their brands to cover multiple delivery channels. Following the content industry trend to "create once and publish everywhere" - COPE, a number of architectures, technologies, and tools are currently being developed and deployed to facilitate the automatic conversion of content to multiple formats, and the creation of innovative multi-platform services. This new approach enables the seamless access to information over different network infrastructures and client platforms.
This work uniquely brings together a cross-disciplinary core of contributors to address the technical and business issues of cross-media publishing and service delivery. The contributions are organized into four different areas: the business issues driving the requirements for cross media content delivery, the architectures used for delivering content to multiple platforms, technologies that address specificpractical problems, and, last but not least, concrete applications.

Discrete Password Logbook - Locked Door Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Locked Door Edition (Hardcover)
Suzeteo Enterprises
R503 Discovery Miles 5 030 Ships in 18 - 22 working days
Recent Advances in Face Recognition (Hardcover): Kresimir Delac, Mislav Grgic, Sonja Grgic Recent Advances in Face Recognition (Hardcover)
Kresimir Delac, Mislav Grgic, Sonja Grgic
R3,113 Discovery Miles 31 130 Ships in 18 - 22 working days
A Walk to the Cloud - A Gentle Introduction to Fully Managed Environments (Hardcover): Mitch Seymour A Walk to the Cloud - A Gentle Introduction to Fully Managed Environments (Hardcover)
Mitch Seymour; Illustrated by Mitch Seymour, Elyse Seymour
R582 Discovery Miles 5 820 Ships in 18 - 22 working days
Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.): Sara Foresti Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.)
Sara Foresti
R2,754 Discovery Miles 27 540 Ships in 18 - 22 working days

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Broadband Infrastructure - The Ultimate Guide to Building and Delivering OSS/BSS (Hardcover, 2003 ed.): Shailendra Jain, Mark... Broadband Infrastructure - The Ultimate Guide to Building and Delivering OSS/BSS (Hardcover, 2003 ed.)
Shailendra Jain, Mark Hayward, Sharad Kumar
R4,170 Discovery Miles 41 700 Ships in 18 - 22 working days

The companies that provide the Internet to the rest of the world do not have the luxury of setting high expectations and assuming they will be met. These Internet infrastructure companies (IICs) are responsible for delivering the Internet's promise, including everything from eBusiness and mobile Internet applications to optical services and high-speed access. The Internet's audience takes this promise for granted, and IICs face the daunting challenge of making the Internet, and networks like it, do what the audience expects them to. To meet the expectations they face, IICs must harness the power of their operations support systems (OSSs) - the software systems in the background they use to create, manage, maintain, manipulate and adapt their networks to serve customers reliably and rapidly.
Broadband Infrastructure: The Ultimate Guide to Understanding and Delivering OSS/BSS is a "how to" book for Internet infrastructure companies to help them prepare for the decisions they will face when constructing their core OSS strategies and infrastructure. This book provides a source of reference and education to learn the language, methods, and technologies associated with the OSS market. It examines the Internet infrastructure supply chain and how it will be automated. Finally, it brings together a wealth of proven knowledge and advice, gathered from BusinessEdge Solutions' extensive OSS experience, that broadband providers can use to minimize their OSS risks while maximizing their ability to differentiate and compete.

The Student Supercomputer Challenge Guide - From Supercomputing Competition to the Next HPC Generation (Hardcover, 1st ed.... The Student Supercomputer Challenge Guide - From Supercomputing Competition to the Next HPC Generation (Hardcover, 1st ed. 2018)
Asc Community
R1,733 Discovery Miles 17 330 Ships in 10 - 15 working days

This guide provides a comprehensive overview of High Performance Computing (HPC) to equip students with a full skill set including cluster setup, network selection, and a background of supercomputing competitions. It covers the system, architecture, evaluating approaches, and other practical supercomputing techniques. As the world's largest supercomputing hackathon, the ASC Student Supercomputer Challenge has attracted a growing number of new talent to supercomputing and has greatly promoted communications in the global HPC community. Enclosed in this book, readers will also find how to analyze and optimize supercomputing systems and applications in real science and engineering cases.

