0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (281)
  • R250 - R500 (873)
  • R500+ (13,612)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Continuous Authentication Using Biometrics - Data, Models, and Metrics (Hardcover): Issa Traore, Ahmed Awad E Ahmed Continuous Authentication Using Biometrics - Data, Models, and Metrics (Hardcover)
Issa Traore, Ahmed Awad E Ahmed
R4,917 Discovery Miles 49 170 Ships in 18 - 22 working days

User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat. Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the leading experts in this recent, fast growing research area. These chapters collectively provide a thorough and concise introduction to the field of biometric-based continuous authentication. The book covers the conceptual framework underlying continuous authentication and presents detailed processing models for various types of practical continuous authentication applications.

Internet Protocols - Advances, Technologies and Applications (Hardcover, 2003 ed.): Subrata Goswami Internet Protocols - Advances, Technologies and Applications (Hardcover, 2003 ed.)
Subrata Goswami
R4,186 Discovery Miles 41 860 Ships in 18 - 22 working days

IP technology has progressed from being a scientific topic to being one of the most popular technologies in networking. Concurrently, a number of new innovations and technological advances have been developed and brought to the marketplace. These new ideas, concepts and products are likely to have a tremendous influence on businesses and on our everyday lives. This book addresses many of these newer technological developments and provides insights for engineers and scientists developing new technological components, devices and products. explores how they are being implemented in the real world. The author examines numerous implementation details related to IP equipment and software. The material is organized by application so that readers can better understand the uses of IP technology. Included are details of implementation issues and state-of-the-art equipment and software. descriptions of Cisco 12410 GSR and Juniper M160, and IP software stack details are also included for several popular operating systems such as Windows, BSD, VxWorks and Linux.

Metropolitan Area WDM Networks - An AWG Based Approach (Hardcover, 2004 ed.): Martin Maier Metropolitan Area WDM Networks - An AWG Based Approach (Hardcover, 2004 ed.)
Martin Maier
R4,071 Discovery Miles 40 710 Ships in 18 - 22 working days

Metropolitan Area WDM Networks: An AWG Based Approach provides a comprehensive and technically detailed overview of the latest metropolitan area WDM network experimental systems, architectures, and access protocols. Its main focus is on the novel star WDM networks based on a wavelength-selective Arrayed-Waveguide Grating (AWG). Network researchers, engineers, professionals, and graduate students will benefit from the thorough overview and gain an in-depth understanding of current and next-generation metro WDM networks.

The AWG based metro star WDM network is discussed at length and extensively investigated by means of stochastic analyses and simulations. The book provides:
*an up-to-date overview of ring and star metro WDM networks and access protocols,
*in-depth performance comparison studies of AWG based multihop vs. single-hop WDM networks and AWG vs. Passive Star Coupler based single-hop WDM networks,
*a thorough description of the AWG based network and node architectures and access protocols,
*a novel highly-efficient approach to provide survivability for star WDM networks,
*extensive analytical results for both unicast and multicast variable-size packet traffic and bandwidth on demand,
*supplementary simulation results, including packet header trace files.

Networking Security and Standards (Hardcover, 1997 ed.): Weidong Kou Networking Security and Standards (Hardcover, 1997 ed.)
Weidong Kou
R4,128 Discovery Miles 41 280 Ships in 18 - 22 working days

Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modification. Putting proper security in place gives us many advantages. It lets us exchange confidential information and keep it confidential. We can be sure that a piece of information received has not been changed. Nobody can deny sending or receiving a piece of information. We can control which piece of information can be accessed, and by whom. We can know when a piece of information was accessed, and by whom. Networks and databases are guarded against unauthorized access. We have seen the rapid development of the Internet and also increasing security requirements in information networks, databases, systems, and other information resources. This comprehensive book responds to increasing security needs in the marketplace, and covers networking security and standards. There are three types of readers who are interested in security: non-technical readers, general technical readers who do not implement security, and technical readers who actually implement security. This book serves all three by providing a comprehensive explanation of fundamental issues of networking security, concept and principle of security standards, and a description of some emerging security technologies. The approach is to answer the following questions: 1. What are common security problems and how can we address them? 2. What are the algorithms, standards, and technologies that can solve common security problems? 3.

