0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (256)
  • R250 - R500 (865)
  • R500+ (13,653)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Reflexing Interfaces - The Complex Coevolution of Information Technology Ecosystems (Hardcover): Franco F. Orsucci, Nicoletta... Reflexing Interfaces - The Complex Coevolution of Information Technology Ecosystems (Hardcover)
Franco F. Orsucci, Nicoletta Sala
R4,615 Discovery Miles 46 150 Ships in 18 - 22 working days

Information and communication technologies are increasingly prolific worldwide, exposing the issues and challenges of the assimilation of existing living environments to the shift in technological communication infrastructure. ""Reflexing Interfaces"" discusses the application of complex theories in information and communication technology, with a focus on the interaction between living systems and information technologies. This innovative view provides researcher, scholars, and IT professionals with a fundamental resource on such compelling topics as virtual reality; fuzzy logic systems; and complexity science in artificial intelligence, evolutionary computation, neural networks, and 3-D modeling.

Reliabilities of Consecutive-k Systems (Hardcover, 2001 ed.): Chung In-Hang, Lirong Cui, F.K. Hwang Reliabilities of Consecutive-k Systems (Hardcover, 2001 ed.)
Chung In-Hang, Lirong Cui, F.K. Hwang
R2,768 Discovery Miles 27 680 Ships in 18 - 22 working days

The consecutive-k system was first studied around 1980, and it soon became a very popular subject. The reasons were many-folded, includ ing: 1. The system is simple and natural. So most people can understand it and many can do some analysis. Yet it can grow in many directions and there is no lack of new topics. 2. The system is simple enough to become a prototype for demonstrat ing various ideas related to reliability. For example, the interesting concept of component importance works best with the consecutive-k system. 3. The system is supported by many applications. Twenty years have gone and hundreds of papers have been published on the subject. This seems to be a good time for retrospect and to sort the scattered material into a book. Besides providing our own per spective, the book will also serve as an easy reference to the numerous ramifications of the subject. It is hoped that a summary of work in the current period will become the seed of future break-through."

Challenges and Opportunities for the Convergence of IoT, Big Data, and Cloud Computing (Hardcover): Sathiyamoorthi Velayutham Challenges and Opportunities for the Convergence of IoT, Big Data, and Cloud Computing (Hardcover)
Sathiyamoorthi Velayutham
R5,960 Discovery Miles 59 600 Ships in 18 - 22 working days

In today's market, emerging technologies are continually assisting in common workplace practices as companies and organizations search for innovative ways to solve modern issues that arise. Prevalent applications including internet of things, big data, and cloud computing all have noteworthy benefits, but issues remain when separately integrating them into the professional practices. Significant research is needed on converging these systems and leveraging each of their advantages in order to find solutions to real-time problems that still exist. Challenges and Opportunities for the Convergence of IoT, Big Data, and Cloud Computing is a pivotal reference source that provides vital research on the relation between these technologies and the impact they collectively have in solving real-world challenges. While highlighting topics such as cloud-based analytics, intelligent algorithms, and information security, this publication explores current issues that remain when attempting to implement these systems as well as the specific applications IoT, big data, and cloud computing have in various professional sectors. This book is ideally designed for academicians, researchers, developers, computer scientists, IT professionals, practitioners, scholars, students, and engineers seeking research on the integration of emerging technologies to solve modern societal issues.

Geolocation Techniques - Principles and Applications (Hardcover, 2013): Camillo Gentile, Nayef Alsindi, Ronald Raulefs, Carole... Geolocation Techniques - Principles and Applications (Hardcover, 2013)
Camillo Gentile, Nayef Alsindi, Ronald Raulefs, Carole Teolis
R5,337 Discovery Miles 53 370 Ships in 10 - 15 working days

Basics of Distributed and Cooperative Radio and Non-Radio Based Geolocation provides a detailed overview of geolocation technologies. The book covers the basic principles of geolocation, including ranging techniques to localization technologies, fingerprinting and localization in wireless sensor networks. This book also examines the latest algorithms and techniques such as Kalman Filtering, Gauss-Newton Filtering and Particle Filtering.

