0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (288)
  • R250 - R500 (831)
  • R500+ (14,090)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives (Hardcover, New): Raghu Santanam Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives (Hardcover, New)
Raghu Santanam
R4,952 Discovery Miles 49 520 Ships in 10 - 15 working days

Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as well as the private sector. Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics.

High Performance Networks - Technology and Protocols (Hardcover, 1994 ed.): Ahmed N. Tantawy High Performance Networks - Technology and Protocols (Hardcover, 1994 ed.)
Ahmed N. Tantawy
R4,487 Discovery Miles 44 870 Ships in 10 - 15 working days

In the last few years, the world of information networks has undergone significant changes that will revolutionize the future of communications. Data rates have reached the gigabit per second range. Optical fibers have become the transmission medium of choice. Standardization activities have very aggressively produced a set of well established standard for future LANs, MANs and WANs. It has become very difficult for computer and communications professionals to follow these rapidly evolving technologies and standards. High Performance Networks: Technology and Protocols provides a timely technical overview of the start-of-the-art in high performance networking. Chapters cover lightweight protocols, high performance protocol implementation techniques, high speed MAC protocols, optical networks, as well as emerging standards, including ATM, SMDS, B-ISDN, SONET, FCS and HIPPI. Professionals, engineers, and researchers in communications and computers, who need to understand the underlying technologies of high performance (gigabit) networks, will find this volume to be an invaluable reference. The book is also suitable for use as a text for advanced courses on the subject.

Business Data Networks and Security, Global Edition (Paperback, 10th edition): Raymond Panko, Julia Panko Business Data Networks and Security, Global Edition (Paperback, 10th edition)
Raymond Panko, Julia Panko
R2,794 Discovery Miles 27 940 Ships in 12 - 19 working days

For undergraduate and graduate courses in Business Data Communication / Networking (MIS) Clear writing style, job-ready detail, and focus on the technologies used in today's marketplace Business Data Networks and Security guides readers through the details of networking, while helping them train for the workplace. It starts with the basics of security and network design and management; goes beyond the basic topology and switch operation covering topics like VLANs, link aggregation, switch purchasing considerations, and more; and covers the latest in networking techniques, wireless networking, with an emphasis on security. With this text as a guide, readers learn the basic, introductory topics as a firm foundation; get sound training for the marketplace; see the latest advances in wireless networking; and learn the importance and ins and outs of security.

Cloud Computing - Challenges, Limitations and R&D Solutions (Hardcover, 2014 ed.): Zaigham Mahmood Cloud Computing - Challenges, Limitations and R&D Solutions (Hardcover, 2014 ed.)
Zaigham Mahmood
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

This book reviews the challenging issues that present barriers to greater implementation of the cloud computing paradigm, together with the latest research into developing potential solutions. Topics and features: presents a focus on the most important issues and limitations of cloud computing, covering cloud security and architecture, QoS and SLAs; discusses a methodology for cloud security management, and proposes a framework for secure data storage and identity management in the cloud; introduces a simulation tool for energy-aware cloud environments, and an efficient congestion control system for data center networks; examines the issues of energy-aware VM consolidation in the IaaS provision, and software-defined networking for cloud related applications; reviews current trends and suggests future developments in virtualization, cloud security, QoS data warehouses, cloud federation approaches, and DBaaS provision; predicts how the next generation of utility computing infrastructures will be designed.

Wideband, Multiband, and Smart Antenna Systems (Hardcover, 1st ed. 2021): Mohammad Abdul Matin Wideband, Multiband, and Smart Antenna Systems (Hardcover, 1st ed. 2021)
Mohammad Abdul Matin
R3,442 Discovery Miles 34 420 Ships in 10 - 15 working days

This book provides current R&D trends and novel approaches in design and analysis of broadband, multiband, and smart antennas for 5G and B5G mobile and wireless applications, as well as the identification of integration techniques of these antennas in a diverse range of devices. The book presents theoretical and experimental approaches to help the reader in understanding the unique design issues and more advanced research. Moreover, the book includes chapters on the fundamentals of antenna theory. The book is pertinent to professionals and researchers working in the field of antenna engineering; it is written for graduate students, researchers, academics, and industry practitioners who want to improve their understanding in the current research trends in design analysis of broadband, multiband, and smart antennas for wireless applications.