Human-Centered Digitalization and Services (Hardcover, 1st ed. 2019): Marja Toivonen, Eveliina Saari Human-Centered Digitalization and Services (Hardcover, 1st ed. 2019)
Marja Toivonen, Eveliina Saari
R3,372 Discovery Miles 33 720 Ships in 18 - 22 working days

This book provides a timely overview of the impacts of digitalization from the perspective of everyday life, and argues that one central issue in digitalization is the development of new types of services that digitalization enables, but which are often overlooked due to the focus on new technologies and devices. The book summarizes the past 20 years of research into the relationship between information and communications technology (ICT) and service innovation, and reveals that the ongoing digitalization is a qualitatively different phenomenon and represents a true paradigm shift. The all-encompassing integration and distribution of data raises critical issues such as preserving human dignity and individual autonomy; moreover, interaction practices that foster broad participation, trust, learning, and a willingness to share knowledge are called for. Citizen empowerment and multi-actor co-creation have become central to using digitalization to support the development of wellbeing and sustainability. Further, the book shows how employees and professionals can and should be involved in designing their future work, and in evaluating it. Proactiveness and participation in innovation endeavours are ways to guarantee meaningful work in an age of socio-technical transition. The book employs a variety of theoretical approaches and perspectives from diverse disciplines to illustrate these needs. In addition to theoretical analyses, some specific application areas are examined, e.g. services in health and social care, and problems linked to robots in elderly care. Given its scope, the book is highly recommended to all readers seeking an overview of the current understanding of the human side of digitalization and searching for concrete cases from different countries to illustrate the topic.

User Interface Evaluation - A Structured Approach (Hardcover, New): Siegfried Treu User Interface Evaluation - A Structured Approach (Hardcover, New)
Siegfried Treu
R2,429 Discovery Miles 24 290 Ships in 18 - 22 working days

Introduction: Background and Status. Design before Evaluation. Prerequisite Knowledge Areas: Supportive Tools and Techniques. Interface Structures. Basic Measures. Measurement and Evaluation: Evaluation Terms and Aspects. Tailored Measures of Performance. Evaluation Approaches and Methods. Special Topics: Stress and User Satisfaction. Visualizable Objects and Spaces. Interaction and Mental Involvement. Structural Specification and Utility. Index.

Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March... Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers (Hardcover, 1st ed. 2016)
Mason Rice, Sujeet Shenoi
R2,915 R1,920 Discovery Miles 19 200 Save R995 (34%) Ships in 10 - 15 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: themes and issues; control systems security; infrastructure modeling and simulation; risk and impact assessment. This book is the tenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of fourteen edited papers from the Tenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2016. Critical Infrastructure Protection is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Privacy, Identity, and Cloud Computing (Hardcover): Harry Katzan Privacy, Identity, and Cloud Computing (Hardcover)
Harry Katzan
R668 R602 Discovery Miles 6 020 Save R66 (10%) Ships in 18 - 22 working days

Three important technology issues face professionals in today's business, education, and government world. In "Privacy, Identity, and Cloud Computing, " author and computer expert Dr. Harry Katzan Jr. addresses the subjects of privacy and identity as they relate to the new discipline of cloud computing, a model for providing on-demand access to computing service via the Internet. A compendium of eight far-reaching papers, "Privacy, Identity, and Cloud Computing" thoroughly dissects and discusses the following: The privacy of cloud computing Identity as a service Identity analytics and belief structures Compatibility relations in identity analysis Conspectus of cloud computing Cloud computing economics: Democratization and monetization of services Ontological view of cloud computing Privacy as a service Katzan provides not only a wealth of information, but gives exposure to these topics facing today's computer users. Ultimately, these are important facets of modern computing, and all their implications must be considered thoroughly in anticipation of future developments.

