![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
In recent years, wireless networks have become more ubiquitous and integrated into everyday life. As such, it is increasingly imperative to research new methods to boost cost-effectiveness for spectrum and energy efficiency. Interference Mitigation and Energy Management in 5G Heterogeneous Cellular Networks is a pivotal reference source for the latest research on emerging network architectures and mitigation technology to enhance cellular network performance and dependency. Featuring extensive coverage across a range of relevant perspectives and topics, such as interference alignment, resource allocation, and high-speed mobile environments, this book is ideally designed for engineers, professionals, practitioners, upper-level students, and academics seeking current research on interference and energy management for 5G heterogeneous cellular networks. Topics Covered: Cognitive Radio Game Theory Green Technologies High-Speed Mobile Environments
The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.
The book provides complete coverage of fundamental IP networking in Java. It introduces the concepts behind TCP/IP and UDP and their intended use and purpose; gives complete coverage of Java networking APIs, includes an extended discussion of advanced server design, so that the various design principles and tradeoffs concerned are discussed and equips the reader with analytic queuing-theory tools to evaluate design alternatives; covers UDP multicasting, and covers multi-homed hosts, leading the reader to understand the extra programming steps and design considerations required in such environments. After reading this book the reader will have an advanced knowledge of fundamental network design and programming concepts in the Java language, enabling them to design and implement distributed applications with advanced features and to predict their performance. Special emphasis is given to the scalable I/O facilities of Java 1.4 as well as complete treatments of multi-homing and UDP both unicast and multicast.
Practically every crime now involves some aspect of digital evidence. This is the most recent volume in the Advances in Digital Forensics series. It describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. This book contains a selection of twenty-eight edited papers from the Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, held at Kyoto University, Kyoto, Japan in the spring of 2008.
The present textbook contains the recordsof a two-semester course on que- ing theory, including an introduction to matrix-analytic methods. This course comprises four hours oflectures and two hours of exercises per week andhas been taughtattheUniversity of Trier, Germany, for about ten years in - quence. The course is directed to last year undergraduate and?rst year gr- uate students of applied probability and computer science, who have already completed an introduction to probability theory. Its purpose is to present - terial that is close enough to concrete queueing models and their applications, while providing a sound mathematical foundation for the analysis of these. Thus the goal of the present book is two-fold. On the one hand, students who are mainly interested in applications easily feel bored by elaborate mathematical questions in the theory of stochastic processes. The presentation of the mathematical foundations in our courses is chosen to cover only the necessary results, which are needed for a solid foundation of the methods of queueing analysis. Further, students oriented - wards applications expect to have a justi?cation for their mathematical efforts in terms of immediate use in queueing analysis. This is the main reason why we have decided to introduce new mathematical concepts only when they will be used in the immediate sequel. On the other hand, students of applied probability do not want any heur- tic derivations just for the sake of yielding fast results for the model at hand.
Current middleware solutions, e.g., application servers and Web services, are very complex software products that are hard to tame because of intricacies of distributed systems. Their functionalities have mostly been developed and managed with the help of administration tools and corresponding configuration files, recently in XML. Though this constitutes flexibility for developing and administrating a distributed application, the conceptual model underlying the different configurations is only implicit. To remedy such problems, Semantic Management of Middleware contributes an ontology-based approach to support the development and administration of middleware-based applications. The ontology is an explicit conceptual model with formal logic-based semantics. Its descriptions may therefore be queried, may foresight required actions, or may be checked to avoid inconsistent system configurations. This book builds a rigorous approach towards giving the declarative descriptions of components and services a well-defined meaning by specifying ontological foundations and by showing how such foundations may be realized in practical, up-and-running systems.
