0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (301)
  • R250 - R500 (844)
  • R500+ (14,109)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Distributed Computing in Big Data Analytics - Concepts, Technologies and Applications (Hardcover, 1st ed. 2017): Sourav... Distributed Computing in Big Data Analytics - Concepts, Technologies and Applications (Hardcover, 1st ed. 2017)
Sourav Mazumder, Robin Singh Bhadoria, Ganesh Chandra Deka
R4,496 Discovery Miles 44 960 Ships in 12 - 19 working days

Big data technologies are used to achieve any type of analytics in a fast and predictable way, thus enabling better human and machine level decision making. Principles of distributed computing are the keys to big data technologies and analytics. The mechanisms related to data storage, data access, data transfer, visualization and predictive modeling using distributed processing in multiple low cost machines are the key considerations that make big data analytics possible within stipulated cost and time practical for consumption by human and machines. However, the current literature available in big data analytics needs a holistic perspective to highlight the relation between big data analytics and distributed processing for ease of understanding and practitioner use. This book fills the literature gap by addressing key aspects of distributed processing in big data analytics. The chapters tackle the essential concepts and patterns of distributed computing widely used in big data analytics. This book discusses also covers the main technologies which support distributed processing. Finally, this book provides insight into applications of big data analytics, highlighting how principles of distributed computing are used in those situations. Practitioners and researchers alike will find this book a valuable tool for their work, helping them to select the appropriate technologies, while understanding the inherent strengths and drawbacks of those technologies.

Software Failure Investigation - A Near-Miss Analysis Approach (Hardcover, 1st ed. 2018): Jan H.P. Eloff, Madeleine Bihina Bella Software Failure Investigation - A Near-Miss Analysis Approach (Hardcover, 1st ed. 2018)
Jan H.P. Eloff, Madeleine Bihina Bella
R3,703 R3,421 Discovery Miles 34 210 Save R282 (8%) Ships in 12 - 19 working days

This book reviews existing operational software failure analysis techniques and proposes near-miss analysis as a novel, and new technique for investigating and preventing software failures. The authors provide details on how near-miss analysis techniques focus on the time-window before the software failure actually unfolds, so as to detect the high-risk conditions that can lead to a major failure. They detail how by alerting system users of an upcoming software failure, the detection of near misses provides an opportunity to collect at runtime failure-related data that is complete and relevant. They present a near-miss management systems (NMS) for detecting upcoming software failures, which can contribute significantly to the improvement of the accuracy of the software failure analysis. A prototype of the NMS is implemented and is discussed in the book. The authors give a practical hands-on approach towards doing software failure investigations by means of near-miss analysis that is of use to industry and academia

A System Administrator's Guide to Sun Workstations (Hardcover, New): George Becker, Kathy Slattery A System Administrator's Guide to Sun Workstations (Hardcover, New)
George Becker, Kathy Slattery
R2,931 Discovery Miles 29 310 Ships in 10 - 15 working days

This guide to Sun Administration is a reference manual written by Sun administrators for Sun administrators. It is not intended to be a complete guide to Unix System Administration; instead it will concentrate on the special issues that are particular to the Sun environment. The authors will present a clearer and more in-depth explanation of the issues involved in managing SunOS 4.0 through 4.0.3 than is currently available. The reader will be led through the basic steps necessary to install and maintain a network of Sun computers. Along the way, helpful ideas will be given concerning NFS, YP, backup and restore procedures, as well as many useful installation tips that can make a Sun system administrator's job less painful.

Challenges in Ad Hoc Networking - Fourth Annual Mediterranean Ad Hoc Networking Workshop, June 21-24, 2005, Ile de... Challenges in Ad Hoc Networking - Fourth Annual Mediterranean Ad Hoc Networking Workshop, June 21-24, 2005, Ile de Porquerolles, France (Hardcover, 2006 ed.)
K. Al Agha, I. Guerin Lassous, G. Pujolle
R2,942 Discovery Miles 29 420 Ships in 10 - 15 working days

This book contains the refereed proceedings of the Fourth Annual Mediterranean Ad Hoc Networking Workshop, Med-Hoc-Net 2005. Med-Hoc-Net 2005 consolidated the success of the previous editions of the workshop series. It aimed to serve as a platform for researchers from academia, research, laboratories, and industry from all over the world to share their ideas, views, reults, and experiences in the field of ad-hoc networking.

