0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (281)
  • R250 - R500 (873)
  • R500+ (13,612)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Universal Navigation on Smartphones (Hardcover, 2011): Hassan A. Karimi Universal Navigation on Smartphones (Hardcover, 2011)
Hassan A. Karimi
R1,492 Discovery Miles 14 920 Ships in 18 - 22 working days

Universal navigation is accessible primarily through smart phones providing users with navigation information regardless of the environment (i.e., outdoor or indoor). Universal Navigation for Smart Phones provide the most up-to-date navigation technologies and systems for both outdoor and indoor navigation. It also provides a comparison of the similarities and differences between outdoor and indoor navigation systems from both a technological stand point and user 's perspective.

All aspects of navigation systems including geo-positioning, wireless communication, databases, and functions will be introduced. The main thrust of this book presents new approaches and techniques for future navigation systems including social networking, as an emerging approach for navigation.

Mobile Information Systems II - IFIP Working Conference on Mobile Information Systems, MOBIS 2005, Leeds, UK, December 6-7,... Mobile Information Systems II - IFIP Working Conference on Mobile Information Systems, MOBIS 2005, Leeds, UK, December 6-7, 2005 (Hardcover, 2005 ed.)
John Krogstie, Karlheinz Kautz, David Allen
R2,686 Discovery Miles 26 860 Ships in 18 - 22 working days

Mobile Information Systems II provides a collection of research on the planning, analysis, design, construction, modification, implementation, utilization, evaluation, and management of mobile information systems. The articles focus on the implications of this research in the world of commerce, and address technical issues and constraints on mobile information systems functionalities and design.

Applied Cyber-Physical Systems (Hardcover, 2014 ed.): Sang C Suh, U. John Tanik, John N. Carbone, Abdullah Eroglu Applied Cyber-Physical Systems (Hardcover, 2014 ed.)
Sang C Suh, U. John Tanik, John N. Carbone, Abdullah Eroglu
R4,658 Discovery Miles 46 580 Ships in 10 - 15 working days

Applied Cyber-Physical Systems presents the latest methods and technologies in the area of cyber-physical systems including medical and biological applications. Cyber-physical systems (CPS) integrate computing and communication capabilities by monitoring, and controlling the physical systems via embedded hardware and computers. This book brings together unique contributions from renowned experts on cyber-physical systems research and education with applications. It also addresses the major challenges in CPS, and then provides a resolution with various diverse applications as examples. Advanced-level students and researchers focused on computer science, engineering and biomedicine will find this to be a useful secondary text book or reference, as will professionals working in this field.

SAP R/3 Implementation - Methods and Tools (Hardcover, 2000 ed.): Hans-Jurgen Appelrath, Joerg Ritter SAP R/3 Implementation - Methods and Tools (Hardcover, 2000 ed.)
Hans-Jurgen Appelrath, Joerg Ritter
R1,512 Discovery Miles 15 120 Ships in 18 - 22 working days

Before use, standard ERP systems such as SAP R/3 need to be customized to meet the concrete requirements of the individual enterprise. This book provides an overview of the process models, methods, and tools offered by SAP and its partners to support this complex and time-consuming process. It begins by characterizing the foundations of the latest ERP systems from both a conceptual and technical viewpoint, whereby the most important components and functions of SAP R/3 are described. The main part of the book then goes on to present the current methods and tools for the R/3 implementation based on newer process models (roadmaps).

Managing QoS in Multimedia Networks and Services - IEEE / IFIP TC6 - WG6.4 & WG6.6 Third International Conference on Management... Managing QoS in Multimedia Networks and Services - IEEE / IFIP TC6 - WG6.4 & WG6.6 Third International Conference on Management of Multimedia Networks and Services (MMNS'2000) September 25-28, 2000, Fortaleza, Ceara, Brazil (Hardcover, 2000 ed.)
Jose Neuman De Souza, Raouf Boutaba
R5,307 Discovery Miles 53 070 Ships in 18 - 22 working days

