![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
Today, many institutions and corporations are involved in various grid researches that involve improvement in concepts, protocols, applications, methods, and tools. To help capture the rapid growth in grid concepts and applications and chart the future direction in this field, a resource compiling current advances in grid computing is essential. The Handbook of Research on Grid Technologies and Utility Computing: Concepts for Managing Large-Scale Applications provides a compendium of terms, definitions, and explanations of concepts, issues, processes, and trends in grid technology. As the first book collection of its kind, this reference features current articles presenting comprehensive coverage of grid technologies valuable to any researcher, practitioner, or academician in grid computing.
This book is about software piracy--what it is and how it's done.
Stealing software is not to be condoned, and theft of intellectual
property and copyright infringement are serious matters, but it's
totally unrealistic to pretend that it doesn't happen. Software
piracy has reached epidemic proportions. Many computer users know
this, the software companies know this, and once you've read the
Introduction to this book, you'll understand why. Seeing how
widespread software piracy is, learning how it's accomplished, and
particularly how incredibly easy it is to do might surprise you.
This book describes how software piracy is actually being carried
out.
Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information Security in Biomedical Signal Processing provides emerging research on security in biomedical data as well as techniques for accurate reading and further processing. While highlighting topics such as image processing, secure access, and watermarking, this publication explores advanced models and algorithms in information security in the modern healthcare system. This publication is a vital resource for academicians, medical professionals, technology developers, researchers, students, and practitioners seeking current research on intelligent techniques in medical data security.
As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.
A practical reference written to assist the security professional
in clearly identifying what systems are required to meet security
needs as defined by a threat analysis and vulnerability assessment.
All of the elements necessary to conduct a detailed survey of a
facility and the methods used to document the findings of that
survey are covered. Once the required systems are determined, the
chapters following present how to assemble and evaluate bids for
the acquisition of the required systems in a manner that will meet
the most rigorous standards established for competitive bidding.
The book also provides recommended approaches for system/user
implementation, giving checklists and examples for developing
management controls using the installed systems. This book was
developed after a careful examination of the approved reference
material available from the American Society for Industrial
Security (ASIS International) for the certification of Physical
Security Professionals (PSP). It is intended to fill voids left by
the currently approved reference material to perform implementation
of systems suggested in the existing reference texts. This book is
an excellent "How To" for the aspiring security professional who
wishes to take on the responsibilities of security system
implementation, or the security manager who wants to do a
professional job of system acquisition without hiring a
professional consultant.
This volume is number 67 in the series Advances in Computers that began back in 1960. This is the longest continuously published series of books that chronicles the evolution of the computer industry. Each year three volumes are produced presenting approximately 20 chapters that describe the latest technology in the use of computers today. Volume 67, subtitled "Web technology," presents 6 chapters that show the impact that the World Wide Web is having on our society today. The general theme running throughout the volume is the ubiquity of web services. Topics such as wireless access and its problems and reliability of web communications are emphasized.
Wireless networking is poised to have a massive impact on
communications, and the 802.11 standard is to wireless networking
what Ethernet is to wired networking. There are already over 50
million devices using the dominant IEEE 802.11 (essentially
wireless Ethernet) standard, with astronomical growth predicted
over the next 10 years. New applications are emerging every day,
with wireless capability being embedded in everything from electric
meters to hospital patient tracking systems to security devices.
The explosive growth and deployment of networking technology poses many security challenges to networking professionals including network administrators and information systems managers. Often, network administrators and managers learn about specific tools and techniques that are applicable to specific systems or situations only, and hence, have a great deal of difficulty in applying their knowledge of security when a technology, a system, or a situation changes. Network Security, Administration and Management: Advancing Technology and Practice identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems. This book is a collection of current research and practices in network security and administration to be used as a reference by practitioners as well as a text by academicians and trainers.
Cloud computing has become integrated into all sectors, from business to quotidian life. Since it has revolutionized modern computing, there is a need for updated research related to the architecture and frameworks necessary to maintain its efficiency. The Handbook of Research on End-to-End Cloud Computing Architecture Design provides architectural design and implementation studies on cloud computing from an end-to-end approach, including the latest industrial works and extensive research studies of cloud computing. This handbook enumerates deep dive and systemic studies of cloud computing from architecture to implementation. This book is a comprehensive publication ideal for programmers, IT professionals, students, researchers, and engineers.
In this book, you will gain extensive hands-on experience
installing and configuring a firewall. You will also learn how to
allow access to key Web services while maintaining your
organization's security, as well as how to implement
firewall-to-firewall virtual private networks (VPNs). You will
learn how to build a firewall to protect your network; provide
access to HTTP and FTP services on the Internet, and implement
publicly accessible servers without compromising security.
Furthermore, throughout the book, extensive hands-on examples
provide you with practical experience in establishing security with
firewalls. Examples include, but are not limited to: Installing and
configuring Check Point FireWall-1; scanning to validate
configuration using ISS Internet Scanner; configuring the firewall
to support simple and complex Web services; setting up a packet
filtering router; enhancing firewall configurations to support
split-DNS; authenticating remote users; and protecting browsers and
servers with a proxy-based firewall.
