0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (251)
  • R250 - R500 (863)
  • R500+ (13,636)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Web-Based Multimedia Advancements in Data Communications and Networking Technologies (Hardcover, New): Varadharajan Sridhar,... Web-Based Multimedia Advancements in Data Communications and Networking Technologies (Hardcover, New)
Varadharajan Sridhar, Debashis Saha
R4,822 Discovery Miles 48 220 Ships in 18 - 22 working days

New data communication technologies, and the resulting policies and management, can have a profound effect on the success of business organizations. By quantifying the impact of these new innovations, researchers can help these businesses thrive in the networking and business data communications fields. Web-Based Multimedia Advancements in Data Communications and Networking Technologies highlights comprehensive research which will enable readers to understand, manage, use, and maintain business data communication networks more effectively. It also addresses key technology, management, and policy issues for utilizing data communications and networking in business and the current best practices for aligning this important technology with the strategic goals of the organization.

Trust Management III - Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009,... Trust Management III - Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009, Proceedings (Hardcover, 2009 ed.)
Elena Ferrari, Ninghui Li, Elisa Bertino, Yucel Karabulut
R2,692 Discovery Miles 26 920 Ships in 18 - 22 working days

ThisvolumecontainstheproceedingsofIFIPTM2009, theThirdIFIPWG11.11 International Conference on Trust Management, held at Purdue University in West Lafayette, Indiana, USA during June 15-19, 2009. IFIPTM 2009 provided a truly global platform for the reporting of research, development, policyandpracticeintheinterdependentareasofprivacy, security, and trust. Building on the traditions inherited from the highly successful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, and the IFIPTM 2008conferencein Trondheim, Norway, IFIPTM 2009 focusedontrust, privacyand security from multidisciplinary perspectives. The conferenceisanarenafor discussionaboutrelevantproblemsfromboth research and practice in the areas of academia, business, and government. IFIPTM 2009 was an open IFIP conference. The program of the conference featured both theoretical research papers and reports of real-world case studies. IFIPTM 2009 received 44 submissions. The ProgramCommittee selected 17 - pers for presentation and inclusion in the proceedings. In addition, the program and the proceedings include one invited paper and ?ve demo descriptions. The highlights of IFIPTM 2009 included invited talks and tutorials by academic and governmental experts in the ?elds of trust management, privacy and security, including Eugene Spa?ord, Marianne Winslett, and Michael Novak. Running an international conference requires an immense e?ort from all p- ties involved. We would like to thank the Program Committee members and external referees for having provided timely and in-depth reviews of the subm- ted papers.We wouldalsolike to thank the Workshop, Tutorial, Demonstration, Local Arrangements, and Website Chairs, for having provided great help or- nizing the con

Optimizing Information Security and Advancing Privacy Assurance - New Technologies (Hardcover, New): Hamid R. Nemati Optimizing Information Security and Advancing Privacy Assurance - New Technologies (Hardcover, New)
Hamid R. Nemati
R4,935 Discovery Miles 49 350 Ships in 18 - 22 working days

Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amounts of information online. Optimizing Information Security and Advancing Privacy Assurance: New Technologies reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises. Enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems are discussed in this multidisciplinary collection of research, with the primary aim being the continuation and promotion of methods and theories in this far-reaching discipline.

Multiaccess, Mobility and Teletraffic in Wireless Communications: Volume 5 (Hardcover, 2001 ed.): Gordon L. Stuber, Bijan... Multiaccess, Mobility and Teletraffic in Wireless Communications: Volume 5 (Hardcover, 2001 ed.)
Gordon L. Stuber, Bijan Jabbari
R5,371 Discovery Miles 53 710 Ships in 18 - 22 working days