Network-Centric Collaboration and Supporting Frameworks - IFIP TC 5 WG 5.5, Seventh IFIP Working Conference on Virtual... Network-Centric Collaboration and Supporting Frameworks - IFIP TC 5 WG 5.5, Seventh IFIP Working Conference on Virtual Enterprises, 25-27 September 2006, Helsinki, Finland (Hardcover, 2006 ed.)
Luis M. Camarinha-Matos, Hamideh Afsarmanesh, Martin Ollus
R4,371 Discovery Miles 43 710 Ships in 18 - 22 working days

Collaborative Networks is a fast developing area, as shown by the already large number of diverse real-world implemented cases and the dynamism of its related involved research community. Benefiting from contributions of multiple areas, nameley management, economy, social sciences, law and ethics, etc., the area of Collaborative Networs is being consolidated as a new scientific discipline of its own. On one hand significant steps towards a stronger theoretical foundation for this new discipline are developed and applied in industry and services.

Based on the experiences and lessons learned in many research projects and pilot cases developed during the last decade, a new emphasis is now being put on the development of holistic frameworks, combining business models, conceptual models, governance principles and methods, as well as supporting infrastructures and services. In fact, researching the phase in which the computer and networking technologies provide a good starting basis for the establishment of collaborative platforms, the emphasis is now turning to the understanding of the collaboration promotion mechanisms and CN governance principles. Therefore, issues such as the value systems, trust, performance and benefits distribution are gaining more importance. Encompassing all these developments, the efforts to develp reference models for collaborative networks represent a major challenge in order to provide the foundation for further developments of the CN.

PRO-VE represents a good synthesis of the work in this area, and plays an active role in the promotion of these activities. Being recognized as the most focused scientific and technical conference on CollaborativeNetworks, PRO-VE continues to offer the opportunity for presentation and discussion of both the latest research developments as well as the practical application case studies. Following the vision of IFIP and SOCOLNET, the PRO-VE conference offers a forum for collaboration and knowledge exchange among experts from different regions of the world.

Design of Optical WDM Networks - LAN, MAN and WAN Architectures (Hardcover, 2001 ed.): Byrav Ramamurthy Design of Optical WDM Networks - LAN, MAN and WAN Architectures (Hardcover, 2001 ed.)
Byrav Ramamurthy
R2,752 Discovery Miles 27 520 Ships in 18 - 22 working days

Lo, soul! seest thou not God's purpose from the first? The earth to be spann'd, connected by net-work From Passage to India! Walt Whitman, "Leaves of Grass", 1900. The Internet is growing at a tremendous rate today. New services, such as telephony and multimedia, are being added to the pure data-delivery framework of yesterday. Such high demands on capacity could lead to a "bandwidth-crunch" at the core wide-area network resulting in degra dation of service quality. Fortunately, technological innovations have emerged which can provide relief to the end-user to overcome the In ternet's well-known delay and bandwidth limitations. At the physical layer, a major overhaul of existing networks has been envisaged from electronic media (such as twisted-pair and cable) to optical fibers - in the wide area, in the metropolitan area, and even in the local area set tings. In order to exploit the immense bandwidth potential of the optical fiber, interesting multiplexing techniques have been developed over the years. Wavelength division multiplexing (WDM) is such a promising tech nique in which multiple channels are operated along a single fiber si multaneously, each on a different wavelength. These channels can be independently modulated to accommodate dissimilar bit rates and data formats, if so desired. Thus, WDM carves up the huge bandwidth of an optical fiber into channels whose bandwidths (1-10 Gbps) are compati ble with peak electronic processing speed.

Ad-hoc Networks: Fundamental Properties and Network Topologies (Mixed media product, 2006 ed.): Ramin Hekmat Ad-hoc Networks: Fundamental Properties and Network Topologies (Mixed media product, 2006 ed.)
Ramin Hekmat
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book provides an original graph theoretical approach to the fundamental properties of wireless mobile ad-hoc networks. This approach is combined with a realistic radio model for physical links between nodes to produce new insight into network characteristics like connectivity, degree distribution, hopcount, interference and capacity. The book establishes directives for designing ad-hoc networks and sensor networks. It will interest the academic community, and engineers who roll out ad-hoc and sensor networks.