The book is logically divided into 5 main categories with each
category representing a major skill set required by most security
professionals:
Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam folders, and those are good ideas as far as they go. But the truth is, there are people out there - a lot of them - who treat stealing your identity as a full-time job.One such company is a nameless firm located in Russia, which has a trove of over a billion internet passwords. Another set up a website full of live streams of hacked web cameras, showing everything from people's offices and lobbies to the feeds from baby monitors. Even purchases made in person are still logged by retailers like Target, who are famously vulnerable to hackers. Adam Levin, a longtime consumer advocate and identity fraud expert, is your guide to this brave new world. By telling memorable stories and extracting the relevant lessons, he offers a strategy for dealing with these risks. You may not be able to prevent identity theft, but you certainly shouldn't wait until it happens to take action. Levin's approach is defined by the three M's: minimizing risk, monitoring your identity, and managing the damage. The book is also organized around the different problems caused by identity theft: financial, criminal, medical, familial, etc., enabling readers to dip into the sections most relevant to them. Swiped is a practical, lively book that is essential to surviving the ever-changing world of online security. It is invaluable not only for preventing problems but helping cope when they arrive.
Today's smartphones utilize a rapidly developing range of sophisticated applications, pushing the limits of mobile processing power. The increased demand for cell phone applications has necessitated the rise of mobile cloud computing, a technological research arena which combines cloud computing, mobile computing, and wireless networks to maximize the computational and data storage capabilities of mobile devices. Enabling Real-Time Mobile Cloud Computing through Emerging Technologies is an authoritative and accessible resource that incorporates surveys, tutorials, and the latest scholarly research on cellular technologies to explore the latest developments in mobile and wireless computing technologies. With its exhaustive coverage of emerging techniques, protocols, and computational structures, this reference work is an ideal tool for students, instructors, and researchers in the field of telecommunications. This reference work features astute articles on a wide range of current research topics including, but not limited to, architectural communication components (cloudlets), infrastructural components, secure mobile cloud computing, medical cloud computing, network latency, and emerging open source structures that optimize and accelerate smartphones.
Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks' shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.
The SANS Institute maintains a list of the "Top 10 Software
Vulnerabilities." At the current time, over half of these
vulnerabilities are exploitable by Buffer Overflow attacks, making
this class of attack one of the most common and most dangerous
weapon used by malicious attackers. This is the first book
specifically aimed at detecting, exploiting, and preventing the
most common and dangerous attacks.
Quality of service provides different priorities to different users to guarantee a certain level of performance to a data flow in accordance with requests from the Internet service provider policy. Quality of Service Architectures for Wireless Networks: Performance Metrics and Management presents a comprehensive collection of quality of service mechanisms for various access technologies and introduces existing and traditional approaches to traffic management for wireless technologies. With expert international contributions, this critical mass of knowledge covers both academic and industry-based state-of-the-art techniques and ongoing research.
The emergence of artificial intelligence has created a vast amount of advancements within various professional sectors and has transformed the way organizations conduct themselves. The implementation of intelligent systems has assisted with developing traditional processes including decision making, risk management, and security. An area that requires significant attention and research is how these companies are becoming accustomed to computer intelligence and applying this technology to their everyday practices. Transdisciplinary Perspectives on Risk Management and Cyber Intelligence is a pivotal reference source that provides vital research on the application of intelligent systems within various professional sectors as well as the exploration of theories and empirical findings. While highlighting topics such as decision making, cognitive science, and knowledge management, this publication explores the management of risk and uncertainty using training exercises, as well as the development of managerial intelligence competency. This book is ideally designed for practitioners, educators, researchers, policymakers, managers, developers, analysts, politicians, and students seeking current research on modern approaches to the analysis and performance of cyber intelligence.
In recent years, the field of multimedia communication in wireless and mobile video has grown in attraction. As the number of networks, types of devices, and content representation formats increase, the need for multimedia transcoding in wireless and mobile networks intensifies in order to provide a seamless interaction between content creation and usage.""Multimedia Transcoding in Mobile and Wireless Networks"" addresses the transcoding of all multimedia elements, including video, audio and text, while addressing both practical and theoretical problems in the field. A must have resource for all stakeholders in mobile and wireless technologies, this book embodies state-of-the-art knowledge of transcoding as it is embedded in today's pioneering technologies and leading research.
This book is jointly compiled by Chinese Academy of Sciences, Cyberspace Administration of China, Ministry of Education of the People's Republic of China, Ministry of Science and Technology of the People's Republic of China, Chinese Academy of Social Sciences, National Natural Science Foundation of China and Chinese Academy of Agricultural Sciences. Over the past several years, Chinese scholars have contributed numerous research works on the development of Chinese scientific information and technology, and produced a range of outstanding achievements. Focusing on the main topic of e-Science, this book explores the forefront of science and technology around the globe, the major demands in China and the main fields in China's economic development. Furthermore, it reviews the major achievements and the typical cases in China's e-Science research. It provides a valuable reference source for future technological innovations and will introduce researchers and students in the area of e-Science to the latest results in China.
In designing a network device, you make dozens of decisions that
affect the speed with which it will perform sometimes for better,
but sometimes for worse. Network Algorithmics provides a complete,
coherent methodology for maximizing speed while meeting your other
design goals. |
You may like...
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, …
Hardcover
R7,752
Discovery Miles 77 520
CCNA 200-301 Network Simulator
Sean Wilkins
Digital product license key
R2,877
Discovery Miles 28 770
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,452
Discovery Miles 14 520
|