The METRA (Multi-Element Transmit and Receive Antennas) Project Ana Perez-Neira, Javier R Fonollosa.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 . . . . . . . . . . . . . . . . . . . . TURBO-BLAST: A Novel Technique for Multi-transmit Multi-receive Wireless Communications Mathini Sellathurni, Sirnon Haykin. . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . ... . . . 13 . . . . . . Optimal Channel Training for Multiple Antenna Systems J. Balakrishnan, M. Rupp, H. Viswanathan. .. . . . . . . . . . .. . . . . . . . . . . . . . . . . . . .... . . . . 25 . . . . . . Code-Aided Blind Multi-user Detection in Dispersive CDMA channels Stefano Buzzi, Marco Lops.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... . . . 3 . . 7 . . . . . . . . . . . . . . . . . . . . . lndoor BLAST Measurements: Capacity ofMulti-elemmt Antenna Systems P.Kyritsi, P.Wolniansky, R Valenzuela..... .. . .. . .. . .. . .. . .. . .. . .. . . . .. . . .. . .. . . . .. . . ... 49 The High Data Rate Evolution of the cdma2000 Cellular System Eduardo Esteves. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User-Perceived Performance ofWeb-Browsing and Interactive Data Applications in TDMA Packet Wireless Networks N.K. Shankaranarayanan, Z.Jiang, P.Mishra......................................... ... 73 Resource Allocation Schemes for Voice and Data Integration over Wireless Cessular Networks Wessam Ajib, Philippe Godlewski............................ .. . . . . . .. . . . . . . . . . . . .. . . 85 . . . SIP-sessions between a 3G-Network and a SIP-proxy Traversing NAT -PT G. Bajko, B. Bertenyi............................. .. . . . . . . . . . . . . . .. . . .. . . . . . . . . . .. . . . . . .. . . 97 Resource Allocation for Soft Handoff in Wireless Packet CDMA System E. Dinan, B. Jabbari, M. Kasmi, P. Godlewski............... .. . . . . . . . . . . . . . ... . . . 109 . . . . . . ."

PAM Mastery (Hardcover): Michael W Lucas PAM Mastery (Hardcover)
Michael W Lucas
R878 R797 Discovery Miles 7 970 Save R81 (9%) Ships in 18 - 22 working days
Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance (Hardcover): Maria Manuela Cruz Cunha,... Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance (Hardcover)
Maria Manuela Cruz Cunha, Irene Maria Portela
R9,614 Discovery Miles 96 140 Ships in 18 - 22 working days

In our hyper-connected digital world, cybercrime prevails as a major threat to online security and safety. New developments in digital forensics tools and an understanding of current criminal activities can greatly assist in minimizing attacks on individuals, organizations, and society as a whole. The Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance combines the most recent developments in data protection and information communication technology (ICT) law with research surrounding current criminal behaviors in the digital sphere. Bridging research and practical application, this comprehensive reference source is ideally designed for use by investigators, computer forensics practitioners, and experts in ICT law, as well as academicians in the fields of information security and criminal science.

Feedback Strategies for Wireless Communication (Hardcover, 2014 ed.): Berna OEzbek, Didier Le Ruyet Feedback Strategies for Wireless Communication (Hardcover, 2014 ed.)
Berna OEzbek, Didier Le Ruyet
R4,795 Discovery Miles 47 950 Ships in 10 - 15 working days

This book explores the different strategies regarding limited feedback information. The book analyzes the impact of quantization and the delay of CSI on the performance. The author shows the effect of the reduced feedback information and gives an overview about the feedback strategies in the standards. This volume presents theoretical analysis as well as practical algorithms for the required feedback information at the base stations to perform adaptive resource algorithms efficiently and mitigate interference coming from other cells.

Broadband Communications - Convergence of Network Technologies (Hardcover, 2000 ed.): Danny H.K. Tsang, Paul J. Kuhn Broadband Communications - Convergence of Network Technologies (Hardcover, 2000 ed.)
Danny H.K. Tsang, Paul J. Kuhn
R5,528 Discovery Miles 55 280 Ships in 18 - 22 working days

Broadband communications is widely recognized as one of the key technologies for building the next generation global network infrastructure to support ever-increasing multimedia applications. This book contains a collection of timely leading-edge research papers that address some of the important issues of providing such a broadband network infrastructure. Broadband Communications represents the selected proceedings of the Fifth International Conference on Broadband Communications, sponsored by the International Federation for Information Processing (IFIP) and held in Hong Kong in November 1999. The book is organized according to the eighteen technical sessions of the conference. The topics covered include internet services, traffic modeling, internet traffic control, performance evaluation, billing, pricing, admission policy, mobile network protocols, TCP/IP performance, mobile network performance, bandwidth allocation, switching systems, traffic flow control, routing, congestion and admission control, multicast protocols, network management, and quality of service. It will serve as an essential reference for computer scientists and practitioners.