Memory Machines - The Evolution of Hypertext (Paperback): Belinda Barnet Memory Machines - The Evolution of Hypertext (Paperback)
Belinda Barnet
R769 Discovery Miles 7 690 Ships in 10 - 15 working days
Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover): Marcel Ohanga Odhiambo, Weston... Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover)
Marcel Ohanga Odhiambo, Weston Mwashita
R5,948 Discovery Miles 59 480 Ships in 18 - 22 working days

As the IoT market is booming, several issues are delaying the full realization of the technology. IoT devices, in cybersecurity terms, greatly increase security risk. This means that any scientific work that offers cybersecurity strategies will excite security experts who will be glad to expand their knowledge base on IoT cybersecurity. As a result of the booming of the IoT market, business competitors are jockeying for a piece of the market. This means that solutions from researchers that address compatibility issues will be greatly welcomed by IoT technology developers. Connectivity providers are likely to embrace solutions to challenges of bandwidth since a growing IoT market must be followed up by bandwidth-intensive IoT applications which tend to jostle for space on the current client-server model. Overpromising followed by underdelivering, has been the current approach by many innovators and the mismatch results in losses in production, orphaned technologies accompanied by frequent system failures. Solutions that address IoT performance issues are likely to excite many start-ups. Solutions to challenges of fragmentation presented by thousands of devices from different manufacturers operating on proprietary ecosystems are likely to be warmly embraced by many IoT brands developers. As such, a publication that specifically addresses the challenges faced in the rolling out of IoT technologies is sorely needed.

Challenges in Ad Hoc Networking - Fourth Annual Mediterranean Ad Hoc Networking Workshop, June 21-24, 2005, Ile de... Challenges in Ad Hoc Networking - Fourth Annual Mediterranean Ad Hoc Networking Workshop, June 21-24, 2005, Ile de Porquerolles, France (Hardcover, 2006 ed.)
K. Al Agha, I. Guerin Lassous, G. Pujolle
R2,717 Discovery Miles 27 170 Ships in 18 - 22 working days

This book contains the refereed proceedings of the Fourth Annual Mediterranean Ad Hoc Networking Workshop, Med-Hoc-Net 2005. Med-Hoc-Net 2005 consolidated the success of the previous editions of the workshop series. It aimed to serve as a platform for researchers from academia, research, laboratories, and industry from all over the world to share their ideas, views, reults, and experiences in the field of ad-hoc networking.

Internet Naming and Discovery - Architecture and Economics (Hardcover, 2013 ed.): Joud S. Khoury, Chaouki T. Abdallah Internet Naming and Discovery - Architecture and Economics (Hardcover, 2013 ed.)
Joud S. Khoury, Chaouki T. Abdallah
R3,267 Discovery Miles 32 670 Ships in 10 - 15 working days

Naming is an integral building block within data networks and systems and is becoming ever more important as complex data-centric usage models emerge. Internet Naming and Discovery is timely in developing a unified model for studying the topic of naming and discovery. It details the architectural and economic tools needed for designing naming and discovery schemes within the broader context of internetwork architecture. Readers will find in this book a historic overview of the Internet and a comprehensive survey of the literature, followed by and an in-depth examination of naming and discovery. Specific topics covered include: * formal definitions of name, address, identifier, locator, binding, routing, discovery, mapping, and resolution; * a discussion of the properties of names and bindings, along with illustrative case studies; * taxonomy that helps in organizing the solution space, and more importantly in identifying new avenues for contributing to the field; * a general model for exploring the tradeoffs involved in designing discovery systems; * an illustrative design exercise for differentiated discovery services; * broad treatment of the main economic issues that arise in the context of discovery; and * a game-theoretic incentive model for route distribution (and discovery) in the context of path-vector routing protocols (mainly BGP). Internet Naming and Discovery will be of great value to readers, including graduate students, engineers and computer scientists, theoreticians and practitioners, seeking a training in advanced networking, or specializing in computer and communications networks.

