0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (874)
  • R500+ (13,634)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC 11 International Information Security Conference, SEC 2010,... Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, 2010 Ed.)
Kai Rannenberg, Vijay Varadharajan, Christian Weber
R1,446 Discovery Miles 14 460 Ships in 18 - 22 working days

These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 20-23. The call for papers went out with the challenging motto of "Security & Privacy Silver Linings in the Cloud" building a bridge between the long standing issues of security and privacy and the most recent developments in information and commu- cation technology. It attracted 102 submissions. All of them were evaluated on the basis of their significance, novelty, and technical quality by at least five member of the Program Committee. The Program Committee meeting was held electronically over a period of a week. Of the papers submitted, 25 were selected for presentation at the conference; the acceptance rate was therefore as low as 24. 5% making SEC 2010 a highly competitive forum. One of those 25 submissions could unfortunately not be included in the proceedings, as none of its authors registered in time to present the paper at the conference.

Networks and Network Analysis for Defence and Security (Hardcover, 2014): Anthony J. Masys Networks and Network Analysis for Defence and Security (Hardcover, 2014)
Anthony J. Masys
R3,410 Discovery Miles 34 100 Ships in 10 - 15 working days

Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples highlighting the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic well-being of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of big data and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies, vulnerabilities to produce insights for creative solutions. This book will be well positioned to inform defence, security and intelligence professionals and researchers with regards to leading methodologies and approaches."

Performance Analysis of Computer Networks (Hardcover, 2013 ed.): Matthew N.O Sadiku, Sarhan M. Musa Performance Analysis of Computer Networks (Hardcover, 2013 ed.)
Matthew N.O Sadiku, Sarhan M. Musa
R1,946 Discovery Miles 19 460 Ships in 10 - 15 working days

This book covers performance analysis of computer networks, and begins by providing the necessary background in probability theory, random variables, and stochastic processes. Queuing theory and simulation are introduced as the major tools analysts have access to. It presents performance analysis on local, metropolitan, and wide area networks, as well as on wireless networks. It concludes with a brief introduction to self-similarity. Designed for a one-semester course for senior-year undergraduates and graduate engineering students, it may also serve as a fingertip reference for engineers developing communication networks, managers involved in systems planning, and researchers and instructors of computer communication networks.

The Design of Rijndael - AES - The Advanced Encryption Standard (Hardcover, 2002 ed.): Joan Daemen, Vincent Rijmen The Design of Rijndael - AES - The Advanced Encryption Standard (Hardcover, 2002 ed.)
Joan Daemen, Vincent Rijmen 1
R2,446 Discovery Miles 24 460 Ships in 18 - 22 working days

In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This book is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.

Handbook of Research on Social and Organizational Liabilities in Information Security (Hardcover): Manish Gupta, Raj Sharman Handbook of Research on Social and Organizational Liabilities in Information Security (Hardcover)
Manish Gupta, Raj Sharman
R6,714 Discovery Miles 67 140 Ships in 18 - 22 working days

As the diffusion and use of technology applications have accelerated in organizational and societal domains, behavioral and social dynamics have inevitably created the potential for negative as well as positive consequences and events associated with technology. A pressing need within organizations and societies has therefore emerged for robust, proactive information security measures that can prevent as well as ameliorate breaches, attacks, and abuses.""The Handbook of Research on Social and Organizational Liabilities in Information Security"" offers a critical mass of insightful, authoritative articles on the most salient contemporary issues of managing social and human aspects of information security. Aimed at providing immense scholarly value to researchers, academicians, and practitioners in the area of information technology and security, this landmark reference collection provides estimable coverage of pertinent issues such as employee surveillance, information security policies, and password authentication.

Computer-Supported Cooperative Work - Introduction to Distributed Applications (Hardcover, 2000 ed.): Uwe M. Borghoff, Johann... Computer-Supported Cooperative Work - Introduction to Distributed Applications (Hardcover, 2000 ed.)
Uwe M. Borghoff, Johann H. Schlichter
R2,679 R1,685 Discovery Miles 16 850 Save R994 (37%) Ships in 10 - 15 working days

The terms groupware and CSCW (Computer-Supported Cooperative Work) have received significant attention in computer science and related disciplines for quite some time now. This book has two main objectives: first, to outline the meaning of both terms, and second, to point out both the numerous opportunities for users of CSCW systems and the risks of applying them. The book introduces in detail an interdisciplinary application area of distributed systems, namely the computer support of individuals trying to solve a problem in cooperation with each other but not necessarily having identical work places or working times. CSCW can be viewed as a synergism between the areas of distributed systems and (multimedia) communications on the one hand and those of information science and socio-organizational theory on the other hand. Thus, the book is addressed to students of all these disciplines, as well as to users and developers of systems with group communication and cooperation as top priorities.

