![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
High Performance Networking is a state-of-the-art book that deals with issues relating to the fast-paced evolution of public, corporate and residential networks. It focuses on the practical and experimental aspects of high performance networks and introduces novel approaches and concepts aimed at improving the performance, usability, interoperability and scalability of such systems. Among others, the topics covered include: Java applets and applications; distributed virtual environments; new internet streaming protocols; web telecollaboration tools; Internet, Intranet; real-time services like multimedia; quality of service; mobility. High Performance Networking comprises the proceedings of the Eighth International Conference on High Performance Networking, sponsored by the International Federation for Information Processing (IFIP), and was held at Vienna Univrsity of Technology, Vienna, Austria, in September 1998. High Performance Networking is suitable as a secondary text for a graduate level course on high performance networking, and as a reference for researchers and practitioners in industry.
"The New Economy in Development" presents conceptual and empirical
analyses of the opportunities offered by information and
communications technologies (ICT). By focusing on the
interrelationships between ICT, services, globalization,
international agreements and broader development goals, the volume
offers a range of policy options for harnessing ICT for
development. Contributors include scholars and policy makers from
international organizations, and the chapters include understudied
cases from Africa, Latin America, Eastern Europe, and Asia.
Optical network design and modeling is an essential issue for planning and operating networks for the next century. The main issues in optical networking are being widely investigated, not only for WDM networks but also for optical TDM and optical packet switching. This book contributes to further progress in optical network architectures, design, operation and management and covers the following topics in detail: Optical switching and Teabit networking; Future OTDM and packet switched networks; WDM ring networks; Optical interworking and packets over wavelength'; Hybrid and switchless networks; Medium access protocols for optical LANs and MANs. This book contains the selected proceedings of the Fourth International Working Conference on Optical Network Design and Modeling, which was sponsored by the International Federation for Information Processing (IFIP), and held in February 2000, in Athens, Greece. This valuable new book will be essential reading for academic researchers and practitioners working in computer science, electrical engineering, and communications.
In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid. It is essential from a design point of view to be aware of all the levels in order to provide a comprehensive solution. The strength of a system is defined by its weakest point; there is no reason to enhance other protection means, if the weakest point remains untreated. Many severe attacks have considered this weakness in order not to face brute force attack complexity. Several solutions are proposed in Security Trends for FPGA's especially at the logical, architecture and system levels in order to provide a global solution.
This is the first book devoted to mobility management, covering the important principles, technologies and applications of mobility management based on years of academic research and industry experiences. The content is organized according to the reference models proposed by the authors, and emphasizes on technical principles rather than protocol details; a systematic and comprehensive introduction is presented yet without losing focuses; the existing technologies in cellular system, mobile Internet and IMS/SIP are also extensively compared. This book can be an indispensable reference for mobile communication engineers, computer network engineers, researchers and anyone else involved in academic, industrial and standardization activities on mobility management.
Optical network design and modelling is an essential issue for planning and operating networks for the next century. The main issues in optical networking are being widely investigated not only for WDM networks but also for optical TDM and optical packet switching. This book aims to contribute to further progress in optical network architectures, design, operation and management and covers the following topics in detail: OAM functions and layered design of photonic networks; network planning and design; network modelling; analysis and protocols of optical LANs; network availability and performance modelling. This book contains the selected proceedings of the International Working Conference on Optical Network Design and Modelling, sponsored by the International Federation for Information Processing (IFIP) and was held in February 1997, in Vienna, Austria. The valuable book will be essential rading for personnel in computer/communication industries, and academic and research staff in computer science and electrical engineering.
Understanding the social relations within the fields of business and economics is vital for the promotion of success within a certain organization. Analytics and statistics have taken a prominent role in marketing and management practices as professionals are constantly searching for a competitive advantage. Converging these technological tools with traditional methods of business relations is a trending area of research. Applied Social Network Analysis With R: Emerging Research and Opportunities is an essential reference source that materializes and analyzes the issue of structure in terms of its effects on human societies and the state of the individuals in these communities. Even though the theme of the book is business-oriented, an approach underlining and strengthening the ties of this field of study with social sciences for further development is adopted throughout. Therefore, the knowledge presented is valid for analyzing not only the organization of the business world but also for the organization of any given community. Featuring research on topics such as network visualization, graph theory, and micro-dynamics, this book is ideally designed for researchers, practitioners, business professionals, managers, programmers, academicians, and students seeking coverage on analyzing social and business networks using modern methods of statistics, programming, and data sets.