Integrated Network Management IV - Proceedings of the fourth international symposium on integrated network management, 1995... Integrated Network Management IV - Proceedings of the fourth international symposium on integrated network management, 1995 (Hardcover, 1995 ed.)
A.S. Sethi, Y. Raynaud, F. Faure-Vincent
R8,035 Discovery Miles 80 350 Ships in 18 - 22 working days

Integrated network management plays a pivotal role in establishing and maintaining an efficient worldwide information infrastructure. This volume presents a state-of-the-art review of the latest worldwide research results covering this topic. The book contains the selected proceedings of the fourth International Symposium on Integrated Network Management, arranged by the International Federation for Information Processing and jointly sponsored by the IEEE. The Symposium was held in Santa Barbara, California, May 1995.

Cyber-security and Global Information Assurance - Threat Analysis and Response Solutions (Hardcover): Kenneth J. Knapp Cyber-security and Global Information Assurance - Threat Analysis and Response Solutions (Hardcover)
Kenneth J. Knapp
R4,977 Discovery Miles 49 770 Ships in 18 - 22 working days

Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field.

Formal Description Techniques VIII (Hardcover, 1996 ed.): Gregor von Bochmann, Rachida Dssouli, Omar Rafiq Formal Description Techniques VIII (Hardcover, 1996 ed.)
Gregor von Bochmann, Rachida Dssouli, Omar Rafiq
R5,396 Discovery Miles 53 960 Ships in 18 - 22 working days

This volume contains the latest worldwide research results on formal description techniques applicable to telecommunications, covering their theoretical foundations, industrial applications and practical usage. The book presents the selected proceedings of the eighth International Conference on Formal Description Techniques, arranged by the International Federation for Information Processing and held in Montreal, Canada, October 1995.

Perspectives and Implications for the Development of Information Infrastructures (Hardcover, New): Panos Constantinides Perspectives and Implications for the Development of Information Infrastructures (Hardcover, New)
Panos Constantinides
R4,430 Discovery Miles 44 300 Ships in 18 - 22 working days

In the same way that infrastructures such as transportation, electricity, sewage, and water supply are widely assumed to be integrators of urban spaces, information infrastructures are assumed to be integrators of information spaces. With the advent of Web 2.0 and new types of information infrastructures such as online social networks and smart mobile platforms, a more in-depth understanding of the various rights to access, use, develop, and modify information infrastructure resources is necessary. Perspectives and Implications for the Development of Information Infrastructures aims at addressing this need by offering a fresh new perspective on information infrastructure development. It achieves this by drawing on and adapting theory that was initially developed to study natural resource commons arrangements such as inshore fisheries, forests, irrigation systems, and pastures, while placing great emphasis on the complex problems and social dilemmas that often arise in the negotiations.

Grid Middleware and Services - Challenges and Solutions (Hardcover, 2008 ed.): Domenico Talia, Ramin Yahyapour, Wolfgang Ziegler Grid Middleware and Services - Challenges and Solutions (Hardcover, 2008 ed.)
Domenico Talia, Ramin Yahyapour, Wolfgang Ziegler
R4,248 Discovery Miles 42 480 Ships in 18 - 22 working days

Grid Middleware and Services: Challenges and Solutions is the eighth volume of the CoreGRID series. The CoreGrid Proceedings is the premiere European event on Grid Computing. This book aims to strengthen and advance scientific and technological excellence in the area of Grid Computing. The main focus in this volume is on Grid middleware and service level agreement. Grid middleware and Grid services are two pillars of grid computing systems and applications. This book includes high-level contributions by leading researchers in both areas and presents current solutions together with future challenges. This volume includes sections on knowledge and data management on grids, Grid resource management and scheduling, Grid information, resource and workflow monitoring services, and service level agreements. Grid Middleware and Services: Challenges and Solutions is designed for a professional audience, composed of researchers and practitioners in industry. This volume is also suitable for graduate-level students in computer science.