Transforming Your Business with AWS - Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services... Transforming Your Business with AWS - Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services (Paperback)
P Abdoulaye
R816 R750 Discovery Miles 7 500 Save R66 (8%) Ships in 12 - 19 working days

Expert guidance on how to use Amazon Web Services to supercharge your digital services business In Transforming Your Business with AWS: Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services, renowned international consultant and sought-after speaker Philippe Abdoulaye delivers a practical and accessible guide to using Amazon Web Services to modernize your business and the digital services you offer. This book provides you with a concrete action plan to build a team capable of creating world-class digital services and long-term competitive advantages. You'll discover what separates merely average digital service organizations from the truly outstanding, as well as how moving to the cloud will enable your business to deliver your services faster, better, and more efficiently. This book also includes: A comprehensive overview of building industry-leading digital service delivery capabilities, including discussions of the development lifecycle, best practices, and AWS-based development infrastructure Explanations of how to implement a digital business transformation strategy An exploration of key roles like DevOps Continuous Delivery, Continuous Deployment, Continuous Integration, Automation, and DevSecOps Hands-on treatments of AWS application management tools, including Elastic Beanstalk, CodeDeploy, and CodePipeline Perfect for executives, managers, and other business leaders attempting to clarify and implement their organization's digital vision and strategy, Transforming Your Business with AWS is a must-read reference that answers the "why" and, most importantly, the "how," of digital transformation with Amazon Web Services.

Trends in Communication, Cloud, and Big Data - Proceedings of 3rd National Conference on CCB, 2018 (Hardcover, 1st ed. 2020):... Trends in Communication, Cloud, and Big Data - Proceedings of 3rd National Conference on CCB, 2018 (Hardcover, 1st ed. 2020)
Hiren Kumar Deva Sarma, Bhaskar Bhuyan, Samarjeet Borah, Nitul Dutta
R4,348 Discovery Miles 43 480 Ships in 10 - 15 working days

This book presents the outcomes of the Third National Conference on Communication, Cloud and Big Data (CCB) held on November 2-3, 2018, at Sikkim Manipal Institute of Technology, Majitar, Sikkim. Featuring a number of papers from the conference, it explores various aspects of communication, computation, cloud, and big data, including routing in cognitive radio wireless sensor networks, big data security issues, routing in ad hoc networks, routing protocol for Internet of things (IoT), and algorithm for imaging quality enhancement.

Unimodal and Multimodal Biometric Data Indexing (Hardcover): Somnath Dey, Debasis, Samanta Unimodal and Multimodal Biometric Data Indexing (Hardcover)
Somnath Dey, Debasis, Samanta
R2,944 Discovery Miles 29 440 Ships in 12 - 19 working days

This work is on biometric data indexing for large-scale identification systems with a focus on different biometrics data indexing methods. It provides state-of-the-art coverage including different biometric traits, together with the pros and cons for each. Discussion of different multimodal fusion strategies are also included.

Networks and Network Analysis for Defence and Security (Hardcover, 2014): Anthony J. Masys Networks and Network Analysis for Defence and Security (Hardcover, 2014)
Anthony J. Masys
R3,623 Discovery Miles 36 230 Ships in 12 - 19 working days

Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples highlighting the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic well-being of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of big data and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies, vulnerabilities to produce insights for creative solutions. This book will be well positioned to inform defence, security and intelligence professionals and researchers with regards to leading methodologies and approaches."