Information Fusion and Geographic Information Systems (IF&GIS 2013) - Environmental and Urban Challenges (Hardcover, 2014 ed.):... Information Fusion and Geographic Information Systems (IF&GIS 2013) - Environmental and Urban Challenges (Hardcover, 2014 ed.)
Vasily Popovich, Christophe Claramunt, Manfred Schrenk, Kyrill Korolenko
R4,799 R3,655 Discovery Miles 36 550 Save R1,144 (24%) Ships in 12 - 19 working days

The Workshop Proceedings reflect problems of advanced geo-information science with a special emphasis on environmental and urban challenges. The Proceedings incorporate papers presented by leading scientists doing research on environmental issues from modeling to analysis, information processing and visualization. As well as practitioners engaged in GIS and GIS applications development. The Proceedings pay close attention to the problems of scientific and technological innovations as well application opportunities such as getting environmental and global warming problems under control, as well as the monitoring, planning and simulation of urban systems with respect to economic trends as related to: Artificial intelligence; GIS ontologies; GIS data integration and modeling; Environmental management ; Urban GIS; Transportation GIS; GIS data fusion; GIS and corporate information systems; GIS and real-time monitoring systems; GIS algorithms and computational issues; Landscape studies; Global warming; GIS and the Arctic sea; Novel and emerging GIS research areas; Maritime and environmental GIS; and Coastal GIS.

Transactions on Engineering Technologies - Special Volume of the World Congress on Engineering 2013 (Hardcover, 2014): Gi-Chul... Transactions on Engineering Technologies - Special Volume of the World Congress on Engineering 2013 (Hardcover, 2014)
Gi-Chul Yang, Sio-Iong Ao, L. Engelman
R5,729 Discovery Miles 57 290 Ships in 10 - 15 working days

This book contains revised and extended research articles written by prominent researchers participating in the international conference on Advances in Engineering Technologies and Physical Science ("London, U.K., 3-5 July, 2013)." Topics covered include mechanical engineering, bioengineering, internet engineering, image engineering, wireless networks, knowledge engineering, manufacturing engineering, and industrial applications. The book offers state of art of tremendous advances in engineering technologies and physical science and applications, and also serves as an excellent reference work for researchers and graduate students working with/on engineering technologies and physical science.

Mobile Information Systems - IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS) 15-17 September 2004, Oslo,... Mobile Information Systems - IFIP TC 8 Working Conference on Mobile Information Systems (MOBIS) 15-17 September 2004, Oslo, Norway (Hardcover, 2005 ed.)
Elaine Lawrence, Barbara Pernici, John Krogstie
R4,556 Discovery Miles 45 560 Ships in 10 - 15 working days

Mobility is perhaps the most important market and technological trend within information and communication technology. With the advent of new mobile infrastructures providing higher bandwidth and constant connection to the network from virtually everywhere, the way people use information resources is predicted to be radically transformed. Over the last years, a new breed of information systems, referred to as mCommerce systems or mobile information systems, has appeared to address this emerging situation. In 2000, the IFIP 8.1 WG decided to look into establishing a task group to look closer at this area, and the idea was adopted and extended by IFIP TC8 the following year. After the arrangement of several workshop, this task group has been the driving force behind the arrangement of MOBIS (IFIP TC 8 Working Conference on Mobile Information systems) held in Oslo, Norway, 15-17 September 2004. The objective of the working conference was to provide a forum for researchers and practitioners interested in planning, analysis, design, construction, modification, implementation, utilization, evaluation, and management of mobile information systems to meet, and exchange research ideas and results. Specifically, we tried to use the working conference to * Clarify differences and similarities between the development of mobile vs. more traditional information systems * Investigate organizational impact of mobile information systems * Investigate mobile commerce applications combined with the advantages of mobile communications technologies X Mobile Information Systems * Evaluate existing and newly developed approaches for analysis, design, implementation, and evolution of mobile information systems.