Privacy-Respecting Intrusion Detection (Hardcover, 2007 ed.): Ulrich Flegel Privacy-Respecting Intrusion Detection (Hardcover, 2007 ed.)
Ulrich Flegel
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

Effective response to misuse or abusive activity in IT systems requires the capability to detect and understand improper activity. Intrusion Detection Systems observe IT activity, record these observations in audit data, and analyze the collected audit data to detect misuse. Privacy-Respecting Intrusion Detection introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection. Also, it limits the recovery of personal data to pseudonyms involved in a detected misuse scenario. The book includes case studies demonstrating this theory, and solutions that are constructively validated by providing algorithms.

Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.): Guido Schryen Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.)
Guido Schryen
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

This book examines anti-spam measures in terms of their potentials, limitations, advantages, and drawbacks. These factors determine to which extent the measures can contribute to the reduction of spam in the long run. It examines legislative, organizational, behavioral, and technological anti-spam measures, including an insight into their effectiveness. In addition, it presents the conceptual development and analysis of an infrastructural e-mail framework, which features such a complementary application, and considers deployment issues.

Protocols, Servers and Projects for Multimedia Realtime Systems (Hardcover): Dimitris N Chorafas Protocols, Servers and Projects for Multimedia Realtime Systems (Hardcover)
Dimitris N Chorafas
R2,679 Discovery Miles 26 790 Ships in 18 - 22 working days

This book addresses the changing role of networks and the evolving structure of an Infrastructure Superhighway. The requirements for leadership in telecommunications are reviewed from different viewpoints: Network operators, equipment manufacturers, software developers and user organizations. Emphasis is placed on multimedia and what multimedia solutions would mean to telephone utilities and endusers. Based on extensive research undertaken in Europe, US and Japan, Dimitris Chorafas identifies new domains of applications, presents the breakthroughs which have currently been achieved and outlines the systems solutions necessary to fruitfully exploit new technology.

Multi-Threaded Object-Oriented MPI-Based Message Passing Interface - The ARCH Library (Hardcover, 1998 ed.): Jean-Marc Adamo Multi-Threaded Object-Oriented MPI-Based Message Passing Interface - The ARCH Library (Hardcover, 1998 ed.)
Jean-Marc Adamo
R4,116 Discovery Miles 41 160 Ships in 18 - 22 working days

Multi-Threaded Object-Oriented MPI-Based Message Passing Interface: The ARCH Library presents ARCH, a library built as an extension to MPI. ARCH relies on a small set of programming abstractions that allow the writing of well-structured multi-threaded parallel codes according to the object-oriented programming style. ARCH has been written with C++. The book describes the built-in classes, and illustrates their use through several template application cases in several fields of interest: Distributed Algorithms (global completion detection, distributed process serialization), Parallel Combinatorial Optimization (A* procedure), Parallel Image-Processing (segmentation by region growing). It shows how new application-level distributed data types - such as a distributed tree and a distributed graph - can be derived from the built-in classes. A feature of interest to readers is that both the library and the application codes used for illustration purposes are available via the Internet. The material can be downloaded for installation and personal parallel code development on the reader's computer system. ARCH can be run on Unix/Linux as well as Windows NT-based platforms. Current installations include the IBM-SP2, the CRAY-T3E, the Intel Paragon, PC-networks under Linux or Windows NT. Multi-Threaded Object-Oriented MPI-Based Message Passing Interface: The ARCH Library is aimed at scientists who need to implement parallel/distributed algorithms requiring complicated local and/or distributed control structures. It can also benefit parallel/distributed program developers who wish to write codes in the object-oriented style. The author has been using ARCH for several years as a medium to teach parallel and network programming. Teachers can employ the library for the same purpose while students can use it for training. Although ARCH has been used so far in an academic environment, it will be an effective tool for professionals as well. Multi-Threaded Object-Oriented MPI-Based Message Passing Interface: The ARCH Library is suitable as a secondary text for a graduate level course on Data Communications and Networks, Programming Languages, Algorithms and Computational Theory and Distributed Computing and as a reference for researchers and practitioners in industry.