Converged Networking - Data and Real-time Communications over IP (Hardcover, 2003 ed.): Chris McDonald Converged Networking - Data and Real-time Communications over IP (Hardcover, 2003 ed.)
Chris McDonald
R3,089 Discovery Miles 30 890 Ships in 10 - 15 working days

This volume forms the edited proceedings of the Sixth International Symposium on Communications Interworking, held in Perth, Western Australia, from 13-16 October, 2002. In total, 39 research papers were submitted for consideration, and after full refereeing by international referees, 27 papers from authors in 11 countries were accepted for publication. Invited keynote addresses were presented by Dr Hugh Bradlow, Chief Technology Offleer for Telstra Corporation, Australia, and Dr Sathya Rao, Director ofTelscom A.G., Switzerland. The symposium brought together 60 active international researchers and telecommunications engineers to discuss the important questions as to whether there is a convergence of all communications, including real-time communications, over the Internet Protocol (IP), and whether existing IP technology is capable of supporting this convergence, or whether it requires further development of that technology. The papers selected to appear in this volume make an important and timely contribution to this debate. Specific symposium paper sessions were held to present and discuss ernerging research on the topics of converged networking, real-time communications over IP, quality of service, routing and metrics, ernerging issues in mobile networks, differentiated services, and wireless networking.

Advances in Security, Networks, and Internet of Things - Proceedings from SAM'20, ICWN'20, ICOMP'20, and... Advances in Security, Networks, and Internet of Things - Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 (Hardcover, 1st ed. 2021)
Kevin Daimi, Hamid R Arabnia, Leonidas Deligiannidis, Min-Shiang Hwang, Fernando G. Tinetti
R7,751 Discovery Miles 77 510 Ships in 10 - 15 working days

The book presents the proceedings of four conferences: The 19th International Conference on Security & Management (SAM'20), The 19th International Conference on Wireless Networks (ICWN'20), The 21st International Conference on Internet Computing & Internet of Things (ICOMP'20), and The 18th International Conference on Embedded Systems, Cyber-physical Systems (ESCS'20). The conferences took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences are part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Authors include academics, researchers, professionals, and students. Presents the proceedings of four conferences as part of the 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20); Includes the tracks on security & management, wireless networks, internet computing and IoT, and embedded systems as well as cyber-physical systems; Features papers from SAM'20, ICWN'20, ICOMP'20 and ESCS'20.

Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March... Critical Infrastructure Protection X - 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers (Hardcover, 1st ed. 2016)
Mason Rice, Sujeet Shenoi
R3,101 R2,037 Discovery Miles 20 370 Save R1,064 (34%) Ships in 12 - 19 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: themes and issues; control systems security; infrastructure modeling and simulation; risk and impact assessment. This book is the tenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of fourteen edited papers from the Tenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2016. Critical Infrastructure Protection is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Mobile Computing (Hardcover, 1996 ed.): Tomasz Imielinski, Henry F. Korth Mobile Computing (Hardcover, 1996 ed.)
Tomasz Imielinski, Henry F. Korth
R8,725 Discovery Miles 87 250 Ships in 10 - 15 working days

The desire and the necessity for accessing and processing information stored in computer networks anytime and anywhere' has been the impetus for the growing interest in mobile computing research. Wired computing networks and end devices such as PCs and workstations have effectively extended the data-only networking capability of a few years ago to sophisticated multimedia networking. The cost of such transformation to the end user turns out to be very nominal. Undoubtedly the wireless access technology has given a big boost to mobile cellular telephony and data networking. Processing general purpose multimedia information requires, besides higher bandwidth, means for controlling the available bandwidth and caring for quality of service issues. This problem is accentuated by the need for providing such service in the presence of wireless physical layer and host mobility. Thus, tetherless and ubiquitous mobile and wireless computing systems should carefully combine advances in computer networking and wireless communication. While several experimental mobile computing platforms have sprung up, much research is needed to overcome technological obstacles in low power system design, sustainable battery life, unreliability and limited bandwidth of the wireless channel. Mobile Computing addresses some aspects of this new but rapidly growing field of research. A total of eight papers span the areas of protocols, network architecture, and performance issues. All of the papers deal with the complexities of host mobility in a wireless setting. They expose several challenges that affect system design of mobile computing networks at various levels. By addressing these challenges in an efficient andcost-effective manner, it is hoped that user-friendly, seamless and faster networks will emerge to serve the sophisticated and demanding applications of mobile users. Mobile Computing serves as an excellent reference, providing insights into some of the most important issues in mobile and wireless computing.