WDM Mesh Networks - Management and Survivability (Hardcover, 2003 ed.): Hui Zang WDM Mesh Networks - Management and Survivability (Hardcover, 2003 ed.)
Hui Zang
R2,989 Discovery Miles 29 890 Ships in 10 - 15 working days

In recent years, with the rapid growth of the Internet, the bandwidth demand for data traffic is exploding. Optical networks based on wavelength-division multiplexing (WDM) technology offer the promise to satisfy the bandwidth requirements of the Internet infrastructure. With WDM technology, signals are carried simultaneously on mUltiple wavelengths on a single fiber. WDM provides a practical approach of resolving the mismatch between the fiber ca pacity and the peak electronic processing speed. Mesh-based WDM networks have recently attracted much research and development interest since the In ternet topology is meshed in nature, and more importantly, mesh-based WDM networks are flexible with respect to routing and survivability. This book exam ines the management and survivability issues of mesh-based WDM networks and proposes new WDM network protocols and algorithms that could make telecommunication networks more efficient. Wavelength-routing has been one of the most important technologies to em ploy WDM in backbone networks. In wavelength-routed WDM networks, optical channels, which are referred to as lightpaths, are set up between WDM terminals. Most chapters of this bock are focused on various issues related to wavelength-routed networks, namely, routing and wavelength-assignment, con trol and management, fault management, and wavelength-converter placement. This book also presents an all-optical packet-switched network architecture based on the concept of photonic slot routing. The audience for this book are network designers and planners, research and development engineers active in the field of telecommunications, and students of optical networking at the graduate or senior undergraduate levels."

Security for Web Services and Service-Oriented Architectures (Hardcover, 2010 ed.): Elisa Bertino, Lorenzo Martino, Federica... Security for Web Services and Service-Oriented Architectures (Hardcover, 2010 ed.)
Elisa Bertino, Lorenzo Martino, Federica Paci, Anna Squicciarini
R2,271 Discovery Miles 22 710 Ships in 10 - 15 working days

Web services technologies are advancing fast and being extensively deployed in many di?erent application environments. Web services based on the eXt- sible Markup Language (XML), the Simple Object Access Protocol (SOAP), andrelatedstandards, anddeployedinService-OrientedArchitectures(SOAs) are the key to Web-based interoperability for applications within and across organizations. Furthermore, they are making it possible to deploy appli- tions that can be directly used by people, and thus making the Web a rich and powerful social interaction medium. The term Web 2.0 has been coined to embrace all those new collaborative applications and to indicate a new, "social" approach to generating and distributing Web content, characterized by open communication, decentralization of authority, and freedom to share and reuse. For Web services technologies to hold their promise, it is crucial that - curity of services and their interactions with users be assured. Con?dentiality, integrity, availability, anddigitalidentitymanagementareallrequired.People need to be assured that their interactions with services over the Web are kept con?dential and the privacy of their personal information is preserved. People need to be sure that information they use for looking up and selecting s- vicesiscorrectanditsintegrityisassured.Peoplewantservicestobeavailable when needed. They also require interactions to be convenient and person- ized, in addition to being private. Addressing these requirements, especially when dealing with open distributed applications, is a formidable challenge.

Peer to Peer Computing - The Evolution of a Disruptive Technology (Hardcover, New): Ramesh Subramanian, Brian D Goodman Peer to Peer Computing - The Evolution of a Disruptive Technology (Hardcover, New)
Ramesh Subramanian, Brian D Goodman
R2,569 Discovery Miles 25 690 Ships in 10 - 15 working days

Peer to Peer Computing: The Evolution of Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bio-informatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to Peer Computing includes current articles from academics as well as IT practitioners and consultants from around the world. As a result, the book strikes a balance for many readers. Neither too technical or too managerial, Peer to Peer Computing appeals to the needs of both researchers and practitioners who are trying to gain a more thorough understanding of current P2P technologies and their emerging ramifications.