Welcome to the third International Conference on Management of Multimedia Networks and Services (MMNS'2000) in Fortaleza (Brazil) The first MMNS was held in Montreal ( Canada) in july 1997 and the second MMNS was held in Versailles (France) in November 1998. The MMNS conference takes place every year and a half and is aimed to be a truly international event by bringing together researchers and practitioners from all around the world and by organising the conference each time in a different continent/country. Over the past several years, there has been a considerable amount of research within the fields of multimedia networking and network management. Much of that work has taken place within the context of managing Quality-of Service in broadband integrated services digital networks such as the A TM, and more recently in IP-based networks, to respond to the requirements of emerging multimedia applications. A TM networks were designed to support multimedia traffic with diverse characteristics and can be used as the transfer mode for both wired and wireless networks. A new set of Internet protocols is being developed to provide better quality of service, which is a prerequisite for supporting multimedia applications. Multimedia applications have a different set of requirements, which impacts the design of the underlying communication network as well as its management. Several QoS management mechanisms intervening at different layers of the communication network are required including QoS-routing, QoS-based transport, QoS negotiation, QoS adaptation, FCAPS management, and mobility management."

Making Grids Work - Proceedings of the CoreGRID Workshop on Programming Models Grid and P2P System Architecture Grid Systems,... Making Grids Work - Proceedings of the CoreGRID Workshop on Programming Models Grid and P2P System Architecture Grid Systems, Tools and Environments 12-13 June 2007, Heraklion, Crete, Greece (Hardcover, 2008 ed.)
Marco Danelutto, Paraskevi Fragopoulou, Vladimir Getov
R4,239 Discovery Miles 42 390 Ships in 18 - 22 working days

Making Grids Work includes selected articles from the CoreGRID Workshop on Grid Programming Models, Grid and P2P Systems Architecture, Grid Systems, Tools and Environments held at the Institute of Computer Science, Foundation for Research and Technology - Hellas in Crete, Greece, June 2007. The workshop brought together representatives of the academic and industrial communities performing Grid research in Europe. The workshop was organized in the context of the CoreGRID Network of Excellence in order to provide a forum for the presentation and exchange of views on the latest developments in Grid Technology research. This volume is the 7th in the series of CoreGRID books. Making Grids Work is designed for a professional audience, composed of researchers and practitioners in industry. This volume is also suitable for graduate-level students in computer science.

Formal Description Techniques VIII (Hardcover, 1996 ed.): Gregor von Bochmann, Rachida Dssouli, Omar Rafiq Formal Description Techniques VIII (Hardcover, 1996 ed.)
Gregor von Bochmann, Rachida Dssouli, Omar Rafiq
R5,396 Discovery Miles 53 960 Ships in 18 - 22 working days

This volume contains the latest worldwide research results on formal description techniques applicable to telecommunications, covering their theoretical foundations, industrial applications and practical usage. The book presents the selected proceedings of the eighth International Conference on Formal Description Techniques, arranged by the International Federation for Information Processing and held in Montreal, Canada, October 1995.

Distributed Event-Based Systems (Hardcover, 2006 ed.): Gero Muhl, Ludger Fiege, Peter Pietzuch Distributed Event-Based Systems (Hardcover, 2006 ed.)
Gero Muhl, Ludger Fiege, Peter Pietzuch
R1,624 Discovery Miles 16 240 Ships in 18 - 22 working days

In today s world, services and data are integrated in ever new constellations, requiring the easy, flexible and scalable integration of autonomous, heterogeneous components into complex systems at any time.

Event-based architectures inherently decouple system components. Event-based components are not designed to work with specific other components in a traditional request/reply mode, but separate communication from computation through asynchronous communication mechanisms via a dedicated notification service.

Muhl, Fiege, and Pietzuch provide the reader with an in-depth description of event-based systems. They cover the complete spectrum of topics, ranging from a treatment of local event matching and distributed event forwarding algorithms, through a more practical discussion of software engineering issues raised by the event-based style, to a presentation of state-of-the-art research topics in event-based systems, such as composite event detection and security. Their presentation gives researchers a comprehensive overview of the area and lots of hints for future research. In addition, they show the power of event-based architectures in modern system design, thus encouraging professionals to exploit this technique in next generation large-scale distributed applications like information dissemination, network monitoring, enterprise application integration, or mobile systems.

