![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
Network Security first-stepSecond Edition Tom Thomas and Donald Stoddard Your first step into the world of network security
Company network administrators are compelled today to aggressively pursue a robust network security regime. This book aims to give the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view the company 's security and will thus be better equipped to act in a way that forwards the company 's goals.
This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications. Green Computing in Network Security: Energy Efficient Solutions for Business and Home includes analysis of green-security mechanisms and explores the role of green computing for secured modern internet applications. It discusses green computing-based distributed learning approaches for security and emphasizes the development of green computing-based security systems for IoT devices. Written with researchers, academic libraries, and professionals in mind so they can get up to speed on network security, the challenges, and implementation processes.
Although sophisticated wireless radio technologies make it possible for unlicensed wireless devices to take advantage of un-used broadcast TV spectra, those looking to advance the field have lacked a book that covers cognitive radio in TV white spaces (TVWS). Filling this need, TV White Space Spectrum Technologies: Regulations, Standards and Applications explains how white space technology can be used to enable the additional spectrum access that is so badly needed. Providing a comprehensive overview and analysis of the topics related to TVWS, this forward-looking reference contains contributions from key industry players, standards developers, and researchers from around the world in TV white space, dynamic spectrum access, and cognitive radio fields. It supplies an extensive survey of new technologies, applications, regulations, and open research areas in TVWS. The book is organized in four parts: Regulations and Profiles-Covers regulations, spectrum policies, channelization, and system requirements Standards-Examines TVWS standards efforts in different standard-developing organizations, with emphasis on the IEEE 802.22 wireless network standard Coexistence-Presents coexistence techniques between all potential TVWS standards, technologies, devices, and service providers, with emphasis on the Federal Communications Commission's (FCC) recent regulations and policies, and IEEE 802.19 coexistence study group efforts Important Aspects-Considers spectrum allocation, use cases, and security issues in the TVWS network This complete reference includes coverage of system requirements, collaborative sensing, spectrum sharing, privacy, and interoperability. Suggesting a number of applications that can be deployed to provide new services to users, including broadband Internet applications, the book highlights potential business opportunities and addresses the deployment challenges that are likely to arise.
The main purpose of this paper is to contribute to the discussion about the design of computer and communication systems that can aid the management process. 1.1 Historical Overview We propose that Decision Support System can be considered as a design conception conceived within the computer industry to facilitate the use of computer technology in organisations (Keen, 1991). This framework, built during the late 1970s, offers computer and communication technology as support to the decision process which constitutes, in this view, the core of the management process. The DSS framework offers the following capabilities: * Access: ease of use, wide variety of data, analysis and modelling capacity. * Technological: software gel)eration tools. * Development modes: interactive and evolutionary. Within this perspective, computer and communication technologies are seen as an amplification of the human data processing capabilities which limit the decision process. Thus, the human being is understood metaphorically as a data processing machine. Mental processes are associated with the manipulation of symbols aOO human communication to signal transmission.
As the advancement of technology continues, cyber security continues to play a significant role in today's world. With society becoming more dependent on the internet, new opportunities for virtual attacks can lead to the exposure of critical information. Machine and deep learning techniques to prevent this exposure of information are being applied to address mounting concerns in computer security. The Handbook of Research on Machine and Deep Learning Applications for Cyber Security is a pivotal reference source that provides vital research on the application of machine learning techniques for network security research. While highlighting topics such as web security, malware detection, and secure information sharing, this publication explores recent research findings in the area of electronic security as well as challenges and countermeasures in cyber security research. It is ideally designed for software engineers, IT specialists, cybersecurity analysts, industrial experts, academicians, researchers, and post-graduate students.
Emphasizing leadership principles and practices, Antipatterns: Managing Software Organizations and People, Second Edition catalogs 49 business practices that are often precursors to failure. This updated edition of a bestseller not only illustrates bad management approaches, but also covers the bad work environments and cultural traits commonly found in IT, software development, and other business domains. For each antipattern, it describes the situation and symptoms, gives examples, and offers a refactoring solution. The authors, graduate faculty at Penn State University, avoid an overly scholarly style and infuse the text with entertaining sidebars, cartoons, stories, and jokes. They provide names for the antipatterns that are visual, humorous, and memorable. Using real-world anecdotes, they illustrate key concepts in an engaging manner. This updated edition sheds light on new management and environmental antipattems and includes a new chapter, six updated chapters, and new discussion questions. Topics covered include leadership principles, environmental antipatterns, group patterns, management antipatterns, and team leadership. Following introductory material on management theory and human behavior, the text catalogs the full range of management, cultural, and environmental antipatterns. It includes thought-provoking exercises that each describe a situation, ask which antipatterns are present, and explain how to refactor the situation. It provides time-tested advice to help you overcome bad practices through successful interaction with your clients, customers, peers, supervisors, and subordinates.