Performance Evaluation and Planning Methods for the Next Generation Internet (Hardcover, 2005 ed.): Andre Girard, Brunilde... Performance Evaluation and Planning Methods for the Next Generation Internet (Hardcover, 2005 ed.)
Andre Girard, Brunilde Sanso, Felida Vazquez-Abad
R3,095 Discovery Miles 30 950 Ships in 10 - 15 working days

With the ever increasing growth of services and the corresponding demand for Quality of Service requirements that are placed on IP-based networks, the essential aspects of network planning will be critical in the coming years. A wide number of problems must be faced in order for the next generation of IP networks to meet their expected performance. With Performance Evaluation and Planning Methods for the Next Generation Internet, the editors have prepared a volume that outlines and illustrates these developing trends.

A number of the problems examined and analyzed in the book are:

-The design of IP networks and guaranteed performance

-Performances of virtual private networks

-Network design and reliability

-The issues of pricing, routing and the management of QoS

-Design problems arising from wireless networks

-Controlling network congestion

-New applications spawned from Internet use

-Several new models are introduced that will lead to better Internet performance

These are a few of the problem areas addressed in the book and only a selective example of some of the coming key areas in networks requiring performance evaluation and network planning.

Computational Intelligence for Privacy and Security (Hardcover, 2012 ed.): David A. Elizondo, Agusti Solanas, Antoni... Computational Intelligence for Privacy and Security (Hardcover, 2012 ed.)
David A. Elizondo, Agusti Solanas, Antoni Martinez-Balleste
R4,371 Discovery Miles 43 710 Ships in 10 - 15 working days

The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural Networks (IJCNN-2010) held July 2010 in Barcelona, Spain. The book is devoted to Computational Intelligence for Privacy and Security. It provides an overview of the most recent advances on the Computational Intelligence techniques being developed for Privacy and Security. The book will be of interest to researchers in industry and academics and to post-graduate students interested in the latest advances and developments in the field of Computational Intelligence for Privacy and Security.

Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion,... Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012, Proceedings (Hardcover)
Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou
R2,994 Discovery Miles 29 940 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation.

Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event,... Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings (Hardcover, 1st ed. 2021)
Steven Furnell, Nathan Clarke
R2,887 Discovery Miles 28 870 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021.The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology.

Resilience and Risk - Methods and Application in Environment, Cyber and Social Domains (Hardcover, 1st ed. 2017): Igor Linkov,... Resilience and Risk - Methods and Application in Environment, Cyber and Social Domains (Hardcover, 1st ed. 2017)
Igor Linkov, Jose Manuel Palma-Oliveira
R6,432 Discovery Miles 64 320 Ships in 10 - 15 working days

This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains. The book utilizes the collective expertise of scholars and experts in industry, government and academia in the new and emerging field of resilience in order to provide a more comprehensive and universal understanding of how resilience methodology can be applied in various disciplines and applications. This book advocates for a systems-driven view of resilience in applications ranging from cyber security to ecology to social action, and addresses resilience-based management in infrastructure, cyber, social domains and methodology and tools. Risk and Resilience has been written to open up a transparent dialog on resilience management for scientists and practitioners in all relevant academic disciplines and can be used as supplement in teaching risk assessment and management courses.

Agent-Based Service-Oriented Computing (Hardcover, 2010 Ed.): Nathan Griffiths, Kuo-Ming Chao Agent-Based Service-Oriented Computing (Hardcover, 2010 Ed.)
Nathan Griffiths, Kuo-Ming Chao
R3,038 Discovery Miles 30 380 Ships in 10 - 15 working days

Service-Oriented Computing (SOC) allows software development time to be shortened by the composition of existing services across the Internet. Further exploitation of this revolutionary trend is feasible through automation, thanks to the use of software agents and techniques from distributed artificial intelligence.