Reliabilities of Consecutive-k Systems (Hardcover, 2001 ed.): Chung In-Hang, Lirong Cui, F.K. Hwang Reliabilities of Consecutive-k Systems (Hardcover, 2001 ed.)
Chung In-Hang, Lirong Cui, F.K. Hwang
R2,768 Discovery Miles 27 680 Ships in 18 - 22 working days

The consecutive-k system was first studied around 1980, and it soon became a very popular subject. The reasons were many-folded, includ ing: 1. The system is simple and natural. So most people can understand it and many can do some analysis. Yet it can grow in many directions and there is no lack of new topics. 2. The system is simple enough to become a prototype for demonstrat ing various ideas related to reliability. For example, the interesting concept of component importance works best with the consecutive-k system. 3. The system is supported by many applications. Twenty years have gone and hundreds of papers have been published on the subject. This seems to be a good time for retrospect and to sort the scattered material into a book. Besides providing our own per spective, the book will also serve as an easy reference to the numerous ramifications of the subject. It is hoped that a summary of work in the current period will become the seed of future break-through."

Challenges and Opportunities for the Convergence of IoT, Big Data, and Cloud Computing (Hardcover): Sathiyamoorthi Velayutham Challenges and Opportunities for the Convergence of IoT, Big Data, and Cloud Computing (Hardcover)
Sathiyamoorthi Velayutham
R5,960 Discovery Miles 59 600 Ships in 18 - 22 working days

In today's market, emerging technologies are continually assisting in common workplace practices as companies and organizations search for innovative ways to solve modern issues that arise. Prevalent applications including internet of things, big data, and cloud computing all have noteworthy benefits, but issues remain when separately integrating them into the professional practices. Significant research is needed on converging these systems and leveraging each of their advantages in order to find solutions to real-time problems that still exist. Challenges and Opportunities for the Convergence of IoT, Big Data, and Cloud Computing is a pivotal reference source that provides vital research on the relation between these technologies and the impact they collectively have in solving real-world challenges. While highlighting topics such as cloud-based analytics, intelligent algorithms, and information security, this publication explores current issues that remain when attempting to implement these systems as well as the specific applications IoT, big data, and cloud computing have in various professional sectors. This book is ideally designed for academicians, researchers, developers, computer scientists, IT professionals, practitioners, scholars, students, and engineers seeking research on the integration of emerging technologies to solve modern societal issues.

Active Networks and Active Network Management - A Proactive Management Framework (Mixed media product, 2001 ed.): Stephen F.... Active Networks and Active Network Management - A Proactive Management Framework (Mixed media product, 2001 ed.)
Stephen F. Bush, Amit B. Kulkarni
R2,763 Discovery Miles 27 630 Ships in 18 - 22 working days

Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables all these groups to understand the impact of active networking in their sphere of interest. Information services managers, network administrators, and e-commerce developers would like to know the potential benefits of the new technology to their businesses, networks, and applications. The book introduces the basic active networking paradigm and its potential impacts on the future of information handling in general and on communications in particular. This is useful for forward-looking businesses that wish to actively participate in the development of active networks and ensure a head start in the integration of the technology in their future products, be they applications or networks. Areas in which active networking is likely to make significant impact are identified, and the reader is pointed to any related ongoing research efforts in the area. The book also provides a deeper insight into the active networking model for students and researchers, who seek challenging topics that define or extend frontiers of the technology. It describes basic components of the model, explains some of the terms used by the active networking community, and provides the reader with taxonomy of the research being conducted at the time this book was written. Current efforts are classified based on typical research areas such as mobility, security, and management. The intent is to introduce the serious reader to the background regarding some of the models adopted by the community, to outline outstanding issues concerning active networking, and to provide a snapshot of the fast-changing landscape in active networking research. Management is a very important issue in active networks because of its open nature. The latter half of the book explains the architectural concepts of a model for managing active networks and the motivation for a reference model that addresses limitations of the current network management framework by leveraging the powerful features of active networking to develop an integrated framework. It also describes a novel application enabled by active network technology called the Active Virtual Network Management Prediction (AVNMP) algorithm. AVNMP is a pro-active management system; in other words, it provides the ability to solve a potential problem before it impacts the system by modeling network devices within the network itself and running that model ahead of real time.

Geolocation Techniques - Principles and Applications (Hardcover, 2013): Camillo Gentile, Nayef Alsindi, Ronald Raulefs, Carole... Geolocation Techniques - Principles and Applications (Hardcover, 2013)
Camillo Gentile, Nayef Alsindi, Ronald Raulefs, Carole Teolis
R5,337 Discovery Miles 53 370 Ships in 10 - 15 working days

Basics of Distributed and Cooperative Radio and Non-Radio Based Geolocation provides a detailed overview of geolocation technologies. The book covers the basic principles of geolocation, including ranging techniques to localization technologies, fingerprinting and localization in wireless sensor networks. This book also examines the latest algorithms and techniques such as Kalman Filtering, Gauss-Newton Filtering and Particle Filtering.