Distributed Embedded Systems: Design, Middleware and Resources - IFIP 20th World Computer Congress, TC10 Working Conference on... Distributed Embedded Systems: Design, Middleware and Resources - IFIP 20th World Computer Congress, TC10 Working Conference on Distributed and Parallel Embedded Systems (DIPES 2008), September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
Bernd Kleinjohann, Lisa Kleinjohann, Marilyn Wolf
R2,779 Discovery Miles 27 790 Ships in 18 - 22 working days

This year, the IFIP Working Conference on Distributed and Parallel Embedded Sys tems (DIPES 2008) is held as part of the IFIP World Computer Congress, held in Milan on September 7 10, 2008. The embedded systems world has a great deal of experience with parallel and distributed computing. Many embedded computing systems require the high performance that can be delivered by parallel computing. Parallel and distributed computing are often the only ways to deliver adequate real time performance at low power levels. This year's conference attracted 30 submissions, of which 21 were accepted. Prof. Jor ] g Henkel of the University of Karlsruhe graciously contributed a keynote address on embedded computing and reliability. We would like to thank all of the program committee members for their diligence. Wayne Wolf, Bernd Kleinjohann, and Lisa Kleinjohann Acknowledgements We would like to thank all people involved in the organization of the IFIP World Computer Congress 2008, especially the IPC Co Chairs Judith Bishop and Ivo De Lotto, the Organization Chair Giulio Occhini, as well as the Publications Chair John Impagliazzo. Further thanks go to the authors for their valuable contributions to DIPES 2008. Last but not least we would like to acknowledge the considerable amount of work and enthusiasm spent by our colleague Claudius Stern in preparing theproceedingsofDIPES2008. Hemadeitpossibletoproducethemintheircurrent professional and homogeneous style."

Performance Analysis of Multi-Channel and Multi-Traffic on Wireless Communication Networks (Hardcover, 2002 ed.): Wuyi Yue,... Performance Analysis of Multi-Channel and Multi-Traffic on Wireless Communication Networks (Hardcover, 2002 ed.)
Wuyi Yue, Yutaka Matsumoto
R4,199 Discovery Miles 41 990 Ships in 18 - 22 working days

With rapid increase of mobile users of laptop computers and cellular phones, support of Internet services like e-mail and World Wide Web (WWW) access in a mobile environment is an indispensable requirement. The wireless networks must have the ability to provide real-time bursty traffic (such as voice or video) and data traffic in a multimedia environment with high quality of service. To satisfy the huge demand for wireless multimedia service, efficient channel access methods must be devised. For design and tuning of the channel access methods, the system performance must be mathematically analysed. To do so, very accurate models, that faithfully reproduce the stochastic behaviour of multimedia wireless communication and computer networks, must be constructed.
There exist several books on the performance analysis and evaluation for data communication networks or computer networks. This book attempts to present exact and approximate analytical solution methods and techniques using queueing theory in the complex multimedia traffic systems with procedures of random multiple access schemes. In particular, this book presents how to approximate the system performance of discrete-time multimedia networks, the probability distribution of the interarrival time of internetwork packets at the adjacent network and the higher moments of the transmission departure distribution and delay in wireless multimedia communication environment. In general the modeling of discrete-time multimedia communication systems are more complex than that of continuous-time systems because multiple state changes can occur from one time-unit to the next. This complicates the analysis of the model. This book alsodiscusses numerical results that illustrate the applications of the theory and various properties.
Performance Analysis of Multichannel and Multi-Traffic on Wireless Communication Networks should prove useful to a post-graduate course in computer science or electrical engineering. It can be a pre requisite to some other more advanced courses like network design and management or queueing theory with applications to multimedia communication and computer networks. It can also be used for a course on stochastic models in applied mathematics and operations research departments.