Resource Management of Mobile Cloud Computing Networks and Environments (Hardcover): George Mastorakis, Constandinos X.... Resource Management of Mobile Cloud Computing Networks and Environments (Hardcover)
George Mastorakis, Constandinos X. Mavromoustakis, Evangelos Pallis
R5,463 Discovery Miles 54 630 Ships in 18 - 22 working days

As more and more of our data is stored remotely, accessing that data wherever and whenever it is needed is a critical concern. More concerning is managing the databanks and storage space necessary to enable cloud systems. Resource Management of Mobile Cloud Computing Networks and Environments reports on the latest advances in the development of computationally intensive and cloud-based applications. Covering a wide range of problems, solutions, and perspectives, this book is a scholarly resource for specialists and end-users alike making use of the latest cloud technologies.

Continuous Authentication Using Biometrics - Data, Models, and Metrics (Hardcover): Issa Traore, Ahmed Awad E Ahmed Continuous Authentication Using Biometrics - Data, Models, and Metrics (Hardcover)
Issa Traore, Ahmed Awad E Ahmed
R4,917 Discovery Miles 49 170 Ships in 18 - 22 working days

User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat. Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the leading experts in this recent, fast growing research area. These chapters collectively provide a thorough and concise introduction to the field of biometric-based continuous authentication. The book covers the conceptual framework underlying continuous authentication and presents detailed processing models for various types of practical continuous authentication applications.

Internet Protocols - Advances, Technologies and Applications (Hardcover, 2003 ed.): Subrata Goswami Internet Protocols - Advances, Technologies and Applications (Hardcover, 2003 ed.)
Subrata Goswami
R4,186 Discovery Miles 41 860 Ships in 18 - 22 working days

IP technology has progressed from being a scientific topic to being one of the most popular technologies in networking. Concurrently, a number of new innovations and technological advances have been developed and brought to the marketplace. These new ideas, concepts and products are likely to have a tremendous influence on businesses and on our everyday lives. This book addresses many of these newer technological developments and provides insights for engineers and scientists developing new technological components, devices and products. explores how they are being implemented in the real world. The author examines numerous implementation details related to IP equipment and software. The material is organized by application so that readers can better understand the uses of IP technology. Included are details of implementation issues and state-of-the-art equipment and software. descriptions of Cisco 12410 GSR and Juniper M160, and IP software stack details are also included for several popular operating systems such as Windows, BSD, VxWorks and Linux.

Metropolitan Area WDM Networks - An AWG Based Approach (Hardcover, 2004 ed.): Martin Maier Metropolitan Area WDM Networks - An AWG Based Approach (Hardcover, 2004 ed.)
Martin Maier
R4,071 Discovery Miles 40 710 Ships in 18 - 22 working days

Metropolitan Area WDM Networks: An AWG Based Approach provides a comprehensive and technically detailed overview of the latest metropolitan area WDM network experimental systems, architectures, and access protocols. Its main focus is on the novel star WDM networks based on a wavelength-selective Arrayed-Waveguide Grating (AWG). Network researchers, engineers, professionals, and graduate students will benefit from the thorough overview and gain an in-depth understanding of current and next-generation metro WDM networks.

The AWG based metro star WDM network is discussed at length and extensively investigated by means of stochastic analyses and simulations. The book provides:
*an up-to-date overview of ring and star metro WDM networks and access protocols,
*in-depth performance comparison studies of AWG based multihop vs. single-hop WDM networks and AWG vs. Passive Star Coupler based single-hop WDM networks,
*a thorough description of the AWG based network and node architectures and access protocols,
*a novel highly-efficient approach to provide survivability for star WDM networks,
*extensive analytical results for both unicast and multicast variable-size packet traffic and bandwidth on demand,
*supplementary simulation results, including packet header trace files.