FORTE/PSTV '97 addresses Formal Description Techniques (FDTs) applicable to Distributed Systems and Communication Protocols (such as Estelle, LOTOS, SDL, ASN.1, TTCN, Z, Automata, Process Algebra, Logic). The conference is a forum for presentation of the state-of-the-art in theory, application, tools and industrialization of FDTs, and provides an excellent orientation for newcomers.
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user's password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.
Mobile ad-hoc networks must be rapidly interoperable, customizable, and quick to adapt to the latest technological advances. Technological Advancements and Applications in Mobile Ad-Hoc Networks: Research Trends offers a current look into the latest research in the field, frameworks for development, and future directions. As mobile networks become more complex, it is vital for researchers, practitioners, and academics alike to stay abreast within the ever-burgeoning field. With a wide range of applications, theories, and use across industrial, commercial, and domestic settings, mobile ad-hoc networks are a topic of vital discussion, and this volume offers the cutting edge developments with contributions from around the world.
A major challenge in grid computing remains the application software development for this new kind of infrastructure. Grid application programmers have to take into account several complicated aspects: distribution of data and computations, parallel computations on different sites and processors, heterogeneity of the involved computers, load balancing, etc. Grid programmers thus demand novel programming methodologies that abstract over such technical details while preserving the beneficial features of modern grid middleware. For this purpose, the authors introduce Higher-Order Components (HOCs). HOCs implement generic parallel/distributed processing patterns, together with the required middleware support, and they are offered to users via a high-level service interface. Users only have to provide the application-specific pieces of their programs as parameters, while low-level implementation details, such as the transfer of data across the grid, are handled by the HOCs. HOCs were developed within the CoreGRID European Network of Excellence and have become an optional extension of the popular Globus middleware. The book provides the reader with hands-on experience, describing a broad collection of example applications from various fields of science and engineering, including biology, physics, etc. The Java code for these examples is provided online, complementing the book. The expected application performance is studied and reported for extensive performance experiments on different testbeds, including grids with worldwide distribution. The book is targeted at graduate students, advanced professionals, and researchers in both academia and industry. Readers can raise their level of knowledge about methodologies for programming contemporary parallel and distributed systems, and, furthermore, they can gain practical experience in using distributed software. Practical examples show how the complementary online material can easily be adopted in various new projects.
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the core of Cyber Situational Awareness. Whether the last question can be satisfactorily answered is greatly de pendent upon the cyber situational awareness capability of an enterprise. A variety of computer and network security research topics (especially some sys tems security topics) belong to or touch the scope of Cyber Situational Awareness. However, the Cyber Situational Awareness capability of an enterprise is still very limited for several reasons: * Inaccurate and incomplete vulnerability analysis, intrusion detection, and foren sics. * Lack of capability to monitor certain microscopic system/attack behavior. * Limited capability to transform/fuse/distill information into cyber intelligence. * Limited capability to handle uncertainty. * Existing system designs are not very "friendly" to Cyber Situational Awareness.
Access control is a method of allowing and disallowing certain operations on a computer or network system. This book details access control mechanisms that are emerging with the latest Internet programming technologies. It provides a thorough introduction to the foundations of programming systems security as well as the theory behind access control models. The author explores all models employed and describes how they work.
The volume provides a comprehensive, up-to-date account on recent developments concerning the incorporation of fuzzy capabilities in Petri Net models. The results of such studies originated the class of models that have been designated by Fuzzy Petri Nets. The recent papers specially elaborated for this volume range over several aspects of fuzziness in Petri nets. They form an interesting collection of original works that covers a great variety of relevant problems concerning the concept of Fuzzy Petri Net model. The articles approach several of the most outstanding issues in the framework of Fuzzy Petri nets, such as the representation of time, consistency checking, learning, design, computational efficiency, modelling flexibility, among others. From the material collected in the book one can extract the points of view of leading researchers concerning the basic and advanced concepts, advantages, potential applications and open problems, related to the field.