Localized Quality of Service Routing for the Internet (Hardcover, 2003 ed.): Srihari Nelakuditi, Zhi-Li Zhang Localized Quality of Service Routing for the Internet (Hardcover, 2003 ed.)
Srihari Nelakuditi, Zhi-Li Zhang
R1,470 Discovery Miles 14 700 Ships in 18 - 22 working days

Under Quality of Service (QoS) routing, paths for flows are selected based upon the knowledge of resource availability at network nodes and the QoS requirements of flows. QoS routing schemes proposed differ in the way they gather information about the network state and select paths based on this information. We broadly categorize these schemes into best-path routing and proportional routing. The best-path routing schemes gather global network state information and always select the best path for an incoming flow based on this global view. On the other hand, proportional routing schemes proportion incoming flows among a set of candidate paths. We have shown that it is possible to compute near-optimal proportions using only locally collected information. Furthermore, a few good candidate paths can be selected using infrequently exchanged global information and thus with minimal communication overhead.

Localized Quality Of Service Routing For The Internet, describes these schemes in detail demonstrating that proportional routing schemes can achieve higher throughput with lower overhead than best-path routing schemes. It first addresses the issue of finding near-optimal proportions for a given set of candidate paths based on locally collected flow statistics. This book will also look into the selection of a few good candidate paths based on infrequently exchanged global information. The final phase of this book will describe extensions to proportional routing approach to provide hierarchical routing across multiple areas in a large network.

Localized Quality Of Service Routing For The Internet is designed for researchers and practitioners in industry, and is suitable for graduatelevel students in computer science as a secondary text.

Piecewise Linear Modeling and Analysis (Hardcover, 1998 ed.): Domine Leenaerts, Wim M.G.Van Bokhoven Piecewise Linear Modeling and Analysis (Hardcover, 1998 ed.)
Domine Leenaerts, Wim M.G.Van Bokhoven
R4,119 Discovery Miles 41 190 Ships in 18 - 22 working days

Piecewise Linear (PL) approximation of non-linear behaviour is a well-known technique in synthesis and analysis of electrical networks. However, the PL description should be efficient in data storage and the description should allow simple retrieval of the stored information. Furthermore, it would be useful if the model description could handle a large class of piecewise linear mappings. Piecewise Linear Modeling and Analysis explains in detail all possible model descriptions for efficiently storing piecewise linear functions, starting with the Chua descriptions. Detailed explanation on how the model parameter can be obtained for a given mapping is provided and demonstrated by examples. The models are ranked to compare them and to show which model can handle the largest class of PL mappings. All model descriptions are implicitly related to the Linear Complementarity Problem and most solution techniques for this problem, like Katzenelson and Lemke, are discussed according to examples that are explained in detail. To analyse PL electrical networks a simulator is mandatory. Piecewise Linear Modeling and Analysis provides a detailed outline of a possible PL simulator, including pseudo-programming code. Several simulation domains like transient, AC and distortion are discussed. The book explains the attractive features of PL simulators with respect to mixed-level and mixed-signal simulation while paying due regard also to hierarchical simulation. Piecewise Linear Modeling and Analysis shows in detail how many existing components in electrical networks can be modeled. These range from digital logic and analog basic elements such as transistors to complex systems like Phase-Locked Loops and detection systems. Simulation results are also provided. The book concludes with a discussion on how to find multiple solutions for PL functions or networks. Again, the most common techniques are outlined using clear examples. Piecewise Linear Modeling and Analysis is an indispensable guide for researchers and designers interested in network theory, network synthesis and network analysis.

Spoken Multimodal Human-Computer Dialogue in Mobile Environments (Hardcover, 2005 ed.): Wolfgang Minker, Dirk Buhler, Laila... Spoken Multimodal Human-Computer Dialogue in Mobile Environments (Hardcover, 2005 ed.)
Wolfgang Minker, Dirk Buhler, Laila Dybkjaer
R4,243 Discovery Miles 42 430 Ships in 18 - 22 working days

The ongoing migration of computing and information access from stationary environments to mobile computing devices for eventual use in mobile environments, such as Personal Digital Assistants (PDAs), tablet PCs, next generation mobile phones, and in-car driver assistance systems, poses critical challenges for natural human-computer interaction. Spoken dialogue is a key factor in ensuring natural and user-friendly interaction with such devices which are meant not only for computer specialists, but also for everyday users.

Speech supports hands-free and eyes-free operation, and becomes a key alternative interaction mode in mobile environments, e.g. in cars where driver distraction by manually operated devices may be a significant problem. On the other hand, the use of mobile devices in public places, may make the possibility of using alternative modalities possibly in combination with speech, such as graphics output and gesture input, preferable due to e.g. privacy issues. Researchers' interest is progressively turning to the integration of speech with other modalities such as gesture input and graphics output, partly to accommodate more efficient interaction and partly to accommodate different user preferences.