Networking Security and Standards (Hardcover, 1997 ed.): Weidong Kou Networking Security and Standards (Hardcover, 1997 ed.)
Weidong Kou
R4,128 Discovery Miles 41 280 Ships in 18 - 22 working days

Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modification. Putting proper security in place gives us many advantages. It lets us exchange confidential information and keep it confidential. We can be sure that a piece of information received has not been changed. Nobody can deny sending or receiving a piece of information. We can control which piece of information can be accessed, and by whom. We can know when a piece of information was accessed, and by whom. Networks and databases are guarded against unauthorized access. We have seen the rapid development of the Internet and also increasing security requirements in information networks, databases, systems, and other information resources. This comprehensive book responds to increasing security needs in the marketplace, and covers networking security and standards. There are three types of readers who are interested in security: non-technical readers, general technical readers who do not implement security, and technical readers who actually implement security. This book serves all three by providing a comprehensive explanation of fundamental issues of networking security, concept and principle of security standards, and a description of some emerging security technologies. The approach is to answer the following questions: 1. What are common security problems and how can we address them? 2. What are the algorithms, standards, and technologies that can solve common security problems? 3.

Human-Centered Digitalization and Services (Hardcover, 1st ed. 2019): Marja Toivonen, Eveliina Saari Human-Centered Digitalization and Services (Hardcover, 1st ed. 2019)
Marja Toivonen, Eveliina Saari
R3,372 Discovery Miles 33 720 Ships in 18 - 22 working days

This book provides a timely overview of the impacts of digitalization from the perspective of everyday life, and argues that one central issue in digitalization is the development of new types of services that digitalization enables, but which are often overlooked due to the focus on new technologies and devices. The book summarizes the past 20 years of research into the relationship between information and communications technology (ICT) and service innovation, and reveals that the ongoing digitalization is a qualitatively different phenomenon and represents a true paradigm shift. The all-encompassing integration and distribution of data raises critical issues such as preserving human dignity and individual autonomy; moreover, interaction practices that foster broad participation, trust, learning, and a willingness to share knowledge are called for. Citizen empowerment and multi-actor co-creation have become central to using digitalization to support the development of wellbeing and sustainability. Further, the book shows how employees and professionals can and should be involved in designing their future work, and in evaluating it. Proactiveness and participation in innovation endeavours are ways to guarantee meaningful work in an age of socio-technical transition. The book employs a variety of theoretical approaches and perspectives from diverse disciplines to illustrate these needs. In addition to theoretical analyses, some specific application areas are examined, e.g. services in health and social care, and problems linked to robots in elderly care. Given its scope, the book is highly recommended to all readers seeking an overview of the current understanding of the human side of digitalization and searching for concrete cases from different countries to illustrate the topic.

User Interface Evaluation - A Structured Approach (Hardcover, New): Siegfried Treu User Interface Evaluation - A Structured Approach (Hardcover, New)
Siegfried Treu
R2,429 Discovery Miles 24 290 Ships in 18 - 22 working days

Introduction: Background and Status. Design before Evaluation. Prerequisite Knowledge Areas: Supportive Tools and Techniques. Interface Structures. Basic Measures. Measurement and Evaluation: Evaluation Terms and Aspects. Tailored Measures of Performance. Evaluation Approaches and Methods. Special Topics: Stress and User Satisfaction. Visualizable Objects and Spaces. Interaction and Mental Involvement. Structural Specification and Utility. Index.

Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March... Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers (Hardcover, 1st ed. 2016)
Mason Rice, Sujeet Shenoi
R2,915 R1,920 Discovery Miles 19 200 Save R995 (34%) Ships in 10 - 15 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: themes and issues; control systems security; infrastructure modeling and simulation; risk and impact assessment. This book is the tenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of fourteen edited papers from the Tenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2016. Critical Infrastructure Protection is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Privacy, Identity, and Cloud Computing (Hardcover): Harry Katzan Privacy, Identity, and Cloud Computing (Hardcover)
Harry Katzan
R668 R602 Discovery Miles 6 020 Save R66 (10%) Ships in 18 - 22 working days

Three important technology issues face professionals in today's business, education, and government world. In "Privacy, Identity, and Cloud Computing, " author and computer expert Dr. Harry Katzan Jr. addresses the subjects of privacy and identity as they relate to the new discipline of cloud computing, a model for providing on-demand access to computing service via the Internet. A compendium of eight far-reaching papers, "Privacy, Identity, and Cloud Computing" thoroughly dissects and discusses the following: The privacy of cloud computing Identity as a service Identity analytics and belief structures Compatibility relations in identity analysis Conspectus of cloud computing Cloud computing economics: Democratization and monetization of services Ontological view of cloud computing Privacy as a service Katzan provides not only a wealth of information, but gives exposure to these topics facing today's computer users. Ultimately, these are important facets of modern computing, and all their implications must be considered thoroughly in anticipation of future developments.