Guide to e-Science - Next Generation Scientific Research and Discovery (Hardcover, Edition.): Xiaoyu Yang, Lizhe Wang, Wei Jie Guide to e-Science - Next Generation Scientific Research and Discovery (Hardcover, Edition.)
Xiaoyu Yang, Lizhe Wang, Wei Jie
R4,112 Discovery Miles 41 120 Ships in 18 - 22 working days

This guidebook on e-science presents real-world examples of practices and applications, demonstrating how a range of computational technologies and tools can be employed to build essential infrastructures supporting next-generation scientific research. Each chapter provides introductory material on core concepts and principles, as well as descriptions and discussions of relevant e-science methodologies, architectures, tools, systems, services and frameworks. Features: includes contributions from an international selection of preeminent e-science experts and practitioners; discusses use of mainstream grid computing and peer-to-peer grid technology for "open" research and resource sharing in scientific research; presents varied methods for data management in data-intensive research; investigates issues of e-infrastructure interoperability, security, trust and privacy for collaborative research; examines workflow technology for the automation of scientific processes; describes applications of e-science.

Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,436 Discovery Miles 94 360 Ships in 18 - 22 working days
High Performance Networks - Frontiers and Experience (Hardcover, 1993 ed.): Ahmed N. Tantawy High Performance Networks - Frontiers and Experience (Hardcover, 1993 ed.)
Ahmed N. Tantawy
R4,137 Discovery Miles 41 370 Ships in 18 - 22 working days

'The world of information processing is going through a major phase of its evolution. Networking has been associated with computers since the 1960's. Communicating machines, exchanging information or cooperating to solve complex problems, were the dream of many scientists and engineers. Rudi mentary networks and protocols were invented. Local area networks capable of carrying a few megabits per second became basic components of corporate computing installations in the 1980's. At the same time, advances in optical transmission and switching technologies made it possible to transfer billions of bits per second. 'The availability of this huge bandwidth is making people wonder about the seemingly unlimited possibilities of these "fat information pipes" A new world where all interesting up-to-date information becomes instantaneously available to everyone everywhere is often portrayed to be around the comer. New applications are envisioned and their requirements are defined. 'The new field of High Performance Networking is burgeoning with activities at various levels. Several frontiers are being explored simultaneously. In order to achieve more bandwidth and better performance, work is progressing in optical transmission, high speed switching and network resource manage ment. Some researchers have started to investigate all-optical networking as a promising approach to remove the relatively slow electronics from the network infrastructure. This will also introduce a new environment with unique characteristics that will have a definite impact on network architec tures, topologies, addressing schemes, and protocols."

Operational Semantics and Verification of Security Protocols (Hardcover, 2011): Cas Cremers, Sjouke Mauw Operational Semantics and Verification of Security Protocols (Hardcover, 2011)
Cas Cremers, Sjouke Mauw
R1,747 Discovery Miles 17 470 Ships in 18 - 22 working days

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols.

The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool.

The methodology s strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.

"

High Performance Networks - Technology and Protocols (Hardcover, 1994 ed.): Ahmed N. Tantawy High Performance Networks - Technology and Protocols (Hardcover, 1994 ed.)
Ahmed N. Tantawy
R4,139 Discovery Miles 41 390 Ships in 18 - 22 working days

In the last few years, the world of information networks has undergone significant changes that will revolutionize the future of communications. Data rates have reached the gigabit per second range. Optical fibers have become the transmission medium of choice. Standardization activities have very aggressively produced a set of well established standard for future LANs, MANs and WANs. It has become very difficult for computer and communications professionals to follow these rapidly evolving technologies and standards. High Performance Networks: Technology and Protocols provides a timely technical overview of the start-of-the-art in high performance networking. Chapters cover lightweight protocols, high performance protocol implementation techniques, high speed MAC protocols, optical networks, as well as emerging standards, including ATM, SMDS, B-ISDN, SONET, FCS and HIPPI. Professionals, engineers, and researchers in communications and computers, who need to understand the underlying technologies of high performance (gigabit) networks, will find this volume to be an invaluable reference. The book is also suitable for use as a text for advanced courses on the subject.