As depicted in David Lodge's celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth's population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became widespread and the information age stopped being an empty buzzword. But small is not necessarily beautiful. We now live in a global village and, alas, some (often very powerful) voices state that we ought not expect any more privacy in it. Should this be true, we would have created our own nightmare: a global village combining the worst of conventional villages, where a lot of information on an individual is known by the other villagers, and conventional big cities, where the invidual feels lost in a grim and potentially dangerous place. Whereas security is essential for organizations to survive, individuals and so- times even companies also need some privacy to develop comfortably and lead a free life. This is the reason why individual privacy is mentioned in the Univ- sal Declaration of Human Rights (1948) and data privacy is protected by law in most Western countries. Indeed, without privacy, the rest of fundamental rights, like freedom of speech and democracy, are impaired. The outstanding challenge is to create technology that implements those legal guarantees in a way compatible with functionality and security. This book edited by Dr. Javier Herranz and Dr.
Wireless Sensor Network (WSN) consists of numerous physically distributed autonomous devices used for sensing and monitoring the physical and/or environmental conditions. A WSN uses a gateway that provides wireless connectivity to the wired world as well as distributed networks. There are many open problems related to Ad-Hoc networks and its applications. Looking at the expansion of the cellular infrastructure, Ad-Hoc network may be acting as the basis of the 4th generation wireless technology with the new paradigm of 'anytime, anywhere communications'. To realize this, the real challenge would be the security, authorization and management issues of the large scale WSNs. This book is an edited volume in the broad area of WSNs. The book covers various chapters like Multi-Channel Wireless Sensor Networks, its Coverage, Connectivity as well as Deployment. It covers comparison of various communication protocols and algorithms such as MANNET, ODMRP and ADMR Protocols for Ad hoc Multicasting, Location Based Coordinated Routing Protocol and other Token based group local mutual exclusion Algorithms. The book also covers a chapter on Extended Ad hoc On-Demand Distance Vector (EAODV) routing protocol based on Distributed Minimum Transmission Multicast Routing (DMTMR). One chapter is dedicated to OCDMA and its future application and another chapter covers development of Home Automation System using SWN.
This book is devoted to logic synthesis and design techniques for asynchronous circuits. It uses the mathematical theory of Petri Nets and asynchronous automata to develop practical algorithms implemented in a public domain CAD tool. Asynchronous circuits have so far been designed mostly by hand, and are thus much less common than their synchronous counterparts, which have enjoyed a high level of design automation since the mid-1970s. Asynchronous circuits, on the other hand, can be very useful to tackle clock distribution, modularity, power dissipation and electro-magnetic interference in digital integrated circuits. This book provides the foundation needed for CAD-assisted design of such circuits, and can also be used as the basis for a graduate course on logic design.
This chapter has discussed how a commonbroadcast medium can be shared among many contending users. Multiple access protocols differ primarily by the amount of coordination needed to control potentially conflicting packet transmissions. Ato neextreme is random access where no coordinationis provideda ndp acket collisions arep ossible. Atthe other endo fthe spectrum, the class of fixed assignment access protocols eliminates collisions entirely butpay the price ofadditional overhead required forscheduling user access. Hybrid access protocolsb etweenthese two extremes exist While these protocols attempt to combine the advantages ofrandom andfixed access, they also suffer the c ombined drawbacks and overhead ofboth classes of access schemes. Amongt he many factors that determine the performance ofa n access protocol include the propagation delay/packet transmission timeratio, the message arrival process, the types of feedback information available, the user population, and the ability of the user to sense the activities in the network. BIBLIOGRAPHY [ABRA93] Abramson, N. , Multiple Access Communications , IEEE Press, 1993. [BERT92] Bertsekas, D. and Gallager, R. , Data Networks , Prentice Hall, 1992. [CHOU83]Chou,W, ComputerCommunications Volume1:Principles , Prentice Hall, 1983. [CIDO87] Cidon, I. andSidi, M. , "Erasures and Noise in Splitting Multiple Access Algorithms", IEEE Transactions on Information Theory, Vol. 33, No. 1, January 1987, pp. 132 - 140. [CIDO88] Cidon, I, Kodesh, H. and Sidi, M. , "Erasure, Capture and Random Power Level Selectionin Multiple Access Systems", IEEE Transactions on Communications , Vol. 3 6,N o. 3,March 1988, pp. 263 - 271.