Network-Centric Collaboration and Supporting Frameworks - IFIP TC 5 WG 5.5, Seventh IFIP Working Conference on Virtual... Network-Centric Collaboration and Supporting Frameworks - IFIP TC 5 WG 5.5, Seventh IFIP Working Conference on Virtual Enterprises, 25-27 September 2006, Helsinki, Finland (Hardcover, 2006 ed.)
Luis M. Camarinha-Matos, Hamideh Afsarmanesh, Martin Ollus
R4,371 Discovery Miles 43 710 Ships in 18 - 22 working days

Collaborative Networks is a fast developing area, as shown by the already large number of diverse real-world implemented cases and the dynamism of its related involved research community. Benefiting from contributions of multiple areas, nameley management, economy, social sciences, law and ethics, etc., the area of Collaborative Networs is being consolidated as a new scientific discipline of its own. On one hand significant steps towards a stronger theoretical foundation for this new discipline are developed and applied in industry and services.

Based on the experiences and lessons learned in many research projects and pilot cases developed during the last decade, a new emphasis is now being put on the development of holistic frameworks, combining business models, conceptual models, governance principles and methods, as well as supporting infrastructures and services. In fact, researching the phase in which the computer and networking technologies provide a good starting basis for the establishment of collaborative platforms, the emphasis is now turning to the understanding of the collaboration promotion mechanisms and CN governance principles. Therefore, issues such as the value systems, trust, performance and benefits distribution are gaining more importance. Encompassing all these developments, the efforts to develp reference models for collaborative networks represent a major challenge in order to provide the foundation for further developments of the CN.

PRO-VE represents a good synthesis of the work in this area, and plays an active role in the promotion of these activities. Being recognized as the most focused scientific and technical conference on CollaborativeNetworks, PRO-VE continues to offer the opportunity for presentation and discussion of both the latest research developments as well as the practical application case studies. Following the vision of IFIP and SOCOLNET, the PRO-VE conference offers a forum for collaboration and knowledge exchange among experts from different regions of the world.

Design of Optical WDM Networks - LAN, MAN and WAN Architectures (Hardcover, 2001 ed.): Byrav Ramamurthy Design of Optical WDM Networks - LAN, MAN and WAN Architectures (Hardcover, 2001 ed.)
Byrav Ramamurthy
R2,752 Discovery Miles 27 520 Ships in 18 - 22 working days

Lo, soul! seest thou not God's purpose from the first? The earth to be spann'd, connected by net-work From Passage to India! Walt Whitman, "Leaves of Grass", 1900. The Internet is growing at a tremendous rate today. New services, such as telephony and multimedia, are being added to the pure data-delivery framework of yesterday. Such high demands on capacity could lead to a "bandwidth-crunch" at the core wide-area network resulting in degra dation of service quality. Fortunately, technological innovations have emerged which can provide relief to the end-user to overcome the In ternet's well-known delay and bandwidth limitations. At the physical layer, a major overhaul of existing networks has been envisaged from electronic media (such as twisted-pair and cable) to optical fibers - in the wide area, in the metropolitan area, and even in the local area set tings. In order to exploit the immense bandwidth potential of the optical fiber, interesting multiplexing techniques have been developed over the years. Wavelength division multiplexing (WDM) is such a promising tech nique in which multiple channels are operated along a single fiber si multaneously, each on a different wavelength. These channels can be independently modulated to accommodate dissimilar bit rates and data formats, if so desired. Thus, WDM carves up the huge bandwidth of an optical fiber into channels whose bandwidths (1-10 Gbps) are compati ble with peak electronic processing speed.

Ad-hoc Networks: Fundamental Properties and Network Topologies (Mixed media product, 2006 ed.): Ramin Hekmat Ad-hoc Networks: Fundamental Properties and Network Topologies (Mixed media product, 2006 ed.)
Ramin Hekmat
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book provides an original graph theoretical approach to the fundamental properties of wireless mobile ad-hoc networks. This approach is combined with a realistic radio model for physical links between nodes to produce new insight into network characteristics like connectivity, degree distribution, hopcount, interference and capacity. The book establishes directives for designing ad-hoc networks and sensor networks. It will interest the academic community, and engineers who roll out ad-hoc and sensor networks.