This book provides an overview of the related technologies and insight into state-of-the art research results in the field. The topics discussed cover the various stages in the life cycle of service-oriented software development using agent technologies to automate the development process and to manage services in a dynamic environment. The book presents both academic research results and the latest developments from industry.

Researchers from academia and industry, as well as postgraduates, will find this cutting-edge volume indispensable in order to gain understanding of the issues associated with agent-based service-oriented computing along with recent, and likely future technology trends.

IP Network-based Multi-agent Systems for Industrial Automation - Information Management, Condition Monitoring and Control of... IP Network-based Multi-agent Systems for Industrial Automation - Information Management, Condition Monitoring and Control of Power Systems (Hardcover, 2007 ed.)
David P. Buse, Q.-H. Wu
R2,989 Discovery Miles 29 890 Ships in 10 - 15 working days

A mobile agent is a software program with the capability to suspend its execution and resume it on another computer. Agents are a relatively recent development in computer science, which have become a popular and useful methodology for the modelling and implementation of distributed systems, particularly those consisting of a number of largely autonomous components. The extensive use of multi-agent systems in various areas including information management, industrial control and manufacturing systems, suggests that the multi-agent systems methodology may also be appropriate for the design of power system automation systems.

IP Network-based Multi-agent Systems for Industrial Automation: Information Management, Condition Monitoring and Control of Power Systems is the first book to present an introduction to the use of the Internet protocol suite and multi-agent systems for the information management, online monitoring and control of distributed power system substations. It proposes an open architecture for information management and control, based on the concepts of multi-agent systems and mobile agents. In this book, mobile agents are applied to the retrieval and analysis of substation data, and to remote operator intervention. This book also describes a prototype implementation of the architecture, in the form of a substation information management system, which has been demonstrated and evaluated using a substation simulator. The architecture is also evaluated theoretically with respect to its performance, modifiability, functionality and reliability.

As mobile agent technologies are in the early stages the real applications of these technologies are rare; IPNetwork-based Multi-agent Systems for Industrial Automation: Information Management, Condition Monitoring and Control of Power Systems will be an excellent reference for postgraduates, researchers and academics in engineering and computer science, as well as engineers in system automation and managers in distributed industrial systems.

Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Hardcover, Edition.): Benoit Badrignans, Jean-Luc... Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Hardcover, Edition.)
Benoit Badrignans, Jean-Luc Danger, Viktor Fischer, Guy Gogniat, Lionel Torres
R2,880 Discovery Miles 28 800 Ships in 10 - 15 working days

In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid. It is essential from a design point of view to be aware of all the levels in order to provide a comprehensive solution. The strength of a system is defined by its weakest point; there is no reason to enhance other protection means, if the weakest point remains untreated. Many severe attacks have considered this weakness in order not to face brute force attack complexity. Several solutions are proposed in Security Trends for FPGA's especially at the logical, architecture and system levels in order to provide a global solution.

Advances in Air Pollution Modeling for Environmental Security - Proceedings of the NATO Advanced Research Workshop Advances in... Advances in Air Pollution Modeling for Environmental Security - Proceedings of the NATO Advanced Research Workshop Advances in Air Pollution Modeling for Environmental Security, Borovetz, Bulgaria, 8-12 May 2004 (Hardcover, 2005 ed.)
Istvan Farago, Krassimir Georgiev, Agnes Havasi
R2,940 Discovery Miles 29 400 Ships in 10 - 15 working days

