![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
This book presents the leading edge in several related fields, specifically object orientated programming, open distributed systems and formal methods for object oriented systems. With increased support within industry regarding these areas, this book captures the most up-to-date information on the subject. Many topics are discussed, including the following important areas: object oriented design and programming; formal specification of distributed systems; open distributed platforms; types, interfaces and behaviour; formalisation of object oriented methods.
This textbook was inspired by an undergraduate elective course given on virtual organizations and technology. The instructor could not find a suitable text that covered both the organizational and technological aspects including examples based on today's industry. Other books were either too strategic or too technical for an audience of undergraduate business and technology students who were to use the book. But why was that the case? For the same reason that business and IT people in industry tended not to speak the same "language": indeed, the integration of technology into business strategy has been a recent occurrence, and traditional strategy issues have been decided too high in the organizational structure while technology was too detailed in tactical implementation. With the Internet and the advent of e-commerce, m-commerce, and c-commerce (and the other letters of the alphabet soon to follow), business and technology finally started to become closer, and the interest in technology as an enabler for strategic business decision-making evolved into a mainstream concept. How are we defining a virtual organization? Most definitions of the concept of virtual organizations start with stating that it is "a network between organisations or individuals . . . ". The Oxford Concise Dictionary defines 'virtual' as: "that is such/or practical purposes, though not in name or according to a strict definition. " An organization may be thought of as a number of individuals systematically united for some end or work.
This book, written by leading experts from academia and industry, offers a condensed overview on hot topics among the Cognitive Radios and Networks scientific and industrial communities (including those considered within the framework of the European COST Action IC0902) and presents exciting visions for the future. Examples of the subjects considered include the design of new filter bank-based air interfaces for spectrum sharing, medium access control design protocols, the design of cloud-based radio access networks, an evolutionary vision for the development and deployment of cognitive TCP/IP, and regulations relevant to the development of a spectrum sharing market. The concluding chapter comprises a practical, hands-on tutorial for those interested in developing their own research test beds. By focusing on the most recent advances and future avenues, this book will assist researchers in understanding the current issues and solutions in Cognitive Radios and Networks designs.
Software Networks describe new concepts for the Internet s next generation. This architecture is based on virtual networking using Cloud and datacenter facilities. The main problems to be dealt with are the placement of virtual resources for opening a new network on the fly, and the urbanization of virtual resources implemented on physical network equipment. The digital architecture also deals with mechanisms capable of automatically controlling the placement of all virtual resources within the physical network. This book describes how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of virtual resource (e.g. switches, routers, LSRs, optical paths, firewalls, SIP-based servers, devices, servers, access points, etc.). Software Networks shows how this architecture is compatible with new advances in SDN (Software Defined Networking), new high-speed transport protocols such as TRILL (Transparent Interconnection of Lots of Links) and LISP (Locator/Identifier Separation Protocol), NGN, IMS, new generation Wi-Fi, and 4G/5G networks. Finally, the author introduces Clouds of security and the virtualization of secure elements (smartcards) that could certainly transform how to secure the Internet. For this second edition, the author addresses in five new chapters the importance of open source software for networks, mobile edge computing, fog networking, tactile internet - a network environment allowing remote access, and security - the use of Cloud of security, secure elements and the emergence of the blockchain.
Welcome to IWQOS'97 in New York City! Over the past several years, there has been a considerable amount of research within the field of Quality of Service (QOS). Much of that work has taken place within the context of QOS support for distributed multimedia systems, operating systems, transport subsystems, networks, devices and formal languages. The objective of the Fifth International Workshop on Quality of Service (IWQOS) is to bring together researchers, developers and practitioners working in all facets of QOS research. While many workshops and conferences offer technical sessions on the topic QOS, none other than IWQOS, provide a single-track workshop dedicated to QOS research. The theme of IWQOS'97 is building QOS into distributed systems. Implicit in that theme is the notion that the QOS community should now focus on discussing results from actual implementations of their work. As QOS research moves from theory to practice, we are interested in gauging the impact of ideas discussed at previous workshops on development of actual systems. While we are interested in experimental results, IWQOS remains a forum for fresh and innovative ideas emerging in the field. As a result of this, authors were solicited to provide experimental research (long) papers and more speculative position (short) statements for consideration. We think we have a great invited and technical program lined up for you this year. The program reflects the Program Committees desire to hear about experiment results, controversial QOS subjects and retrospectives on where we are and where we are going.