The switching net.work is an important. classic research area in t.ele- communication and comput.er net.works. It.s import.ancc st.ems from both theory and practice. In fact, some open problems, such as Benes conjec- ture on shuffle-exchange networks and Chung-Rmis conjecture on multi- rate rearrangeability, still attract many researchers and the further de- velopment in optical networks requires advanced technology in optical switching networks. In 1997, we had a workshop in switching networks held in NSF Sci- ence and Technology Center in Discrete Mathematics and Theoretical Computer Science (DIMACS), at Princeton University. This workshop was very successful. Many participants wished to have a similar activity every two or three years. This book is a result of such a wish. We are putting together SOllle important developments in this area during last. several years, including articles ill fault-tolerance, rearrang{~ability. non- blocking, optical networks. random permutation generat.ioll. and layout complexity. SOlllC of thos(~ art ides are research papers alld SOIllC an' sur- veys. All articles were reviewed. We would like to uWlItioll two special problems studied in those articles.
Welcome to IM'97 We hope you had the opportunity to attend the Conference in beautiful San Diego. If that was the case, you will want to get back to these proceedings for further read ings and reflections. You'll find e-mail addresses of the main author of each paper, and you are surely encouraged to get in touch for further discussions. You can also take advantage of the CNOM (Committee on Network Operation and Management) web site where a virtual discus sion agora has been set up for IM'97 (URL: http: //www.cselt.stet.it/CNOMWWWIIM97.html). At this site you will find a brief summary of discussions that took place in the various panels, and slides that accompanied some of the presentations--all courtesy of the participants. If you have not been to the Conference, leafing through these proceedings may give you food for thought. Hopefully, you will also be joining the virtual world on the web for discussions with authors and others who were at the Conference. At IM'97 the two worlds of computer networks and telecommunications systems came to gether, each proposing a view to management that stems from their own paradigms. Each world made clear the need for end-to-end management and, therefore, each one stepped into the oth er's field. We feel that there is no winner but a mutual enrichment. The time is ripe for integra tion and it is likely that the next Conference will bear its fruit."
The field of cybersecurity is becoming increasingly important due to the continuously expanding reliance on computer systems, the internet, wireless network standards such as Bluetooth and wi-fi, and the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the internet of things (IoT). Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and technology. Global Perspectives on Cybersecurity Risk in Contemporary Business Systems examines current risks involved in the cybersecurity of various business systems today from a global perspective and investigates critical business systems. Covering key topics such as artificial intelligence, hacking, and software, this reference work is ideal for computer scientists, industry professionals, policymakers, researchers, academicians, scholars, instructors, and students.
Biometrics-based recognition systems offer many benefits over traditional authentication approaches. However, such systems raise new challenges related to personal data protection. This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardization; describes real-world applications, from face and fingerprint-based user recognition, to biometrics-based electronic documents, and biometric systems employing smart cards; reviews the ethical implications of the ubiquity of biometrics in everyday life, and its impact on human dignity; provides guidance on best practices for the processing of biometric data within a legal framework. This timely and authoritative volume is essential reading for all practitioners and researchers involved in biometrics-based automatic human recognition. Graduate students of computer science and electrical engineering will also find the text to be an invaluable practical reference.
This book represents a timely overview of advances in systems safety and security, based on selected, revised and extended contributions from the 2nd and 3rd editions of the International Workshop on Systems Safety and Security - IWSSS, held in 2014 and 2015, respectively, in Bucharest, Romania. It includes 14 chapters, co-authored by 34 researchers from 7 countries. The book provides an useful reference from both theoretical and applied perspectives in what concerns recent progress in this area of critical interest. Contributions, broadly grouped by core topic, address challenges related to information theoretic methods for assuring systems safety and security, cloud-based solutions, image processing approaches, distributed sensor networks and legal or risk analysis viewpoints. These are mostly accompanied by associated case studies providing additional practical value and underlying the broad relevance and impact of the field. |
You may like...
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,452
Discovery Miles 14 520
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders
Paperback
R1,469
Discovery Miles 14 690
|