Organizational, Legal, and Technological Dimensions of Information System Administation (Hardcover, New): Irene Maria Portela,... Organizational, Legal, and Technological Dimensions of Information System Administation (Hardcover, New)
Irene Maria Portela, Fernando Almeida
R4,930 Discovery Miles 49 300 Ships in 18 - 22 working days

In addition to capital infrastructure and consumers, digital information created by individual and corporate consumers of information technology is quickly being recognised as a key economic resource and an extremely valuable asset to a company. Organizational, Legal, and Technological Dimensions of Information System Administration recognises the importance of information technology by addressing the most crucial issues, challenges, opportunities, and solutions related to the role and responsibility of an information system. Highlighting various aspects of the organizational and legal implications of system administration, this reference work will be useful to managers, IT professionals, and graduate students who seek to gain an understanding in this discipline.

From Model-Driven Design to Resource Management for Distributed Embedded Systems - IFIP TC 10 Working Conference on Distributed... From Model-Driven Design to Resource Management for Distributed Embedded Systems - IFIP TC 10 Working Conference on Distributed and Parallel Embedded Systems (DIPES 2006) October 11-13, 2006, Braga, Portugal (Hardcover, 2006 ed.)
Bernd Kleinjohann, Lisa Kleinjohann, Ricardo J. Machado, Carlos Pereira, P.S. Thiagarajan
R2,804 Discovery Miles 28 040 Ships in 18 - 22 working days

From Model-Driven Design to Resource Management for Distributed Embedded Systems presents 16 original contributions and 12 invited papers presented at the Working Conference on Distributed and Parallel Embedded Systems - DIPES 2006, sponsored by the International Federation for Information Processing - IFIP. Coverage includes model-driven design, testing and evolution of embedded systems, timing analysis and predictability, scheduling, allocation, communication and resource management in distributed real-time systems.

Cooperative Management of Enterprise Networks (Hardcover, 2002 ed.): Pradeep Kumar Ray Cooperative Management of Enterprise Networks (Hardcover, 2002 ed.)
Pradeep Kumar Ray
R2,821 Discovery Miles 28 210 Ships in 18 - 22 working days

Enterprises all over the world are experiencing a rapid development of networked computing for applications that are required for the daily survival of an organization. Client-server computing offers great potential for cost-effective networked computing. However, many organizations have now learned that the cost of maintenance and support of these networked distributed systems far exceeds the cost of buying them. Computer Supported Creative Work (CSCW) is the new evolving area that promotes the understanding of business processes and relevant communication technologies. Cooperative Management of Enterprise Networks uses CSCW as the medium for conveying ideas on the integration of business processes with network and systems management. This book will be useful for systems management professionals wishing to know about business process integration; business managers wishing to integrate their tasks with network/systems management; software system developers wishing to adopt participatory design practices; and students and researchers.

High-Performance Networks, Personal Communications and Mobile Computing (Hardcover): Dimitris N Chorafas High-Performance Networks, Personal Communications and Mobile Computing (Hardcover)
Dimitris N Chorafas
R2,681 Discovery Miles 26 810 Ships in 18 - 22 working days

Many professionals in the technology industry are seeking new solutions beyond the confines of the more traditional type software tools, network design solutions and distributed systems applications. The aim of this book is to provide for them a much needed upgrade of knowledge and skills by addressing the developing technical and business perspectives which have emerged from the deregulation of telecommunications, including issues connected to costs and tariffs. It also addresses a comprehensible introduction to the research, development and implementation of agents. Based on thorough research undertaken from 1993-96 in the United States, Europe and Japan, much practical material is included, with both comprehensive examples and case studies.