Queueing is an aspect of modern life that we encounter at every step in our daily activities. Whether it happens at the checkout counter in the supermarket or in accessing the Internet, the basic phenomenon of queueing arises whenever a shared facility needs to be accessed for service by a ]arge number of jobs or customers. The study of queueing is important as it gravides both a theoretical background to the kind of service that we may expect from such a facility and the way in which the facility itself may be designed to provide some specified grade of service to its customers. Our study of queueing was basically motivated by its use in the study of communication systems and computer networks. The various computers, routers and switches in such a network may be modelled as individual queues. The whole system may itself be modelled as a queueing network providing the required service to the messages, packets or cells that need to be carried. Application of queueing theory provides the theoretical framework for the design and study of such networks. The purpose of this book is to support a course on queueing systems at the senior undergraduate or graduate Ievels. Such a course would then provide the theoretical background on which a subsequent course on the performance modeHing and analysis of computer networks may be based.
It is important to understand what came before and how to meld new products with legacy systems. Network managers need to understand the context and origins of the systems they are using. Programmers need an understanding of the reasons behind the interfaces they must satisfy and the relationship of the software they build to the whole network. And finally, sales representatives need to see the context into which their products must fit.
Network calculus is a theory dealing with queuing systems found in computer networks. Its focus is on performance guarantees. Central to the theory is the use of alternate algebras such as the min-plus algebra to transform complex network systems into analytically tractable systems. To simplify the ana- sis, another idea is to characterize tra?c and service processes using various bounds. Since its introduction in the early 1990s, network calculus has dev- oped along two tracks-deterministic and stochastic. This book is devoted to summarizing results for stochastic network calculus that can be employed in the design of computer networks to provide stochastic service guarantees. Overview and Goal Like conventional queuing theory, stochastic network calculus is based on properly de?ned tra?c models and service models. However, while in c- ventional queuing theory an arrival process is typically characterized by the inter-arrival times of customers and a service process by the service times of customers, the arrival process and the service process are modeled in n- work calculus respectively by some arrival curve that (maybe probabilis- cally) upper-bounds the cumulative arrival and by some service curve that (maybe probabilistically) lower-bounds the cumulative service. The idea of usingboundstocharacterizetra?candservicewasinitiallyintroducedfor- terministic network calculus. It has also been extended to stochastic network calculus by exploiting the stochastic nature of arrival and service processes.
With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.
The IT Security Governance Guidebook with Security Program Metrics provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying downloadable resources offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model provided in the text, allowing an enterprise to measure its overall information protection program.
In recent years, wireless networks have become more ubiquitous and integrated into everyday life. As such, it is increasingly imperative to research new methods to boost cost-effectiveness for spectrum and energy efficiency. Interference Mitigation and Energy Management in 5G Heterogeneous Cellular Networks is a pivotal reference source for the latest research on emerging network architectures and mitigation technology to enhance cellular network performance and dependency. Featuring extensive coverage across a range of relevant perspectives and topics, such as interference alignment, resource allocation, and high-speed mobile environments, this book is ideally designed for engineers, professionals, practitioners, upper-level students, and academics seeking current research on interference and energy management for 5G heterogeneous cellular networks. Topics Covered: Cognitive Radio Game Theory Green Technologies High-Speed Mobile Environments
This text, intended for a first course in performance evaluation, provides a self-contained treatment of all aspects of queueing theory. It starts by introducing readers to the terminology and usefulness of queueing theory and continues by considering Markovian queues in equilibrium, Little's law, reversibility, transient analysis and computation, and the M/G/1 queueing system. Subsequent chapters treat the theory of networks of queues and computational algorithms for networks of queues. Stochastic Petri networks, including those whose solutions can be given in product form, are covered in detail. A chapter on discrete-time queueing systems, which are of recent interest, discusses arrival processes, Geom/Geom/m queueing models, and case studies of discrete-time queueing networks arising in industrial applications. This third edition includes a new chapter on current models of network traffic as well as sixteen new homework problems on discrete-time models and a revised and updated set of references. The discussion of network traffic models includes a survey of continuous and discrete time models, a detailed discussion of burstiness, a complete introduction to self-similar traffic and a presentation of solution techniques. Solutions for all of the homework problems in this text are available in a separate volume.
The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.