Perspectives and Implications for the Development of Information Infrastructures (Hardcover, New): Panos Constantinides Perspectives and Implications for the Development of Information Infrastructures (Hardcover, New)
Panos Constantinides
R4,430 Discovery Miles 44 300 Ships in 18 - 22 working days

In the same way that infrastructures such as transportation, electricity, sewage, and water supply are widely assumed to be integrators of urban spaces, information infrastructures are assumed to be integrators of information spaces. With the advent of Web 2.0 and new types of information infrastructures such as online social networks and smart mobile platforms, a more in-depth understanding of the various rights to access, use, develop, and modify information infrastructure resources is necessary. Perspectives and Implications for the Development of Information Infrastructures aims at addressing this need by offering a fresh new perspective on information infrastructure development. It achieves this by drawing on and adapting theory that was initially developed to study natural resource commons arrangements such as inshore fisheries, forests, irrigation systems, and pastures, while placing great emphasis on the complex problems and social dilemmas that often arise in the negotiations.

Privacy-Respecting Intrusion Detection (Hardcover, 2007 ed.): Ulrich Flegel Privacy-Respecting Intrusion Detection (Hardcover, 2007 ed.)
Ulrich Flegel
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

Effective response to misuse or abusive activity in IT systems requires the capability to detect and understand improper activity. Intrusion Detection Systems observe IT activity, record these observations in audit data, and analyze the collected audit data to detect misuse. Privacy-Respecting Intrusion Detection introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection. Also, it limits the recovery of personal data to pseudonyms involved in a detected misuse scenario. The book includes case studies demonstrating this theory, and solutions that are constructively validated by providing algorithms.

Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.): Guido Schryen Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.)
Guido Schryen
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

This book examines anti-spam measures in terms of their potentials, limitations, advantages, and drawbacks. These factors determine to which extent the measures can contribute to the reduction of spam in the long run. It examines legislative, organizational, behavioral, and technological anti-spam measures, including an insight into their effectiveness. In addition, it presents the conceptual development and analysis of an infrastructural e-mail framework, which features such a complementary application, and considers deployment issues.

Protocols, Servers and Projects for Multimedia Realtime Systems (Hardcover): Dimitris N Chorafas Protocols, Servers and Projects for Multimedia Realtime Systems (Hardcover)
Dimitris N Chorafas
R2,679 Discovery Miles 26 790 Ships in 18 - 22 working days

This book addresses the changing role of networks and the evolving structure of an Infrastructure Superhighway. The requirements for leadership in telecommunications are reviewed from different viewpoints: Network operators, equipment manufacturers, software developers and user organizations. Emphasis is placed on multimedia and what multimedia solutions would mean to telephone utilities and endusers. Based on extensive research undertaken in Europe, US and Japan, Dimitris Chorafas identifies new domains of applications, presents the breakthroughs which have currently been achieved and outlines the systems solutions necessary to fruitfully exploit new technology.

Reflexing Interfaces - The Complex Coevolution of Information Technology Ecosystems (Hardcover): Franco F. Orsucci, Nicoletta... Reflexing Interfaces - The Complex Coevolution of Information Technology Ecosystems (Hardcover)
Franco F. Orsucci, Nicoletta Sala
R4,615 Discovery Miles 46 150 Ships in 18 - 22 working days

Information and communication technologies are increasingly prolific worldwide, exposing the issues and challenges of the assimilation of existing living environments to the shift in technological communication infrastructure. ""Reflexing Interfaces"" discusses the application of complex theories in information and communication technology, with a focus on the interaction between living systems and information technologies. This innovative view provides researcher, scholars, and IT professionals with a fundamental resource on such compelling topics as virtual reality; fuzzy logic systems; and complexity science in artificial intelligence, evolutionary computation, neural networks, and 3-D modeling.

