![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
The desire and the necessity for accessing and processing information stored in computer networks anytime and anywhere' has been the impetus for the growing interest in mobile computing research. Wired computing networks and end devices such as PCs and workstations have effectively extended the data-only networking capability of a few years ago to sophisticated multimedia networking. The cost of such transformation to the end user turns out to be very nominal. Undoubtedly the wireless access technology has given a big boost to mobile cellular telephony and data networking. Processing general purpose multimedia information requires, besides higher bandwidth, means for controlling the available bandwidth and caring for quality of service issues. This problem is accentuated by the need for providing such service in the presence of wireless physical layer and host mobility. Thus, tetherless and ubiquitous mobile and wireless computing systems should carefully combine advances in computer networking and wireless communication. While several experimental mobile computing platforms have sprung up, much research is needed to overcome technological obstacles in low power system design, sustainable battery life, unreliability and limited bandwidth of the wireless channel. Mobile Computing addresses some aspects of this new but rapidly growing field of research. A total of eight papers span the areas of protocols, network architecture, and performance issues. All of the papers deal with the complexities of host mobility in a wireless setting. They expose several challenges that affect system design of mobile computing networks at various levels. By addressing these challenges in an efficient andcost-effective manner, it is hoped that user-friendly, seamless and faster networks will emerge to serve the sophisticated and demanding applications of mobile users. Mobile Computing serves as an excellent reference, providing insights into some of the most important issues in mobile and wireless computing.
This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review "Tools, Perspectives, and Applications," and "Mining and Visualization" in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.
The ongoing migration of computing and information access from stationary environments to mobile computing devices for eventual use in mobile environments, such as Personal Digital Assistants (PDAs), tablet PCs, next generation mobile phones, and in-car driver assistance systems, poses critical challenges for natural human-computer interaction. Spoken dialogue is a key factor in ensuring natural and user-friendly interaction with such devices which are meant not only for computer specialists, but also for everyday users. Speech supports hands-free and eyes-free operation, and becomes a key alternative interaction mode in mobile environments, e.g. in cars where driver distraction by manually operated devices may be a significant problem. On the other hand, the use of mobile devices in public places, may make the possibility of using alternative modalities possibly in combination with speech, such as graphics output and gesture input, preferable due to e.g. privacy issues. Researchers' interest is progressively turning to the integration of speech with other modalities such as gesture input and graphics output, partly to accommodate more efficient interaction and partly to accommodate different user preferences. This book: Audience: Computer scientists, engineers, and others who work in
the area of spoken multimodal dialogue systems in academia and in
the industry;
A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference. This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practices and covers network security tools, policies, and administrative goals in an integrated manner. It is an essential security resource for undergraduate or graduate study, practitioners in networks, and professionals who develop and maintain secure computer network systems.
Written by one of the founding fathers of Quantum Information, this book gives an accessible (albeit mathematically rigorous), self-contained introduction to quantum information theory. The central role is played by the concept of quantum channel and its entropic and information characteristics. In this revised edition, the main results have been updated to reflect the most recent developments in this very active field of research.
Video monitoring has become a vital aspect within the global society as it helps prevent crime, promote safety, and track daily activities such as traffic. As technology in the area continues to improve, it is necessary to evaluate how video is being processed to improve the quality of images. Applied Video Processing in Surveillance and Monitoring Systems investigates emergent techniques in video and image processing by evaluating such topics as segmentation, noise elimination, encryption, and classification. Featuring real-time applications, empirical research, and vital frameworks within the field, this publication is a critical reference source for researchers, professionals, engineers, academicians, advanced-level students, and technology developers.
The companies that provide the Internet to the rest of the world do
not have the luxury of setting high expectations and assuming they
will be met. These Internet infrastructure companies (IICs) are
responsible for delivering the Internet's promise, including
everything from eBusiness and mobile Internet applications to
optical services and high-speed access. The Internet's audience
takes this promise for granted, and IICs face the daunting
challenge of making the Internet, and networks like it, do what the
audience expects them to. To meet the expectations they face, IICs
must harness the power of their operations support systems (OSSs) -
the software systems in the background they use to create, manage,
maintain, manipulate and adapt their networks to serve customers
reliably and rapidly.