QoS Enhancements and the New Transport Services; A. Danthine, et al. Performance Evaluation and Monitoring of Heterogenous Networks; J. Neuman, et al. Application of High Speed Networks in Hospital Environment; J.R. Rao. On Allocation Schemes for the Interconnection of LANs and Multimedia Sources over Broadband Networks; M. Mateescu. A Superposition of Bursty Sources in a LAN Interconnection Environment; J.M. Karlsson. Interconnecting LANs for Real Time Traffic Application; I. Chlamtac. An Analytical Model for ATM Based Networks which Utilize LookAhead Contention Resolution Switching; J.V. Luciani, C.Y. Roger Chen. Transient Analysis of Nonhomogenous Continuous Time Markov Chains Describing Realistic LAN Systems; A. Rindos, et al. Closed Queueing Network Modeling for End-to-End Performance Analysis of ISO LLC Transport Protocols over Bridged Networks; T. Ikegawa. A Preview of APPN High Performance Routing; J.P. Gray, M.L. Peters. 12 additional articles. Index.
Both authors have taught the course of "Distributed Systems" for many years in the respective schools. During the teaching, we feel strongly that "Distributed systems" have evolved from traditional "LAN" based distributed systems towards "Internet based" systems. Although there exist many excellent textbooks on this topic, because of the fast development of distributed systems and network programming/protocols, we have difficulty in finding an appropriate textbook for the course of "distributed systems" with orientation to the requirement of the undergraduate level study for today's distributed technology. Specifically, from - to-date concepts, algorithms, and models to implementations for both distributed system designs and application programming. Thus the philosophy behind this book is to integrate the concepts, algorithm designs and implementations of distributed systems based on network programming. After using several materials of other textbooks and research books, we found that many texts treat the distributed systems with separation of concepts, algorithm design and network programming and it is very difficult for students to map the concepts of distributed systems to the algorithm design, prototyping and implementations. This book intends to enable readers, especially postgraduates and senior undergraduate level, to study up-to-date concepts, algorithms and network programming skills for building modern distributed systems. It enables students not only to master the concepts of distributed network system but also to readily use the material introduced into implementation practices.
Small and medium-sized enterprises (SMEs) are recognized as the backbone of today's world economy. However, SMEs are well known for having limitations and acceptance barriers in adopting new technology even though the internet and communications channel's revolution has changed the way people conduct business today. Further, the COVID-19 pandemic has disturbed the operations of SMEs and increased the burden on social media application globally. It is essential that SMEs utilize social media to strengthen their performance. Strengthening SME Performance Through Social Media Adoption and Usage explores experiences in different technological, managerial, organizational, and entrepreneurial environmental issues. It focuses on different conceptions of factors and consequences influencing social media usage and SME performance. Covering topics such as corporate social responsibility, marketing frameworks, and social media adoption, this premier reference source is a valuable resource for entrepreneurs, business leaders and managers, human resource managers, marketers, consultants, students and educators of higher education, librarians, researchers, and academicians.
This book describes the emerging practice of e-mail tutoring; one-to-one correspondence between college students and writing tutors conducted over electronic mail. It reviews the history of Composition Studies, paying special attention to those ways in which writing centers and computers and composition have been previously hailed within a narrative of functional literacy and quick-fix solutions. The author suggests a new methodology for tutoring, and a new mandate for the writing center: a strong connection between the rhythms of extended, asynchronous writing and dialogic literacy. The electronic writing center can become a site for informed resistance to functional literacy.
Secure and Resilient Software: Requirements, Test Cases, and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements for improved information assurance. This resource-rich book includes:
Offering ground-level, already-developed software nonfunctional requirements and corresponding test cases and methods, this book will help to ensure that your software meets its nonfunctional requirements for security and resilience. The accompanying CD filled with helpful checklists and reusable documentation provides you with the tools needed to integrate security into the requirements analysis, design, and testing phases of your software development lifecycle. Some Praise for the Book: This book pulls together the state of the art in thinking about
this important issue in a holistic way with several examples. It
takes you through the entire lifecycle from conception to
implementation ... . ...provides the reader with the tools necessary to jump-start
and mature security within the software development lifecycle
(SDLC).
Formal Methods for Protocol Engineering and Distributed Systems addresses formal description techniques (FDTs) applicable to distributed systems and communication protocols. It aims to present the state of the art in theory, application, tools an industrialization of FDTs. Among the important features presented are: FDT-based system and protocol engineering; FDT application to distributed systems; Protocol engineeering; Practical experience and case studies. Formal Methods for Protocol Engineering and Distributed Systems contains the proceedings of the Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols and Protocol Specification, Testing, and Verification, which was sponsored by the International Federation for Information Processing (IFIP) and was held in Beijing, China, in October 1999. This volume is suitable as a secondary text for a graduate level course on Distributed Systems or Communications, and as a reference for researchers and industry practitioners.