Interface and Transport Dynamics - Computational Modelling (Hardcover, 2003 ed.): Heike Emmerich, Britta Nestler, Michael... Interface and Transport Dynamics - Computational Modelling (Hardcover, 2003 ed.)
Heike Emmerich, Britta Nestler, Michael Schreckenberg
R4,097 Discovery Miles 40 970 Ships in 18 - 22 working days

An overview of the recent progress of research in computational physics and materials science. Particular topics are modelling of traffic flow and complex multi-scale solidification phenomena. The sections introduce novel research results of experts from a considerable diversity of disciplines such as physics, mathematical and computational modelling, nonlinear dynamics, materials sciences, statistical mechanics and foundry technique. The book intends to create a comprehensive and coherent image of the current research status and illustrates new simulation results of transport and interface dynamics by high resolution graphics. Various possible perspectives are formulated for future activities. Special emphasis is laid on exchanging experiences concerning numerical tools and on the bridging of the scales as is necessary in a variety of scientific and engineering applications. An interesting possibility along this line was the coupling of different computational approaches leading to hybrid simulations.

Development and Deployment of Multiplayer Online Games, Vol. II - DIY, (Re)Actors, Client Arch., Unity/UE4/ Lumberyard/Urho3D... Development and Deployment of Multiplayer Online Games, Vol. II - DIY, (Re)Actors, Client Arch., Unity/UE4/ Lumberyard/Urho3D (Hardcover)
'No Bugs' Hare; Contributions by Sergey Ignatchenko
R977 R856 Discovery Miles 8 560 Save R121 (12%) Ships in 18 - 22 working days
Views on Evolvability of Embedded Systems (Hardcover, 2011 Ed.): Pierre Van De Laar, Teade Punter Views on Evolvability of Embedded Systems (Hardcover, 2011 Ed.)
Pierre Van De Laar, Teade Punter
R4,183 Discovery Miles 41 830 Ships in 18 - 22 working days

Evolvability, the ability to respond effectively to change, represents a major challenge to today's high-end embedded systems, such as those developed in the medical domain by Philips Healthcare. These systems are typically developed by multi-disciplinary teams, located around the world, and are in constant need of upgrading to provide new advanced features, to deal with obsolescence, and to exploit emerging enabling technologies. Despite the importance of evolvability for these types of systems, the field has received scant attention from the scientific and engineering communities.

Views on Evolvability of Embedded Systems focuses on the topic of evolvability of embedded systems from an applied scientific perspective. In particular, the book describes results from the Darwin project that researched evolvability in the context of Magnetic Resonance Imaging (MRI) systems. This project applied the Industry-as-Laboratory paradigm, in which industry and academia join forces to ensure continuous knowledge and technology transfer during the project's lifetime. The Darwin project was a collaboration between the Embedded Systems Institute, the MRI business unit of Philips Healthcare, Philips Research, and five Dutch universities.

Evolvability was addressed from a system engineering perspective by a number of researchers from different disciplines such as software-, electrical- and mechanical engineering, with a clear focus on economic decision making. The research focused on four areas: data mining, reference architectures, mechanisms and patterns for evolvability, in particular visualization & modelling, and economic decision making. Views on Evolvability of Embedded Systems is targeted at both researchers and practitioners; they will not only find a state-of-the-art overview on evolvability research, but also guidelines to make systems more evolvable and new industrially-validated techniques to improve the evolvability of embedded systems.

Smart Micro-Grid Systems Security and Privacy (Hardcover, 1st ed. 2018): Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph... Smart Micro-Grid Systems Security and Privacy (Hardcover, 1st ed. 2018)
Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book is centered on Smart grids and micro-grids, as a cost-effective method of ensuring fair and equitable access to power in urban areas. It also considers scenarios where deploying smart grids can be both cost-prohibitively expensive and logistically challenging. Deploying smart microgrids instead, offers a reliable power solution but, as is the case in smart grids, a key issue is guaranteeing usability, trust, and reliability while protecting against energy theft. This book considers aspects such as state estimation, capacity planning, demand forecasting, price signals, and demand management with respect to energy theft. Straight-forward approaches to provoking energy theft on smart grids and micro-grids include mis-recordings power consumption/generation information and exposures of personally identifiable information or sensitive information. Attack models based on mis-recorded generation and/or consumption data and exposure of personally identifiable information, are also studied. In each case, countermeasures are proposed to circumvent the power theft attacks raised. Researchers in Smart Micro-grids security, cyber-physical systems, and critical infrastructure will want to purchase this book as a reference. Professionals, Researchers, Academics and students working in security general and Security of Critical Infrastructure, Privacy, and Data Sharing will also want to purchase this book as a reference.