This guide provides a comprehensive overview of High Performance Computing (HPC) to equip students with a full skill set including cluster setup, network selection, and a background of supercomputing competitions. It covers the system, architecture, evaluating approaches, and other practical supercomputing techniques. As the world's largest supercomputing hackathon, the ASC Student Supercomputer Challenge has attracted a growing number of new talent to supercomputing and has greatly promoted communications in the global HPC community. Enclosed in this book, readers will also find how to analyze and optimize supercomputing systems and applications in real science and engineering cases.
Under Quality of Service (QoS) routing, paths for flows are selected based upon the knowledge of resource availability at network nodes and the QoS requirements of flows. QoS routing schemes proposed differ in the way they gather information about the network state and select paths based on this information. We broadly categorize these schemes into best-path routing and proportional routing. The best-path routing schemes gather global network state information and always select the best path for an incoming flow based on this global view. On the other hand, proportional routing schemes proportion incoming flows among a set of candidate paths. We have shown that it is possible to compute near-optimal proportions using only locally collected information. Furthermore, a few good candidate paths can be selected using infrequently exchanged global information and thus with minimal communication overhead. Localized Quality Of Service Routing For The Internet, describes these schemes in detail demonstrating that proportional routing schemes can achieve higher throughput with lower overhead than best-path routing schemes. It first addresses the issue of finding near-optimal proportions for a given set of candidate paths based on locally collected flow statistics. This book will also look into the selection of a few good candidate paths based on infrequently exchanged global information. The final phase of this book will describe extensions to proportional routing approach to provide hierarchical routing across multiple areas in a large network. Localized Quality Of Service Routing For The Internet is designed for researchers and practitioners in industry, and is suitable for graduatelevel students in computer science as a secondary text.
The evolution of modern computers began more than 50 years ago and has been driven to a large extend by rapid advances in electronic technology during that period. The first computers ran one application (user) at a time. Without the benefit of operating systems or compilers, the application programmers were responsible for managing all aspects of the hardware. The introduction of compilers allowed programmers to express algorithms in abstract terms without being concerned with the bit level details of their implementation. Time sharing operating systems took computing systems one step further and allowed several users and/or applications to time share the computing services of com puters. With the advances of networks and software tools, users and applications were able to time share the logical and physical services that are geographically dispersed across one or more networks. Virtual Computing (VC) concept aims at providing ubiquitous open computing services in analogous way to the services offered by Telephone and Elec trical (utility) companies. The VC environment should be dynamically setup to meet the requirements of a single user and/or application. The design and development of a dynamically programmable virtual comput ing environments is a challenging research problem. However, the recent advances in processing and network technology and software tools have successfully solved many of the obstacles facing the wide deployment of virtual computing environments as will be outlined next."
Three important technology issues face professionals in today's business, education, and government world. In "Privacy, Identity, and Cloud Computing, " author and computer expert Dr. Harry Katzan Jr. addresses the subjects of privacy and identity as they relate to the new discipline of cloud computing, a model for providing on-demand access to computing service via the Internet. A compendium of eight far-reaching papers, "Privacy, Identity, and Cloud Computing" thoroughly dissects and discusses the following: The privacy of cloud computing Identity as a service Identity analytics and belief structures Compatibility relations in identity analysis Conspectus of cloud computing Cloud computing economics: Democratization and monetization of services Ontological view of cloud computing Privacy as a service Katzan provides not only a wealth of information, but gives exposure to these topics facing today's computer users. Ultimately, these are important facets of modern computing, and all their implications must be considered thoroughly in anticipation of future developments.
Piecewise Linear (PL) approximation of non-linear behaviour is a well-known technique in synthesis and analysis of electrical networks. However, the PL description should be efficient in data storage and the description should allow simple retrieval of the stored information. Furthermore, it would be useful if the model description could handle a large class of piecewise linear mappings. Piecewise Linear Modeling and Analysis explains in detail all possible model descriptions for efficiently storing piecewise linear functions, starting with the Chua descriptions. Detailed explanation on how the model parameter can be obtained for a given mapping is provided and demonstrated by examples. The models are ranked to compare them and to show which model can handle the largest class of PL mappings. All model descriptions are implicitly related to the Linear Complementarity Problem and most solution techniques for this problem, like Katzenelson and Lemke, are discussed according to examples that are explained in detail. To analyse PL electrical networks a simulator is mandatory. Piecewise Linear Modeling and Analysis provides a detailed outline of a possible PL simulator, including pseudo-programming code. Several simulation domains like transient, AC and distortion are discussed. The book explains the attractive features of PL simulators with respect to mixed-level and mixed-signal simulation while paying due regard also to hierarchical simulation. Piecewise Linear Modeling and Analysis shows in detail how many existing components in electrical networks can be modeled. These range from digital logic and analog basic elements such as transistors to complex systems like Phase-Locked Loops and detection systems. Simulation results are also provided. The book concludes with a discussion on how to find multiple solutions for PL functions or networks. Again, the most common techniques are outlined using clear examples. Piecewise Linear Modeling and Analysis is an indispensable guide for researchers and designers interested in network theory, network synthesis and network analysis.