The book provides complete coverage of fundamental IP networking in Java. It introduces the concepts behind TCP/IP and UDP and their intended use and purpose; gives complete coverage of Java networking APIs, includes an extended discussion of advanced server design, so that the various design principles and tradeoffs concerned are discussed and equips the reader with analytic queuing-theory tools to evaluate design alternatives; covers UDP multicasting, and covers multi-homed hosts, leading the reader to understand the extra programming steps and design considerations required in such environments. After reading this book the reader will have an advanced knowledge of fundamental network design and programming concepts in the Java language, enabling them to design and implement distributed applications with advanced features and to predict their performance. Special emphasis is given to the scalable I/O facilities of Java 1.4 as well as complete treatments of multi-homing and UDP both unicast and multicast.
Practically every crime now involves some aspect of digital evidence. This is the most recent volume in the Advances in Digital Forensics series. It describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. This book contains a selection of twenty-eight edited papers from the Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, held at Kyoto University, Kyoto, Japan in the spring of 2008.
The present textbook contains the recordsof a two-semester course on que- ing theory, including an introduction to matrix-analytic methods. This course comprises four hours oflectures and two hours of exercises per week andhas been taughtattheUniversity of Trier, Germany, for about ten years in - quence. The course is directed to last year undergraduate and?rst year gr- uate students of applied probability and computer science, who have already completed an introduction to probability theory. Its purpose is to present - terial that is close enough to concrete queueing models and their applications, while providing a sound mathematical foundation for the analysis of these. Thus the goal of the present book is two-fold. On the one hand, students who are mainly interested in applications easily feel bored by elaborate mathematical questions in the theory of stochastic processes. The presentation of the mathematical foundations in our courses is chosen to cover only the necessary results, which are needed for a solid foundation of the methods of queueing analysis. Further, students oriented - wards applications expect to have a justi?cation for their mathematical efforts in terms of immediate use in queueing analysis. This is the main reason why we have decided to introduce new mathematical concepts only when they will be used in the immediate sequel. On the other hand, students of applied probability do not want any heur- tic derivations just for the sake of yielding fast results for the model at hand.
Current middleware solutions, e.g., application servers and Web services, are very complex software products that are hard to tame because of intricacies of distributed systems. Their functionalities have mostly been developed and managed with the help of administration tools and corresponding configuration files, recently in XML. Though this constitutes flexibility for developing and administrating a distributed application, the conceptual model underlying the different configurations is only implicit. To remedy such problems, Semantic Management of Middleware contributes an ontology-based approach to support the development and administration of middleware-based applications. The ontology is an explicit conceptual model with formal logic-based semantics. Its descriptions may therefore be queried, may foresight required actions, or may be checked to avoid inconsistent system configurations. This book builds a rigorous approach towards giving the declarative descriptions of components and services a well-defined meaning by specifying ontological foundations and by showing how such foundations may be realized in practical, up-and-running systems.
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re levant problems from both research and practice in the areas of academia, busi ness, and government. IFIPTM 2008 is an open IFIP conference, which only accepts contributed pa pers, so all papers in these proceedings have passed strict peer review. The pro gram of the conference features both theoretical research papers and reports of real world case studies. IFIPTM 2008 received 62 submissions. The program commit tee selected 22 papers for presentation and inclusion in the proceedings. In addi tion, the program and the proceedings include 3 demo descriptions. The highlights of IFIPTM 2008 include invited talks and tutorials by industri al and academic experts in the fields of trust management, privacy and security, including Jon Bing and Michael Steiner.
Over the past year there has been a shift within the computer
security world away from passive, reactive defense towards more
aggressive, proactive countermeasures. Although such tactics are
extremely controversial, many security professionals are reaching
into the dark side of their tool box to identify, target, and
suppress their adversaries. This book will provide a detailed
analysis of the most timely and dangerous attack vectors targeted
at operating systems, applications, and critical infrastructure and
the cutting-edge counter-measures used to nullify the actions of an
attacking, criminal hacker.
The world is more digitally connected than ever before and, with this connectivity, comes vulnerability. This book will equip you with all the skills and insights you need to understand cyber security and kickstart a prosperous career. Confident Cyber Security is here to help. From the human side to the technical and physical implications, this book takes you through the fundamentals: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm. Featuring real-world case studies including Disney, the NHS, Taylor Swift and Frank Abagnale, this book is packed with clear explanations, sound advice and practical exercises to help you understand and apply the principles of cyber security. This new edition covers increasingly important topics such as deepfakes, AI and blockchain technology. About the Confident series... From coding and data science to cloud and cyber security, the Confident books are perfect for building your technical knowledge and enhancing your professional career.