High Availability and Disaster Recovery - Concepts, Design, Implementation (Hardcover, 2006 ed.): Klaus Schmidt High Availability and Disaster Recovery - Concepts, Design, Implementation (Hardcover, 2006 ed.)
Klaus Schmidt
R1,635 Discovery Miles 16 350 Ships in 18 - 22 working days

Companies and other organizations depend more than ever on the availability of their Information Technology, and most mission critical business processes are IT-based processes. Business Continuity is the ability to do business under any circumstances and is an essential requirement modern companies are facing. "High Availability and Disaster Recovery" are contributions of the IT to fulfill this requirement. And companies will be confronted with such demands to an even greater extent in the future, since their credit ratings will be lower without such precautions. Both, "High Availability and Disaster Recovery," are realized by redundant systems. Redundancy can and should be implemented on different abstraction levels: from the hardware, the operating system and middleware components up to the backup computing center in case of a disaster. This book presents requirements, concepts, and realizations of redundant systems on all abstraction levels, and all given examples refer to UNIX and Linux Systems.

Outlier Analysis (Hardcover, 2013 ed.): Charu C. Aggarwal Outlier Analysis (Hardcover, 2013 ed.)
Charu C. Aggarwal
R4,224 Discovery Miles 42 240 Ships in 10 - 15 working days

With the increasing advances in hardware technology for data collection, and advances in software technology (databases) for data organization, computer scientists have increasingly participated in the latest advancements of the outlier analysis field. Computer scientists, specifically, approach this field based on their practical experiences in managing large amounts of data, and with far fewer assumptions- the data can be of any type, structured or unstructured, and may be extremely large. Outlier Analysis is a comprehensive exposition, as understood by data mining experts, statisticians and computer scientists. The book has been organized carefully, and emphasis was placed on simplifying the content, so that students and practitioners can also benefit. Chapters will typically cover one of three areas: methods and techniques commonly used in outlier analysis, such as linear methods, proximity-based methods, subspace methods, and supervised methods; data domains, such as, text, categorical, mixed-attribute, time-series, streaming, discrete sequence, spatial and network data; and key applications of these methods as applied to diverse domains such as credit card fraud detection, intrusion detection, medical diagnosis, earth science, web log analytics, and social network analysis are covered.

Theoretical Aspects of Distributed Computing in Sensor Networks (Hardcover, Edition.): Sotiris Nikoletseas, Jose D.P. Rolim Theoretical Aspects of Distributed Computing in Sensor Networks (Hardcover, Edition.)
Sotiris Nikoletseas, Jose D.P. Rolim
R2,844 Discovery Miles 28 440 Ships in 18 - 22 working days

Wireless ad hoc sensor networks has recently become a very active research subject. Achieving efficient, fault-tolerant realizations of very large, highly dynamic, complex, unconventional networks is a real challenge for abstract modelling, algorithmic design and analysis, but a solid foundational and theoretical background seems to be lacking. This book presents high-quality contributions by leading experts worldwide on the key algorithmic and complexity-theoretic aspects of wireless sensor networks. The intended audience includes researchers and graduate students working on sensor networks, and the broader areas of wireless networking and distributed computing, as well as practitioners in the relevant application areas. The book can also serve as a text for advanced courses and seminars.

Scaling Networks v6 Labs & Study Guide (Paperback): Cisco Networking Academy, Allan Johnson Scaling Networks v6 Labs & Study Guide (Paperback)
Cisco Networking Academy, Allan Johnson
R1,470 Discovery Miles 14 700 Ships in 10 - 15 working days

Lab Manuals provide students enrolled in a Cisco Networking Academy course of the same name with a convenient, complete collection of all the course lab exercises that provide hands-on practice and challenges. The only authorized Labs & Study Guide for the Cisco Networking Academy Routing and Switching Essentials course in the CCNA Routing and Switching curriculum Each chapter of this book is divided into a Study Guide section followed by a Lab section. The Study Guide section offers exercises that help you learn the concepts, configurations, and troubleshooting skills crucial to your success as a CCENT exam candidate. Each chapter is slightly different and includes some or all the following types of exercises: Vocabulary Matching Exercises Concept Questions Exercises Skill-Building Activities and Scenarios Configuration Scenarios Packet Tracer Exercises Troubleshooting Scenarios The Labs & Activities include all the online course Labs and Packet Tracer activity instructions. If applicable, this section begins with a Command Reference that you will complete to highlight all the commands introduced in the chapter.