This book provides unique insight into the use of intranets and extranets. Corporate intranets and the use of internet technology are relatively recent phenomena and the development of these technologies is now fuelling the most significant changes in corporate infrastructure since the development of the PC. The impact is likely to be even greater and is heralding radical changes in the way organizations operate.
"The book provides an introduction to optimization theory and its applications. It is written for senior under-graduate students and first-year graduate students of telecommunication and related fields. Most applications pertain to communication and network problems. Optimization theory involves a great deal of mathematics. The book has practical examples to accompany rigorous discussion so that the reader may develop intuitive understanding on relevant concepts. The materials have been developed from course notes. By attempting to cover convex, linear, and integer optimization for a one-semester course, the author focuses on fundamental concepts and techniques rather than trying to be comprehensive. Infact, the book is written with the main intention to serve as a bridge for students with no prior background in optimization to be able to access more advanced books on the subject later on. "--
We arehappy to welcome you to the IFIP Protocols for High-Speed Networks '96 workshop hosted by INRIA Sophia Antipolis. This is the fifth event in a series initiated in Zurich in 1989 followed by Palo Alto (1990), Stockholm (1993), and Vancouver (1994). This workshop provides an international forum for the exchange of information on protocols for high-speed networks. The workshop focus on problems related to the e: fficient transmission of multimedia application data using high-speed networks and internetworks. Protocol for High-Speed Networks is a "working conference." That explains we have privileged high quality papers describing on-going research and novel ideas. The number of selected papers was kept low in order to leave room for discussion on each paper. Together with the technical sessions, working sessions were organized on hot topics. We would like to thank all the authors for their interest. We also thank the Program Committee members for the Ievel of effort in the reviewing process and in the workshop technical program organization. We finally thank INRIA and DRET for their financial support to the organization of the workshop.
Teleservice is a common concept for distributed application services related to the use of telecommunication equipment, PCs, workstations and mainframes. Teleservices represent a diversity of applications related to various user and vendor cultures such as traditional telecommunications services, E-mail services, cooperative work, applications, multimedia applications, mobile services and intelligent network services. The complexity and diversity of teleservices are increasing, but of greater importance is the change in the way in which teleservices are designed, delivered and maintained. Information Network and Data Communications captures the cultural as well as the technical variety of teleservice.
This book provides a coherent overview of the most important modelling-related security techniques available today, and demonstrates how to combine them. Further, it describes an integrated set of systematic practices that can be used to achieve increased security for software from the outset, and combines practical ways of working with practical ways of distilling, managing, and making security knowledge operational. The book addresses three main topics: (1) security requirements engineering, including security risk management, major activities, asset identification, security risk analysis and defining security requirements; (2) secure software system modelling, including modelling of context and protected assets, security risks, and decisions regarding security risk treatment using various modelling languages; and (3) secure system development, including effective approaches, pattern-driven development, and model-driven security. The primary target audience of this book is graduate students studying cyber security, software engineering and system security engineering. The book will also benefit practitioners interested in learning about the need to consider the decisions behind secure software systems. Overall it offers the ideal basis for educating future generations of security experts.
The complexity of the UMTS system, new WCDMA technology, and new technical features set new requirements for the radio network planning area. The WCDMA-based UMTS networks need also more advanced and careful radio planning, optimization, and QOS management tasks in order to guarantee seamless mobility and connectivity for the end-user when various voice and data services are used. Hence, new detailed and practical radio planning, optimization, and QOS Management guidelines must be defined through the UMTS planning process. UMTS Radio Network Planning, Optimization and QOS Management describes practical planning process and gives solutions for detailed planning actions by following the planning process. The role of radio planning tool environment is emphasized by specifying the requirements of the digital map production, design tool, field measurement tool, and QOS measurement tool and by giving several examples of the results of these topics. efficient UMTS planning and optimization tool environment and to carry out a practical UMTS planning and optimization project from configuration planning to field and QOS measurements.
This book gathers the outcomes of the 18th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2019), which was held on June 12-14, 2019 in Beijing, China. The aim of the conference was to bring together researchers and scientists, businesspeople and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Further, they presented research results on all aspects (theory, applications and tools) of computer and information science, and discussed the practical challenges encountered in their work and the solutions they adopted to overcome them. The book highlights the best papers from those accepted for presentation at the conference. They were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round, 15 of the conference's most promising papers were selected for this Springer (SCI) book and not the conference proceedings. We eagerly await the important contributions that we know these authors will make to the field of computer and information science. |
You may like...
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, …
Hardcover
R5,931
Discovery Miles 59 310
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao
Paperback
|