Multi-Threaded Object-Oriented MPI-Based Message Passing Interface - The ARCH Library (Hardcover, 1998 ed.): Jean-Marc Adamo Multi-Threaded Object-Oriented MPI-Based Message Passing Interface - The ARCH Library (Hardcover, 1998 ed.)
Jean-Marc Adamo
R4,116 Discovery Miles 41 160 Ships in 18 - 22 working days

Multi-Threaded Object-Oriented MPI-Based Message Passing Interface: The ARCH Library presents ARCH, a library built as an extension to MPI. ARCH relies on a small set of programming abstractions that allow the writing of well-structured multi-threaded parallel codes according to the object-oriented programming style. ARCH has been written with C++. The book describes the built-in classes, and illustrates their use through several template application cases in several fields of interest: Distributed Algorithms (global completion detection, distributed process serialization), Parallel Combinatorial Optimization (A* procedure), Parallel Image-Processing (segmentation by region growing). It shows how new application-level distributed data types - such as a distributed tree and a distributed graph - can be derived from the built-in classes. A feature of interest to readers is that both the library and the application codes used for illustration purposes are available via the Internet. The material can be downloaded for installation and personal parallel code development on the reader's computer system. ARCH can be run on Unix/Linux as well as Windows NT-based platforms. Current installations include the IBM-SP2, the CRAY-T3E, the Intel Paragon, PC-networks under Linux or Windows NT. Multi-Threaded Object-Oriented MPI-Based Message Passing Interface: The ARCH Library is aimed at scientists who need to implement parallel/distributed algorithms requiring complicated local and/or distributed control structures. It can also benefit parallel/distributed program developers who wish to write codes in the object-oriented style. The author has been using ARCH for several years as a medium to teach parallel and network programming. Teachers can employ the library for the same purpose while students can use it for training. Although ARCH has been used so far in an academic environment, it will be an effective tool for professionals as well. Multi-Threaded Object-Oriented MPI-Based Message Passing Interface: The ARCH Library is suitable as a secondary text for a graduate level course on Data Communications and Networks, Programming Languages, Algorithms and Computational Theory and Distributed Computing and as a reference for researchers and practitioners in industry.

High Performance Networks - Frontiers and Experience (Hardcover, 1993 ed.): Ahmed N. Tantawy High Performance Networks - Frontiers and Experience (Hardcover, 1993 ed.)
Ahmed N. Tantawy
R4,137 Discovery Miles 41 370 Ships in 18 - 22 working days

'The world of information processing is going through a major phase of its evolution. Networking has been associated with computers since the 1960's. Communicating machines, exchanging information or cooperating to solve complex problems, were the dream of many scientists and engineers. Rudi mentary networks and protocols were invented. Local area networks capable of carrying a few megabits per second became basic components of corporate computing installations in the 1980's. At the same time, advances in optical transmission and switching technologies made it possible to transfer billions of bits per second. 'The availability of this huge bandwidth is making people wonder about the seemingly unlimited possibilities of these "fat information pipes" A new world where all interesting up-to-date information becomes instantaneously available to everyone everywhere is often portrayed to be around the comer. New applications are envisioned and their requirements are defined. 'The new field of High Performance Networking is burgeoning with activities at various levels. Several frontiers are being explored simultaneously. In order to achieve more bandwidth and better performance, work is progressing in optical transmission, high speed switching and network resource manage ment. Some researchers have started to investigate all-optical networking as a promising approach to remove the relatively slow electronics from the network infrastructure. This will also introduce a new environment with unique characteristics that will have a definite impact on network architec tures, topologies, addressing schemes, and protocols."

Integrated Network Management IV - Proceedings of the fourth international symposium on integrated network management, 1995... Integrated Network Management IV - Proceedings of the fourth international symposium on integrated network management, 1995 (Hardcover, 1995 ed.)
A.S. Sethi, Y. Raynaud, F. Faure-Vincent
R8,035 Discovery Miles 80 350 Ships in 18 - 22 working days

Integrated network management plays a pivotal role in establishing and maintaining an efficient worldwide information infrastructure. This volume presents a state-of-the-art review of the latest worldwide research results covering this topic. The book contains the selected proceedings of the fourth International Symposium on Integrated Network Management, arranged by the International Federation for Information Processing and jointly sponsored by the IEEE. The Symposium was held in Santa Barbara, California, May 1995.

Operational Semantics and Verification of Security Protocols (Hardcover, 2011): Cas Cremers, Sjouke Mauw Operational Semantics and Verification of Security Protocols (Hardcover, 2011)
Cas Cremers, Sjouke Mauw
R1,747 Discovery Miles 17 470 Ships in 18 - 22 working days

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols.