Secondary Liability of Internet Service Providers (Hardcover, 2017 ed.): Graeme B. Dinwoodie Secondary Liability of Internet Service Providers (Hardcover, 2017 ed.)
Graeme B. Dinwoodie
R5,122 Discovery Miles 51 220 Ships in 10 - 15 working days

This book analyses the doctrinal structure and content of secondary liability rules that hold internet service providers liable for the conduct of others, including the safe harbours (or immunities) of which they may take advantage, and the range of remedies that can be secured against such providers. Many such claims involve intellectual property infringement, but the treatment extends beyond that field of law. Because there are few formal international standards which govern the question of secondary liability, comprehension of the international landscape requires treatment of a broad range of national approaches. This book thus canvasses numerous jurisdictions across several continents, but presents these comparative studies thematically to highlight evolving commonalities and trans-border commercial practices that exist despite the lack of hard international law. The analysis presented in this book allows exploration not only of contemporary debates about the appropriate policy levers through which to regulate intermediaries, but also about the conceptual character of secondary liability rules.

Data Communications and Networking: Volume II (Hardcover): Michel Levine Data Communications and Networking: Volume II (Hardcover)
Michel Levine
R3,155 R2,857 Discovery Miles 28 570 Save R298 (9%) Ships in 18 - 22 working days
Distributed and Parallel Systems - From Cluster to Grid Computing (Hardcover, 2nd Revised edition): Peter Kacsuk, Thomas... Distributed and Parallel Systems - From Cluster to Grid Computing (Hardcover, 2nd Revised edition)
Peter Kacsuk, Thomas Fahringer, Zsolt Nemeth
R4,024 Discovery Miles 40 240 Ships in 18 - 22 working days

From Cluster to Grid Computing is an edited volume based on DAPSYS 2006, the 6th Austrian-Hungarian Workshop on Distributed and Parallel Systems, which is dedicated to all aspects of distributed and parallel computing. The workshop was held in conjunction with the 2nd Austrian Grid Symposium in Innsbruck, Austria in September 2006. Distributed and Parallel Systems: From Cluster to Grid Computing is designed for a professional audience composed of practitioners and researchers in industry. This book is also suitable for advanced-level students in computer science.

Cyber Security in Business and Management (Hardcover): Stephen Mason Cyber Security in Business and Management (Hardcover)
Stephen Mason
R3,055 R2,770 Discovery Miles 27 700 Save R285 (9%) Ships in 18 - 22 working days
Data Security in Cloud Computing (Hardcover): Vimal Kumar, Ryan Ko, Sivadon Chaisiri Data Security in Cloud Computing (Hardcover)
Vimal Kumar, Ryan Ko, Sivadon Chaisiri
R3,639 R3,279 Discovery Miles 32 790 Save R360 (10%) Ships in 18 - 22 working days

Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. But since the data is not stored, analysed or computed on site, this can open security, privacy, trust and compliance issues. This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management. Data Security in Cloud Computing covers major aspects of securing data in Cloud Computing. Topics covered include NOMAD: a framework for ensuring data confidentiality in mission-critical cloud based applications; 3DCrypt: privacy-preserving pre-classification volume ray-casting of 3D images in the cloud; multiprocessor system-on-chip for processing data in Cloud Computing; distributing encoded data for private processing in the cloud; data protection and mobility management for cloud; understanding software defined perimeter; security, trust and privacy for Cloud Computing in transportation cyber-physical systems; review of data leakage attack techniques in cloud systems; Cloud Computing and personal data processing: sorting out legal requirements; the Waikato data privacy matrix; provenance reconstruction in clouds; and security visualization for Cloud Computing.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,389 R1,288 Discovery Miles 12 880
Trustworthy Autonomic Computing
Thaddeus Eze Hardcover R2,997 R2,712 Discovery Miles 27 120
CompTIA Network+ Guide to Networks
Jill West Paperback R1,416 R1,315 Discovery Miles 13 150
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Guide to Networking Essentials
Greg Tomsho Paperback R1,419 R1,315 Discovery Miles 13 150

 

Partners