![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
This book presents the proceedings of the 2nd EAI International Conference on Technology, Innovation, Entrepreneurship and Education (TIE' 2018), which took place at Ravensbourne University London, London, UK, on September 4, 2018. The central theme of the conference is emerging technologies in relation to business, education, social and political needs that make modern society flourish. The proceedings feature papers from a cross-disciplinary audience that explore the process of creativity and innovation. The goal is that the various disciplines can learn from each other and see how they might benefit from the cross-fertilization of practices.
Cloud computing presents a promising approach for implementing scalable information and communications technology systems for private and public, individual, community, and business use. Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice overviews current developments in cloud computing concepts, architectures, infrastructures and methods, focusing on the needs of small to medium enterprises. The topic of cloud computing is addressed on two levels: the fundamentals of cloud computing and its impact on the IT world; and an analysis of the main issues regarding the cloud federation, autonomic resource management, and efficient market mechanisms, while supplying an overview of the existing solutions able to solve them. This publication is aimed at both enterprise business managers and research and academic audiences alike.
Internet heterogeneity is driving a new challenge in application development: adaptive software. Together with the increased Internet capacity and new access technologies, network congestion and the use of older technologies, wireless access, and peer-to-peer networking are increasing the heterogeneity of the Internet. Applications should provide gracefully degraded levels of service when network conditions are poor, and enhanced services when network conditions exceed expectations. Existing adaptive technologies, which are primarily end-to-end or proxy-based and often focus on a single deficient link, can perform poorly in heterogeneous networks. Instead, heterogeneous networks frequently require multiple, coordinated, and distributed remedial actions. Conductor: Distributed Adaptation for Heterogeneous Networks describes a new approach to graceful degradation in the face of network heterogeneity - distributed adaptation - in which adaptive code is deployed at multiple points within a network. The feasibility of this approach is demonstrated by conductor, a middleware framework that enables distributed adaptation of connection-oriented, application-level protocols. By adapting protocols, conductor provides application-transparent adaptation, supporting both existing applications and applications designed with adaptation in mind. Conductor: Distributed Adaptation for Heterogeneous Networks introduces new techniques that enable distributed adaptation, making it automatic, reliable, and secure. In particular, we introduce the notion of semantic segmentation, which maintains exactly-once delivery of the semantic elements of a data stream while allowing the stream to be arbitrarily adapted in transit. We also introduce a secure architecture for automatic adaptor selection, protecting user data from unauthorized adaptation. These techniques are described both in the context of conductor and in the broader context of distributed systems. Finally, this book presents empirical evidence from several case studies indicating that distributed adaptation can allow applications to degrade gracefully in heterogeneous networks, providing a higher quality of service to users than other adaptive techniques. Further, experimental results indicate that the proposed techniques can be employed without excessive cost. Thus, distributed adaptation is both practical and beneficial. Conductor: Distributed Adaptation for Heterogeneous Networks is designed to meet the needs of a professional audience composed of researchers and practitioners in industry and graduate-level students in computer science.
This timely book provides broad coverage of vehicular ad-hoc network (VANET) issues, such as security, and network selection. Machine learning based methods are applied to solve these issues. This book also includes four rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues. This book will also help readers understand how to use machine learning to address the security and communication challenges in VANETs. Vehicular ad-hoc networks (VANETs) support vehicle-to-vehicle communications and vehicle-to-infrastructure communications to improve the transmission security, help build unmanned-driving, and support booming applications of onboard units (OBUs). The high mobility of OBUs and the large-scale dynamic network with fixed roadside units (RSUs) make the VANET vulnerable to jamming. The anti-jamming communication of VANETs can be significantly improved by using unmanned aerial vehicles (UAVs) to relay the OBU message. UAVs help relay the OBU message to improve the signal-to-interference-plus-noise-ratio of the OBU signals, and thus reduce the bit-error-rate of the OBU message, especially if the serving RSUs are blocked by jammers and/or interference, which is also demonstrated in this book. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues.
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.