The protection of our environment is one of the major problems in the society. More and more important physical and chemical mechanisms are to be added to the air pollution models. Moreover, new reliable and robust control strategies for keeping the pollution caused by harmful compounds under certain safe levels have to be developed and used in a routine way. Well based and correctly analyzed large mathematical models can successfully be used to solve this task. The use of such models leads to the treatment of huge computational tasks. The efficient solution of such problems requires combined research from specialists working in different fields. The aim of the NATO Advanced Research Workshop (NATO ARW) entitled "Advances in Air Pollution Modeling for Environmental Security" was to invite specialists from all areas related to large-scale air pollution modeling and to exchange information and plans for future actions towards improving the reliability and the scope of application of the existing air pollution models and tools. This ARW was planned to be an interdisciplinary event, which provided a forum for discussions between physicists, meteorologists, chemists, computer scientists and specialists in numerical analysis about different ways for improving the performance and the quality of the results of different air pollution models.

Architecting User-Centric Privacy-as-a-Set-of-Services - Digital Identity-Related Privacy Framework (Hardcover, 2014 ed.):... Architecting User-Centric Privacy-as-a-Set-of-Services - Digital Identity-Related Privacy Framework (Hardcover, 2014 ed.)
Ghazi Ben Ayed
R4,069 R3,499 Discovery Miles 34 990 Save R570 (14%) Ships in 12 - 19 working days

How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the author addresses major issues of identity protection and proposes a service-oriented layered framework to achieve interoperability of privacy and secure distributed systems. The framework is intended to distill privacy-related digital identity requirements (business interoperability) into a set of services, which in turn can be implemented on the basis of open standards (technical interoperability). The adoption of the proposed framework in security projects and initiatives would decrease complexities and foster understanding and collaborations between business and technical stakeholders. This work is a step toward implementing the author's vision of delivering cyber security as a set of autonomous multi-platform hosted services that should be available upon user request and on a pay-per-use basis.

Wireless and Mobile Networking - Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009,... Wireless and Mobile Networking - Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009, Proceedings (Hardcover, 2009 ed.)
Jozef Wozniak, Jerzy Konorski, Ryszard Katulski, Andrzej R. Pach
R2,932 Discovery Miles 29 320 Ships in 10 - 15 working days

Recent spectacular achievements in wireless, mobile, and sensor networks have dramatically changed our lives in many ways. However, the rapid evolution of wireless systems not only promises increased functionality, reliability, availability, and security, as well as putting a wide variety of new services at the users' disposal ? it also creates a number of design challenges that our research community is now facing. Scientists and engineers need to come up with, and promptly implement, novel wireless network architectures, while system operators and planners rethink their business models and attend to the growing expectations of their customer base. To provide a suitable forum for discussion between researchers, practitioners, and industry representatives interested in new developments in the respective research area, IFIP WG 6. 8 launched three separate series of conferences: MWCN (Mobile and Wireless Communications Networks), PWC (Personal Wireless Communications), and WSAN (Wireless Sensor and Actors Networks). In 2008, MWCN and PWC were merged into the IFIP Wireless and Mobile Networking Conference (WMNC 2008), held in Toulouse, France, from September 30 to October 2, 2008. MWNC 2008 and PWC 2008 topics were subsequently revised with a view to covering the whole spectrum of hot issues in wireless and mobile networking. As a result, IFIP WG 6. 8 decided to add WSAN as another WMNC track.

Formal Aspects in Security and Trust - IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer... Formal Aspects in Security and Trust - IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, Toulouse, France (Hardcover, 2005 ed.)
Theo Dimitrakos, Fabio Martinelli
R3,020 Discovery Miles 30 200 Ships in 10 - 15 working days

Second International Workshop on Formal Aspects in Security and Trust is an essential reference for both academic and professional researchers in the field of security and trust.

Because of the complexity and scale of deployment of emerging ICT systems based on web service and grid computing concepts, we also need to develop new, scalable, and more flexible foundational models of pervasive security enforcement across organizational borders and in situations where there is high uncertainty about the identity and trustworthiness of the participating networked entites. On the other hand, the increasingly complex set of building activities sharing different resources but managed with different policies calls for new and business-enabling models of trust between members of virtual organizations and communities that span the boundaries of physical enterprises and loosely structured groups of individuals.