These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 20-23. The call for papers went out with the challenging motto of "Security & Privacy Silver Linings in the Cloud" building a bridge between the long standing issues of security and privacy and the most recent developments in information and commu- cation technology. It attracted 102 submissions. All of them were evaluated on the basis of their significance, novelty, and technical quality by at least five member of the Program Committee. The Program Committee meeting was held electronically over a period of a week. Of the papers submitted, 25 were selected for presentation at the conference; the acceptance rate was therefore as low as 24. 5% making SEC 2010 a highly competitive forum. One of those 25 submissions could unfortunately not be included in the proceedings, as none of its authors registered in time to present the paper at the conference.
This book offers a comparative perspective on data protection and cybersecurity in Europe. In light of the digital revolution and the implementation of social media applications and big data innovations, it analyzes threat perceptions regarding privacy and cyber security, and examines socio-political differences in the fundamental conceptions and narratives of privacy, and in data protection regimes, across various European countries. The first part of the book raises fundamental legal and ethical questions concerning data protection; the second analyses discourses on cybersecurity and data protection in various European countries; and the third part discusses EU regulations and norms intended to create harmonized data protection regimes.
Technology has been the spark that ignited NATO's interest and commitment to scientific advancement during its history. Since its creation, the Science for Peace and Security (SPS) Programme has been instrumental to NATO's commitment to innovation, science and technological advancement. During the years, SPS has demonstrated a flexible and versatile approach to practical scientific cooperation, and has promoted knowledge-sharing, building capacity, and projected stability outside NATO territory. The priorities addressed by the SPS Programme are aligned with NATO's strategic objectives, and aim to tackle emerging security challenges that require dynamic adaptation for the prevention and mitigation of risks. By addressing priorities such as advanced technologies, hybrid threats, and counter-terrorism, the Programme deals with new, contemporary challenges. On 17-18 September 2019, the SPS Programme gathered at the KU Leuven University a wide number of researchers from a selection of on-going and recently closed SPS projects in the field of security-related advanced technologies for a "Cluster Workshop on Advanced Technologies". The workshop covered, in particular, the following scientific domains: communication systems, advanced materials, sensors and detectors, and unmanned and autonomous systems. This book provides an overview on how these projects have contributed to the development of new technologies and innovative solutions and recommendations for future actions in the NATO SPS programme.
Web Dynpro ABAP, a NetWeaver web application user interface tool from SAP, enables web programming connected to SAP Systems. The authors' main focus was to create a book based on their own practical experience. Each chapter includes examples which lead through the content step-by-step and enable the reader to gradually explore and grasp the Web Dynpro ABAP process. The authors explain in particular how to design Web Dynpro components, the data binding and interface methods, and the view controller methods. They also describe the other SAP NetWeaver Elements (ABAP Dictionary, Authorization) and the integration of the Web Dynpro Application into the SAP NetWeaver Portal. The new edition has been expanded to include chapters on subjects such as POWER Lists; creating the Modal Windows and External Windows; using Web Dynpro application parameters and Shared Objects to communicate between the Web Dynpro ABAP Application and Business Server Pages; and creating multi-language mails using Web Dynpro ABAP.
This book covers performance analysis of computer networks, and begins by providing the necessary background in probability theory, random variables, and stochastic processes. Queuing theory and simulation are introduced as the major tools analysts have access to. It presents performance analysis on local, metropolitan, and wide area networks, as well as on wireless networks. It concludes with a brief introduction to self-similarity. Designed for a one-semester course for senior-year undergraduates and graduate engineering students, it may also serve as a fingertip reference for engineers developing communication networks, managers involved in systems planning, and researchers and instructors of computer communication networks.
In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This book is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.