Conquer Microsoft 365 administration, from the inside out! Dive into Microsoft 365 administration and harness the full power of cloud scaling, automation, and availability in Microsoft 365! This supremely well-organized reference packs hundreds of time-saving solutions, tips, and workarounds; all you need to continually enhance organizational agility, productivity, and security. Three Microsoft insiders help you fully leverage Microsoft Purview, Microsoft Enterprise Mobility + Security (EMS), Azure AD, Exchange Online, Microsoft Teams, SharePoint Online, OneDrive for Business, and more. Discover how experts tackle today's key tasks and challenge yourself to new levels of mastery. Plan deployment, understand downstream impacts, and avoid pitfalls Prepare your environment, establish governance, and enforce compliance Assess and improve security posture with Microsoft 365 Secure Score Move to identity-based security with Microsoft Enterprise Mobility + Security (EMS) Plan identity types, authentication, identity federation, and AAD Connect deployment Replace costly premises infrastructure with cloud-based Azure synchronization Manage complex Azure AD scenarios such as mergers, acquisitions, and divestitures Automate Azure to improve consistency, security, and standardization Prepare for Exchange Online cloud-only deployments, hybrid coexistence, and migration Move mailboxes and public folders to Exchange Online Understand Microsoft Teams concepts, architecture, and user interface Support meetings, webinars, and live events Deliver full-featured telephony solutions with Teams Phone System Implement telephony scheduling, room collaboration, automation, and IVR Use SharePoint Online to manage content and extend it with analytics and dashboards  For IT Professionals and Consultants Your role: You have, or will have, responsibilities for deploying, migrating to, or managing some or all of a Microsoft 365 environment Prerequisites: For individuals at any stage of their cloud journey
The Fibre Channel Association is an international organization
devoted to educating and promoting the Fibre Channel standard.
The adoption of cloud and IoT technologies in both the industrial and academic communities has enabled the discovery of numerous applications and ignited countless new research opportunities. With numerous professional markets benefiting from these advancements, it is easy to forget the non-technical issues that accompany technologies like these. Despite the advantages that these systems bring, significant ethical questions and regulatory issues have become prominent areas of discussion. Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies is a pivotal reference source that provides vital research on the non-technical repercussions of IoT technology adoption. While highlighting topics such as smart cities, environmental monitoring, and data privacy, this publication explores the regulatory and ethical risks that stem from computing technologies. This book is ideally designed for researchers, engineers, practitioners, students, academicians, developers, policymakers, scientists, and educators seeking current research on the sociological impact of cloud and IoT technologies.
This book provides a complete guide to the design, procurement,
installation and testing procedures for local area networks (LANs)
using both copper and optical fibre cable technology.
International, European and American LAN and premises cabling
standards are explained and compared including the latest Category
5, Category 6 and Category 7 proposals. The latest standards in
testing, electromagnetic compatibility (EMC) compliance and fire
safety are also covered in detail.
This book applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM).
Digital signal processing is an area of science and engineering that has been developed rapidly over the past years. This rapid development is the result of the significant advances in digital computer technology and integrated circuits fabrication. Many of the signal processing tasks conventionally performed by analog means, are realized today by less expensive and often more reliable digital hardware. Multirate Systems: Design and Applications addresses the rapid development of multirate digital signal processing and how it is complemented by the emergence of new applications.
With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research on upcoming 5G technologies for next generation mobile networks, examining the various features, solutions, and challenges associated with such advances. Highlighting relevant coverage across topics such as energy efficiency, user support, and adaptive multimedia services, this book is ideally designed for academics, professionals, graduate students, and professionals interested in novel research for wireless innovations.
It is certain that, over the next few years, data traffic will dwarf voice traffic on telecommunications networks. Growth in data-traffic volumes far exceeds that for voice, and is driven by increased use of applications such as e-mail attachments, remote printing and fileserver access, and the now omnipresent World Wide Web. The growth of data networking to connect computers with each other and with their peripheral devices began in earnest in the 1970s, took off in the 1980s and exploded in the 1990s. The early 21st century will see ever faster, more cost effective networks providing flexible data access into ever more businesses and homes. Since the 1970s there have been great advances in technology. For the past twenty years the processing power of computers has continued to grow with no hint of slowing - recall the oft-cited Moore's Law claiming that this power doubles every 18 months. Advances in the data networking equipment required to support the data traffic generated have been enormous. The pace of development from early X. 25 and modem technology through to some of the advanced equipment functionality now available is breathtaking - it is sometimes hard to believe that the practical router is barely ten years old This book provides an overview of the advanced data networking field by bringing together chapters on local area networks, wide area networks and their application."
This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used "against" users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.