PC Interfacing (Paperback, 3rd ed.): Pei An PC Interfacing (Paperback, 3rd ed.)
Pei An
R1,286 Discovery Miles 12 860 Ships in 12 - 19 working days

The main links with your PC and the outside world are the centronic port, used for connecting the printer, the RS232 port, used for the mouse, and the games port for a joystick. This book explores how these input/output (I/O) ports can be put to use through a range of other interfacing applications. This is especially useful for laptop and palmtop PCs which cannot be fitted with internal I/O cards. A novel approach is taken by this book, combining the hardware through which the ports can be explored, and the software programming needed to carry out a range of experiments.
Circuits are provided for simple testing tools, and three experimental boards - which can also be purchased ready-made. Ready-to-run TurboPascal programs are available on the Newnes web site.
A huge range of applications are considered, turning the PC into a flexible core of a variety of systems. External devices considered include opto-isolator drivers, power drivers, LED drivers, relay drivers, special driver ICs, and methods of driving opto-isolated zero-crossing solid state relays, stepper motors, sound generating devices and displays. Ways of gathering information from the outside world are given, as well as connection to digital devices, remote control and digital communication.
As well as teaching in this field, Pei An has written numerous articles for magazines such as Electronics World and Electronics Today International.

A hands-on guide to exploring your PC's input/output ports
Covers the hardware and software aspects of interfacing
An exciting project-based approach to an important subject area

Spoken Multimodal Human-Computer Dialogue in Mobile Environments (Hardcover, 2005 ed.): Wolfgang Minker, Dirk Buhler, Laila... Spoken Multimodal Human-Computer Dialogue in Mobile Environments (Hardcover, 2005 ed.)
Wolfgang Minker, Dirk Buhler, Laila Dybkjaer
R4,599 Discovery Miles 45 990 Ships in 10 - 15 working days

The ongoing migration of computing and information access from stationary environments to mobile computing devices for eventual use in mobile environments, such as Personal Digital Assistants (PDAs), tablet PCs, next generation mobile phones, and in-car driver assistance systems, poses critical challenges for natural human-computer interaction. Spoken dialogue is a key factor in ensuring natural and user-friendly interaction with such devices which are meant not only for computer specialists, but also for everyday users.

Speech supports hands-free and eyes-free operation, and becomes a key alternative interaction mode in mobile environments, e.g. in cars where driver distraction by manually operated devices may be a significant problem. On the other hand, the use of mobile devices in public places, may make the possibility of using alternative modalities possibly in combination with speech, such as graphics output and gesture input, preferable due to e.g. privacy issues. Researchers' interest is progressively turning to the integration of speech with other modalities such as gesture input and graphics output, partly to accommodate more efficient interaction and partly to accommodate different user preferences.

This book:
-combines overview chapters of key areas in spoken multimodal dialogue (systems and components, architectures, and evaluation) with chapters focussed on particular applications or problems in the field;
-focuses on the influence of the environment when building and evaluating an application.

Audience: Computer scientists, engineers, and others who work in the area of spoken multimodal dialogue systems in academia and in the industry;
graduatestudents and Ph.D. students specialising in spoken multimodal dialogue systems in general, or focusing on issues in these systems in mobile environments in particular.

Computer Network Security (Hardcover, 2005 ed.): Joseph Migga Kizza Computer Network Security (Hardcover, 2005 ed.)
Joseph Migga Kizza
R1,789 Discovery Miles 17 890 Ships in 12 - 19 working days

A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference. This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practices and covers network security tools, policies, and administrative goals in an integrated manner. It is an essential security resource for undergraduate or graduate study, practitioners in networks, and professionals who develop and maintain secure computer network systems.

Applied Video Processing in Surveillance and Monitoring Systems (Hardcover): Nilanjan Dey, Amira Ashour, Suvojit Acharjee Applied Video Processing in Surveillance and Monitoring Systems (Hardcover)
Nilanjan Dey, Amira Ashour, Suvojit Acharjee
R5,877 Discovery Miles 58 770 Ships in 10 - 15 working days

Video monitoring has become a vital aspect within the global society as it helps prevent crime, promote safety, and track daily activities such as traffic. As technology in the area continues to improve, it is necessary to evaluate how video is being processed to improve the quality of images. Applied Video Processing in Surveillance and Monitoring Systems investigates emergent techniques in video and image processing by evaluating such topics as segmentation, noise elimination, encryption, and classification. Featuring real-time applications, empirical research, and vital frameworks within the field, this publication is a critical reference source for researchers, professionals, engineers, academicians, advanced-level students, and technology developers.