User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat. Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the leading experts in this recent, fast growing research area. These chapters collectively provide a thorough and concise introduction to the field of biometric-based continuous authentication. The book covers the conceptual framework underlying continuous authentication and presents detailed processing models for various types of practical continuous authentication applications.
The terms groupware and CSCW (Computer-Supported Cooperative Work) have received significant attention in computer science and related disciplines for quite some time now. This book has two main objectives: first, to outline the meaning of both terms, and second, to point out both the numerous opportunities for users of CSCW systems and the risks of applying them. The book introduces in detail an interdisciplinary application area of distributed systems, namely the computer support of individuals trying to solve a problem in cooperation with each other but not necessarily having identical work places or working times. CSCW can be viewed as a synergism between the areas of distributed systems and (multimedia) communications on the one hand and those of information science and socio-organizational theory on the other hand. Thus, the book is addressed to students of all these disciplines, as well as to users and developers of systems with group communication and cooperation as top priorities.
This book tells the story of government-sponsored wiretapping in Britain and the United States from the rise of telephony in the 1870s until the terrorist attacks of 9/11. It pays particular attention to the 1990s, which marked one of the most dramatic turns in the history of telecommunications interception. During that time, fiber optic and satellite networks rapidly replaced the copper-based analogue telephone system that had remained virtually unchanged since the 1870s. That remarkable technological advance facilitated the rise of the networked home computer, cellular telephony, and the Internet, and users hailed the dawn of the digital information age. However, security agencies such as the FBI and MI5 were concerned. Since the emergence of telegraphy in the 1830s, security services could intercept private messages using wiretaps, and this was facilitated by some of the world's largest telecommunications monopolies such as AT&T in the US and British Telecom in the UK. The new, digital networks were incompatible with traditional wiretap technology. To make things more complicated for the security services, these monopolies had been privatized and broken up into smaller companies during the 1980s, and in the new deregulated landscape the agencies had to seek assistance from thousands of startup companies that were often unwilling to help. So for the first time in history, technological and institutional changes posed a threat to the security services' wiretapping activities, and government officials in Washington and London acted quickly to protect their ability to spy, they sought to force the industry to change the very architecture of the digital telecommunications network. This book describes in detail the tense negotiations between governments, the telecommunications industry, and civil liberties groups during an unprecedented moment in history when the above security agencies were unable to wiretap. It reveals for the first time the thoughts of some of the protagonists in these crucial negotiations, and explains why their outcome may have forever altered the trajectory of our information society.
As the diffusion and use of technology applications have accelerated in organizational and societal domains, behavioral and social dynamics have inevitably created the potential for negative as well as positive consequences and events associated with technology. A pressing need within organizations and societies has therefore emerged for robust, proactive information security measures that can prevent as well as ameliorate breaches, attacks, and abuses.""The Handbook of Research on Social and Organizational Liabilities in Information Security"" offers a critical mass of insightful, authoritative articles on the most salient contemporary issues of managing social and human aspects of information security. Aimed at providing immense scholarly value to researchers, academicians, and practitioners in the area of information technology and security, this landmark reference collection provides estimable coverage of pertinent issues such as employee surveillance, information security policies, and password authentication.
As the use of digital technology has grown, so necessarily has the body of research into its effects at the personal, group and organizational levels, but there is no one book that looks at how digital technology has specifically influenced creativity. Digital Creativity: Individuals, Groups, and Organizations discusses all spectrums of influence that digital technologies have on creativity from the individual, team, and organization level. This book offers a new kind of creativity model encompassing all three levels of creativity. It combines each level into a unified creativity framework in which organizations regardless of their industry types could benefit in reengineering their business processes as well as strategies. For this purpose, the book considers various factors that would affect creativity- individuals' digital efficacy, heterogeneity among members (i.e., age, gender, races, tenure, education, and culture, etc), CMC (Computer-Mediated Communication), task complexity, exploitation, exploration, culture, organizational learning capability, and knowledge networks among members. This book introduces a theorized and systematic glimpse into the exciting realm of digital creativity. It is organized with contents starting from individuals to teams and ultimately to organizations, each with various techniques and cases. Each chapter shows how individuals, teams, and organizations can become more creative through use of digital technologies. |
![]() ![]() You may like...
Revealing Revelation - How God's Plans…
Amir Tsarfati, Rick Yohn
Paperback
![]()
Menasseh Ben Israel's Mission to Oliver…
1604-1657 Manasseh Ben Israel
Hardcover
R953
Discovery Miles 9 530
|