Actor-Network Theory (ANT) has existed as a topic of interest among social theorists for decades. Due to the prevalence of technology in modern society, discussions over the influence of actor-network theory on the changing scope of technology can assist in facilitating further research and scientific thought. Technological Advancements and the Impact of Actor-Network Theory focuses on cross-disciplinary research as well as examples of the use of actor-network theory in a variety of fields, including medicine, education, business, engineering, environmental science, computer science, and social science. This timely publication is well-suited for reference use by academicians, researchers, upper-level students, and theorists. Topics Covered The many academic areas covered in this publication include, but are not limited to: Digital Communication E-Health Human Interaction Information and Communication Technologies Online Education Online Investing Public Service Innovation Software Development
Grids are a crucial enabling technology for scientific and industrial development. Grid and Services Evolution, the 11th edited volume of the CoreGRID series, was based on The CoreGRID Middleware Workshop, held in Barcelona, Spain, June 5-6, 2008. Grid and Services Evolution provides a bridge between the application community and the developers of middleware services, especially in terms of parallel computing. This edited volume brings together a critical mass of well-established researchers worldwide, from forty-two institutions active in the fields of distributed systems and middleware, programming models, algorithms, tools and environments. Grid and Services Evolution is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science.
The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.
Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactivists. Therefore, we need a better understanding of cyberspace, for which patterns, which are predictable regularities, may help to detect, understand and respond to incidents better. The inspiration for the workshop came from the existing work on formalising design patterns applied to cybersecurity, but we also need to understand the many other types of patterns that arise in cyberspace.
1 This year marks the l0 h anniversary of the IFIP International Workshop on Protocols for High-Speed Networks (PfHSN). It began in May 1989, on a hillside overlooking Lake Zurich in Switzerland, and arrives now in Salem Massachusetts 6,000 kilometers away and 10 years later, in its sixth incarnation, but still with a waterfront view (the Atlantic Ocean). In between, it has visited some picturesque views of other lakes and bays of the world: Palo Alto (1990 - San Francisco Bay), Stockholm (1993 - Baltic Sea), Vancouver (1994- the Strait of Georgia and the Pacific Ocean), and Sophia Antipolis I Nice (1996- the Mediterranean Sea). PfHSN is a workshop providing an international forum for the exchange of information on high-speed networks. It is a relatively small workshop, limited to 80 participants or less, to encourage lively discussion and the active participation of all attendees. A significant component of the workshop is interactive in nature, with a long history of significant time reserved for discussions. This was enhanced in 1996 by Christophe Diot and W allid Dabbous with the institution of Working Sessions chaired by an "animator," who is a distinguished researcher focusing on topical issues of the day. These sessions are an audience participation event, and are one of the things that makes PfHSN a true "working conference."
This volume comprises eight well-versed contributed chapters devoted to report the latest findings on the intelligent approaches to multimedia data analysis. Multimedia data is a combination of different discrete and continuous content forms like text, audio, images, videos, animations and interactional data. At least a single continuous media in the transmitted information generates multimedia information. Due to these different types of varieties, multimedia data present varied degrees of uncertainties and imprecision, which cannot be easy to deal by the conventional computing paradigm. Soft computing technologies are quite efficient to handle the imprecision and uncertainty of the multimedia data and they are flexible enough to process the real-world information. Proper analysis of multimedia data finds wide applications in medical diagnosis, video surveillance, text annotation etc. This volume is intended to be used as a reference by undergraduate and post graduate students of the disciplines of computer science, electronics and telecommunication, information science and electrical engineering. THE SERIES: FRONTIERS IN COMPUTATIONAL INTELLIGENCE The series Frontiers In Computational Intelligence is envisioned to provide comprehensive coverage and understanding of cutting edge research in computational intelligence. It intends to augment the scholarly discourse on all topics relating to the advances in artifi cial life and machine learning in the form of metaheuristics, approximate reasoning, and robotics. Latest research fi ndings are coupled with applications to varied domains of engineering and computer sciences. This field is steadily growing especially with the advent of novel machine learning algorithms being applied to different domains of engineering and technology. The series brings together leading researchers that intend to continue to advance the fi eld and create a broad knowledge about the most recent state of the art.
This book comprises peer-reviewed contributions presented at the 5th International Conference on Electronics, Communications and Networks (CECNet 2015), held in Shanghai, China, 12-15 December, 2015. It includes new multi-disciplinary topics spanning a unique depth and breadth of cutting-edge research areas in Electronic Engineering, Communications and Networks, and Computer Technology. More generally, it is of interest to academics, students and professionals involved in Consumer Electronics Technology, Communication Engineering and Technology, Wireless Communication Systems and Technology, and Computer Engineering and Technology. |
You may like...
The Host in the Machine - Examining the…
Angela Thomas-Jones
Paperback
R1,318
Discovery Miles 13 180
Understanding PKI - Concepts, Standards…
Carlisle Adams, Steve Lloyd
Paperback
R2,283
Discovery Miles 22 830
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,452
Discovery Miles 14 520
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, …
Hardcover
R5,931
Discovery Miles 59 310
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, …
Hardcover
R6,200
Discovery Miles 62 000
|