Computational Social Networks - Security and Privacy (Hardcover, 2012 ed.): Ajith Abraham Computational Social Networks - Security and Privacy (Hardcover, 2012 ed.)
Ajith Abraham
R2,924 Discovery Miles 29 240 Ships in 10 - 15 working days

This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review "Tools, Perspectives, and Applications," and "Mining and Visualization" in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.

The Student Supercomputer Challenge Guide - From Supercomputing Competition to the Next HPC Generation (Hardcover, 1st ed.... The Student Supercomputer Challenge Guide - From Supercomputing Competition to the Next HPC Generation (Hardcover, 1st ed. 2018)
Asc Community
R1,838 Discovery Miles 18 380 Ships in 12 - 19 working days

This guide provides a comprehensive overview of High Performance Computing (HPC) to equip students with a full skill set including cluster setup, network selection, and a background of supercomputing competitions. It covers the system, architecture, evaluating approaches, and other practical supercomputing techniques. As the world's largest supercomputing hackathon, the ASC Student Supercomputer Challenge has attracted a growing number of new talent to supercomputing and has greatly promoted communications in the global HPC community. Enclosed in this book, readers will also find how to analyze and optimize supercomputing systems and applications in real science and engineering cases.

Broadband Infrastructure - The Ultimate Guide to Building and Delivering OSS/BSS (Hardcover, 2003 ed.): Shailendra Jain, Mark... Broadband Infrastructure - The Ultimate Guide to Building and Delivering OSS/BSS (Hardcover, 2003 ed.)
Shailendra Jain, Mark Hayward, Sharad Kumar
R4,521 Discovery Miles 45 210 Ships in 10 - 15 working days

The companies that provide the Internet to the rest of the world do not have the luxury of setting high expectations and assuming they will be met. These Internet infrastructure companies (IICs) are responsible for delivering the Internet's promise, including everything from eBusiness and mobile Internet applications to optical services and high-speed access. The Internet's audience takes this promise for granted, and IICs face the daunting challenge of making the Internet, and networks like it, do what the audience expects them to. To meet the expectations they face, IICs must harness the power of their operations support systems (OSSs) - the software systems in the background they use to create, manage, maintain, manipulate and adapt their networks to serve customers reliably and rapidly.
Broadband Infrastructure: The Ultimate Guide to Understanding and Delivering OSS/BSS is a "how to" book for Internet infrastructure companies to help them prepare for the decisions they will face when constructing their core OSS strategies and infrastructure. This book provides a source of reference and education to learn the language, methods, and technologies associated with the OSS market. It examines the Internet infrastructure supply chain and how it will be automated. Finally, it brings together a wealth of proven knowledge and advice, gathered from BusinessEdge Solutions' extensive OSS experience, that broadband providers can use to minimize their OSS risks while maximizing their ability to differentiate and compete.

Virtual Computing - Concept, Design, and Evaluation (Hardcover, 2001 ed.): Dongmin Kim, Salim Hariri Virtual Computing - Concept, Design, and Evaluation (Hardcover, 2001 ed.)
Dongmin Kim, Salim Hariri
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

The evolution of modern computers began more than 50 years ago and has been driven to a large extend by rapid advances in electronic technology during that period. The first computers ran one application (user) at a time. Without the benefit of operating systems or compilers, the application programmers were responsible for managing all aspects of the hardware. The introduction of compilers allowed programmers to express algorithms in abstract terms without being concerned with the bit level details of their implementation. Time sharing operating systems took computing systems one step further and allowed several users and/or applications to time share the computing services of com puters. With the advances of networks and software tools, users and applications were able to time share the logical and physical services that are geographically dispersed across one or more networks. Virtual Computing (VC) concept aims at providing ubiquitous open computing services in analogous way to the services offered by Telephone and Elec trical (utility) companies. The VC environment should be dynamically setup to meet the requirements of a single user and/or application. The design and development of a dynamically programmable virtual comput ing environments is a challenging research problem. However, the recent advances in processing and network technology and software tools have successfully solved many of the obstacles facing the wide deployment of virtual computing environments as will be outlined next."