Secure Group Communications Over Data Networks (Hardcover, 2005 ed.): Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras Secure Group Communications Over Data Networks (Hardcover, 2005 ed.)
Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
R2,655 Discovery Miles 26 550 Ships in 18 - 22 working days

The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri vacy of the communication and to ensure the integrity of the applications. 'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages to group members, in a way that outsiders are unable to glean any information even when they are able to intercept the messages. SGC is becoming extremely important for researchers and practitioners because many applications that require SGC are now widely used, such as teleconferencing, tele-medicine, real-time information services, distributed interactive simulations, collaborative work, grid computing, and the deployment of VPN (Virtual Private Networks). Even though considerable research accomplishments have been achieved in SGC, few books exist on this very important topic. The purpose of this book is to provide a comprehensive survey of principles and state-of-the-art techniques for secure group communications over data net works. The book is targeted towards practitioners, researchers and students in the fields of networking, security, and software applications development. The book consists of 7 chapters, which are listed and described as follows."

Interactive Computation - The New Paradigm (Hardcover, 2006 ed.): Dina Goldin, Scott A. Smolka, Peter Wegner Interactive Computation - The New Paradigm (Hardcover, 2006 ed.)
Dina Goldin, Scott A. Smolka, Peter Wegner
R4,095 Discovery Miles 40 950 Ships in 18 - 22 working days

The interaction paradigm is a new conceptualization of computational phenomena that emphasizes interaction over algorithms, reflecting the shift in technology from main-frame number-crunching to distributed intelligent networks with graphical user interfaces. The book is arranged in four sections: "Introduction," comprising three chapters that explore and summarize the fundamentals of interactive computation; "Theory" with six chapters, each discussing a specific aspect of interaction; "Applications," five chapters showing how this principle is applied in subdisciplines of computer science; and "New Directions," presenting four multidisciplinary applications. The book challenges traditional Turing machine-based answers to fundamental questions of problem solving and the scope of computation.

Guide to Elliptic Curve Cryptography (Hardcover, 2004 ed.): D.R. Hankerson, A.J. Menezes, Scott A. Vanstone Guide to Elliptic Curve Cryptography (Hardcover, 2004 ed.)
D.R. Hankerson, A.J. Menezes, Scott A. Vanstone
R4,744 Discovery Miles 47 440 Ships in 18 - 22 working days

 Chapter 1:  Introduction and Overview

Medical Device Cybersecurity: A Guide for Engineers and Manufacturers (Hardcover, Unabridged edition): Axel Wirth, Christopher... Medical Device Cybersecurity: A Guide for Engineers and Manufacturers (Hardcover, Unabridged edition)
Axel Wirth, Christopher Gates, Jason Smith
R3,793 Discovery Miles 37 930 Ships in 18 - 22 working days

Cybersecurity for medical devices is no longer optional. We must not allow sensationalism or headlines to drive the discussion... Nevertheless, we must proceed with urgency. In the end, this is about preventing patient harm and preserving patient trust. A comprehensive guide to medical device secure lifecycle management, this is a book for engineers, managers, and regulatory specialists. Readers gain insight into the security aspects of every phase of the product lifecycle, including concept, design, implementation, supply chain, manufacturing, postmarket surveillance, maintenance, updates, and end of life. Learn how to mitigate or completely avoid common cybersecurity vulnerabilities introduced during development and production. Grow your awareness of cybersecurity development topics ranging from high-level concepts to practical solutions and tools. Get insight into emerging regulatory and customer expectations. Uncover how to minimize schedule impacts and accelerate time-to-market while still accomplishing the main goal: reducing patient and business exposure to cybersecurity risks. Medical Device Cybersecurity for Engineers and Manufacturers is designed to help all stakeholders lead the charge to a better medical device security posture and improve the resilience of our medical device ecosystem.