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re levant problems from both research and practice in the areas of academia, busi ness, and government. IFIPTM 2008 is an open IFIP conference, which only accepts contributed pa pers, so all papers in these proceedings have passed strict peer review. The pro gram of the conference features both theoretical research papers and reports of real world case studies. IFIPTM 2008 received 62 submissions. The program commit tee selected 22 papers for presentation and inclusion in the proceedings. In addi tion, the program and the proceedings include 3 demo descriptions. The highlights of IFIPTM 2008 include invited talks and tutorials by industri al and academic experts in the fields of trust management, privacy and security, including Jon Bing and Michael Steiner.
This handy textbook covers all you will need to know to learn to
communicate using email and the internet.
The world is more digitally connected than ever before and, with this connectivity, comes vulnerability. This book will equip you with all the skills and insights you need to understand cyber security and kickstart a prosperous career. Confident Cyber Security is here to help. From the human side to the technical and physical implications, this book takes you through the fundamentals: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm. Featuring real-world case studies including Disney, the NHS, Taylor Swift and Frank Abagnale, this book is packed with clear explanations, sound advice and practical exercises to help you understand and apply the principles of cyber security. This new edition covers increasingly important topics such as deepfakes, AI and blockchain technology. About the Confident series... From coding and data science to cloud and cyber security, the Confident books are perfect for building your technical knowledge and enhancing your professional career.
This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on "Security and Privacy", "Software Engineering and Software Quality", "Platforms, Middleware and Integration", and "Social Aspects, Business Models and Standards". It thus provides a holistic view on technological, societal, and legal aspects, which are indispensable not only to ensure the security of cloud services and the data they process, but also to gain the trust of society, business, industry, and science in these services. The ultimate goal of the book, as well as of the Trusted Cloud Program in general, is to distribute these results to a broader audience in both academia and industry, and thus to help with the proliferation of "Industry 4.0" services.
This book focuses on the theory and application of interdependent networks. The contributors consider the influential networks including power and energy networks, transportation networks, and social networks. The first part of the book provides the next generation sustainability framework as well as a comprehensive introduction of smart cities with special emphasis on energy, communication, data analytics and transportation. The second part offers solutions to performance and security challenges of developing interdependent networks in terms of networked control systems, scalable computation platforms, and dynamic social networks. The third part examines the role of electric vehicles in the future of sustainable interdependent networks. The fourth and last part of this volume addresses the promises of control and management techniques for the future power grids.
The proposed title intends to provide a comprehensive view of emerging paradigms of computer science. The initial chapters will introduce various emerging paradigms and discuss research challenges related to them. Then some of the chapters will focus on the research solutions to address the identified challenges. The last few chapters will provide a discussion on future research directions.
ISO/IEC 27001:2022 - An introduction to information security and the ISMS standardThe perfect introduction to the principles of information security management and ISO 27001:2022An ideal resource for anyone wanting a clear, concise and easy-to-read primer on information security, this pocket guide will ensure the ISMS (information security management system) you put in place is effective, reliable and auditable. Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO/IEC 27001:2022 - An introduction to information security and the ISMS standard is an ideal primer for anyone implementing an ISMS aligned to ISO 27001:2022. This must-have resource gives a clear, concise and easy-to-read introduction to information security, providing guidance to ensure the management systems you put in place are effective, reliable and auditable. This pocket guide will help you to: Make informed decisions - Enables key employees to make better decisions before embarking on an information security project. Ensure everyone is up to speed - Gives the non-specialists on the project board and in the project team a clearer understanding of what an ISMS involves, reflecting ISO 27001:2022. Raise awareness among staff - Ensures that your staff know what is at stake with regard to information security and understand what is expected of them. Enhance your competitiveness - Gives you confidence to begin your ISO 27001:2022 implementation journey and let your customers know that the information you hold about them is managed and protected appropriately. Get up to speed with the ISO 27001:2022 updates and keep your information secure
This PSTV'94 Symposium is the fourteenth of a series of annual meetings organized under the auspices of IFIP W.G. 6.1, a Working Group dedicated to "Architectures and Protocols for Computer Networks." This is the oldest and most established symposium in the emerging field of protocol engineering which has spawn many international conferences including FORTE (International Conference on Formal Description Tech niques), IWPTS (International Workshop on Protocol Test Systems), ICNP (Interna tional Conference on Network Protocols) and CAY (Conference on Computer-Aided Verification). The main objective of this PSTV symposium is to provide a forum for researchers and practitioners in industry and academia interested in advances in using formal methods and methodologies to specify, develop, test and verify communication protocols and distributed systems. This year's PSTV symposium enjoys a nice mixture of formal methods and practical issues in network protocols through the invited addresses of three outstanding speakers, Ed Brinksma (University of Twente), Raj Jain (Ohio State University) and David Tennenhouse (MIT) as well as 5 tutorials, in addition to 9 techni cal sessions and two practical panel sessions. The 5 tutorials are offered on the first day in two parallel tracks for intensive exposure on hot topics of current interest. This year, out of 51 submissions the Program Committee selected 18 regular papers (with an allotment of 16 pages in the Proceedings) and 9 mini-papers (of 8 pages)."