Distributed Embedded Systems: Design, Middleware and Resources - IFIP 20th World Computer Congress, TC10 Working Conference on... Distributed Embedded Systems: Design, Middleware and Resources - IFIP 20th World Computer Congress, TC10 Working Conference on Distributed and Parallel Embedded Systems (DIPES 2008), September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
Bernd Kleinjohann, Lisa Kleinjohann, Marilyn Wolf
R2,779 Discovery Miles 27 790 Ships in 18 - 22 working days

This year, the IFIP Working Conference on Distributed and Parallel Embedded Sys tems (DIPES 2008) is held as part of the IFIP World Computer Congress, held in Milan on September 7 10, 2008. The embedded systems world has a great deal of experience with parallel and distributed computing. Many embedded computing systems require the high performance that can be delivered by parallel computing. Parallel and distributed computing are often the only ways to deliver adequate real time performance at low power levels. This year's conference attracted 30 submissions, of which 21 were accepted. Prof. Jor ] g Henkel of the University of Karlsruhe graciously contributed a keynote address on embedded computing and reliability. We would like to thank all of the program committee members for their diligence. Wayne Wolf, Bernd Kleinjohann, and Lisa Kleinjohann Acknowledgements We would like to thank all people involved in the organization of the IFIP World Computer Congress 2008, especially the IPC Co Chairs Judith Bishop and Ivo De Lotto, the Organization Chair Giulio Occhini, as well as the Publications Chair John Impagliazzo. Further thanks go to the authors for their valuable contributions to DIPES 2008. Last but not least we would like to acknowledge the considerable amount of work and enthusiasm spent by our colleague Claudius Stern in preparing theproceedingsofDIPES2008. Hemadeitpossibletoproducethemintheircurrent professional and homogeneous style."

Performance Analysis of Multi-Channel and Multi-Traffic on Wireless Communication Networks (Hardcover, 2002 ed.): Wuyi Yue,... Performance Analysis of Multi-Channel and Multi-Traffic on Wireless Communication Networks (Hardcover, 2002 ed.)
Wuyi Yue, Yutaka Matsumoto
R4,199 Discovery Miles 41 990 Ships in 18 - 22 working days

With rapid increase of mobile users of laptop computers and cellular phones, support of Internet services like e-mail and World Wide Web (WWW) access in a mobile environment is an indispensable requirement. The wireless networks must have the ability to provide real-time bursty traffic (such as voice or video) and data traffic in a multimedia environment with high quality of service. To satisfy the huge demand for wireless multimedia service, efficient channel access methods must be devised. For design and tuning of the channel access methods, the system performance must be mathematically analysed. To do so, very accurate models, that faithfully reproduce the stochastic behaviour of multimedia wireless communication and computer networks, must be constructed.
There exist several books on the performance analysis and evaluation for data communication networks or computer networks. This book attempts to present exact and approximate analytical solution methods and techniques using queueing theory in the complex multimedia traffic systems with procedures of random multiple access schemes. In particular, this book presents how to approximate the system performance of discrete-time multimedia networks, the probability distribution of the interarrival time of internetwork packets at the adjacent network and the higher moments of the transmission departure distribution and delay in wireless multimedia communication environment. In general the modeling of discrete-time multimedia communication systems are more complex than that of continuous-time systems because multiple state changes can occur from one time-unit to the next. This complicates the analysis of the model. This book alsodiscusses numerical results that illustrate the applications of the theory and various properties.
Performance Analysis of Multichannel and Multi-Traffic on Wireless Communication Networks should prove useful to a post-graduate course in computer science or electrical engineering. It can be a pre requisite to some other more advanced courses like network design and management or queueing theory with applications to multimedia communication and computer networks. It can also be used for a course on stochastic models in applied mathematics and operations research departments.