The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool.

The methodology s strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.

"

Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security... Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium (Hardcover, 2002 ed.)
Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
R4,125 Discovery Miles 41 250 Ships in 18 - 22 working days

The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP), focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government, ....Themoreour societyrelies on electronicforms ofcommunication, themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence, researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines, organisationsandcountries, todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering, mobileagentsecurity, e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies, one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion, and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website: http: //www.ifip.at.org/. Finally, wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers, whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety, willprovea drivingforce for futureconferen

Grid Middleware and Services - Challenges and Solutions (Hardcover, 2008 ed.): Domenico Talia, Ramin Yahyapour, Wolfgang Ziegler Grid Middleware and Services - Challenges and Solutions (Hardcover, 2008 ed.)
Domenico Talia, Ramin Yahyapour, Wolfgang Ziegler
R4,248 Discovery Miles 42 480 Ships in 18 - 22 working days

Grid Middleware and Services: Challenges and Solutions is the eighth volume of the CoreGRID series. The CoreGrid Proceedings is the premiere European event on Grid Computing. This book aims to strengthen and advance scientific and technological excellence in the area of Grid Computing. The main focus in this volume is on Grid middleware and service level agreement. Grid middleware and Grid services are two pillars of grid computing systems and applications. This book includes high-level contributions by leading researchers in both areas and presents current solutions together with future challenges. This volume includes sections on knowledge and data management on grids, Grid resource management and scheduling, Grid information, resource and workflow monitoring services, and service level agreements. Grid Middleware and Services: Challenges and Solutions is designed for a professional audience, composed of researchers and practitioners in industry. This volume is also suitable for graduate-level students in computer science.

Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives (Hardcover, New): Raghu Santanam Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives (Hardcover, New)
Raghu Santanam
R4,568 Discovery Miles 45 680 Ships in 18 - 22 working days

Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as well as the private sector. Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics.

High Performance Networks - Technology and Protocols (Hardcover, 1994 ed.): Ahmed N. Tantawy High Performance Networks - Technology and Protocols (Hardcover, 1994 ed.)
Ahmed N. Tantawy
R4,139 Discovery Miles 41 390 Ships in 18 - 22 working days

In the last few years, the world of information networks has undergone significant changes that will revolutionize the future of communications. Data rates have reached the gigabit per second range. Optical fibers have become the transmission medium of choice. Standardization activities have very aggressively produced a set of well established standard for future LANs, MANs and WANs. It has become very difficult for computer and communications professionals to follow these rapidly evolving technologies and standards. High Performance Networks: Technology and Protocols provides a timely technical overview of the start-of-the-art in high performance networking. Chapters cover lightweight protocols, high performance protocol implementation techniques, high speed MAC protocols, optical networks, as well as emerging standards, including ATM, SMDS, B-ISDN, SONET, FCS and HIPPI. Professionals, engineers, and researchers in communications and computers, who need to understand the underlying technologies of high performance (gigabit) networks, will find this volume to be an invaluable reference. The book is also suitable for use as a text for advanced courses on the subject.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Michelangelo
Romain Rolland Paperback R464 Discovery Miles 4 640
Systems Analysis in Forest Resources…
Greg J. Arthaud, Tara M. Barrett Hardcover R4,053 Discovery Miles 40 530
Estudios de la Ocde Sobre Gobernanza…
Oecd Paperback R2,010 Discovery Miles 20 100
Liyoze Line Nangakithi
William Zulu Paperback R75 R70 Discovery Miles 700
High-Performance Computing Using FPGAs
Wim Vanderbauwhede, Khaled Benkrid Hardcover R6,662 Discovery Miles 66 620
Marina Abramović
Karen Archey, Adrian Heathield, … Hardcover R709 Discovery Miles 7 090
Novel Approaches to Information Systems…
Naveen Prakash, Deepika Prakash Hardcover R5,924 Discovery Miles 59 240
It's Not Your Gold Shall Me Entice
Elle Osborne CD R114 Discovery Miles 1 140
Roger Ackling: Between the Lines
Roger Ackling Hardcover R545 Discovery Miles 5 450
Salamander
Bellevue Rendezvous CD R491 Discovery Miles 4 910

 

Partners