This book provides a novel method for topic detection and classification in social networks. The book addresses several research and technical challenges that are currently being investigated by the research community, from the analysis of relations and communications between members of a community, to quality, authority, relevance and timeliness of the content, traffic prediction based on media consumption, spam detection, to security, privacy and protection of personal information. Furthermore, the book discusses innovative techniques to address those challenges and provides novel solutions based on information theory, sequence analysis and combinatorics, which are applied on real data obtained from Twitter.
This workshop proceedings introduces the latest innovations and trends in IP-based applications and satellite networking. It explains many aspects of advanced satellite networking systems, such as deployment of IPv6 over satellites, working with WLAN and WiMax, and rules concerning multi-segment networks. In addition, the book covers hot-button issues such as security, architecture improvement, resource allocation, video networking, and service integration.
The book examines patterns of participation in human rights treaties. International relations theory is divided on what motivates states to participate in treaties, specifically human rights treaties. Instead of examining the specific motivations, this dissertation examines patterns of participation. In doing so, it attempts to match theoretical expectations of state behavior with participation. The conclusion of this study is that the data suggests there are multiple motivations that lead states to participate in human rights treaties. The book is divided into five substantive chapters. After an introduction, the second chapter examines the literature on why states join treaties in general, and human rights treaties in particular. The third chapter reviews the obligations states commit to under the fifteen treaties under consideration. The fourth chapter uses basic quantitative methods to examine any differences in the participation rates between democratic and non-democratic states. The fifth chapter examines reservations, declarations, and objections made in conjuncture with the fifteen treaties. The chapter employs both quantitative and qualitative methods to determine if there are substantial differences between democratic and non-democratic states. Finally, the sixth chapter examines those states that participate in the most human rights treaties to determine if there are characteristics that help to identify these states. Additionally, the chapter examines and evaluates theoretical predictions about participation.
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory, together with a wealth of applications. It presents the peer-reviewed proceedings of the VII International Conference on Complex Networks and their Applications (COMPLEX NETWORKS 2018), which was held in Cambridge on December 11-13, 2018. The carefully selected papers cover a wide range of theoretical topics such as network models and measures; community structure and network dynamics; diffusion, epidemics and spreading processes; and resilience and control; as well as all the main network applications, including social and political networks; networks in finance and economics; biological and neuroscience networks; and technological networks.
Computer vision is becoming increasingly important in several industrial applications such as automated inspection, robotic manipulations and autonomous vehicle guidance. These tasks are performed in a 3-D world and it is imperative to gather reliable information on the 3-D structure of the scene. This book is about passive techniques for depth recovery, where the scene is illuminated only by natural light as opposed to active methods where a special lighting device is used for scene illumination. Passive methods have a wider range of applicability and also correspond to the way humans infer 3-D structure from visual images.