Information Fusion and Geographic Information Systems (IF&GIS 2013) - Environmental and Urban Challenges (Hardcover, 2014 ed.):... Information Fusion and Geographic Information Systems (IF&GIS 2013) - Environmental and Urban Challenges (Hardcover, 2014 ed.)
Vasily Popovich, Christophe Claramunt, Manfred Schrenk, Kyrill Korolenko
R4,511 R3,441 Discovery Miles 34 410 Save R1,070 (24%) Ships in 10 - 15 working days

The Workshop Proceedings reflect problems of advanced geo-information science with a special emphasis on environmental and urban challenges. The Proceedings incorporate papers presented by leading scientists doing research on environmental issues from modeling to analysis, information processing and visualization. As well as practitioners engaged in GIS and GIS applications development. The Proceedings pay close attention to the problems of scientific and technological innovations as well application opportunities such as getting environmental and global warming problems under control, as well as the monitoring, planning and simulation of urban systems with respect to economic trends as related to: Artificial intelligence; GIS ontologies; GIS data integration and modeling; Environmental management ; Urban GIS; Transportation GIS; GIS data fusion; GIS and corporate information systems; GIS and real-time monitoring systems; GIS algorithms and computational issues; Landscape studies; Global warming; GIS and the Arctic sea; Novel and emerging GIS research areas; Maritime and environmental GIS; and Coastal GIS.

Transactions on Engineering Technologies - Special Volume of the World Congress on Engineering 2013 (Hardcover, 2014): Gi-Chul... Transactions on Engineering Technologies - Special Volume of the World Congress on Engineering 2013 (Hardcover, 2014)
Gi-Chul Yang, Sio-Iong Ao, L. Engelman
R5,283 Discovery Miles 52 830 Ships in 18 - 22 working days

This book contains revised and extended research articles written by prominent researchers participating in the international conference on Advances in Engineering Technologies and Physical Science ("London, U.K., 3-5 July, 2013)." Topics covered include mechanical engineering, bioengineering, internet engineering, image engineering, wireless networks, knowledge engineering, manufacturing engineering, and industrial applications. The book offers state of art of tremendous advances in engineering technologies and physical science and applications, and also serves as an excellent reference work for researchers and graduate students working with/on engineering technologies and physical science.

Spyware and Adware (Hardcover, 2011 ed.): John Aycock Spyware and Adware (Hardcover, 2011 ed.)
John Aycock
R2,732 Discovery Miles 27 320 Ships in 18 - 22 working days

"Spyware and Adware" introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.

"Spyware and Adware" is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.

A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Paperback): Kutub Thakur,... A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Paperback)
Kutub Thakur, Abu Kamruzzaman, Al-Sakib Khan Pathan
R1,531 Discovery Miles 15 310 Ships in 9 - 17 working days

This book, divided into three parts, describes the detailed concepts of Digital Communication, Security, and Privacy protocols. In Part One, the first chapter provides a deeper perspective on communications, while Chapters 2 and 3 focus on analog and digital communication networks. Part Two then delves into various Digital Communication protocols. Beginning first in Chapter 4 with the major Telephony protocols, Chapter 5 then focuses on important Data Communication protocols, leading onto the discussion of Wireless and Cellular Communication protocols in Chapter 6 and Fiber Optic Data Transmission protocols in Chapter 7. Part Three covers Digital Security and Privacy protocols including Network Security protocols (Chapter 8), Wireless Security protocols (Chapter 9), and Server Level Security systems (Chapter 10), while the final chapter covers various aspects of privacy related to communication protocols and associated issues. This book will offer great benefits to graduate and undergraduate students, researchers, and practitioners. It could be used as a textbook as well as reference material for these topics. All the authors are well-qualified in this domain. The authors have an approved textbook that is used in some US, Saudi, and Bangladeshi universities since Fall 2020 semester - although used in online lectures/classes due to COVID-19 pandemic.