This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on "Security and Privacy", "Software Engineering and Software Quality", "Platforms, Middleware and Integration", and "Social Aspects, Business Models and Standards". It thus provides a holistic view on technological, societal, and legal aspects, which are indispensable not only to ensure the security of cloud services and the data they process, but also to gain the trust of society, business, industry, and science in these services. The ultimate goal of the book, as well as of the Trusted Cloud Program in general, is to distribute these results to a broader audience in both academia and industry, and thus to help with the proliferation of "Industry 4.0" services.
This book focuses on the theory and application of interdependent networks. The contributors consider the influential networks including power and energy networks, transportation networks, and social networks. The first part of the book provides the next generation sustainability framework as well as a comprehensive introduction of smart cities with special emphasis on energy, communication, data analytics and transportation. The second part offers solutions to performance and security challenges of developing interdependent networks in terms of networked control systems, scalable computation platforms, and dynamic social networks. The third part examines the role of electric vehicles in the future of sustainable interdependent networks. The fourth and last part of this volume addresses the promises of control and management techniques for the future power grids.
ISO/IEC 27001:2022 - An introduction to information security and the ISMS standardThe perfect introduction to the principles of information security management and ISO 27001:2022An ideal resource for anyone wanting a clear, concise and easy-to-read primer on information security, this pocket guide will ensure the ISMS (information security management system) you put in place is effective, reliable and auditable. Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO/IEC 27001:2022 - An introduction to information security and the ISMS standard is an ideal primer for anyone implementing an ISMS aligned to ISO 27001:2022. This must-have resource gives a clear, concise and easy-to-read introduction to information security, providing guidance to ensure the management systems you put in place are effective, reliable and auditable. This pocket guide will help you to: Make informed decisions - Enables key employees to make better decisions before embarking on an information security project. Ensure everyone is up to speed - Gives the non-specialists on the project board and in the project team a clearer understanding of what an ISMS involves, reflecting ISO 27001:2022. Raise awareness among staff - Ensures that your staff know what is at stake with regard to information security and understand what is expected of them. Enhance your competitiveness - Gives you confidence to begin your ISO 27001:2022 implementation journey and let your customers know that the information you hold about them is managed and protected appropriately. Get up to speed with the ISO 27001:2022 updates and keep your information secure
This PSTV'94 Symposium is the fourteenth of a series of annual meetings organized under the auspices of IFIP W.G. 6.1, a Working Group dedicated to "Architectures and Protocols for Computer Networks." This is the oldest and most established symposium in the emerging field of protocol engineering which has spawn many international conferences including FORTE (International Conference on Formal Description Tech niques), IWPTS (International Workshop on Protocol Test Systems), ICNP (Interna tional Conference on Network Protocols) and CAY (Conference on Computer-Aided Verification). The main objective of this PSTV symposium is to provide a forum for researchers and practitioners in industry and academia interested in advances in using formal methods and methodologies to specify, develop, test and verify communication protocols and distributed systems. This year's PSTV symposium enjoys a nice mixture of formal methods and practical issues in network protocols through the invited addresses of three outstanding speakers, Ed Brinksma (University of Twente), Raj Jain (Ohio State University) and David Tennenhouse (MIT) as well as 5 tutorials, in addition to 9 techni cal sessions and two practical panel sessions. The 5 tutorials are offered on the first day in two parallel tracks for intensive exposure on hot topics of current interest. This year, out of 51 submissions the Program Committee selected 18 regular papers (with an allotment of 16 pages in the Proceedings) and 9 mini-papers (of 8 pages)."
This book provides a novel method for topic detection and classification in social networks. The book addresses several research and technical challenges that are currently being investigated by the research community, from the analysis of relations and communications between members of a community, to quality, authority, relevance and timeliness of the content, traffic prediction based on media consumption, spam detection, to security, privacy and protection of personal information. Furthermore, the book discusses innovative techniques to address those challenges and provides novel solutions based on information theory, sequence analysis and combinatorics, which are applied on real data obtained from Twitter. |
You may like...
Negotiating Hostage Crises with the New…
Adam Dolnik, Keith M. Fitzgerald
Hardcover
Perry The Inventor's(R) World's Best…
Perry The Inventor !!!
Hardcover
|