Asynchronous Transfer Mode (ATM) networks are widely considered to be the new generation of high speed communication systems both for broadband public information highways and for local and wide area private networks. ATM is designed to integrate existing and future voice, audio, image and data services. Moreover, ATM aims to simplify the complexity of switching and buffer management, to optimise intermediate node processing and buffering and to limit transmission delays. However, to support such diverse services on one integrated communication network, it is most essential, through careful engineering, to achieve a fruitful balance amongst the conflicting requirements of different quality of service constraints ensuring that one service does not have adverse implications on another. Over recent years there has been a great deal of progress in research and development of ATM technology, but there are still many interesting and important problems to be resolved such as traffic characterisation and control, routing and optimisation, ATM switching techniques and the provision of quality of service. This book presents thirty-two research papers, both from industry and academia, reflecting latest original achievements in the theory and practice of performance modelling of ATM networks worldwide. These papers were selected, subject to peer review, from those submitted as extended and revised versions out of fifty-nine shorter papers presented at the Second IFIP Workshop on "Performance Modelling and Evaluation of ATM Networks" July 4-7, 1994, Bradford University. At least three referees from the scientific committee and externally were involved in the selection of each paper.
* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats
This book focuses on the design and testing of large-scale, distributed signal processing systems, with a special emphasis on systems architecture, tooling and best practices. Architecture modeling, model checking, model-based evaluation and model-based design optimization occupy central roles. Target systems with resource constraints on processing, communication or energy supply require non-trivial methodologies to model their non-functional requirements, such as timeliness, robustness, lifetime and "evolution" capacity. Besides the theoretical foundations of the methodology, an engineering process and toolchain are described. Real-world cases illustrate the theory and practice tested by the authors in the course of the European project ARTEMIS DEMANES. The book can be used as a "cookbook" for designers and practitioners working with complex embedded systems like sensor networks for the structural integrity monitoring of steel bridges, and distributed micro-climate control systems for greenhouses and smart homes.
The term risk is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist. In this book, Lund, Solhaug and Stolen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a model-driven method for defensive risk analysis featuring a tool-supported modelling language specially designed to model risks. Their book serves as an introduction to risk analysis in general, including the central concepts and notions in risk analysis and their relations. The authors' aim is to support risk analysts in conducting structured and stepwise risk analysis. To this end, the book is divided into three main parts. Part I of the book introduces and demonstrates the central concepts and notation used in CORAS, and is largely example-driven. Part II gives a thorough description of the CORAS method and modelling language. After having completed this part of the book, the reader should know enough to use the method in practice. Finally, Part III addresses issues that require special attention and treatment, but still are often encountered in real-life risk analysis and for which CORAS offers helpful advice and assistance. This part also includes a short presentation of the CORAS tool support. The main target groups of the book are IT practitioners and students at graduate or undergraduate level. They will appreciate a concise introduction into the emerging field of risk analysis, supported by a sound methodology, and completed with numerous examples and detailed guidelines.
Autonomous driving is an emerging field. Vehicles are equipped with different systems such as radar, lidar, GPS etc. that enable the vehicle to make decisions and navigate without user's input, but there are still concerns regarding safety and security. This book analyses the security needs and solutions which are beneficial to autonomous driving.
Covers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by most other books about IPv6 do not reflect this important fact. Highlights Teredo, a transistion tool that permits web sites using two different protocols to interact, with complete-chapter coverage.. Since popular applications such as web service can not be operated without DNS. Chapter 9 covers modifications in DNS for IPv6 which other books rarely cover. Other topics covered that make it a most up-to-date and valuable resource: hierarchical mobility management, fast handoff, and security features such as VPN traversal and firewall traversal. |
You may like...
CCNA 200-301 Network Simulator
Sean Wilkins
Digital product license key
R2,877
Discovery Miles 28 770
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders
Paperback
R1,469
Discovery Miles 14 690
E-Learning and Digital Education in the…
M. Mahruf C. Shohel
Hardcover
R3,584
Discovery Miles 35 840
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao
Paperback
|