Privacy, Identity, and Cloud Computing (Hardcover): Harry Katzan Privacy, Identity, and Cloud Computing (Hardcover)
Harry Katzan
R725 R647 Discovery Miles 6 470 Save R78 (11%) Ships in 10 - 15 working days

Three important technology issues face professionals in today's business, education, and government world. In "Privacy, Identity, and Cloud Computing, " author and computer expert Dr. Harry Katzan Jr. addresses the subjects of privacy and identity as they relate to the new discipline of cloud computing, a model for providing on-demand access to computing service via the Internet. A compendium of eight far-reaching papers, "Privacy, Identity, and Cloud Computing" thoroughly dissects and discusses the following: The privacy of cloud computing Identity as a service Identity analytics and belief structures Compatibility relations in identity analysis Conspectus of cloud computing Cloud computing economics: Democratization and monetization of services Ontological view of cloud computing Privacy as a service Katzan provides not only a wealth of information, but gives exposure to these topics facing today's computer users. Ultimately, these are important facets of modern computing, and all their implications must be considered thoroughly in anticipation of future developments.

Localized Quality of Service Routing for the Internet (Hardcover, 2003 ed.): Srihari Nelakuditi, Zhi-Li Zhang Localized Quality of Service Routing for the Internet (Hardcover, 2003 ed.)
Srihari Nelakuditi, Zhi-Li Zhang
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

Under Quality of Service (QoS) routing, paths for flows are selected based upon the knowledge of resource availability at network nodes and the QoS requirements of flows. QoS routing schemes proposed differ in the way they gather information about the network state and select paths based on this information. We broadly categorize these schemes into best-path routing and proportional routing. The best-path routing schemes gather global network state information and always select the best path for an incoming flow based on this global view. On the other hand, proportional routing schemes proportion incoming flows among a set of candidate paths. We have shown that it is possible to compute near-optimal proportions using only locally collected information. Furthermore, a few good candidate paths can be selected using infrequently exchanged global information and thus with minimal communication overhead.

Localized Quality Of Service Routing For The Internet, describes these schemes in detail demonstrating that proportional routing schemes can achieve higher throughput with lower overhead than best-path routing schemes. It first addresses the issue of finding near-optimal proportions for a given set of candidate paths based on locally collected flow statistics. This book will also look into the selection of a few good candidate paths based on infrequently exchanged global information. The final phase of this book will describe extensions to proportional routing approach to provide hierarchical routing across multiple areas in a large network.

Localized Quality Of Service Routing For The Internet is designed for researchers and practitioners in industry, and is suitable for graduatelevel students in computer science as a secondary text.

Piecewise Linear Modeling and Analysis (Hardcover, 1998 ed.): Domine Leenaerts, Wim M.G.Van Bokhoven Piecewise Linear Modeling and Analysis (Hardcover, 1998 ed.)
Domine Leenaerts, Wim M.G.Van Bokhoven
R4,466 Discovery Miles 44 660 Ships in 10 - 15 working days

Piecewise Linear (PL) approximation of non-linear behaviour is a well-known technique in synthesis and analysis of electrical networks. However, the PL description should be efficient in data storage and the description should allow simple retrieval of the stored information. Furthermore, it would be useful if the model description could handle a large class of piecewise linear mappings. Piecewise Linear Modeling and Analysis explains in detail all possible model descriptions for efficiently storing piecewise linear functions, starting with the Chua descriptions. Detailed explanation on how the model parameter can be obtained for a given mapping is provided and demonstrated by examples. The models are ranked to compare them and to show which model can handle the largest class of PL mappings. All model descriptions are implicitly related to the Linear Complementarity Problem and most solution techniques for this problem, like Katzenelson and Lemke, are discussed according to examples that are explained in detail. To analyse PL electrical networks a simulator is mandatory. Piecewise Linear Modeling and Analysis provides a detailed outline of a possible PL simulator, including pseudo-programming code. Several simulation domains like transient, AC and distortion are discussed. The book explains the attractive features of PL simulators with respect to mixed-level and mixed-signal simulation while paying due regard also to hierarchical simulation. Piecewise Linear Modeling and Analysis shows in detail how many existing components in electrical networks can be modeled. These range from digital logic and analog basic elements such as transistors to complex systems like Phase-Locked Loops and detection systems. Simulation results are also provided. The book concludes with a discussion on how to find multiple solutions for PL functions or networks. Again, the most common techniques are outlined using clear examples. Piecewise Linear Modeling and Analysis is an indispensable guide for researchers and designers interested in network theory, network synthesis and network analysis.