The papers presented in this volume address the challenges posed by "ambient intelligence space" as a future paradigm and the need for a set of concepts, tools and methodologies to enable the user's trust and confidence in the underlying computing infrastructure.

This state-of-the-art volume presents selected papers from the 2nd International Workshop on Formal Aspects in Security and Trust, held in conjuuctions with the 18th IFIP World Computer Congress, August 2004, in Toulouse, France.

The collection will be important not only for computer security experts and researchers but also for teachers and adminstrators interested in security methodologies and research.

Applied Ontology Engineering in Cloud Services, Networks and Management Systems (Hardcover, 2012): J. Martin Serrano Applied Ontology Engineering in Cloud Services, Networks and Management Systems (Hardcover, 2012)
J. Martin Serrano
R2,884 Discovery Miles 28 840 Ships in 10 - 15 working days

Metadata standards in today's ICT sector are proliferating at unprecedented levels, while automated information management systems collect and process exponentially increasing quantities of data. With interoperability and knowledge exchange identified as a core challenge in the sector, this book examines the role ontology engineering can play in providing solutions to the problems of information interoperability and linked data. At the same time as introducing basic concepts of ontology engineering, the book discusses methodological approaches to formal representation of data and information models, thus facilitating information interoperability between heterogeneous, complex and distributed communication systems. In doing so, the text advocates the advantages of using ontology engineering in telecommunications systems. In addition, it offers a wealth of guidance and best-practice techniques for instances in which ontology engineering is applied in cloud services, computer networks and management systems.

Engineering and computer science professionals (infrastructure architects, software developers, service designers, infrastructure operators, engineers, etc.) are today confronted as never before with the challenge of convergence in software solutions and technology. This book will help them respond creatively to what is sure to be a period of rapid development.

"

Switched-Current Design and Implementation of Oversampling A/D Converters (Hardcover, 1997 ed.): Nianxiong Tan Switched-Current Design and Implementation of Oversampling A/D Converters (Hardcover, 1997 ed.)
Nianxiong Tan
R4,487 Discovery Miles 44 870 Ships in 10 - 15 working days

Switched-Current Design and Implementation of Oversampling A/D Converters discusses the switched-current (SI) technique and its application in oversampling A/D converters design. The SI technique is an analog sampled-data technique that fully exploits the digital CMOS process. Compared with the traditional switched-capacitor (SC) technique, the SI technique has both pros and cons that are highlighted in the book. With the consideration of similarity and difference of SI and SC techniques, oversampling A/D converter architectures are tailored and optimized for SI design and implementation in the book. Switched-Current Design and Implementation of Oversampling A/D Converters emphasizes the practical aspects of SI circuits without tedious mathematical derivations, and is full of circuit design and implementation examples. There are more than 10 different chips included in the book, demonstrating the high-speed (over 100 MHz) and ultra-low-voltage (1.2 V) operation of SI circuits and systems in standard digital CMOS processes. Therefore, the book is of special value as a practical guide for designing SI circuits and SI oversampling A/D converters. Switched-Current Design and Implementation of Oversampling A/D Converters serves as an excellent reference for analog designers, especially A/D converter designers, and is of interest to digital designers for real-time signal processing who need A/D interfaces. The book may also be used as a text for advanced courses on the subject.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Community Engagement in the Online Space
Michelle Dennis, James H Albert Hardcover R5,824 Discovery Miles 58 240
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,540 Discovery Miles 15 400
Guide to Networking Essentials
Greg Tomsho Paperback R1,452 R1,344 Discovery Miles 13 440
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,420 R1,316 Discovery Miles 13 160
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,420 R1,316 Discovery Miles 13 160
Managing Business Projects - The…
Frank Einhorn Paperback R515 Discovery Miles 5 150
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,916 Discovery Miles 19 160
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,397 Discovery Miles 13 970
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,932 Discovery Miles 19 320

 

Partners