Secure Group Communications Over Data Networks (Hardcover, 2005 ed.): Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras Secure Group Communications Over Data Networks (Hardcover, 2005 ed.)
Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
R2,655 Discovery Miles 26 550 Ships in 18 - 22 working days

The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri vacy of the communication and to ensure the integrity of the applications. 'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages to group members, in a way that outsiders are unable to glean any information even when they are able to intercept the messages. SGC is becoming extremely important for researchers and practitioners because many applications that require SGC are now widely used, such as teleconferencing, tele-medicine, real-time information services, distributed interactive simulations, collaborative work, grid computing, and the deployment of VPN (Virtual Private Networks). Even though considerable research accomplishments have been achieved in SGC, few books exist on this very important topic. The purpose of this book is to provide a comprehensive survey of principles and state-of-the-art techniques for secure group communications over data net works. The book is targeted towards practitioners, researchers and students in the fields of networking, security, and software applications development. The book consists of 7 chapters, which are listed and described as follows."

Interactive Computation - The New Paradigm (Hardcover, 2006 ed.): Dina Goldin, Scott A. Smolka, Peter Wegner Interactive Computation - The New Paradigm (Hardcover, 2006 ed.)
Dina Goldin, Scott A. Smolka, Peter Wegner
R4,095 Discovery Miles 40 950 Ships in 18 - 22 working days

The interaction paradigm is a new conceptualization of computational phenomena that emphasizes interaction over algorithms, reflecting the shift in technology from main-frame number-crunching to distributed intelligent networks with graphical user interfaces. The book is arranged in four sections: "Introduction," comprising three chapters that explore and summarize the fundamentals of interactive computation; "Theory" with six chapters, each discussing a specific aspect of interaction; "Applications," five chapters showing how this principle is applied in subdisciplines of computer science; and "New Directions," presenting four multidisciplinary applications. The book challenges traditional Turing machine-based answers to fundamental questions of problem solving and the scope of computation.

Guide to Elliptic Curve Cryptography (Hardcover, 2004 ed.): D.R. Hankerson, A.J. Menezes, Scott A. Vanstone Guide to Elliptic Curve Cryptography (Hardcover, 2004 ed.)
D.R. Hankerson, A.J. Menezes, Scott A. Vanstone
R4,744 Discovery Miles 47 440 Ships in 18 - 22 working days

 Chapter 1:  Introduction and Overview

Medical Device Cybersecurity: A Guide for Engineers and Manufacturers (Hardcover, Unabridged edition): Axel Wirth, Christopher... Medical Device Cybersecurity: A Guide for Engineers and Manufacturers (Hardcover, Unabridged edition)
Axel Wirth, Christopher Gates, Jason Smith
R3,793 Discovery Miles 37 930 Ships in 18 - 22 working days

Cybersecurity for medical devices is no longer optional. We must not allow sensationalism or headlines to drive the discussion... Nevertheless, we must proceed with urgency. In the end, this is about preventing patient harm and preserving patient trust. A comprehensive guide to medical device secure lifecycle management, this is a book for engineers, managers, and regulatory specialists. Readers gain insight into the security aspects of every phase of the product lifecycle, including concept, design, implementation, supply chain, manufacturing, postmarket surveillance, maintenance, updates, and end of life. Learn how to mitigate or completely avoid common cybersecurity vulnerabilities introduced during development and production. Grow your awareness of cybersecurity development topics ranging from high-level concepts to practical solutions and tools. Get insight into emerging regulatory and customer expectations. Uncover how to minimize schedule impacts and accelerate time-to-market while still accomplishing the main goal: reducing patient and business exposure to cybersecurity risks. Medical Device Cybersecurity for Engineers and Manufacturers is designed to help all stakeholders lead the charge to a better medical device security posture and improve the resilience of our medical device ecosystem.

Computer and Computing Technologies in Agriculture IV - 4th IFIP TC 12 International Conference, CCTA 2010, Nanchang, China,... Computer and Computing Technologies in Agriculture IV - 4th IFIP TC 12 International Conference, CCTA 2010, Nanchang, China, October 22-25, 2010, Selected Papers, Part III (Hardcover, Edition.)
Daoliang Li, Yande Liu, Yingyi Chen
R2,807 Discovery Miles 28 070 Ships in 18 - 22 working days

This book constitutes Part III of the refereed four-volume post-conference proceedings of the 4th IFIP TC 12 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2010, held in Nanchang, China, in October 2010. The 352 revised papers presented were carefully selected from numerous submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including simulation models and decision-support systems for agricultural production, agricultural product quality testing, traceability and e-commerce technology, the application of information and communication technology in agriculture, and universal information service technology and service systems development in rural areas.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Cable Engineering for Local Area…
B.J. Elliott Hardcover R3,208 Discovery Miles 32 080
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,200 Discovery Miles 62 000
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210

 

Partners