Computer and Computing Technologies in Agriculture IV - 4th IFIP TC 12 International Conference, CCTA 2010, Nanchang, China,... Computer and Computing Technologies in Agriculture IV - 4th IFIP TC 12 International Conference, CCTA 2010, Nanchang, China, October 22-25, 2010, Selected Papers, Part III (Hardcover, Edition.)
Daoliang Li, Yande Liu, Yingyi Chen
R2,807 Discovery Miles 28 070 Ships in 18 - 22 working days

This book constitutes Part III of the refereed four-volume post-conference proceedings of the 4th IFIP TC 12 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2010, held in Nanchang, China, in October 2010. The 352 revised papers presented were carefully selected from numerous submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including simulation models and decision-support systems for agricultural production, agricultural product quality testing, traceability and e-commerce technology, the application of information and communication technology in agriculture, and universal information service technology and service systems development in rural areas.

PAM Mastery (Hardcover): Michael W Lucas PAM Mastery (Hardcover)
Michael W Lucas
R878 R797 Discovery Miles 7 970 Save R81 (9%) Ships in 18 - 22 working days
Adaptive User Interfaces, Volume 10 - Principles and Practice (Hardcover): M.Schneider Hufschmidt, T. Kuhme, U. Malinowski Adaptive User Interfaces, Volume 10 - Principles and Practice (Hardcover)
M.Schneider Hufschmidt, T. Kuhme, U. Malinowski
R4,494 Discovery Miles 44 940 Ships in 10 - 15 working days

The area of intelligent and adaptive user interfaces has been of interest to the research community for a long time. Much effort has been spent in trying to find a stable theoretical base for adaptivity in human-computer interaction and to build prototypical systems showing features of adaptivity in real-life interfaces. To date research in this field has not led to a coherent view of problems, let alone solutions. A workshop was organized, which brought together a number of well-known researchers in the area of adaptive user interfaces with a view to


develop a coherent view of the results accomplished in the field


organize basic ideas which might lead to a more general methodology for adaptivity in order to overcome the problem of specialized, non-generalizable solutions, and


discuss possible areas for future research in the field and to define criteria for the selection of the most promising directions of such research.


The results of the workshop are presented in this volume. The authors have collected papers from the participants which describe both their research and their views on questions which were dealt with during the workshop. A state-of-the-art report and taxonomy for the field of adaptive interfaces and a discussion summary are also included in this volume.


Formal Description Techniques IX - Theory, application and tools (Hardcover, 1996 ed.): R. Gotzhein, J. Bredereke Formal Description Techniques IX - Theory, application and tools (Hardcover, 1996 ed.)
R. Gotzhein, J. Bredereke
R7,921 Discovery Miles 79 210 Ships in 18 - 22 working days

This book is the combined proceedings of the latest IFIP Formal Description Techniques (FDTs) and Protocol Specification, Testing and Verification (PSTV) series. It addresses FDTs applicable to communication protocols and distributed systems, with special emphasis on standardised FDTs. It features state-of-the-art in theory, application, tools and industrialisation of formal description.

Performance Modeling and Engineering (Hardcover, 2008 ed.): Zhen Liu, Cathy H. Xia Performance Modeling and Engineering (Hardcover, 2008 ed.)
Zhen Liu, Cathy H. Xia
R2,666 Discovery Miles 26 660 Ships in 18 - 22 working days

With the fast development of networking and software technologies, information processing infrastructure and applications have been growing at an impressive rate in both size and complexity, to such a degree that the design and development of high performance and scalable data processing systems and networks have become an ever-challenging issue. As a result, the use of performance modeling and m- surementtechniquesas a critical step in designand developmenthas becomea c- mon practice. Research and developmenton methodologyand tools of performance modeling and performance engineering have gained further importance in order to improve the performance and scalability of these systems. Since the seminal work of A. K. Erlang almost a century ago on the mod- ing of telephone traf c, performance modeling and measurement have grown into a discipline and have been evolving both in their methodologies and in the areas in which they are applied. It is noteworthy that various mathematical techniques were brought into this eld, including in particular probability theory, stochastic processes, statistics, complex analysis, stochastic calculus, stochastic comparison, optimization, control theory, machine learning and information theory. The app- cation areas extended from telephone networks to Internet and Web applications, from computer systems to computer software, from manufacturing systems to s- ply chain, from call centers to workforce management.