WDM Mesh Networks - Management and Survivability (Hardcover, 2003 ed.): Hui Zang WDM Mesh Networks - Management and Survivability (Hardcover, 2003 ed.)
Hui Zang
R2,759 Discovery Miles 27 590 Ships in 18 - 22 working days

In recent years, with the rapid growth of the Internet, the bandwidth demand for data traffic is exploding. Optical networks based on wavelength-division multiplexing (WDM) technology offer the promise to satisfy the bandwidth requirements of the Internet infrastructure. With WDM technology, signals are carried simultaneously on mUltiple wavelengths on a single fiber. WDM provides a practical approach of resolving the mismatch between the fiber ca pacity and the peak electronic processing speed. Mesh-based WDM networks have recently attracted much research and development interest since the In ternet topology is meshed in nature, and more importantly, mesh-based WDM networks are flexible with respect to routing and survivability. This book exam ines the management and survivability issues of mesh-based WDM networks and proposes new WDM network protocols and algorithms that could make telecommunication networks more efficient. Wavelength-routing has been one of the most important technologies to em ploy WDM in backbone networks. In wavelength-routed WDM networks, optical channels, which are referred to as lightpaths, are set up between WDM terminals. Most chapters of this bock are focused on various issues related to wavelength-routed networks, namely, routing and wavelength-assignment, con trol and management, fault management, and wavelength-converter placement. This book also presents an all-optical packet-switched network architecture based on the concept of photonic slot routing. The audience for this book are network designers and planners, research and development engineers active in the field of telecommunications, and students of optical networking at the graduate or senior undergraduate levels."

Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security... Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium (Hardcover, 2002 ed.)
Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
R4,125 Discovery Miles 41 250 Ships in 18 - 22 working days

The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP), focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government, ....Themoreour societyrelies on electronicforms ofcommunication, themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence, researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines, organisationsandcountries, todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering, mobileagentsecurity, e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies, one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion, and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website: http: //www.ifip.at.org/. Finally, wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers, whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety, willprovea drivingforce for futureconferen

Managing Business and Service Networks (Hardcover, 2001 ed.): Lundy Lewis Managing Business and Service Networks (Hardcover, 2001 ed.)
Lundy Lewis
R4,250 Discovery Miles 42 500 Ships in 18 - 22 working days

Most everything in our experience requires management in some form or other: our gardens, our automobiles, our minds, our bodies, our love lives, our businesses, our forests, our countries, etc. Sometimes we don't call it "management" per se. We seldom talk about managing our minds or automobiles. But if we think of management in terms of monitoring, maintaining, and cultivating with respect to some goal, then it makes sense. We certainly monitor an automobile, albeit unconsciously, to make sure that it doesn't exhibit signs of trouble. And we certainly try to cultivate our minds. This book is about managing networks. That itself is not a new concept. We've been managing the networks that support our telephones for about 100 years, and we've been managing the networks that support our computers for about 20 years. What is new (and what motivated me to write this book) is the following: (i) the enormous advancements in networking technology as we transition th st from the 20 century to the 21 century, (ii) the increasing dependence of human activities on networking technology, and (iii) the commercialization of services that depend on networking technology (e.g., email and electronic commerce).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
Demystifying Graph Data Science - Graph…
Pethuru Raj, Abhishek Kumar, … Hardcover R3,333 R3,010 Discovery Miles 30 100
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,452 Discovery Miles 14 520
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180

 

Partners