This book:
-combines overview chapters of key areas in spoken multimodal dialogue (systems and components, architectures, and evaluation) with chapters focussed on particular applications or problems in the field;
-focuses on the influence of the environment when building and evaluating an application.

Audience: Computer scientists, engineers, and others who work in the area of spoken multimodal dialogue systems in academia and in the industry;
graduatestudents and Ph.D. students specialising in spoken multimodal dialogue systems in general, or focusing on issues in these systems in mobile environments in particular.

Computer Network Security (Hardcover, 2005 ed.): Joseph Migga Kizza Computer Network Security (Hardcover, 2005 ed.)
Joseph Migga Kizza
R1,686 Discovery Miles 16 860 Ships in 10 - 15 working days

A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference. This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practices and covers network security tools, policies, and administrative goals in an integrated manner. It is an essential security resource for undergraduate or graduate study, practitioners in networks, and professionals who develop and maintain secure computer network systems.

Cyber Crime and the Victimization of Women - Laws, Rights and Regulations (Hardcover, New): Debarati Halder, K Jaishankar Cyber Crime and the Victimization of Women - Laws, Rights and Regulations (Hardcover, New)
Debarati Halder, K Jaishankar
R4,911 Discovery Miles 49 110 Ships in 18 - 22 working days

While women benefit from using new digital and Internet technologies for self-expression, networking, and professional activities, cyber victimization remains an underexplored barrier to their participation. Women often outnumber men in surveys on cyber victimization. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It explores gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing. These and other tactics designed to inflict intimidation, control, and other harms are frequently committed by perpetrators who, for many reasons, are unlikely to be identified or punished. Scholars, researchers, law makers, and ordinary women and their supporters will gain a better understanding of cyber victimization and discover how to improve responses to cyber crimes against women.

Research Anthology on Artificial Intelligence Applications in Security, VOL 2 (Hardcover): Information Reso Management... Research Anthology on Artificial Intelligence Applications in Security, VOL 2 (Hardcover)
Information Reso Management Association
R9,815 Discovery Miles 98 150 Ships in 18 - 22 working days
PC Interfacing (Paperback, 3rd ed.): Pei An PC Interfacing (Paperback, 3rd ed.)
Pei An
R1,213 Discovery Miles 12 130 Ships in 10 - 15 working days

The main links with your PC and the outside world are the centronic port, used for connecting the printer, the RS232 port, used for the mouse, and the games port for a joystick. This book explores how these input/output (I/O) ports can be put to use through a range of other interfacing applications. This is especially useful for laptop and palmtop PCs which cannot be fitted with internal I/O cards. A novel approach is taken by this book, combining the hardware through which the ports can be explored, and the software programming needed to carry out a range of experiments.
Circuits are provided for simple testing tools, and three experimental boards - which can also be purchased ready-made. Ready-to-run TurboPascal programs are available on the Newnes web site.
A huge range of applications are considered, turning the PC into a flexible core of a variety of systems. External devices considered include opto-isolator drivers, power drivers, LED drivers, relay drivers, special driver ICs, and methods of driving opto-isolated zero-crossing solid state relays, stepper motors, sound generating devices and displays. Ways of gathering information from the outside world are given, as well as connection to digital devices, remote control and digital communication.
As well as teaching in this field, Pei An has written numerous articles for magazines such as Electronics World and Electronics Today International.

A hands-on guide to exploring your PC's input/output ports
Covers the hardware and software aspects of interfacing
An exciting project-based approach to an important subject area

Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014): Graeme Proudler, Liqun Chen, Chris Dalton Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014)
Graeme Proudler, Liqun Chen, Chris Dalton
R4,853 Discovery Miles 48 530 Ships in 10 - 15 working days

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Virtual Computing - Concept, Design, and Evaluation (Hardcover, 2001 ed.): Dongmin Kim, Salim Hariri Virtual Computing - Concept, Design, and Evaluation (Hardcover, 2001 ed.)
Dongmin Kim, Salim Hariri
R2,730 Discovery Miles 27 300 Ships in 18 - 22 working days