Data Security in Cloud Computing (Hardcover): Vimal Kumar, Ryan Ko, Sivadon Chaisiri Data Security in Cloud Computing (Hardcover)
Vimal Kumar, Ryan Ko, Sivadon Chaisiri
R3,639 R3,279 Discovery Miles 32 790 Save R360 (10%) Ships in 18 - 22 working days

Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. But since the data is not stored, analysed or computed on site, this can open security, privacy, trust and compliance issues. This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management. Data Security in Cloud Computing covers major aspects of securing data in Cloud Computing. Topics covered include NOMAD: a framework for ensuring data confidentiality in mission-critical cloud based applications; 3DCrypt: privacy-preserving pre-classification volume ray-casting of 3D images in the cloud; multiprocessor system-on-chip for processing data in Cloud Computing; distributing encoded data for private processing in the cloud; data protection and mobility management for cloud; understanding software defined perimeter; security, trust and privacy for Cloud Computing in transportation cyber-physical systems; review of data leakage attack techniques in cloud systems; Cloud Computing and personal data processing: sorting out legal requirements; the Waikato data privacy matrix; provenance reconstruction in clouds; and security visualization for Cloud Computing.

Information Superhighways - Multimedia Users and Futures (Hardcover): Stephen J. Emmott Information Superhighways - Multimedia Users and Futures (Hardcover)
Stephen J. Emmott; Series edited by Andrew F. Monk, Brian R. Gaines
R2,093 Discovery Miles 20 930 Ships in 10 - 15 working days

A global information revolution has begun. Converging communications and computing technologies are forming information superhighways, linking people and information interactively, at any time, in any place, via a combination of multimedia, digital video, sound, graphics, and text.
The challenge now is to understand the needs of people as the users of information superhighways and develop products and services that use the technological advances to positive effect. This is the first book to examine these issues. It shows that by focusing on users, a range of multimedia applications emerge which make more imaginative use of computing and bandwidth than the products of the current focus on application development, such as"video on demand."The book emphasizes the point that the information revolution will be driven by users, not the multimedia industry.
Information Superhighways is essential reading for those working in the communications, computing, and media industries, and in multimedia. It will also be of interest to students and practitioners in psychology, computing, and human-computer interaction.
Key Features
* Foreword by best-selling author Nicholas Negroponte, Media Lab, Massachusetts Institute of Technology, Senior Columnist for Wired magazine
* Discusses the importance of the coming information age
* Outlines need for innovation in regulatory policy
* Presents the idea of using multimedia to design organizations
* Describes multimedia-supported group working
* Gives discussion of designing media space
* Provides coverage of issues in user-centered multimedia development

Resource Management and Efficiency in Cloud Computing Environments (Hardcover): Ashok Kumar Turuk, Bibhudatta Sahoo, Sourav... Resource Management and Efficiency in Cloud Computing Environments (Hardcover)
Ashok Kumar Turuk, Bibhudatta Sahoo, Sourav Kanti Addya
R5,188 Discovery Miles 51 880 Ships in 18 - 22 working days

Today's advancements in technology have brought about a new era of speed and simplicity for consumers and businesses. Due to these new benefits, the possibilities of universal connectivity, storage and computation are made tangible, thus leading the way to new Internet-of Things solutions. Resource Management and Efficiency in Cloud Computing Environments is an authoritative reference source for the latest scholarly research on the emerging trends of cloud computing and reveals the benefits cloud paths provide to consumers. Featuring coverage across a range of relevant perspectives and topics, such as big data, cloud security, and utility computing, this publication is an essential source for researchers, students and professionals seeking current research on the organization and productivity of cloud computing environments. Topics Covered: Big Data Cloud Application Services (SaaS) Cloud Security Hybrid Cloud Internet of Things (IoT) Private Cloud Public Cloud Service Oriented Architecture (SOA) Utility Computing Virtualization Technology

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Digital Health - Mobile and Wearable…
Shabbir Syed-Abdul, Xinxin Zhu, … Paperback R2,525 Discovery Miles 25 250
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Cable Engineering for Local Area…
B.J. Elliott Hardcover R3,208 Discovery Miles 32 080

 

Partners