Advanced Technologies for Security Applications - Proceedings of the NATO Science for Peace and Security 'Cluster Workshop... Advanced Technologies for Security Applications - Proceedings of the NATO Science for Peace and Security 'Cluster Workshop on Advanced Technologies', 17-18 September 2019, Leuven, Belgium (Hardcover, 1st ed. 2020)
Claudio Palestini
R4,387 Discovery Miles 43 870 Ships in 10 - 15 working days

Technology has been the spark that ignited NATO's interest and commitment to scientific advancement during its history. Since its creation, the Science for Peace and Security (SPS) Programme has been instrumental to NATO's commitment to innovation, science and technological advancement. During the years, SPS has demonstrated a flexible and versatile approach to practical scientific cooperation, and has promoted knowledge-sharing, building capacity, and projected stability outside NATO territory. The priorities addressed by the SPS Programme are aligned with NATO's strategic objectives, and aim to tackle emerging security challenges that require dynamic adaptation for the prevention and mitigation of risks. By addressing priorities such as advanced technologies, hybrid threats, and counter-terrorism, the Programme deals with new, contemporary challenges. On 17-18 September 2019, the SPS Programme gathered at the KU Leuven University a wide number of researchers from a selection of on-going and recently closed SPS projects in the field of security-related advanced technologies for a "Cluster Workshop on Advanced Technologies". The workshop covered, in particular, the following scientific domains: communication systems, advanced materials, sensors and detectors, and unmanned and autonomous systems. This book provides an overview on how these projects have contributed to the development of new technologies and innovative solutions and recommendations for future actions in the NATO SPS programme.

Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC 11 International Information Security Conference, SEC 2010,... Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, 2010 Ed.)
Kai Rannenberg, Vijay Varadharajan, Christian Weber
R1,563 Discovery Miles 15 630 Ships in 10 - 15 working days

These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 20-23. The call for papers went out with the challenging motto of "Security & Privacy Silver Linings in the Cloud" building a bridge between the long standing issues of security and privacy and the most recent developments in information and commu- cation technology. It attracted 102 submissions. All of them were evaluated on the basis of their significance, novelty, and technical quality by at least five member of the Program Committee. The Program Committee meeting was held electronically over a period of a week. Of the papers submitted, 25 were selected for presentation at the conference; the acceptance rate was therefore as low as 24. 5% making SEC 2010 a highly competitive forum. One of those 25 submissions could unfortunately not be included in the proceedings, as none of its authors registered in time to present the paper at the conference.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Networks on Chip
Axel Jantsch, Hannu Tenhunen Hardcover R4,647 Discovery Miles 46 470
Amazon Redshift Database Developer Guide
Documentation Team Hardcover R3,207 Discovery Miles 32 070
VHDL '92 - The New Features of the VHDL…
Jean-Michel Berge, Etc, … Hardcover R2,597 Discovery Miles 25 970
Ageing of Integrated Circuits - Causes…
Basel Halak Hardcover R3,135 Discovery Miles 31 350
The Future of Creative Work - Creativity…
Greg Hearn Hardcover R3,488 Discovery Miles 34 880
New Developments in Distributed…
Zielinski, Kurt Geihs, … Hardcover R5,773 Discovery Miles 57 730
Transforming Management Using Artificial…
Vikas Garg, Rashmi Agrawal Hardcover R5,068 Discovery Miles 50 680
Economics with Heterogeneous Interacting…
Alessandro Caiani, Alberto Russo, … Hardcover R4,184 Discovery Miles 41 840
The Next Era in Hardware Security - A…
Nikhil Rangarajan, Satwik Patnaik, … Hardcover R2,407 Discovery Miles 24 070
Dynamic Econometrics For Empirical…
Ragnar Nymoen Paperback R1,900 Discovery Miles 19 000

 

Partners