The evolution of modern computers began more than 50 years ago and has been driven to a large extend by rapid advances in electronic technology during that period. The first computers ran one application (user) at a time. Without the benefit of operating systems or compilers, the application programmers were responsible for managing all aspects of the hardware. The introduction of compilers allowed programmers to express algorithms in abstract terms without being concerned with the bit level details of their implementation. Time sharing operating systems took computing systems one step further and allowed several users and/or applications to time share the computing services of com puters. With the advances of networks and software tools, users and applications were able to time share the logical and physical services that are geographically dispersed across one or more networks. Virtual Computing (VC) concept aims at providing ubiquitous open computing services in analogous way to the services offered by Telephone and Elec trical (utility) companies. The VC environment should be dynamically setup to meet the requirements of a single user and/or application. The design and development of a dynamically programmable virtual comput ing environments is a challenging research problem. However, the recent advances in processing and network technology and software tools have successfully solved many of the obstacles facing the wide deployment of virtual computing environments as will be outlined next."

Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC 11 International Information Security Conference, SEC 2010,... Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, 2010 Ed.)
Kai Rannenberg, Vijay Varadharajan, Christian Weber
R1,446 Discovery Miles 14 460 Ships in 18 - 22 working days

These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 20-23. The call for papers went out with the challenging motto of "Security & Privacy Silver Linings in the Cloud" building a bridge between the long standing issues of security and privacy and the most recent developments in information and commu- cation technology. It attracted 102 submissions. All of them were evaluated on the basis of their significance, novelty, and technical quality by at least five member of the Program Committee. The Program Committee meeting was held electronically over a period of a week. Of the papers submitted, 25 were selected for presentation at the conference; the acceptance rate was therefore as low as 24. 5% making SEC 2010 a highly competitive forum. One of those 25 submissions could unfortunately not be included in the proceedings, as none of its authors registered in time to present the paper at the conference.

Networks and Network Analysis for Defence and Security (Hardcover, 2014): Anthony J. Masys Networks and Network Analysis for Defence and Security (Hardcover, 2014)
Anthony J. Masys
R3,410 Discovery Miles 34 100 Ships in 10 - 15 working days

Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples highlighting the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic well-being of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of big data and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies, vulnerabilities to produce insights for creative solutions. This book will be well positioned to inform defence, security and intelligence professionals and researchers with regards to leading methodologies and approaches."

Performance Analysis of Computer Networks (Hardcover, 2013 ed.): Matthew N.O Sadiku, Sarhan M. Musa Performance Analysis of Computer Networks (Hardcover, 2013 ed.)
Matthew N.O Sadiku, Sarhan M. Musa
R1,946 Discovery Miles 19 460 Ships in 10 - 15 working days

This book covers performance analysis of computer networks, and begins by providing the necessary background in probability theory, random variables, and stochastic processes. Queuing theory and simulation are introduced as the major tools analysts have access to. It presents performance analysis on local, metropolitan, and wide area networks, as well as on wireless networks. It concludes with a brief introduction to self-similarity. Designed for a one-semester course for senior-year undergraduates and graduate engineering students, it may also serve as a fingertip reference for engineers developing communication networks, managers involved in systems planning, and researchers and instructors of computer communication networks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Julius Caesar
Richard Appignanesi Paperback  (2)
R269 R254 Discovery Miles 2 540
Sweat
Lynn Nottage Paperback R270 Discovery Miles 2 700
Secondary Cause of Death
Peter Gordon Paperback R337 Discovery Miles 3 370
Cyrano De Bergerac: A Heroic Comedy…
Edmond Rostand Paperback R580 Discovery Miles 5 800
The Works of the Rev. Jonathan Swift…
Jonathan Swift Paperback R535 Discovery Miles 5 350
Is God Is
Aleshea Harris Paperback R380 Discovery Miles 3 800
The Hollow - Play
Agatha Christie Paperback R420 Discovery Miles 4 200
Pericles and Aspasia
Walter Savage Landor Paperback R534 Discovery Miles 5 340
All My Sons
Arthur Miller Paperback R304 Discovery Miles 3 040
Contemporary Plays by African Women…
Yvette Hutchison, Amy Jephta Paperback R823 Discovery Miles 8 230

 

Partners